sleuthkit 4.6.7-1build1 source package in Ubuntu

Changelog

sleuthkit (4.6.7-1build1) focal; urgency=medium

  * No-change rebuild for libgcc-s1 package name change.

 -- Matthias Klose <email address hidden>  Sun, 22 Mar 2020 16:58:02 +0100

Upload details

Uploaded by:
Matthias Klose
Uploaded to:
Focal
Original maintainer:
Debian Security Tools
Architectures:
any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Focal release universe admin

Downloads

File Size SHA-256 Checksum
sleuthkit_4.6.7.orig.tar.gz 8.9 MiB 7f6305160109d681dd6fe00b7a19f1c43af35d2eb265d3abbdc2749611707687
sleuthkit_4.6.7-1build1.debian.tar.xz 36.6 KiB 9d09ac5e883fead663bdce3fbc0f0d1bd1b9f9aaa4593ca1bf9b15f7000d0efa
sleuthkit_4.6.7-1build1.dsc 2.1 KiB 950a63b18c9fc8f99803d6389a47dd8b4f9dfc6c10509955033fc80a76c44b92

View changes file

Binary packages built by this source

libtsk-dev: library for forensics analysis (development files)

 The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
 line file and volume system forensic analysis tools. The filesystem tools
 allow you to examine filesystems of a suspect computer in a non-intrusive
 fashion. Because the tools do not rely on the operating system to process the
 filesystems, deleted and hidden content is shown.
 .
 The volume system (media management) tools allow you to examine the layout of
 disks and other media. You can also recover deleted files, get information
 stored in slack spaces, examine filesystems journal, see partitions layout on
 disks or images etc. But is very important clarify that the TSK acts over the
 current filesystem only.
 .
 The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
 partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
 tools, you can identify where partitions are located and extract them so that
 they can be analyzed with filesystem analysis tools.
 .
 Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
 Ext4, UFS and YAFFS2.
 .
 This package contains header files and static version of the library.

libtsk13: library for forensics analysis on volume and filesystem data

 The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
 line file and volume system forensic analysis tools. The filesystem tools
 allow you to examine filesystems of a suspect computer in a non-intrusive
 fashion. Because the tools do not rely on the operating system to process the
 filesystems, deleted and hidden content is shown.
 .
 The volume system (media management) tools allow you to examine the layout of
 disks and other media. You can also recover deleted files, get information
 stored in slack spaces, examine filesystems journal, see partitions layout on
 disks or images etc. But is very important clarify that the TSK acts over the
 current filesystem only.
 .
 The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
 partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
 tools, you can identify where partitions are located and extract them so that
 they can be analyzed with filesystem analysis tools.
 .
 Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
 Ext4, UFS and YAFFS2.
 .
 This package contains the library which can be used to implement all of the
 functionality of the command line tools into an application that needs to
 analyze data from a disk image.

libtsk13-dbgsym: debug symbols for libtsk13
sleuthkit: No summary available for sleuthkit in ubuntu hirsute.

No description available for sleuthkit in ubuntu hirsute.

sleuthkit-dbgsym: No summary available for sleuthkit-dbgsym in ubuntu hirsute.

No description available for sleuthkit-dbgsym in ubuntu hirsute.