Skip to content

Commit

Permalink
Merge pull request #15 from radarhere/master
Browse files Browse the repository at this point in the history
Fixed typos
  • Loading branch information
kotakanbe committed Apr 9, 2016
2 parents 1f80738 + 0deb103 commit 336b72b
Show file tree
Hide file tree
Showing 3 changed files with 11 additions and 11 deletions.
2 changes: 1 addition & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

**Merged pull requests:**

- Typo in Exapmle [\#6](https://github.com/future-architect/vuls/pull/6) ([toli](https://github.com/toli))
- Typo in Example [\#6](https://github.com/future-architect/vuls/pull/6) ([toli](https://github.com/toli))

## [v0.1.0](https://github.com/future-architect/vuls/tree/v0.1.0) (2016-04-04)
**Merged pull requests:**
Expand Down
18 changes: 9 additions & 9 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ To avoid downtime in production environment, it is common for system administrat
This leads to the following problems.
- System administrator will have to constantly watch out for any new vulnerabilities in NVD(National Vulnerability Database) and etc.
- It might be impossible for the system administrator to monitor all the software if there are a large number of software installed in server.
- It is expensive to perform anaylsis to determine the servers affected by new vulnerabilities. The possibility of overlooking a server or two during analysis is there.
- It is expensive to perform analysis to determine the servers affected by new vulnerabilities. The possibility of overlooking a server or two during analysis is there.


Vuls is a tool created to solve the problems listed above. It has the following characteristics.
Expand Down Expand Up @@ -194,7 +194,7 @@ $ vuls prepare

```
$ vuls scan
INFO[0000] Begin scannig (config: /home/ec2-user/config.toml)
INFO[0000] Begin scanning (config: /home/ec2-user/config.toml)
... snip ...
Expand Down Expand Up @@ -241,7 +241,7 @@ $ vuls tui
![Vuls-Architecture](img/vuls-architecture.png)

## go-cve-dictinary
- Fetch vulnerbility information from NVD, JVN(Japanese), then insert into SQLite.
- Fetch vulnerability information from NVD, JVN(Japanese), then insert into SQLite.

## Vuls
- Scan vulnerabilities on the servers and create a list of the CVE ID
Expand Down Expand Up @@ -280,7 +280,7 @@ web/app server in the same configuration under the load balancer

# Usage: Automatic Server Discovery

Discovery subcommand discovers active servers specifed in CIDR range, then print the template of config file(TOML format) to terminal.
Discovery subcommand discovers active servers specified in CIDR range, then print the template of config file(TOML format) to terminal.

```
$ vuls discover -help
Expand Down Expand Up @@ -448,7 +448,7 @@ prepare:
-debug
debug mode
-use-unattended-upgrades
[Depricated] For Ubuntu, install unattended-upgrades
[Deprecated] For Ubuntu, install unattended-upgrades
```
----
Expand Down Expand Up @@ -490,9 +490,9 @@ scan:
-report-slack
Slack report
-use-unattended-upgrades
[Depricated] For Ubuntu. Scan by unattended-upgrades or not (use apt-get upgrade --dry-run by default)
[Deprecated] For Ubuntu. Scan by unattended-upgrades or not (use apt-get upgrade --dry-run by default)
-use-yum-plugin-security
[Depricated] For CentOS 5. Scan by yum-plugin-security or not (use yum check-update by default)
[Deprecated] For CentOS 5. Scan by yum-plugin-security or not (use yum check-update by default)

```
Expand Down Expand Up @@ -588,7 +588,7 @@ If your system is behind HTTP proxy, you have to specify --http-proxy option.
- How to Daemonize go-cve-dictionary
Use Systemd, Upstart or supervisord, daemontools...
- How to update vulnerbility data automatically.
- How to update vulnerability data automatically.
Use job scheduler like Cron (with -last2y option).
- How to cross compile
Expand All @@ -607,7 +607,7 @@ Run with --debug, --sql-debug option.
[Riak docs](http://docs.basho.com/riak/latest/ops/tuning/open-files-limit/) is awesome.
- Windows
Use Microsoft Baseline Secuirty Analyzer. [MBSA](https://technet.microsoft.com/en-us/security/cc184924.aspx)
Use Microsoft Baseline Security Analyzer. [MBSA](https://technet.microsoft.com/en-us/security/cc184924.aspx)
----
Expand Down
2 changes: 1 addition & 1 deletion commands/scan.go
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ func (p *ScanCmd) SetFlags(f *flag.FlagSet) {
// Execute execute
func (p *ScanCmd) Execute(_ context.Context, f *flag.FlagSet, _ ...interface{}) subcommands.ExitStatus {

logrus.Infof("Begin scannig (config: %s)", p.configPath)
logrus.Infof("Begin scanning (config: %s)", p.configPath)
err := c.Load(p.configPath)
if err != nil {
logrus.Errorf("Error loading %s, %s", p.configPath, err)
Expand Down

0 comments on commit 336b72b

Please sign in to comment.