How to Install and Uninstall stealth-doc Package on Ubuntu 20.10 (Groovy Gorilla)
Last updated: December 23,2024
1. Install "stealth-doc" package
Please follow the guidelines below to install stealth-doc on Ubuntu 20.10 (Groovy Gorilla)
$
sudo apt update
Copied
$
sudo apt install
stealth-doc
Copied
2. Uninstall "stealth-doc" package
Please follow the steps below to uninstall stealth-doc on Ubuntu 20.10 (Groovy Gorilla):
$
sudo apt remove
stealth-doc
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the stealth-doc package on Ubuntu 20.10 (Groovy Gorilla)
Package: stealth-doc
Architecture: all
Version: 4.02.00-3
Priority: optional
Section: universe/doc
Source: stealth
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Frank B. Brokken
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 516
Filename: pool/universe/s/stealth/stealth-doc_4.02.00-3_all.deb
Size: 400752
MD5sum: 19d76f120f85bfce966b03a0e55a2aa7
SHA1: e8a371db77cbf3d77c34553c584a4849939ef37b
SHA256: 7f4e1c68295b0947638411bc51daee1162bce43afd548624df14e281ea7be79c
SHA512: 1f643d9b39749a1ddc2dfd7c6b3bacb1abd379bccd838797287b309bc71e76c9792586f38efa6deecbd74e503154bf3bf5fe8e6dd63803dd27253b46b05774ec
Homepage: https://fbb-git.gitlab.io/stealth
Description-en: stealthy File Integrity Checker documentation
STEALTH program performs File Integrity Checks on (remote) clients. It
differs from other File Integrity Checkers by not requiring baseline
integrity data to be kept on either write-only media or in the client's file
system. In fact, client's will contain hardly any indication at all that they
are being monitored, thus improving the stealthiness of the integrity scans.
.
STEALTH uses standard available software to perform file integrity checks
(like find(1) and md5sum(1)). Using individualized policy files, it is highly
adaptable to the specific requirements of its clients.
.
In production environments STEALTH should be run from an isolated computer
(called the `STEALTH monitor'). In optimal configurations the STEALTH
monitor should be a computer not accepting incoming connections. The account
used to connect to its clients does not have to be `root': usually
read-access to the client's file system is enough to perform a full integrity
check. Instead of using `root' a more restrictive administrative or
ordinary account might offer all requirements for the desired integrity
check.
.
STEALTH itself must communicate with the computers it should monitor. It is
essential that this communication is secure, and STEALTH configurations will
therefore normally specify SSH as the command-shell to use to connect to its
clients. STEALTH may be configured so as to use but one SSH connection per
client, even if integrity scans are to be performed repeatedly. Apart from
this, the STEALTH monitor might be allowed to send e-mail to remote clients
system's maintainers.
.
STEALTH-runs itself may start randomly within specified intervals. The
resulting unpredicability of STEALTH-runs further increases STEALTH's
stealthiness.
.
STEALTH's acronym is expanded to `Ssh-based Trust Enforcement Acquired
through a Locally Trusted Host': the client's trust is enforced, the locally
trusted host is the STEALTH monitor.
.
This package provides the supplemental documentation for Stealth.
Description-md5: 2366cf791404334af5c3cdb50882e047
Architecture: all
Version: 4.02.00-3
Priority: optional
Section: universe/doc
Source: stealth
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Frank B. Brokken
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 516
Filename: pool/universe/s/stealth/stealth-doc_4.02.00-3_all.deb
Size: 400752
MD5sum: 19d76f120f85bfce966b03a0e55a2aa7
SHA1: e8a371db77cbf3d77c34553c584a4849939ef37b
SHA256: 7f4e1c68295b0947638411bc51daee1162bce43afd548624df14e281ea7be79c
SHA512: 1f643d9b39749a1ddc2dfd7c6b3bacb1abd379bccd838797287b309bc71e76c9792586f38efa6deecbd74e503154bf3bf5fe8e6dd63803dd27253b46b05774ec
Homepage: https://fbb-git.gitlab.io/stealth
Description-en: stealthy File Integrity Checker documentation
STEALTH program performs File Integrity Checks on (remote) clients. It
differs from other File Integrity Checkers by not requiring baseline
integrity data to be kept on either write-only media or in the client's file
system. In fact, client's will contain hardly any indication at all that they
are being monitored, thus improving the stealthiness of the integrity scans.
.
STEALTH uses standard available software to perform file integrity checks
(like find(1) and md5sum(1)). Using individualized policy files, it is highly
adaptable to the specific requirements of its clients.
.
In production environments STEALTH should be run from an isolated computer
(called the `STEALTH monitor'). In optimal configurations the STEALTH
monitor should be a computer not accepting incoming connections. The account
used to connect to its clients does not have to be `root': usually
read-access to the client's file system is enough to perform a full integrity
check. Instead of using `root' a more restrictive administrative or
ordinary account might offer all requirements for the desired integrity
check.
.
STEALTH itself must communicate with the computers it should monitor. It is
essential that this communication is secure, and STEALTH configurations will
therefore normally specify SSH as the command-shell to use to connect to its
clients. STEALTH may be configured so as to use but one SSH connection per
client, even if integrity scans are to be performed repeatedly. Apart from
this, the STEALTH monitor might be allowed to send e-mail to remote clients
system's maintainers.
.
STEALTH-runs itself may start randomly within specified intervals. The
resulting unpredicability of STEALTH-runs further increases STEALTH's
stealthiness.
.
STEALTH's acronym is expanded to `Ssh-based Trust Enforcement Acquired
through a Locally Trusted Host': the client's trust is enforced, the locally
trusted host is the STEALTH monitor.
.
This package provides the supplemental documentation for Stealth.
Description-md5: 2366cf791404334af5c3cdb50882e047