summaryrefslogtreecommitdiff
path: root/app-forensics
diff options
context:
space:
mode:
Diffstat (limited to 'app-forensics')
-rw-r--r--app-forensics/Manifest.gzbin4874 -> 4881 bytes
-rw-r--r--app-forensics/mac-robber/Manifest2
-rw-r--r--app-forensics/mac-robber/metadata.xml22
3 files changed, 12 insertions, 12 deletions
diff --git a/app-forensics/Manifest.gz b/app-forensics/Manifest.gz
index ba20caf372bc..d939ccbd3fab 100644
--- a/app-forensics/Manifest.gz
+++ b/app-forensics/Manifest.gz
Binary files differ
diff --git a/app-forensics/mac-robber/Manifest b/app-forensics/mac-robber/Manifest
index f3411d040459..92aa7f284884 100644
--- a/app-forensics/mac-robber/Manifest
+++ b/app-forensics/mac-robber/Manifest
@@ -1,3 +1,3 @@
DIST mac-robber-1.02.tar.gz 11708 BLAKE2B d6d35be3c52b5bc93eb779ca3693c4213c57dcb4ecfb24912e92f47b3f896d948c8ccadef39f49af3c455cdff3a92adbca7e3d1e35ef0ebc885034bfa3c0743b SHA512 5330f766eb08aa766ca3f430684e0a40ecf29b7230a582c30a36bbaaa481d52c2a8519fa04e82762f09259ada9e77466c1430aebdff22615a511d519916d54a7
EBUILD mac-robber-1.02.ebuild 612 BLAKE2B 2e24716d4da4657367314593b8293916b63db195e968bc772e3249b6235b5b1d3deac0db616b88a6f72cd29855ed803262839f3469142088378f5a268089aaf7 SHA512 e9a37e85ec1036237297036b789e4fe35f6c6b047b04a42704ccc2f87a6b00713d15bcfb4626027f007b69eda74976759600356d81588da62755d04416b09c08
-MISC metadata.xml 1424 BLAKE2B 1a753087b90e3145fa739fa3cd1cf4b3430754c81786055febc5ba5bf8eac5319af8183e49a489b03eb6802961f63dc31d611ed88d6ca76d0c23c438f4015889 SHA512 f4b0be5dafa7d5044fd84e259c8b98ca560803b477b2ef67524e7a5a6592167fe83b187183878ce4cec3299aed7482633127494a3f4df8879cfa75d3c0f386f9
+MISC metadata.xml 1426 BLAKE2B 70b2972d19b70b4c0f0a1827e832605a46ceb9ee80eefffe309ecedbd2b12bf0d41fed3b426c725fe206f945d0f1507983e04b2069cd2cd57de73093d577e764 SHA512 3a582effe63123460595884d1be07fb041af6f19839cd226b3b80aa2296caf51a0ecbc6f72d6d3470e45ec19e3740a350ceba98caba721d2c7da57a02d6fdd4a
diff --git a/app-forensics/mac-robber/metadata.xml b/app-forensics/mac-robber/metadata.xml
index 4cf2ee79205f..0c56b2d46030 100644
--- a/app-forensics/mac-robber/metadata.xml
+++ b/app-forensics/mac-robber/metadata.xml
@@ -3,20 +3,20 @@
<pkgmetadata>
<!-- maintainer-needed -->
<longdescription>
-mac-robber is a digital forensics and incident response tool that collects data from allocated files in a mounted file system.
-The data can be used by the mactime tool in The Sleuth Kit to make a timeline of file activity. The mac-robber tool is based on
-the grave-robber tool from TCT and is written in C instead of Perl.
+ mac-robber is a digital forensics and incident response tool that collects data from allocated files in a mounted file system.
+ The data can be used by the mactime tool in The Sleuth Kit to make a timeline of file activity. The mac-robber tool is based on
+ the grave-robber tool from TCT and is written in C instead of Perl.
-mac-robber requires that the file system be mounted by the operating system, unlike the tools in The Sleuth Kit that process the
-file system themselves. Therefore, mac-robber will not collect data from deleted files or files that have been hidden by
-rootkits. mac-robber will also modify the Access times on directories that are mounted with write permissions.
+ mac-robber requires that the file system be mounted by the operating system, unlike the tools in The Sleuth Kit that process the
+ file system themselves. Therefore, mac-robber will not collect data from deleted files or files that have been hidden by
+ rootkits. mac-robber will also modify the Access times on directories that are mounted with write permissions.
-"What is mac-robber good for then", you ask? mac-robber is useful when dealing with a file system that is not supported by The
-Sleuth Kit or other forensic tools. mac-robber is very basic C and should compile on any UNIX system. Therefore, you can run
-mac-robber on an obscure, suspect UNIX file system that has been mounted read-only on a trusted system. I have also used
-mac-robber during investigations of common UNIX systems such as AIX.
-</longdescription>
+ "What is mac-robber good for then", you ask? mac-robber is useful when dealing with a file system that is not supported by The
+ Sleuth Kit or other forensic tools. mac-robber is very basic C and should compile on any UNIX system. Therefore, you can run
+ mac-robber on an obscure, suspect UNIX file system that has been mounted read-only on a trusted system. I have also used
+ mac-robber during investigations of common UNIX systems such as AIX.
+ </longdescription>
<upstream>
<remote-id type="sourceforge">mac-robber</remote-id>
</upstream>