How to Install and Uninstall stealth Package on Ubuntu 16.04 LTS (Xenial Xerus)
Last updated: November 07,2024
1. Install "stealth" package
This guide let you learn how to install stealth on Ubuntu 16.04 LTS (Xenial Xerus)
$
sudo apt update
Copied
$
sudo apt install
stealth
Copied
2. Uninstall "stealth" package
This guide let you learn how to uninstall stealth on Ubuntu 16.04 LTS (Xenial Xerus):
$
sudo apt remove
stealth
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the stealth package on Ubuntu 16.04 LTS (Xenial Xerus)
Package: stealth
Priority: optional
Section: universe/admin
Installed-Size: 274
Maintainer: Ubuntu Developers
Original-Maintainer: Frank B. Brokken
Architecture: amd64
Version: 4.01.04-1
Depends: libbobcat4 (>= 4.01.03), libc6 (>= 2.14), libgcc1 (>= 1:3.0), libstdc++6 (>= 5.2)
Suggests: stealth-doc
Filename: pool/universe/s/stealth/stealth_4.01.04-1_amd64.deb
Size: 89000
MD5sum: a856d14998f43583c94df0faa4d635a8
SHA1: 3366d58713961b13475c2a0f107a775d24e8a803
SHA256: 157d5a55d461419aba0e5ea8e3e223cf0cdb5f5788bc2d12b454ef86546f8330
Description-en: stealthy File Integrity Checker
The STEALTH program performs File Integrity Checks on (remote) clients. It
differs from other File Integrity Checkers by not requiring baseline
integrity data to be kept on either write-only media or in the client's file
system. In fact, clients will hardly contain any indication suggesting that
they are being monitored, thus improving the stealthiness of the integrity
scans.
.
STEALTH uses standard available software to perform file integrity checks
(like find(1) and sha1sum(1)). Using individualized policy files, it is
highly adaptable to the specific characteristics of its clients.
.
In production environments STEALTH should be run from an isolated computer
(called the `STEALTH monitor'). In optimal configurations the STEALTH
monitor should be a computer not accepting incoming connections. The account
used to connect to its clients does not have to be `root'; usually
read-access to the client's file system is enough to perform a full integrity
check. Instead of using `root' a more restrictive administrative or
ordinary account might offer all necessary requirements for the desired
integrity check.
.
STEALTH itself must communicate with the computers it should monitor. It is
essential that this communication is secure. STEALTH configurations
therefore normally specify SSH as the command-shell to use for connecting to
clients. STEALTH may be configured so as to use but one SSH connection per
client, even if integrity scans are to be performed repeatedly. Apart from
this, the STEALTH monitor is commonly allowed to send e-mail to remote
client systems' maintainers.
.
STEALTH-runs itself may start randomly within specified intervals. The
resulting unpredicability of STEALTH-runs further increases STEALTH's
stealthiness.
.
STEALTH's acronym is expanded to `Ssh-based Trust Enforcement Acquired
through a Locally Trusted Host': the client's trust is enforced, the locally
trusted host is the STEALTH monitor.
Description-md5: 5bc700bb5b7b5d6ee7d8fdc9665b6a25
Homepage: https://fbb-git.github.io/stealth
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Origin: Ubuntu
Priority: optional
Section: universe/admin
Installed-Size: 274
Maintainer: Ubuntu Developers
Original-Maintainer: Frank B. Brokken
Architecture: amd64
Version: 4.01.04-1
Depends: libbobcat4 (>= 4.01.03), libc6 (>= 2.14), libgcc1 (>= 1:3.0), libstdc++6 (>= 5.2)
Suggests: stealth-doc
Filename: pool/universe/s/stealth/stealth_4.01.04-1_amd64.deb
Size: 89000
MD5sum: a856d14998f43583c94df0faa4d635a8
SHA1: 3366d58713961b13475c2a0f107a775d24e8a803
SHA256: 157d5a55d461419aba0e5ea8e3e223cf0cdb5f5788bc2d12b454ef86546f8330
Description-en: stealthy File Integrity Checker
The STEALTH program performs File Integrity Checks on (remote) clients. It
differs from other File Integrity Checkers by not requiring baseline
integrity data to be kept on either write-only media or in the client's file
system. In fact, clients will hardly contain any indication suggesting that
they are being monitored, thus improving the stealthiness of the integrity
scans.
.
STEALTH uses standard available software to perform file integrity checks
(like find(1) and sha1sum(1)). Using individualized policy files, it is
highly adaptable to the specific characteristics of its clients.
.
In production environments STEALTH should be run from an isolated computer
(called the `STEALTH monitor'). In optimal configurations the STEALTH
monitor should be a computer not accepting incoming connections. The account
used to connect to its clients does not have to be `root'; usually
read-access to the client's file system is enough to perform a full integrity
check. Instead of using `root' a more restrictive administrative or
ordinary account might offer all necessary requirements for the desired
integrity check.
.
STEALTH itself must communicate with the computers it should monitor. It is
essential that this communication is secure. STEALTH configurations
therefore normally specify SSH as the command-shell to use for connecting to
clients. STEALTH may be configured so as to use but one SSH connection per
client, even if integrity scans are to be performed repeatedly. Apart from
this, the STEALTH monitor is commonly allowed to send e-mail to remote
client systems' maintainers.
.
STEALTH-runs itself may start randomly within specified intervals. The
resulting unpredicability of STEALTH-runs further increases STEALTH's
stealthiness.
.
STEALTH's acronym is expanded to `Ssh-based Trust Enforcement Acquired
through a Locally Trusted Host': the client's trust is enforced, the locally
trusted host is the STEALTH monitor.
Description-md5: 5bc700bb5b7b5d6ee7d8fdc9665b6a25
Homepage: https://fbb-git.github.io/stealth
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Origin: Ubuntu