summaryrefslogtreecommitdiffstats
path: root/system/sleuthkit
diff options
context:
space:
mode:
author Barry J. Grundy <bgrundyatlinuxleo.com>2013-03-11 19:30:13 -0400
committer dsomero <xgizzmo@slackbuilds.org>2013-03-22 07:16:40 -0400
commitd30c249588095443f15225c70d35f8099efff699 (patch)
tree7652a6dcae09dcdd1384ed9ab71d29cac32dd073 /system/sleuthkit
parentbb8798c4d225252f1ce5567708f3bb71570d1be0 (diff)
downloadslackbuilds-d30c249588095443f15225c70d35f8099efff699.tar.gz
slackbuilds-d30c249588095443f15225c70d35f8099efff699.tar.xz
system/sleuthkit: Updated for version 4.0.2.
Signed-off-by: dsomero <xgizzmo@slackbuilds.org>
Diffstat (limited to 'system/sleuthkit')
-rw-r--r--system/sleuthkit/README18
-rw-r--r--system/sleuthkit/slack-desc24
-rw-r--r--system/sleuthkit/sleuthkit.SlackBuild6
-rw-r--r--system/sleuthkit/sleuthkit.info6
4 files changed, 29 insertions, 25 deletions
diff --git a/system/sleuthkit/README b/system/sleuthkit/README
index 0d3bcb40ce..f64c370f72 100644
--- a/system/sleuthkit/README
+++ b/system/sleuthkit/README
@@ -1,8 +1,12 @@
-The Sleuth Kit is an open source forensic toolkit for analyzing
-Microsoft and UNIX file systems and disks. The Sleuth Kit enables
-investigators to identify and recover evidence from images
-acquired during incident response or from live systems. The
-Sleuth Kit is open source, which allows investigators to verify
-the actions of the tool or customize it to specific needs.
+The Sleuth Kit (TSK) is a library and collection of command line
+tools that allow you to investigate disk images. The core
+functionality of TSK allows you to analyze volume and file system
+data. The plug-in framework allows you to incorporate additional
+modules to analyze file contents and build automated systems. The
+library can be incorporated into larger digital forensics tools and
+the command line tools can be directly used to find evidence.
-Sleuthkit can use libewf and afflib.
+
+Sleuthkit can optionally use libewf (for Expert Witness files)
+and afflib (for Advanced Forensic Format files). Both are available
+in SBo.
diff --git a/system/sleuthkit/slack-desc b/system/sleuthkit/slack-desc
index da8bebf4f3..07daf92a51 100644
--- a/system/sleuthkit/slack-desc
+++ b/system/sleuthkit/slack-desc
@@ -1,19 +1,19 @@
# HOW TO EDIT THIS FILE:
-# The "handy ruler" below makes it easier to edit a package description. Line
-# up the first '|' above the ':' following the base package name, and the '|'
-# on the right side marks the last column you can put a character in. You must
-# make exactly 11 lines for the formatting to be correct. It's also
-# customary to leave one space after the ':'.
+# The "handy ruler" below makes it easier to edit a package description.
+# Line up the first '|' above the ':' following the base package name, and
+# the '|' on the right side marks the last column you can put a character in.
+# You must make exactly 11 lines for the formatting to be correct. It's also
+# customary to leave one space after the ':' except on otherwise blank lines.
|-----handy-ruler------------------------------------------------------|
sleuthkit: sleuthkit (forensic toolkit)
sleuthkit:
-sleuthkit: The Sleuth Kit is an open source forensic toolkit for analyzing
-sleuthkit: Microsoft and UNIX file systems and disks. The Sleuth Kit enables
-sleuthkit: investigators to identify and recover evidence from images
-sleuthkit: acquired during incident response or from live systems. The
-sleuthkit: Sleuth Kit is open source, which allows investigators to verify
-sleuthkit: the actions of the tool or customize it to specific needs.
+sleuthkit: The Sleuth Kit (TSK) is a library and collection of command line
+sleuthkit: tools that allow you to investigate disk images. The core
+sleuthkit: functionality of TSK allows you to analyze volume and file system
+sleuthkit: data. The plug-in framework allows you to incorporate additional
+sleuthkit: modules to analyze file contents and build automated systems. The
+sleuthkit: library can be incorporated into larger digital forensics tools and
+sleuthkit: the command line tools can be directly used to find evidence.
sleuthkit:
sleuthkit: Homepage: http://www.sleuthkit.org/sleuthkit/
-sleuthkit:
diff --git a/system/sleuthkit/sleuthkit.SlackBuild b/system/sleuthkit/sleuthkit.SlackBuild
index 1f4021870f..aacd96ac43 100644
--- a/system/sleuthkit/sleuthkit.SlackBuild
+++ b/system/sleuthkit/sleuthkit.SlackBuild
@@ -22,10 +22,10 @@
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-# Updated v3.2.3 November 2011 Barry J. Grundy <bgrundy(at)linuxleo.com>
+# Updated v4.0.2 March 2013 Barry J. Grundy <bgrundy(at)linuxleo.com>
PRGNAM=sleuthkit
-VERSION=3.2.3
+VERSION=4.0.2
BUILD=${BUILD:-1}
TAG=${TAG:-_SBo}
@@ -88,7 +88,7 @@ for i in $( find $PKG/usr/man -type l ) ; do ln -s $( readlink $i ).gz $i.gz ; r
# "docs" directory now contains a simple pointer to the wiki.
mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION
-cp -a *.txt licenses $PKG/usr/doc/$PRGNAM-$VERSION
+cp -ri *.txt licenses docs $PKG/usr/doc/$PRGNAM-$VERSION
cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild
rm -f $PKG/usr/doc/$PRGNAM-$VERSION/docs/Makefile*
diff --git a/system/sleuthkit/sleuthkit.info b/system/sleuthkit/sleuthkit.info
index cbb096b913..3d61de5bdc 100644
--- a/system/sleuthkit/sleuthkit.info
+++ b/system/sleuthkit/sleuthkit.info
@@ -1,8 +1,8 @@
PRGNAM="sleuthkit"
-VERSION="3.2.3"
+VERSION="4.0.2"
HOMEPAGE="http://www.sleuthkit.org/sleuthkit/"
-DOWNLOAD="http://downloads.sourceforge.net/sleuthkit/sleuthkit-3.2.3.tar.gz"
-MD5SUM="29465ebe32cfeb5f0cab83e4e93823c5"
+DOWNLOAD="http://downloads.sourceforge.net/project/sleuthkit/sleuthkit/4.0.2/sleuthkit-4.0.2.tar.gz"
+MD5SUM="0ca010103990b390794d682b37310af0"
DOWNLOAD_x86_64=""
MD5SUM_x86_64=""
REQUIRES=""