How to Install and Uninstall nmap Package on openSUSE Leap
Last updated: December 23,2024
1. Install "nmap" package
Please follow the steps below to install nmap on openSUSE Leap
$
sudo zypper refresh
Copied
$
sudo zypper install
nmap
Copied
2. Uninstall "nmap" package
This guide covers the steps necessary to uninstall nmap on openSUSE Leap:
$
sudo zypper remove
nmap
Copied
3. Information about the nmap package on openSUSE Leap
Information for package nmap:
-----------------------------
Repository : Main Repository
Name : nmap
Version : 7.92-150400.1.8
Arch : x86_64
Vendor : SUSE LLC
Installed Size : 23.8 MiB
Installed : No
Status : not installed
Source package : nmap-7.92-150400.1.8.src
Upstream URL : https://nmap.org/
Summary : Network exploration tool and security scanner
Description :
Nmap ("Network Mapper") is a utility for network exploration or
security auditing. It may as well be used for tasks such as network
inventory, managing service upgrade schedules, and monitoring host or
service uptime. Nmap uses raw IP packets to determine what hosts are
available on the network, what services (application name and
version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are
in use, and dozens of other characteristics. It scans large networks,
and works fine against single hosts.
-----------------------------
Repository : Main Repository
Name : nmap
Version : 7.92-150400.1.8
Arch : x86_64
Vendor : SUSE LLC
Installed Size : 23.8 MiB
Installed : No
Status : not installed
Source package : nmap-7.92-150400.1.8.src
Upstream URL : https://nmap.org/
Summary : Network exploration tool and security scanner
Description :
Nmap ("Network Mapper") is a utility for network exploration or
security auditing. It may as well be used for tasks such as network
inventory, managing service upgrade schedules, and monitoring host or
service uptime. Nmap uses raw IP packets to determine what hosts are
available on the network, what services (application name and
version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are
in use, and dozens of other characteristics. It scans large networks,
and works fine against single hosts.