stealth - stealthy File Integrity Checker
|Distribution||Debian 7 (Wheezy)|
|Repository||Debian Main i386|
|Installed size||214 B|
|Download size||85.10 KB|
The STEALTH program performs File Integrity Checks on (remote) clients. It differs from other File Integrity Checkers by not requiring baseline integrity data to be kept on either write-only media or in the client's file system. In fact, clients will hardly contain any indication suggesting that they are being monitored, thus improving the stealthiness of the integrity scans. STEALTH uses standard available software to perform file integrity checks (like find(1) and sha1sum(1)). Using individualized policy files, it is highly adaptable to the specific characteristics of its clients. In production environments STEALTH should be run from an isolated computer (called the `STEALTH monitor'). In optimal configurations the STEALTH monitor should be a computer not accepting incoming connections. The account used to connect to its clients does not have to be `root'; usually read-access to the client's file system is enough to perform a full integrity check. Instead of using `root' a more restrictive administrative or ordinary account might offer all necessary requirements for the desired integrity check. STEALTH itself must communicate with the computers it should monitor. It is essential that this communication is secure. STEALTH configurations therefore normally specify SSH as the command-shell to use for connecting to clients. STEALTH may be configured so as to use but one SSH connection per client, even if integrity scans are to be performed repeatedly. Apart from this, the STEALTH monitor is commonly allowed to send e-mail to remote client systems' maintainers. STEALTH-runs itself may start randomly within specified intervals. The resulting unpredicability of STEALTH-runs further increases STEALTH's stealthiness. STEALTH's acronym is expanded to `Ssh-based Trust Enforcement Acquired through a Locally Trusted Host': the client's trust is enforced, the locally trusted host is the STEALTH monitor.
- Update the package index:
# sudo apt-get update
- Install stealth deb package:
# sudo apt-get install stealth
2012-06-16 - Frank B. Brokken <email@example.com> stealth (2.10.00-1) unstable; urgency=low * New upstream release + new option --reload and supports skipping directories * Added relro to LDFLAGS
2012-06-03 - Frank B. Brokken <firstname.lastname@example.org> stealth (2.04.00-1) unstable; urgency=low * New upstream release fixes failing command recognition
2012-05-31 - tony mancill <email@example.com> stealth (2.03.00-1) unstable; urgency=low [ Frank B. Brokken ] * New upstream release depends on Bobcat 3.01.00 [ tony mancill ] * d/compat set to 8
2012-01-08 - Frank B. Brokken <firstname.lastname@example.org> stealth (2.02.02-1) unstable; urgency=low * New upstream release * Build-Depend on g++ >= 4.6.2, and bobcat >= 2.21.00
2011-06-27 - George Danchev <email@example.com> stealth (2.02.01-3) unstable; urgency=low * Build-Depend on g++ >= 4:4.6.0, better support for c++0x. (fixes ftbfs with older compilers on some architectures)
2011-06-26 - George Danchev <firstname.lastname@example.org> stealth (2.02.01-2) unstable; urgency=low * install-arch should not depend on build. * move texlive-latex-base, texlive-generic-recommended, texlive-latex-recommended, texlive-fonts-recommended, ghostscript back to depends as they are need to create the documentation of stealth (arch-dependent) package.
2011-06-26 - Frank B. Brokken <email@example.com> stealth (2.02.01-1) unstable; urgency=low * Nw upstream release + Removed FnWrap* calls from Stealth's sources + `build' script now recognizes CXXFLAGS and LDFLAGS for, resp. g++ and ld flags. Default values are set in INSTALL.im, as before. * [GD] Rename build to build-arch. * [GD] Drop configure* targets.
2011-06-08 - George Danchev <firstname.lastname@example.org> stealth (2.02.00-2) unstable; urgency=low * [GD] pass -a to dh_* in binary-arch. * [GD] do not compess .dvi, .latex, .txt, .ps, .pdf. * [GD] drop duplicate (empty) binary-indep target. * [GD] remove useless spaces from rules and control.
2011-06-07 - Frank B. Brokken <email@example.com> stealth (2.02.00-1) unstable; urgency=low * New upstream release. * [FB] build depend on bobcat >= 2.17.00. * [GD] honor noopt via DEB_BUILD_OPTIONS.
2011-05-31 - George Danchev <firstname.lastname@example.org> stealth (2.01.00-4) unstable; urgency=low * Change to source format 3.0 (quilt).
|steghide_0.5.1-9+b2_i386.deb||A steganography hiding tool|
|stella_3.7.2-1_i386.deb||Atari 2600 Emulator for SDL & the X Window System|
|stellarium-data_0.11.3-1+deb7u1_all.deb||Stellarium data files|
|stellarium_0.11.3-1+deb7u1_i386.deb||real-time photo-realistic sky generator|
|step_4.8.4-1_i386.deb||interactive physical simulator for KDE|
|stepbill.app_2.4-5+b5_i386.deb||Get rid of those nasty Wingdows viruses|
|steptalk_0.10.0-5+b1_i386.deb||GNUstep Scripting Framework|
|stgit-contrib_0.15-1.1_all.deb||set of contributed script to help working with stgit|
|stgit_0.15-1.1_all.deb||manage stacks of patches in a git repository|
|stimfit_0.10.18-1.1+b1_i386.deb||A program for viewing and analyzing electrophysiological data|
|stk-doc_4.4.3-2+deb7u1_all.deb||Sound Synthesis Toolkit (documentation)|
|stk_4.4.3-2+deb7u1_i386.deb||Sound Synthesis Toolkit (example applications)|
|stl-manual_3.30-13_all.deb||C++-STL documentation in HTML|
|stockfish_2.1.1+git20111006-2_i386.deb||strong chess engine, to play chess against|
|stompserver_0.9.9gem-2_all.deb||stomp messaging server implemented in Ruby|