Package: sleuthkit Version: 3.1.0 Revision: 3 Depends: %N-shlibs (= %v-%r) BuildDepends: libewf (>= 20091108-1) Source: mirror:sourceforge:project/%n/%n/%v/%n-%v.tar.gz Source-MD5: a97899eabe792cad77536cdc5e5825d4 SetCFLAGS: -Os ConfigureParams: --mandir=%p/share/man --disable-dependency-tracking GCC: 4.0 InstallScript: make install DESTDIR=%d DocFiles: licenses/* Splitoff: << Package: %N-shlibs Depends: libewf-shlibs (>= 20091108-1) Files: << lib/libtsk3.3.dylib << Shlibs: << %p/lib/libtsk3.3.dylib 6.0.0 %n (>= 3.1.0-2) << DocFiles: licenses/* << Splitoff2: << Package: %N-dev Depends: %N-shlibs (= %v-%r) BuildDependsOnly: true Files: << lib/libtsk3.dylib lib/lib*a include << DocFiles: licenses/* << License: OSI-Approved Homepage: http://www.sleuthkit.org/sleuthkit Maintainer: Jack Fink Description: Tools for forensics analysis DescDetail: << The Sleuth Kit (previously known as TASK) is a collection of UNIX-based command line file and volume system forensic analysis tools. The file system tools allow you to examine file systems of a suspect computer in a non-intrusive fashion. Because the tools do not rely on the operating system to process the file systems, deleted and hidden content is shown. The volume system (media management) tools allow you to examine the layout of disks and other media. The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac partitions, Sun slices (Volume Table of Contents), and GPT disks. With these tools, you can identify where partitions are located and extract them so that they can be analyzed with file system analysis tools. <<