[Forensics-changes] [sleuthkit] 01/09: debian/control: little adjustments in short and long descriptions.

Eriberto Mota eriberto-guest at moszumanska.debian.org
Mon Mar 3 16:44:14 UTC 2014


This is an automated email from the git hooks/post-receive script.

eriberto-guest pushed a commit to branch debian
in repository sleuthkit.

commit f1787054184c9cb9bf91ece9ab31991feefbe536
Author: Joao Eriberto Mota Filho <eriberto at eriberto.pro.br>
Date:   Mon Mar 3 13:35:05 2014 -0300

    debian/control: little adjustments in short and long descriptions.
---
 debian/control | 28 ++++++++++++++--------------
 1 file changed, 14 insertions(+), 14 deletions(-)

diff --git a/debian/control b/debian/control
index 019044f..8c2a7f1 100644
--- a/debian/control
+++ b/debian/control
@@ -23,12 +23,12 @@ Architecture: any
 Depends: ${shlibs:Depends}, ${misc:Depends}, ${perl:Depends}, file, libdate-manip-perl
 Suggests: autopsy, mac-robber
 Conflicts: tct
-Description: collection of tools for forensics analysis on volume and file system data
+Description: tools for forensics analysis on volume and filesystem data
  The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
- line file and volume system forensic analysis tools. The file system tools
- allow you to examine file systems of a suspect computer in a non-intrusive
+ line file and volume system forensic analysis tools. The filesystem tools
+ allow you to examine filesystems of a suspect computer in a non-intrusive
  fashion. Because the tools do not rely on the operating system to process the
- file systems, deleted and hidden content is shown.
+ filesystems, deleted and hidden content is shown.
  .
  The volume system (media management) tools allow you to examine the layout of
  disks and other media. You can also recover deleted files, get information
@@ -39,7 +39,7 @@ Description: collection of tools for forensics analysis on volume and file syste
  The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
  partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
  tools, you can identify where partitions are located and extract them so that
- they can be analyzed with file system analysis tools.
+ they can be analyzed with filesystem analysis tools.
  .
  Currently, TSK supports several filesystems, as NTFS, FAT, HFS+, Ext3, UFS,
  YAFFS2 and Ext4.
@@ -50,12 +50,12 @@ Package: libtsk10
 Section: libs
 Architecture: any
 Depends: ${shlibs:Depends}, ${misc:Depends}
-Description: library for forensics analysis on volume and file system data
+Description: library for forensics analysis on volume and filesystem data
  The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
- line file and volume system forensic analysis tools. The file system tools
- allow you to examine file systems of a suspect computer in a non-intrusive
+ line file and volume system forensic analysis tools. The filesystem tools
+ allow you to examine filesystems of a suspect computer in a non-intrusive
  fashion. Because the tools do not rely on the operating system to process the
- file systems, deleted and hidden content is shown.
+ filesystems, deleted and hidden content is shown.
  .
  The volume system (media management) tools allow you to examine the layout of
  disks and other media. You can also recover deleted files, get information
@@ -66,7 +66,7 @@ Description: library for forensics analysis on volume and file system data
  The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
  partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
  tools, you can identify where partitions are located and extract them so that
- they can be analyzed with file system analysis tools.
+ they can be analyzed with filesystem analysis tools.
  .
  Currently, TSK supports several filesystems, as NTFS, FAT, HFS+, Ext3, UFS,
  YAFFS2 and Ext4.
@@ -81,10 +81,10 @@ Architecture: any
 Depends: ${misc:Depends}, libtsk10 (= ${binary:Version}), zlib1g-dev
 Description: library for forensics analysis (development files)
  The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
- line file and volume system forensic analysis tools. The file system tools
- allow you to examine file systems of a suspect computer in a non-intrusive
+ line file and volume system forensic analysis tools. The filesystem tools
+ allow you to examine filesystems of a suspect computer in a non-intrusive
  fashion. Because the tools do not rely on the operating system to process the
- file systems, deleted and hidden content is shown.
+ filesystems, deleted and hidden content is shown.
  .
  The volume system (media management) tools allow you to examine the layout of
  disks and other media. You can also recover deleted files, get information
@@ -95,7 +95,7 @@ Description: library for forensics analysis (development files)
  The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
  partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
  tools, you can identify where partitions are located and extract them so that
- they can be analyzed with file system analysis tools.
+ they can be analyzed with filesystem analysis tools.
  .
  Currently, TSK supports several filesystems, as NTFS, FAT, HFS+, Ext3, UFS,
  YAFFS2 and Ext4.

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/forensics/sleuthkit.git



More information about the forensics-changes mailing list