samhain 3.1.0-7build1 source package in Ubuntu

Changelog

samhain (3.1.0-7build1) wily; urgency=medium

  * No-change rebuild against libprelude2v5

 -- Steve Langasek <email address hidden>  Mon, 10 Aug 2015 23:27:14 +0000

Upload details

Uploaded by:
Steve Langasek on 2015-08-10
Uploaded to:
Wily
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Xenial release on 2015-10-22 universe admin

Downloads

File Size SHA-256 Checksum
samhain_3.1.0.orig.tar.gz 2.0 MiB 0b9b8133861fd612bc23681afd5cfdecbe1aafae9c0de5e0504f64a25432e301
samhain_3.1.0-7build1.diff.gz 49.2 KiB 8332da94bafe1aab63d8a7f8bcd9378f3b6d9a06b1ba472c0baa3a29535fe6e9
samhain_3.1.0-7build1.dsc 1.9 KiB 557f64b8913283d39058c0e5efc4081edc6fa7d3d9f558a9ddbef2057d16c5a6

View changes file

Binary packages built by this source

samhain: Data integrity and host intrusion alert system

 Samhain is an integrity checker and host intrusion detection system that
 can be used on single hosts as well as large, UNIX-based networks.
 It supports central monitoring as well as powerful (and new) stealth
 features to run undetected on memory using steganography.
 .
 Main features
     * Complete integrity check
          + uses cryptographic checksums of files to detect
            modifications,
          + can find rogue SUID executables anywhere on disk, and
     * Centralized monitoring
          + native support for logging to a central server via encrypted
            and authenticated connections
     * Tamper resistance
          + database and configuration files can be signed
          + logfile entries and e-mail reports are signed
          + support for stealth operation

samhain-dbgsym: debug symbols for package samhain

 Samhain is an integrity checker and host intrusion detection system that
 can be used on single hosts as well as large, UNIX-based networks.
 It supports central monitoring as well as powerful (and new) stealth
 features to run undetected on memory using steganography.
 .
 Main features
     * Complete integrity check
          + uses cryptographic checksums of files to detect
            modifications,
          + can find rogue SUID executables anywhere on disk, and
     * Centralized monitoring
          + native support for logging to a central server via encrypted
            and authenticated connections
     * Tamper resistance
          + database and configuration files can be signed
          + logfile entries and e-mail reports are signed
          + support for stealth operation