How to Install and Uninstall psad.noarch Package on Fedora 39
Last updated: November 27,2024
1. Install "psad.noarch" package
This is a short guide on how to install psad.noarch on Fedora 39
$
sudo dnf update
Copied
$
sudo dnf install
psad.noarch
Copied
2. Uninstall "psad.noarch" package
Learn how to uninstall psad.noarch on Fedora 39:
$
sudo dnf remove
psad.noarch
Copied
$
sudo dnf autoremove
Copied
3. Information about the psad.noarch package on Fedora 39
Last metadata expiration check: 3:28:26 ago on Thu Mar 7 11:44:58 2024.
Available Packages
Name : psad
Version : 2.4.6
Release : 15.fc39
Architecture : noarch
Size : 1.2 M
Source : psad-2.4.6-15.fc39.src.rpm
Repository : fedora
Summary : Port Scan Attack Detector (psad) watches for suspect traffic
URL : https://www.cipherdyne.org/psad/
License : GPLv2+
Description : Port Scan Attack Detector (psad) is a lightweight
: system daemon written in Perl designed to work with Linux
: iptables firewalling code to detect port scans and other suspect traffic. It
: features a set of highly configurable danger thresholds (with sensible
: defaults provided), verbose alert messages that include the source,
: destination, scanned port range, begin and end times, tcp flags and
: corresponding nmap options, reverse DNS info, email and syslog alerting,
: automatic blocking of offending ip addresses via dynamic configuration of
: iptables rulesets, and passive operating system fingerprinting. In addition,
: psad incorporates many of the tcp, udp, and icmp signatures included in the
: snort intrusion detection system (https://www.snort.org) to detect highly
: suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend,
: SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin,
: xmas) which are easily leveraged against a machine via nmap. psad can also
: alert on snort signatures that are logged via fwsnort
: (https://www.cipherdyne.org/fwsnort/), which makes use of the
: iptables string match module to detect application layer signatures.
Available Packages
Name : psad
Version : 2.4.6
Release : 15.fc39
Architecture : noarch
Size : 1.2 M
Source : psad-2.4.6-15.fc39.src.rpm
Repository : fedora
Summary : Port Scan Attack Detector (psad) watches for suspect traffic
URL : https://www.cipherdyne.org/psad/
License : GPLv2+
Description : Port Scan Attack Detector (psad) is a lightweight
: system daemon written in Perl designed to work with Linux
: iptables firewalling code to detect port scans and other suspect traffic. It
: features a set of highly configurable danger thresholds (with sensible
: defaults provided), verbose alert messages that include the source,
: destination, scanned port range, begin and end times, tcp flags and
: corresponding nmap options, reverse DNS info, email and syslog alerting,
: automatic blocking of offending ip addresses via dynamic configuration of
: iptables rulesets, and passive operating system fingerprinting. In addition,
: psad incorporates many of the tcp, udp, and icmp signatures included in the
: snort intrusion detection system (https://www.snort.org) to detect highly
: suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend,
: SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin,
: xmas) which are easily leveraged against a machine via nmap. psad can also
: alert on snort signatures that are logged via fwsnort
: (https://www.cipherdyne.org/fwsnort/), which makes use of the
: iptables string match module to detect application layer signatures.