How to Install and Uninstall nmap Package on openSuSE Tumbleweed
Last updated: January 10,2025
1. Install "nmap" package
Please follow the steps below to install nmap on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
nmap
Copied
2. Uninstall "nmap" package
In this section, we are going to explain the necessary steps to uninstall nmap on openSuSE Tumbleweed:
$
sudo zypper remove
nmap
Copied
3. Information about the nmap package on openSuSE Tumbleweed
Information for package nmap:
-----------------------------
Repository : openSUSE-Tumbleweed-Non-Oss
Name : nmap
Version : 7.94-2.9
Arch : x86_64
Vendor : openSUSE
Installed Size : 25.0 MiB
Installed : No
Status : not installed
Source package : nmap-7.94-2.9.src
Upstream URL : https://nmap.org/
Summary : Network exploration tool and security scanner
Description :
Nmap ("Network Mapper") is a utility for network exploration or
security auditing. It may as well be used for tasks such as network
inventory, managing service upgrade schedules, and monitoring host or
service uptime. Nmap uses raw IP packets to determine what hosts are
available on the network, what services (application name and
version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are
in use, and dozens of other characteristics. It scans large networks,
and works fine against single hosts.
-----------------------------
Repository : openSUSE-Tumbleweed-Non-Oss
Name : nmap
Version : 7.94-2.9
Arch : x86_64
Vendor : openSUSE
Installed Size : 25.0 MiB
Installed : No
Status : not installed
Source package : nmap-7.94-2.9.src
Upstream URL : https://nmap.org/
Summary : Network exploration tool and security scanner
Description :
Nmap ("Network Mapper") is a utility for network exploration or
security auditing. It may as well be used for tasks such as network
inventory, managing service upgrade schedules, and monitoring host or
service uptime. Nmap uses raw IP packets to determine what hosts are
available on the network, what services (application name and
version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are
in use, and dozens of other characteristics. It scans large networks,
and works fine against single hosts.