Commit 5e5a1e15 authored by Nong Hoang Tu's avatar Nong Hoang Tu
Browse files

Remove old patches

parent 54b809a2
This diff is collapsed.
From: <martignlo@debian.org>
Subject: Update the name of the following Sleuthkit executables: ils, icat, and mactime
diff -urNad autopsy-2.21~/lib/Appview.pm autopsy-2.21/lib/Appview.pm
--- autopsy-2.21~/lib/Appview.pm 2008-09-29 04:42:46.000000000 +0200
+++ autopsy-2.21/lib/Appview.pm 2009-06-16 22:41:19.000000000 +0200
@@ -196,7 +196,7 @@
# identify what type it is
local *OUT;
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
my $file_type = Exec::read_pipe_line(*OUT);
close(OUT);
@@ -231,7 +231,7 @@
local *OUT;
Exec::exec_pipe(*OUT,
- "'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
+ "'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
);
while ($_ = Exec::read_pipe_line(*OUT)) {
diff -urNad autopsy-2.21~/lib/File.pm autopsy-2.21/lib/File.pm
--- autopsy-2.21~/lib/File.pm 2009-02-03 05:26:21.000000000 +0100
+++ autopsy-2.21/lib/File.pm 2009-06-16 22:41:19.000000000 +0200
@@ -1095,7 +1095,7 @@
my $recmode = $File::REC_NO;
local *OUT;
Exec::exec_pipe(*OUT,
- "'$::TSKDIR/ils' -f $ftype -e -o $offset -i $imgtype $img $meta_int");
+ "'$::TSKDIR/ils-sleuthkit' -f $ftype -e -o $offset -i $imgtype $img $meta_int");
while ($_ = Exec::read_pipe_line(*OUT)) {
chop;
next unless ($_ =~ /^$meta/);
@@ -1705,7 +1705,7 @@
local *OUT;
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/ils' -f $ftype -e -o $offset -i $imgtype $img $meta_int"
+"'$::TSKDIR/ils-sleuthkit' -f $ftype -e -o $offset -i $imgtype $img $meta_int"
);
while ($_ = Exec::read_pipe_line(*OUT)) {
chop;
@@ -1726,12 +1726,12 @@
# Get the file type so we can show the thumb nails automatically
if ($recmode == $File::REC_YES) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
}
else {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
}
@@ -1785,12 +1785,12 @@
# Get the file type
if ($recmode == $File::REC_YES) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
}
else {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
}
@@ -1893,7 +1893,7 @@
"$Caseman::vol2sname{$vol}: Viewing $fname ($meta) as ASCII");
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
);
print "Contents Of File: $fname\n\n\n";
@@ -1905,7 +1905,7 @@
"$Caseman::vol2sname{$vol}: Viewing $fname ($meta) as Hex");
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
);
print "Hex Contents Of File: $fname\n\n\n";
@@ -1921,7 +1921,7 @@
"$Caseman::vol2sname{$vol}: Viewing $fname ($meta) as strings");
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::TSKDIR/srch_strings' -a"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::TSKDIR/srch_strings' -a"
);
print "ASCII String Contents Of File: $fname\n\n\n\n";
@@ -1989,7 +1989,7 @@
local *OUT;
Exec::exec_pipe(*OUT,
- "'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
+ "'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
);
# We can't trust the mnt and dir values (since there
@@ -2077,7 +2077,7 @@
# Calculate the MD5 value
local *OUT;
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::MD5_EXE'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::MD5_EXE'"
);
my $md5 = Exec::read_pipe_line(*OUT);
close(OUT);
@@ -2095,7 +2095,7 @@
if ($::SHA1_EXE ne "") {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::SHA1_EXE'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::SHA1_EXE'"
);
my $sha1 = Exec::read_pipe_line(*OUT);
close(OUT);
@@ -2114,7 +2114,7 @@
if ($sort == $FIL_SORT_STR) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::TSKDIR/srch_strings' -a | '$::MD5_EXE'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::TSKDIR/srch_strings' -a | '$::MD5_EXE'"
);
$md5 = Exec::read_pipe_line(*OUT);
close(OUT);
@@ -2127,7 +2127,7 @@
if ($::SHA1_EXE ne "") {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::TSKDIR/srch_strings' -a | '$::SHA1_EXE'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::TSKDIR/srch_strings' -a | '$::SHA1_EXE'"
);
$sha1 = Exec::read_pipe_line(*OUT);
close(OUT);
@@ -2167,7 +2167,7 @@
# File Type
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
my $apptype = Exec::read_pipe_line(*OUT);
close(OUT);
@@ -2187,14 +2187,14 @@
if ($sort == $FIL_SORT_ASC) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
);
Print::print_output($_) while ($_ = Exec::read_pipe_data(*OUT, 1024));
close(OUT);
}
elsif ($sort == $FIL_SORT_HEX) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta"
);
my $offset = 0;
while ($_ = Exec::read_pipe_data(*OUT, 1024)) {
@@ -2205,7 +2205,7 @@
}
elsif ($sort == $FIL_SORT_STR) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::TSKDIR/srch_strings' -a"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype $recflag -o $offset -i $imgtype $img $meta | '$::TSKDIR/srch_strings' -a"
);
Print::print_output($_) while ($_ = Exec::read_pipe_line(*OUT));
close(OUT);
@@ -2267,7 +2267,7 @@
local *OUT_MD5;
Exec::exec_pipe(*OUT_MD5,
-"'$::TSKDIR/icat' -f $ftype -r -o $offset -i $imgtype $img $in | '$::MD5_EXE'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -r -o $offset -i $imgtype $img $in | '$::MD5_EXE'"
);
my $md5out = Exec::read_pipe_line(*OUT_MD5);
diff -urNad autopsy-2.21~/lib/Meta.pm autopsy-2.21/lib/Meta.pm
--- autopsy-2.21~/lib/Meta.pm 2008-09-29 04:42:46.000000000 +0200
+++ autopsy-2.21/lib/Meta.pm 2009-06-16 22:41:19.000000000 +0200
@@ -185,7 +185,7 @@
my $recmode = $File::REC_NO;
local *OUT;
Exec::exec_pipe(*OUT,
- "'$::TSKDIR/ils' -f $ftype -e -o $offset -i $imgtype $img $meta_int");
+ "'$::TSKDIR/ils-sleuthkit' -f $ftype -e -o $offset -i $imgtype $img $meta_int");
while ($_ = Exec::read_pipe_line(*OUT)) {
chop;
next unless ($_ =~ /^$meta_int/);
@@ -289,12 +289,12 @@
if ($recmode == $File::REC_YES) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
}
else {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
}
my $file_type = Exec::read_pipe_line(*OUT);
@@ -313,12 +313,12 @@
# MD5 Value
if ($recmode == $File::REC_YES) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::MD5_EXE'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::MD5_EXE'"
);
}
else {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -o $offset -i $imgtype $img $meta | '$::MD5_EXE'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -o $offset -i $imgtype $img $meta | '$::MD5_EXE'"
);
}
@@ -379,12 +379,12 @@
if ($::SHA1_EXE ne "") {
if ($recmode == $File::REC_YES) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::SHA1_EXE'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::SHA1_EXE'"
);
}
else {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -o $offset -i $imgtype $img $meta | '$::SHA1_EXE'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -o $offset -i $imgtype $img $meta | '$::SHA1_EXE'"
);
}
@@ -546,11 +546,11 @@
local *OUT;
if ($recmode == $File::REC_YES) {
Exec::exec_pipe(*OUT,
- "'$::TSKDIR/icat' -f $ftype -r -o $offset -i $imgtype $img $meta");
+ "'$::TSKDIR/icat-sleuthkit' -f $ftype -r -o $offset -i $imgtype $img $meta");
}
else {
Exec::exec_pipe(*OUT,
- "'$::TSKDIR/icat' -f $ftype -o $offset -i $imgtype $img $meta");
+ "'$::TSKDIR/icat-sleuthkit' -f $ftype -o $offset -i $imgtype $img $meta");
}
print "$_" while ($_ = Exec::read_pipe_data(*OUT, 512));
@@ -658,12 +658,12 @@
if ($recmode == $File::REC_YES) {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -r -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
}
else {
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/icat' -f $ftype -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -o $offset -i $imgtype $img $meta | '$::FILE_EXE' -z -b -"
);
}
@@ -734,7 +734,7 @@
# The list
local *OUT;
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/ils' -e -s $Caseman::ts -f $ftype -o $offset -i $imgtype $img $fmin-$max"
+"'$::TSKDIR/ils-sleuthkit' -e -s $Caseman::ts -f $ftype -o $offset -i $imgtype $img $fmin-$max"
);
while ($_ = Exec::read_pipe_line(*OUT)) {
if (/^($::REG_META)\|([af])\|\d+\|\d+\|\d+\|\d+\|\d+\|/o) {
diff -urNad autopsy-2.21~/lib/Notes.pm autopsy-2.21/lib/Notes.pm
--- autopsy-2.21~/lib/Notes.pm 2008-09-29 04:42:46.000000000 +0200
+++ autopsy-2.21/lib/Notes.pm 2009-06-16 22:41:19.000000000 +0200
@@ -144,7 +144,7 @@
$meta_int = $1 if ($meta_int =~ /^(\d+)-\d+(-\d+)?$/);
local *OUT;
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/ils' -s $Caseman::ts -f $ftype -e -o $offset -i $imgtype $img $meta_int"
+"'$::TSKDIR/ils-sleuthkit' -s $Caseman::ts -f $ftype -e -o $offset -i $imgtype $img $meta_int"
);
# Get the fourth line
@@ -322,7 +322,7 @@
$meta_int = $1 if ($meta_int =~ /^(\d+)-\d+(-\d+)?$/);
local *OUT;
Exec::exec_pipe(*OUT,
-"'$::TSKDIR/ils' -s $Caseman::ts -f $ftype -e -o $offset -i $imgtype $img $meta_int"
+"'$::TSKDIR/ils-sleuthkit' -s $Caseman::ts -f $ftype -e -o $offset -i $imgtype $img $meta_int"
);
# Skip to the fourth line
diff -urNad autopsy-2.21~/lib/Timeline.pm autopsy-2.21/lib/Timeline.pm
--- autopsy-2.21~/lib/Timeline.pm 2008-09-29 04:42:46.000000000 +0200
+++ autopsy-2.21/lib/Timeline.pm 2009-06-16 22:41:19.000000000 +0200
@@ -930,7 +930,7 @@
}
Exec::exec_sys(
-"'$::TSKDIR/icat' -f $ftype -o $offset -i $imgtype $img $pwi > '$pw_tmp'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -o $offset -i $imgtype $img $pwi > '$pw_tmp'"
);
$mac_args .= " -p \'$pw_tmp\' ";
@@ -969,7 +969,7 @@
}
}
Exec::exec_sys(
-"'$::TSKDIR/icat' -f $ftype -o $offset -i $imgtype $img $gri > '$gr_tmp'"
+"'$::TSKDIR/icat-sleuthkit' -f $ftype -o $offset -i $imgtype $img $gri > '$gr_tmp'"
);
$mac_args .= " -g \'$gr_tmp\' ";
}
@@ -1005,17 +1005,17 @@
local *OUT;
if ($otype == $OTYPE_NORM) {
Exec::exec_pipe(*OUT,
-"LANG=C LC_ALL=C '$::TSKDIR/mactime' -b $Caseman::vol2path{$body} $tz -i day '${fname}.sum' $mac_args $date > '$fname'"
+"LANG=C LC_ALL=C '$::TSKDIR/mactime-sleuthkit' -b $Caseman::vol2path{$body} $tz -i day '${fname}.sum' $mac_args $date > '$fname'"
);
}
elsif ($otype == $OTYPE_HOURLY) {
Exec::exec_pipe(*OUT,
-"LANG=C LC_ALL=C '$::TSKDIR/mactime' -b $Caseman::vol2path{$body} $tz -d -i hour '${fname}.sum' $mac_args $date > '$fname'"
+"LANG=C LC_ALL=C '$::TSKDIR/mactime-sleuthkit' -b $Caseman::vol2path{$body} $tz -d -i hour '${fname}.sum' $mac_args $date > '$fname'"
);
}
elsif ($otype == $OTYPE_DAILY) {
Exec::exec_pipe(*OUT,
-"LANG=C LC_ALL=C '$::TSKDIR/mactime' -b $Caseman::vol2path{$body} $tz -d -i day '${fname}.sum' $mac_args $date > '$fname'"
+"LANG=C LC_ALL=C '$::TSKDIR/mactime-sleuthkit' -b $Caseman::vol2path{$body} $tz -d -i day '${fname}.sum' $mac_args $date > '$fname'"
);
}
else {
From: Lorenzo Martignoni <martignlo@debian.org>
Subject: Warn users when autopsy is run as non-root.
diff -urNad autopsy-2.06~/base/autopsy.base autopsy-2.06/base/autopsy.base
--- autopsy-2.06~/base/autopsy.base 2006-01-14 15:54:34.000000000 +0100
+++ autopsy-2.06/base/autopsy.base 2006-01-14 15:54:44.000000000 +0100
@@ -385,6 +385,21 @@
Keep this process running and use <ctrl-c> to exit
EOF2
+if (POSIX::getuid() != 0) {
+
+ print "\n----------------- WARNING: you\'re not running Autopsy as root -----------------\n";
+ print "You may encounter some problems due to lack of privileges: you may not be able\n";
+ print "to use the default evidence directory (/var/lib/autopsy/) and you may not be\n";
+ print "able to mount physical devices.\n\n";
+
+ print "If you believe that what you\'re going to do would not require root privileges\n";
+ print "you can safely run autopsy using a custom evidence directory (using the \'-d\'\n";
+ print "command line argument). If you are already doing that forgot this last message\n";
+ print "but keep in mind that if problems related to permissions arise then probably\n";
+ print "what you\'re doing requires root privileges.\n";
+ print "-------------------------------------------------------------------------------\n\n";
+}
+
Print::log_session_info("Starting session on port $port and $hn\n");
# Set the server alarm
From: <martignlo@filiberto.poggibonsi>
Subject: replace - with -
diff -urNad autopsy-2.10~/man/man1/autopsy.1 autopsy-2.10/man/man1/autopsy.1
--- autopsy-2.10~/man/man1/autopsy.1 2009-04-26 23:21:24.000000000 +0200
+++ autopsy-2.10/man/man1/autopsy.1 2009-04-26 23:22:28.000000000 +0200
@@ -2,11 +2,11 @@
.SH NAME
autopsy \- Autopsy Forensic Browser
.SH SYNOPSIS
-.B autopsy [-c] [-C] [-d
+.B autopsy [\-c] [\-C] [\-d
.I evid_locker
-.B ] [-i
+.B ] [\-i
device filesystem mnt
-.B ] [-p
+.B ] [\-p
.I port
.B ]
.I [addr]
@@ -15,27 +15,27 @@
.B autopsy
starts the Autopsy Forensic Browser server on port 9999 and and accepts
connections from the localhost. If
-.I -p port
+.I \-p port
is given, then the server opens on that port and if
.I addr
is given, then connections are only accepted from that host.
When the
-.I -i
+.I \-i
argument is given, then autopsy goes into live analysis mode.
The arguments are as follows:
-.IP "-c"
+.IP "\-c"
Force the program to use cookies even for localhost.
-.IP "-C"
+.IP "\-C"
Force the program to not use cookies even for remote hosts.
-.IP "-d evid_locker"
+.IP "\-d evid_locker"
Directory where cases and hosts are stored.
This overrides the
.B LOCKDIR
value in
.I conf.pl.
The path must be a full path (i.e. start with /).
-.IP "-i device filesystem mnt"
+.IP "\-i device filesystem mnt"
Specify the information for the live analysis mode. This can be specified
as many times as needed. The
.I device
@@ -44,7 +44,7 @@
field is for the file system type, and the
.I mnt
field is for the mounting point of the file system.
-.IP "-p port"
+.IP "\-p port"
TCP port for server to listen on.
.IP addr
IP address or host name of where investigator is located.
@@ -75,7 +75,7 @@
.RS
Directory where cases and forensic images are located.
The images must have simple
-names with only letters, numbers, '_', '-', and '.'. (See FILES).
+names with only letters, numbers, '_', '\-', and '.'. (See FILES).
.RE
.I TSKDIR
.RS
@@ -137,7 +137,7 @@
integrity of images.
.SH EXAMPLE
-# ./autopsy -p 8888 10.1.34.19
+# autopsy \-p 8888 10.1.34.19
.SH "SEE ALSO"
.BR dd (1),
.BR fls (1),
Description: use find -perm / instead of find -perl +
Forwarded: not-needed
--- autopsy-2.24.orig/Makefile
+++ autopsy-2.24/Makefile
@@ -21,7 +21,7 @@ clean:
rm -f ./lib/*.bak
rm -f ./base/*.bak
find . -name ".DS_Store" | xargs rm -f
- find . -type f -perm +g+x,o+x,u+x | xargs chmod -x
+ find . -type f -perm /g+x,o+x,u+x | xargs chmod -x
grep "curtskver=" ./configure
grep "VER" ./lib/define.pl
find . -name ".*" | grep -v perltidy
Description: Fix spelling error in manpage.
Author: Joao Paulo Lima de Oliveira <jlima.oliveira11@gmail.com>
Last-Update: 2020-06-06
Index: autopsy-2.24/man/man1/autopsy.1
===================================================================
--- autopsy-2.24.orig/man/man1/autopsy.1
+++ autopsy-2.24/man/man1/autopsy.1
@@ -155,7 +155,7 @@ The Autopsy Forensic Browser requires
.SH HISTORY
.BR "autopsy" " first appeared in " "Autopsy" " v1.0."
.SH LICENSE
-This software is distributed under the GNU Public License.
+This software is distributed under the GNU General Public License.
.SH AUTHOR
Brian Carrier <carrier at sleuthkit dot org>
01-configure.patch
#02-sleuthkit.patch
03-warn-when-not-root.patch
04-man.patch
05-find-perm.patch
06-fix-spelling-error-in-manpage.patch
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment