mirror of the now-defunct rocklinux.org
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

57 lines
2.5 KiB

  1. [COPY] --- ROCK-COPYRIGHT-NOTE-BEGIN ---
  2. [COPY]
  3. [COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch.
  4. [COPY] Please add additional copyright information _after_ the line containing
  5. [COPY] the ROCK-COPYRIGHT-NOTE-END tag. Otherwise it might get removed by
  6. [COPY] the ./scripts/Create-CopyPatch script. Do not edit this copyright text!
  7. [COPY]
  8. [COPY] ROCK Linux: rock-src/package/tsa/nessus/nessus.desc
  9. [COPY] ROCK Linux is Copyright (C) 1998 - 2003 Clifford Wolf
  10. [COPY]
  11. [COPY] This program is free software; you can redistribute it and/or modify
  12. [COPY] it under the terms of the GNU General Public License as published by
  13. [COPY] the Free Software Foundation; either version 2 of the License, or
  14. [COPY] (at your option) any later version. A copy of the GNU General Public
  15. [COPY] License can be found at Documentation/COPYING.
  16. [COPY]
  17. [COPY] Many people helped and are helping developing ROCK Linux. Please
  18. [COPY] have a look at http://www.rocklinux.org/ and the Documentation/TEAM
  19. [COPY] file for details.
  20. [COPY]
  21. [COPY] --- ROCK-COPYRIGHT-NOTE-END ---
  22. [I] Nessus security scanner
  23. [T] The "Nessus" Project aims to provide to the Internet community a free,
  24. [T] powerful, up-to-date and easy to use remote security scanner.
  25. [T]
  26. [T] A security scanner is a software which will audit remotely a given network
  27. [T] and determine whether bad guys (aka 'crackers') may break into it, or
  28. [T] misuse it in some way.
  29. [T]
  30. [T] Unlike many other security scanners, Nessus does not take anything for
  31. [T] granted. That is, it will not consider that a given service is running on
  32. [T] a fixed port - that is, if you run your web server on port 1234, Nessus
  33. [T] will detect it and test its security. It will not make its security tests
  34. [T] regarding the version number of the remote services, but will really
  35. [T] attempt to exploit the vulnerability.
  36. [T]
  37. [T] Nessus is very fast, reliable and has a modular architecture that allows
  38. [T] you to fit it to your needs.
  39. [A] Renaud Deraison <deraison@cvs.nessus.org>
  40. [M] Sebastian Jaenicke <tsa@rocklinux.org>
  41. [C] extra/network
  42. [L] GPL
  43. [S] Stable
  44. [V] 2.0.10a
  45. [P] X -----5---9 130.700
  46. [D] 447104428 libnasl-2.0.10a.tar.gz ftp://ftp.nessus.org/pub/nessus/nessus-2.0.10a/src/
  47. [D] 996379524 nessus-core-2.0.10a.tar.gz ftp://ftp.nessus.org/pub/nessus/nessus-2.0.10a/src/
  48. [D] 463257632 nessus-libraries-2.0.10a.tar.gz ftp://ftp.nessus.org/pub/nessus/nessus-2.0.10a/src/
  49. [D] 2617730317 nessus-plugins-2.0.10a.tar.gz ftp://ftp.nessus.org/pub/nessus/nessus-2.0.10a/src/