Tape devices used for backups should not have world permissions.


















Documents for pxt

Tape devices used for backups should not have world permissions. Tape devices used for backups should not have world permissions.











Devices that have improper (world) permissions might be accessed by








Devices that have improper (world) permissions might be accessed by








































































Code [dev002f]

























Code [dev001f]

Code [dev001f]

Code [dev001f]

Code [dev001f]

Code [dev001f]

Code [dev001f]

Code [dev002f]

Code [dev002f]

Code [dev002f]

Code [dev002f]

Code [dev002f]

Code [dev002f]

any system user. This might open security holes if these are shared any system user. This might open security holes if these are shared

Code [dev001f]

Code [dev002f]

Code [dev001f]

Code [dev001f]

Code [dev002f]

Code [dev002f]

Code [dev001f]

Code [dev001f]

Code [dev002f]

Code [dev002f]

Code [dev001f]

Devices that have improper (world) permissions might be accessed by

Code [dev001f]

Code [dev002f]

Code [dev001f]

Code [dev001f]

Tape devices used for backups should not have world permissions. Tape devices used for backups should not have world permissions. Tape devices used for backups should not have world permissions.

Code [dev001f]

Tape devices used for backups should not have world permissions. Tape devices used for backups should not have world permissions. Tape devices used for backups should not have world permissions. Devices that have improper (world) permissions might be accessed by Devices that have improper (world) permissions might be accessed by Devices that have improper (world) permissions might be accessed by devices or hold binaries (disks for example). The administrator should

Code [dev001f]

Tape devices used for backups should not have world permissions. Devices that have improper (world) permissions might be accessed by Devices that have improper (world) permissions might be accessed by Tape devices used for backups should not have world permissions. devices or hold binaries (disks for example). The administrator should Devices that have improper (world) permissions might be accessed by Tape devices used for backups should not have world permissions. Devices that have improper (world) permissions might be accessed by Devices that have improper (world) permissions might be accessed by Tape devices used for backups should not have world permissions. Devices that have improper (world) permissions might be accessed by Tape devices used for backups should not have world permissions. Devices that have improper (world) permissions might be accessed by Tape devices used for backups should not have world permissions. Devices that have improper (world) permissions might be accessed by

Code [dev001f]

Code [dev001f]

Tape devices used for backups should not have world permissions. any system user. This might open security holes if these are shared Devices that have improper (world) permissions might be accessed by

Code [dev001f]

Tape devices used for backups should not have world permissions. Tape devices used for backups should not have world permissions.



































Tape devices used for backups should not have world permissions.























any system user. This might open security holes if these are shared any system user. This might open security holes if these are shared any system user. This might open security holes if these are shared properly set device access (using group configuration to provide









any system user. This might open security holes if these are shared


any system user. This might open security holes if these are shared
Tape devices used for backups should not have world permissions.














any system user. This might open security holes if these are shared








any system user. This might open security holes if these are shared

any system user. This might open security holes if these are shared


properly set device access (using group configuration to provide



















Tape devices used for backups should not have world permissions. any system user. This might open security holes if these are shared devices or hold binaries (disks for example). The administrator should Tape devices used for backups should not have world permissions. Tape devices used for backups should not have world permissions. any system user. This might open security holes if these are shared
































any system user. This might open security holes if these are shared

any system user. This might open security holes if these are shared

Code [dev002f]












Code [dev002f]

Code [dev002f]

Code [dev002f]

Code [dev002f]












Code [dev002f]

devices or hold binaries (disks for example). The administrator should devices or hold binaries (disks for example). The administrator should

Code [dev002f]

devices or hold binaries (disks for example). The administrator should

Code [dev002f]

Code [dev002f]

access to a device to multiple users, for example). devices or hold binaries (disks for example). The administrator should devices or hold binaries (disks for example). The administrator should

Code [dev002f]

devices or hold binaries (disks for example). The administrator should

Code [dev002f]

devices or hold binaries (disks for example). The administrator should












devices or hold binaries (disks for example). The administrator should access to a device to multiple users, for example).

Code [dev002f]

Code [dev002f]

Code [dev002f]









properly set device access (using group configuration to provide














devices or hold binaries (disks for example). The administrator should











devices or hold binaries (disks for example). The administrator should devices or hold binaries (disks for example). The administrator should

Code [dev002f]

Devices that have improper (world) permissions might be accessed by devices or hold binaries (disks for example). The administrator should Devices that have improper (world) permissions might be accessed by

Code [dev002f]

Devices that have improper (world) permissions might be accessed by Devices that have improper (world) permissions might be accessed by Devices that have improper (world) permissions might be accessed by Devices that have improper (world) permissions might be accessed by properly set device access (using group configuration to provide properly set device access (using group configuration to provide Devices that have improper (world) permissions might be accessed by

Code [dev002f]

properly set device access (using group configuration to provide Devices that have improper (world) permissions might be accessed by




Devices that have improper (world) permissions might be accessed by







properly set device access (using group configuration to provide

Devices that have improper (world) permissions might be accessed by properly set device access (using group configuration to provide Devices that have improper (world) permissions might be accessed by properly set device access (using group configuration to provide properly set device access (using group configuration to provide











Code [dev002f]

Code [dev002f]

properly set device access (using group configuration to provide

Code [dev002f]

Devices that have improper (world) permissions might be accessed by properly set device access (using group configuration to provide access to a device to multiple users, for example). Devices that have improper (world) permissions might be accessed by Devices that have improper (world) permissions might be accessed by properly set device access (using group configuration to provide properly set device access (using group configuration to provide Devices that have improper (world) permissions might be accessed by any system user. This might open security holes if these are shared properly set device access (using group configuration to provide Devices that have improper (world) permissions might be accessed by any system user. This might open security holes if these are shared any system user. This might open security holes if these are shared any system user. This might open security holes if these are shared any system user. This might open security holes if these are shared access to a device to multiple users, for example). any system user. This might open security holes if these are shared any system user. This might open security holes if these are shared access to a device to multiple users, for example). access to a device to multiple users, for example).

Code [dev003w]

any system user. This might open security holes if these are shared any system user. This might open security holes if these are shared access to a device to multiple users, for example). Devices that have improper (world) permissions might be accessed by access to a device to multiple users, for example). any system user. This might open security holes if these are shared access to a device to multiple users, for example). any system user. This might open security holes if these are shared

Code [dev003w]

Devices that have improper (world) permissions might be accessed by access to a device to multiple users, for example). access to a device to multiple users, for example). any system user. This might open security holes if these are shared Devices that have improper (world) permissions might be accessed by Devices that have improper (world) permissions might be accessed by any system user. This might open security holes if these are shared access to a device to multiple users, for example). any system user. This might open security holes if these are shared












access to a device to multiple users, for example). access to a device to multiple users, for example). any system user. This might open security holes if these are shared devices or hold binaries (disks for example). The administrator should access to a device to multiple users, for example). any system user. This might open security holes if these are shared devices or hold binaries (disks for example). The administrator should devices or hold binaries (disks for example). The administrator should devices or hold binaries (disks for example). The administrator should


























devices or hold binaries (disks for example). The administrator should

devices or hold binaries (disks for example). The administrator should There is a file in the devices directory which is a common file. Devices devices or hold binaries (disks for example). The administrator should devices or hold binaries (disks for example). The administrator should devices or hold binaries (disks for example). The administrator should devices or hold binaries (disks for example). The administrator should











any system user. This might open security holes if these are shared











any system user. This might open security holes if these are shared


Code [dev003w]


There is a file in the devices directory which is a common file. Devices devices or hold binaries (disks for example). The administrator should
any system user. This might open security holes if these are shared






















any system user. This might open security holes if these are shared devices or hold binaries (disks for example). The administrator should devices or hold binaries (disks for example). The administrator should











devices or hold binaries (disks for example). The administrator should


devices or hold binaries (disks for example). The administrator should















devices or hold binaries (disks for example). The administrator should








properly set device access (using group configuration to provide








properly set device access (using group configuration to provide

Code [dev003w]

properly set device access (using group configuration to provide properly set device access (using group configuration to provide

Code [dev003w]

Code [dev003w]

properly set device access (using group configuration to provide directory should only hold special files although some systems have properly set device access (using group configuration to provide properly set device access (using group configuration to provide properly set device access (using group configuration to provide properly set device access (using group configuration to provide

Code [dev003w]

Code [dev003w]

Code [dev003w]

properly set device access (using group configuration to provide devices or hold binaries (disks for example). The administrator should

Code [dev003w]

Code [dev003w]

There is a file in the devices directory which is a common file. Devices devices or hold binaries (disks for example). The administrator should

Code [dev003w]

directory should only hold special files although some systems have properly set device access (using group configuration to provide properly set device access (using group configuration to provide devices or hold binaries (disks for example). The administrator should

Code [dev003w]

Code [dev003w]

devices or hold binaries (disks for example). The administrator should properly set device access (using group configuration to provide properly set device access (using group configuration to provide properly set device access (using group configuration to provide

Code [dev003w]

properly set device access (using group configuration to provide access to a device to multiple users, for example). access to a device to multiple users, for example). access to a device to multiple users, for example). There is a file in the devices directory which is a common file. Devices access to a device to multiple users, for example). There is a file in the devices directory which is a common file. Devices There is a file in the devices directory which is a common file. Devices access to a device to multiple users, for example). access to a device to multiple users, for example). access to a device to multiple users, for example). directories and shell scripts in /dev. Please check your system's There is a file in the devices directory which is a common file. Devices access to a device to multiple users, for example). There is a file in the devices directory which is a common file. Devices access to a device to multiple users, for example). There is a file in the devices directory which is a common file. Devices access to a device to multiple users, for example). properly set device access (using group configuration to provide There is a file in the devices directory which is a common file. Devices directory should only hold special files although some systems have There is a file in the devices directory which is a common file. Devices properly set device access (using group configuration to provide There is a file in the devices directory which is a common file. Devices directories and shell scripts in /dev. Please check your system's access to a device to multiple users, for example). There is a file in the devices directory which is a common file. Devices access to a device to multiple users, for example). properly set device access (using group configuration to provide properly set device access (using group configuration to provide access to a device to multiple users, for example). There is a file in the devices directory which is a common file. Devices access to a device to multiple users, for example). access to a device to multiple users, for example). access to a device to multiple users, for example). There is a file in the devices directory which is a common file. Devices


































directory should only hold special files although some systems have directory should only hold special files although some systems have






















directory should only hold special files although some systems have



























documentation to determine if that file should be located there.

















directory should only hold special files although some systems have access to a device to multiple users, for example). directory should only hold special files although some systems have directory should only hold special files although some systems have


directory should only hold special files although some systems have









directory should only hold special files although some systems have access to a device to multiple users, for example). directories and shell scripts in /dev. Please check your system's directory should only hold special files although some systems have documentation to determine if that file should be located there.











directory should only hold special files although some systems have











directory should only hold special files although some systems have

















access to a device to multiple users, for example).






access to a device to multiple users, for example). directory should only hold special files although some systems have


Code [dev003w]


Code [dev003w]

Code [dev003w]

directories and shell scripts in /dev. Please check your system's

Code [dev003w]

Code [dev003w]

directories and shell scripts in /dev. Please check your system's

Code [dev003w]

Code [dev003w]

Code [dev003w]

directories and shell scripts in /dev. Please check your system's

Code [dev003w]












Code [dev003w]

directories and shell scripts in /dev. Please check your system's


directories and shell scripts in /dev. Please check your system's










directories and shell scripts in /dev. Please check your system's directories and shell scripts in /dev. Please check your system's

Code [dev003w]

Code [dev003w]


Code [dev003w]

directories and shell scripts in /dev. Please check your system's

Code [dev003w]

directories and shell scripts in /dev. Please check your system's directories and shell scripts in /dev. Please check your system's directories and shell scripts in /dev. Please check your system's












Code [dev003w]

Code [dev003w]

There is a file in the devices directory which is a common file. Devices documentation to determine if that file should be located there.












directories and shell scripts in /dev. Please check your system's











There is a file in the devices directory which is a common file. Devices There is a file in the devices directory which is a common file. Devices documentation to determine if that file should be located there. There is a file in the devices directory which is a common file. Devices There is a file in the devices directory which is a common file. Devices documentation to determine if that file should be located there. There is a file in the devices directory which is a common file. Devices There is a file in the devices directory which is a common file. Devices There is a file in the devices directory which is a common file. Devices

Code [boot01]

documentation to determine if that file should be located there. There is a file in the devices directory which is a common file. Devices There is a file in the devices directory which is a common file. Devices

Code [dev003w]

documentation to determine if that file should be located there.

Code [dev003w]

documentation to determine if that file should be located there. documentation to determine if that file should be located there. documentation to determine if that file should be located there. There is a file in the devices directory which is a common file. Devices There is a file in the devices directory which is a common file. Devices There is a file in the devices directory which is a common file. Devices

Code [boot01]

Code [dev003w]

documentation to determine if that file should be located there. There is a file in the devices directory which is a common file. Devices documentation to determine if that file should be located there. documentation to determine if that file should be located there. documentation to determine if that file should be located there. There is a file in the devices directory which is a common file. Devices There is a file in the devices directory which is a common file. Devices directory should only hold special files although some systems have documentation to determine if that file should be located there.












Code [dev003w]

directory should only hold special files although some systems have









directory should only hold special files although some systems have



directory should only hold special files although some systems have











directory should only hold special files although some systems have directory should only hold special files although some systems have directory should only hold special files although some systems have The lilo configuration file (/etc/lilo.conf) should have permissions











directory should only hold special files although some systems have directory should only hold special files although some systems have directory should only hold special files although some systems have






















There is a file in the devices directory which is a common file. Devices











There is a file in the devices directory which is a common file. Devices directory should only hold special files although some systems have directory should only hold special files although some systems have directory should only hold special files although some systems have











Code [boot01]











There is a file in the devices directory which is a common file. Devices























directory should only hold special files although some systems have

directory should only hold special files although some systems have The lilo configuration file (/etc/lilo.conf) should have permissions directories and shell scripts in /dev. Please check your system's directory should only hold special files although some systems have











directories and shell scripts in /dev. Please check your system's

Code [boot01]

There is a file in the devices directory which is a common file. Devices directories and shell scripts in /dev. Please check your system's

Code [boot01]

directories and shell scripts in /dev. Please check your system's directories and shell scripts in /dev. Please check your system's directories and shell scripts in /dev. Please check your system's directories and shell scripts in /dev. Please check your system's

Code [boot01]

limiting access to only the owner (usually root).

Code [boot01]

directories and shell scripts in /dev. Please check your system's directories and shell scripts in /dev. Please check your system's

Code [boot01]

directories and shell scripts in /dev. Please check your system's

Code [boot01]

directory should only hold special files although some systems have directory should only hold special files although some systems have

Code [boot01]

Code [boot01]

directories and shell scripts in /dev. Please check your system's

Code [boot01]

Code [boot01]

Code [boot01]

directories and shell scripts in /dev. Please check your system's directories and shell scripts in /dev. Please check your system's directory should only hold special files although some systems have The lilo configuration file (/etc/lilo.conf) should have permissions directories and shell scripts in /dev. Please check your system's directories and shell scripts in /dev. Please check your system's documentation to determine if that file should be located there. limiting access to only the owner (usually root). directories and shell scripts in /dev. Please check your system's

Code [boot01]

documentation to determine if that file should be located there. documentation to determine if that file should be located there. The lilo configuration file (/etc/lilo.conf) should have permissions The lilo configuration file (/etc/lilo.conf) should have permissions directory should only hold special files although some systems have documentation to determine if that file should be located there. documentation to determine if that file should be located there. documentation to determine if that file should be located there. The lilo configuration file (/etc/lilo.conf) should have permissions


documentation to determine if that file should be located there.










The lilo configuration file (/etc/lilo.conf) should have permissions documentation to determine if that file should be located there. The lilo configuration file (/etc/lilo.conf) should have permissions directories and shell scripts in /dev. Please check your system's The lilo configuration file (/etc/lilo.conf) should have permissions documentation to determine if that file should be located there. The lilo configuration file (/etc/lilo.conf) should have permissions documentation to determine if that file should be located there. documentation to determine if that file should be located there. directories and shell scripts in /dev. Please check your system's The lilo configuration file (/etc/lilo.conf) should have permissions The lilo configuration file (/etc/lilo.conf) should have permissions The lilo configuration file (/etc/lilo.conf) should have permissions documentation to determine if that file should be located there. directories and shell scripts in /dev. Please check your system's documentation to determine if that file should be located there. The lilo configuration file (/etc/lilo.conf) should have permissions documentation to determine if that file should be located there. limiting access to only the owner (usually root). documentation to determine if that file should be located there.











The lilo configuration file (/etc/lilo.conf) should have permissions documentation to determine if that file should be located there.



























limiting access to only the owner (usually root).






limiting access to only the owner (usually root). directories and shell scripts in /dev. Please check your system's











Code [boot02]











limiting access to only the owner (usually root).































limiting access to only the owner (usually root). documentation to determine if that file should be located there. limiting access to only the owner (usually root).











limiting access to only the owner (usually root). limiting access to only the owner (usually root). documentation to determine if that file should be located there. limiting access to only the owner (usually root).






















documentation to determine if that file should be located there. limiting access to only the owner (usually root).











Code [boot01]


































Code [boot01]

Code [boot02]

limiting access to only the owner (usually root).

Code [boot01]

limiting access to only the owner (usually root).













Code [boot01]

limiting access to only the owner (usually root).





















Code [boot01]

Code [boot01]

The grub configuration file (/boot/grub/grub.conf) should have

Code [boot01]

documentation to determine if that file should be located there.











Code [boot01]


Code [boot01]





























Code [boot01]











Code [boot01]


Code [boot01]





Code [boot02]


Code [boot01]

Code [boot01]

Code [boot01]






















The lilo configuration file (/etc/lilo.conf) should have permissions















The grub configuration file (/boot/grub/grub.conf) should have











Code [boot02]

Code [boot02]

The lilo configuration file (/etc/lilo.conf) should have permissions The lilo configuration file (/etc/lilo.conf) should have permissions

Code [boot01]

The lilo configuration file (/etc/lilo.conf) should have permissions The lilo configuration file (/etc/lilo.conf) should have permissions

Code [boot02]

The lilo configuration file (/etc/lilo.conf) should have permissions












The lilo configuration file (/etc/lilo.conf) should have permissions permissions limiting access to only the owner (usually root).
The lilo configuration file (/etc/lilo.conf) should have permissions











Code [boot02]

Code [boot01]

Code [boot02]

Code [boot02]

The lilo configuration file (/etc/lilo.conf) should have permissions

Code [boot02]

The lilo configuration file (/etc/lilo.conf) should have permissions The lilo configuration file (/etc/lilo.conf) should have permissions

Code [boot02]

Code [boot02]

The lilo configuration file (/etc/lilo.conf) should have permissions The grub configuration file (/boot/grub/grub.conf) should have

Code [boot02]

Code [boot01]

Code [boot02]

The lilo configuration file (/etc/lilo.conf) should have permissions

Code [boot01]

The lilo configuration file (/etc/lilo.conf) should have permissions The lilo configuration file (/etc/lilo.conf) should have permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). The grub configuration file (/boot/grub/grub.conf) should have limiting access to only the owner (usually root). limiting access to only the owner (usually root). limiting access to only the owner (usually root). The grub configuration file (/boot/grub/grub.conf) should have

Code [boot02]

The grub configuration file (/boot/grub/grub.conf) should have

Code [boot01]

limiting access to only the owner (usually root). limiting access to only the owner (usually root). The lilo configuration file (/etc/lilo.conf) should have permissions limiting access to only the owner (usually root). limiting access to only the owner (usually root).












The grub configuration file (/boot/grub/grub.conf) should have The grub configuration file (/boot/grub/grub.conf) should have The grub configuration file (/boot/grub/grub.conf) should have The lilo configuration file (/etc/lilo.conf) should have permissions The grub configuration file (/boot/grub/grub.conf) should have limiting access to only the owner (usually root). limiting access to only the owner (usually root). The grub configuration file (/boot/grub/grub.conf) should have limiting access to only the owner (usually root). The grub configuration file (/boot/grub/grub.conf) should have The grub configuration file (/boot/grub/grub.conf) should have limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). The lilo configuration file (/etc/lilo.conf) should have permissions The lilo configuration file (/etc/lilo.conf) should have permissions limiting access to only the owner (usually root).
limiting access to only the owner (usually root).










limiting access to only the owner (usually root).

The grub configuration file (/boot/grub/grub.conf) should have











permissions limiting access to only the owner (usually root).











The grub configuration file (/boot/grub/grub.conf) should have














permissions limiting access to only the owner (usually root). The lilo configuration file (/etc/lilo.conf) should have permissions








permissions limiting access to only the owner (usually root).



limiting access to only the owner (usually root).











Code [boot03w]























permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root).













permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root).











limiting access to only the owner (usually root).

Code [boot02]















Code [boot03w]



limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root).




Code [boot02]













Code [boot02]


permissions limiting access to only the owner (usually root).

Code [boot02]

Code [boot02]

Code [boot02]












limiting access to only the owner (usually root).

Code [boot02]

Code [boot02]












A boot loader configuration file could not be found. That means











Code [boot02]










Code [boot02]
























Code [boot02]













Code [boot03w]































Code [boot02]

Code [boot02]

Code [boot02]

Code [boot02]


The grub configuration file (/boot/grub/grub.conf) should have























Code [boot03w]


The grub configuration file (/boot/grub/grub.conf) should have A boot loader configuration file could not be found. That means











The grub configuration file (/boot/grub/grub.conf) should have The grub configuration file (/boot/grub/grub.conf) should have

Code [boot03w]

Code [boot03w]

The grub configuration file (/boot/grub/grub.conf) should have



Code [boot02]


The grub configuration file (/boot/grub/grub.conf) should have The grub configuration file (/boot/grub/grub.conf) should have that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.

Code [boot03w]

The grub configuration file (/boot/grub/grub.conf) should have

Code [boot02]

The grub configuration file (/boot/grub/grub.conf) should have

Code [boot03w]

The grub configuration file (/boot/grub/grub.conf) should have

Code [boot03w]

Code [boot03w]

Code [boot03w]

Code [boot03w]

Code [boot03w]

A boot loader configuration file could not be found. That means The grub configuration file (/boot/grub/grub.conf) should have The grub configuration file (/boot/grub/grub.conf) should have

Code [boot02]

Code [boot02]

The grub configuration file (/boot/grub/grub.conf) should have The grub configuration file (/boot/grub/grub.conf) should have

Code [boot03w]

Code [boot03w]

The grub configuration file (/boot/grub/grub.conf) should have permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). A boot loader configuration file could not be found. That means that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). A boot loader configuration file could not be found. That means A boot loader configuration file could not be found. That means

Code [boot02]

permissions limiting access to only the owner (usually root). The grub configuration file (/boot/grub/grub.conf) should have permissions limiting access to only the owner (usually root). A boot loader configuration file could not be found. That means












permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). The grub configuration file (/boot/grub/grub.conf) should have permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). A boot loader configuration file could not be found. That means A boot loader configuration file could not be found. That means A boot loader configuration file could not be found. That means A boot loader configuration file could not be found. That means permissions limiting access to only the owner (usually root). permissions limiting access to only the owner (usually root). that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. A boot loader configuration file could not be found. That means A boot loader configuration file could not be found. That means The grub configuration file (/boot/grub/grub.conf) should have permissions limiting access to only the owner (usually root). A boot loader configuration file could not be found. That means permissions limiting access to only the owner (usually root). The grub configuration file (/boot/grub/grub.conf) should have permissions limiting access to only the owner (usually root). A boot loader configuration file could not be found. That means






















that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.

































that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. The grub configuration file (/boot/grub/grub.conf) should have that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.











Code [ptch01f]

permissions limiting access to only the owner (usually root).











that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.


































permissions limiting access to only the owner (usually root). that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.











that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.











that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.



















permissions limiting access to only the owner (usually root).

that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.











Code [ptch01f]

Code [boot03w]

permissions limiting access to only the owner (usually root).

Code [boot03w]
















that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.




Code [boot03w]

Code [boot03w]


Code [boot03w]

permissions limiting access to only the owner (usually root).























Code [boot03w]

AutoRPM has determined that there are updated packages waiting

Code [boot03w]

Code [boot03w]

Code [boot03w]























Code [boot03w]























Code [boot03w]



Code [boot03w]

Code [ptch01f]













Code [boot03w]







































Code [boot03w]

Code [boot03w]

AutoRPM has determined that there are updated packages waiting A boot loader configuration file could not be found. That means

Code [ptch01f]

A boot loader configuration file could not be found. That means






















A boot loader configuration file could not be found. That means

A boot loader configuration file could not be found. That means A boot loader configuration file could not be found. That means

Code [ptch01f]

Code [ptch01f]

Code [ptch01f]

Code [boot03w]












A boot loader configuration file could not be found. That means to be installed. A boot loader configuration file could not be found. That means A boot loader configuration file could not be found. That means

Code [boot03w]

A boot loader configuration file could not be found. That means A boot loader configuration file could not be found. That means

Code [ptch01f]

Code [ptch01f]

Code [ptch01f]

Code [ptch01f]

A boot loader configuration file could not be found. That means

Code [boot03w]

Code [ptch01f]

Code [ptch01f]

A boot loader configuration file could not be found. That means

Code [ptch01f]

AutoRPM has determined that there are updated packages waiting A boot loader configuration file could not be found. That means

Code [boot03w]

A boot loader configuration file could not be found. That means to be installed. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. A boot loader configuration file could not be found. That means that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.

Code [ptch01f]

that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. AutoRPM has determined that there are updated packages waiting that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. AutoRPM has determined that there are updated packages waiting that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting

Code [boot03w]

A boot loader configuration file could not be found. That means that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.






that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.






AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting A boot loader configuration file could not be found. That means that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting A boot loader configuration file could not be found. That means AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. to be installed. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. A boot loader configuration file could not be found. That means that neither /etc/lilo.conf nor /boot/grub/grub.conf exists. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.

































AutoRPM has determined that there are updated packages waiting to be installed.
to be installed.






























to be installed. A boot loader configuration file could not be found. That means to be installed. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.




Code [ptch02f]














































to be installed. to be installed. to be installed. to be installed. to be installed. that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.

to be installed.




to be installed.






that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.



























that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.



Code [ptch01f]


Code [ptch02f]

Code [ptch01f]

Code [ptch01f]

Code [ptch01f]












to be installed.



Code [ptch01f]














that neither /etc/lilo.conf nor /boot/grub/grub.conf exists.


Code [ptch01f]


Code [ptch01f]












Code [ptch01f]












apt-get has determined that there are updated packages waiting

Code [ptch01f]

Code [ptch01f]


















Code [ptch01f]



































Code [ptch01f]


Code [ptch02f]

Code [ptch01f]


































Code [ptch01f]












Code [ptch01f]

Code [ptch02f]

Code [ptch02f]

AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting

Code [ptch02f]












AutoRPM has determined that there are updated packages waiting





Code [ptch01f]


Code [ptch02f]

AutoRPM has determined that there are updated packages waiting to be installed. AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting

Code [ptch02f]

Code [ptch02f]

Code [ptch02f]

AutoRPM has determined that there are updated packages waiting

Code [ptch01f]

Code [ptch02f]

AutoRPM has determined that there are updated packages waiting

Code [ptch02f]

Code [ptch01f]

Code [ptch02f]

AutoRPM has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting

Code [ptch02f]

Code [ptch01f]

AutoRPM has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting to be installed. apt-get has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting to be installed. to be installed.

Code [ptch02f]

to be installed. to be installed.

Code [ptch01f]

apt-get has determined that there are updated packages waiting to be installed. to be installed. AutoRPM has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting












to be installed. apt-get has determined that there are updated packages waiting to be installed. AutoRPM has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting to be installed. apt-get has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting to be installed. to be installed. apt-get has determined that there are updated packages waiting AutoRPM has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting to be installed. to be installed. AutoRPM has determined that there are updated packages waiting to be installed. to be installed.











to be installed. to be installed. to be installed.










to be installed.






apt-get has determined that there are updated packages waiting






























AutoRPM has determined that there are updated packages waiting











Code [ptch03]

to be installed. to be installed.























to be installed.











to be installed. to be installed. to be installed. to be installed.











to be installed. to be installed. to be installed.






to be installed.

to be installed.


























Code [ptch02f]

Code [ptch03]




















Code [ptch02f]

Code [ptch02f]


Code [ptch02f]

Code [ptch02f]


Code [ptch02f]













to be installed. The machine does not appear to be a RedHat or Debian system. to be installed.











Code [ptch02f]












Code [ptch02f]





Code [ptch02f]























Code [ptch02f]













Code [ptch02f]























Code [ptch02f]

Code [ptch02f]












Code [ptch03]











apt-get has determined that there are updated packages waiting

Code [ptch02f]

Code [ptch03]

The machine does not appear to be a RedHat or Debian system.











apt-get has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting

Code [ptch02f]

Code [ptch03]

apt-get has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting

Code [ptch03]

apt-get has determined that there are updated packages waiting

Code [ptch03]









Code [ptch02f]

This test can currently only determine current patch levels













apt-get has determined that there are updated packages waiting

Code [ptch03]

apt-get has determined that there are updated packages waiting

Code [ptch03]

Code [ptch02f]

Code [ptch03]

Code [ptch03]

apt-get has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting

Code [ptch03]

Code [ptch03]

apt-get has determined that there are updated packages waiting

Code [ptch02f]

apt-get has determined that there are updated packages waiting

Code [ptch02f]

Code [ptch03]

The machine does not appear to be a RedHat or Debian system. to be installed. The machine does not appear to be a RedHat or Debian system. apt-get has determined that there are updated packages waiting apt-get has determined that there are updated packages waiting to be installed. to be installed. to be installed. This test can currently only determine current patch levels The machine does not appear to be a RedHat or Debian system.

Code [ptch02f]

The machine does not appear to be a RedHat or Debian system. to be installed.

Code [ptch03]

to be installed. The machine does not appear to be a RedHat or Debian system. apt-get has determined that there are updated packages waiting to be installed. if it can find autorpm or apt-get. to be installed. The machine does not appear to be a RedHat or Debian system. apt-get has determined that there are updated packages waiting The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system. to be installed. to be installed. The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system. to be installed. The machine does not appear to be a RedHat or Debian system. to be installed. to be installed. apt-get has determined that there are updated packages waiting The machine does not appear to be a RedHat or Debian system. apt-get has determined that there are updated packages waiting This test can currently only determine current patch levels












This test can currently only determine current patch levels to be installed. to be installed.






















The machine does not appear to be a RedHat or Debian system.











This test can currently only determine current patch levels if it can find autorpm or apt-get. apt-get has determined that there are updated packages waiting











This test can currently only determine current patch levels











to be installed. This test can currently only determine current patch levels

































This test can currently only determine current patch levels to be installed. This test can currently only determine current patch levels






This test can currently only determine current patch levels





This test can currently only determine current patch levels











Code [ptch03]












This test can currently only determine current patch levels to be installed.






















This test can currently only determine current patch levels if it can find autorpm or apt-get. This test can currently only determine current patch levels to be installed. if it can find autorpm or apt-get.











Code [ptch03]

Code [ptch03]

Code [ptch03]

Code [ptch03]

if it can find autorpm or apt-get.























Code [ptch03]

This test can currently only determine current patch levels if it can find autorpm or apt-get.

Code [ptch04w]

Code [ptch03]

to be installed.

Code [ptch03]

if it can find autorpm or apt-get.












Code [ptch03]












Code [ptch03]

if it can find autorpm or apt-get. if it can find autorpm or apt-get. if it can find autorpm or apt-get.

Code [ptch03]

if it can find autorpm or apt-get.

Code [ptch03]

Code [ptch03]

The machine does not appear to be a RedHat or Debian system. if it can find autorpm or apt-get.






Code [ptch03]


if it can find autorpm or apt-get. if it can find autorpm or apt-get.

































The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system.

Code [ptch03]

Code [ptch04w]

The machine does not appear to be a RedHat or Debian system. if it can find autorpm or apt-get.























The machine does not appear to be a RedHat or Debian system. No patch management tool could be found on the system.











Code [ptch03]

Code [ptch03]

The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system.

The machine does not appear to be a RedHat or Debian system.























The machine does not appear to be a RedHat or Debian system.










The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system.





This test can currently only determine current patch levels







The machine does not appear to be a RedHat or Debian system.

Code [ptch03]












The machine does not appear to be a RedHat or Debian system.

Code [ptch04w]












Code [ptch04w]












Code [ptch03]

This test can currently only determine current patch levels This test can currently only determine current patch levels This test can currently only determine current patch levels This test can currently only determine current patch levels

Code [ptch04w]

No patch management tool could be found on the system. The machine does not appear to be a RedHat or Debian system.

Code [ptch04w]

Code [ptch03]

This test can currently only determine current patch levels











The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system. This test can currently only determine current patch levels

Code [ptch04w]

The scripts looks for autorpm followed by apt-get. If either

Code [ptch04w]

This test can currently only determine current patch levels

Code [ptch04w]

Code [ptch04w]

Code [ptch04w]

This test can currently only determine current patch levels This test can currently only determine current patch levels if it can find autorpm or apt-get.

Code [ptch04w]

The machine does not appear to be a RedHat or Debian system. This test can currently only determine current patch levels This test can currently only determine current patch levels

Code [ptch04w]

This test can currently only determine current patch levels

Code [ptch04w]

No patch management tool could be found on the system. This test can currently only determine current patch levels No patch management tool could be found on the system. The machine does not appear to be a RedHat or Debian system. if it can find autorpm or apt-get. if it can find autorpm or apt-get. if it can find autorpm or apt-get. No patch management tool could be found on the system. The scripts looks for autorpm followed by apt-get. If either if it can find autorpm or apt-get. The machine does not appear to be a RedHat or Debian system.

Code [ptch04w]

This test can currently only determine current patch levels No patch management tool could be found on the system. if it can find autorpm or apt-get. This test can currently only determine current patch levels This test can currently only determine current patch levels No patch management tool could be found on the system. No patch management tool could be found on the system. No patch management tool could be found on the system. if it can find autorpm or apt-get. if it can find autorpm or apt-get. one is found it is used to determine if updated packages No patch management tool could be found on the system. if it can find autorpm or apt-get. if it can find autorpm or apt-get. No patch management tool could be found on the system. No patch management tool could be found on the system.












if it can find autorpm or apt-get. if it can find autorpm or apt-get. No patch management tool could be found on the system. This test can currently only determine current patch levels No patch management tool could be found on the system. The scripts looks for autorpm followed by apt-get. If either The scripts looks for autorpm followed by apt-get. If either if it can find autorpm or apt-get. if it can find autorpm or apt-get. This test can currently only determine current patch levels














one is found it is used to determine if updated packages























This test can currently only determine current patch levels The scripts looks for autorpm followed by apt-get. If either No patch management tool could be found on the system. if it can find autorpm or apt-get. The scripts looks for autorpm followed by apt-get. If either if it can find autorpm or apt-get.











if it can find autorpm or apt-get.











The scripts looks for autorpm followed by apt-get. If either

Code [ptch04w]

are available for your system. This message indicates that

The scripts looks for autorpm followed by apt-get. If either










The scripts looks for autorpm followed by apt-get. If either




















The scripts looks for autorpm followed by apt-get. If either

The scripts looks for autorpm followed by apt-get. If either The scripts looks for autorpm followed by apt-get. If either
if it can find autorpm or apt-get.













The scripts looks for autorpm followed by apt-get. If either

one is found it is used to determine if updated packages one is found it is used to determine if updated packages The scripts looks for autorpm followed by apt-get. If either

Code [ptch04w]

















Code [ptch04w]


Code [ptch04w]

Code [ptch04w]

are available for your system. This message indicates that if it can find autorpm or apt-get. if it can find autorpm or apt-get. one is found it is used to determine if updated packages The scripts looks for autorpm followed by apt-get. If either












one is found it is used to determine if updated packages

Code [ptch04w]

Code [ptch04w]












Code [ptch04w]

Code [ptch04w]

Code [ptch04w]

neither program was found on your system.





one is found it is used to determine if updated packages
No patch management tool could be found on the system.

one is found it is used to determine if updated packages






one is found it is used to determine if updated packages

Code [ptch04w]

one is found it is used to determine if updated packages












Code [ptch04w]

one is found it is used to determine if updated packages one is found it is used to determine if updated packages are available for your system. This message indicates that one is found it is used to determine if updated packages

Code [ptch04w]

are available for your system. This message indicates that

Code [ptch04w]

one is found it is used to determine if updated packages No patch management tool could be found on the system. No patch management tool could be found on the system. No patch management tool could be found on the system. No patch management tool could be found on the system.

Code [ptch04w]












neither program was found on your system.

Code [ptch04w]












one is found it is used to determine if updated packages are available for your system. This message indicates that No patch management tool could be found on the system. No patch management tool could be found on the system. are available for your system. This message indicates that No patch management tool could be found on the system.

Code [ptch04w]

No patch management tool could be found on the system.






No patch management tool could be found on the system.






Code [ptch04w]

are available for your system. This message indicates that are available for your system. This message indicates that are available for your system. This message indicates that are available for your system. This message indicates that No patch management tool could be found on the system. The scripts looks for autorpm followed by apt-get. If either neither program was found on your system. are available for your system. This message indicates that are available for your system. This message indicates that are available for your system. This message indicates that No patch management tool could be found on the system. The scripts looks for autorpm followed by apt-get. If either No patch management tool could be found on the system. are available for your system. This message indicates that No patch management tool could be found on the system. neither program was found on your system. The scripts looks for autorpm followed by apt-get. If either

Code [ptch04w]

The scripts looks for autorpm followed by apt-get. If either

Code [ptch04w]

The scripts looks for autorpm followed by apt-get. If either No patch management tool could be found on the system.












are available for your system. This message indicates that The scripts looks for autorpm followed by apt-get. If either No patch management tool could be found on the system. The scripts looks for autorpm followed by apt-get. If either neither program was found on your system. neither program was found on your system.

Code [ptch05e]

No patch management tool could be found on the system. The scripts looks for autorpm followed by apt-get. If either The scripts looks for autorpm followed by apt-get. If either No patch management tool could be found on the system. The scripts looks for autorpm followed by apt-get. If either neither program was found on your system. neither program was found on your system. The scripts looks for autorpm followed by apt-get. If either neither program was found on your system. neither program was found on your system. one is found it is used to determine if updated packages neither program was found on your system. The scripts looks for autorpm followed by apt-get. If either

neither program was found on your system.











one is found it is used to determine if updated packages neither program was found on your system. neither program was found on your system. The scripts looks for autorpm followed by apt-get. If either The scripts looks for autorpm followed by apt-get. If either one is found it is used to determine if updated packages
one is found it is used to determine if updated packages











No patch management tool could be found on the system. No patch management tool could be found on the system. The scripts looks for autorpm followed by apt-get. If either one is found it is used to determine if updated packages

Code [ptch05e]

neither program was found on your system. one is found it is used to determine if updated packages The scripts looks for autorpm followed by apt-get. If either one is found it is used to determine if updated packages



If the Tiger tool is not running as root it will probably not be




















one is found it is used to determine if updated packages The scripts looks for autorpm followed by apt-get. If either one is found it is used to determine if updated packages The scripts looks for autorpm followed by apt-get. If either one is found it is used to determine if updated packages

Code [ptch05e]

are available for your system. This message indicates that























one is found it is used to determine if updated packages one is found it is used to determine if updated packages











are available for your system. This message indicates that






















Code [ptch05e]

one is found it is used to determine if updated packages












are available for your system. This message indicates that one is found it is used to determine if updated packages are available for your system. This message indicates that











are available for your system. This message indicates that











The scripts looks for autorpm followed by apt-get. If either The scripts looks for autorpm followed by apt-get. If either one is found it is used to determine if updated packages If the Tiger tool is not running as root it will probably not be





Code [ptch05e]


are available for your system. This message indicates that are available for your system. This message indicates that

Code [ptch05e]

one is found it is used to determine if updated packages able to update the package database from the latest sources available. are available for your system. This message indicates that one is found it is used to determine if updated packages are available for your system. This message indicates that are available for your system. This message indicates that neither program was found on your system. one is found it is used to determine if updated packages

Code [ptch05e]

Code [ptch05e]

Code [ptch05e]

Code [ptch05e]

If the Tiger tool is not running as root it will probably not be

Code [ptch05e]

are available for your system. This message indicates that

Code [ptch05e]

are available for your system. This message indicates that neither program was found on your system. If the Tiger tool is not running as root it will probably not be

Code [ptch05e]

neither program was found on your system. neither program was found on your system. are available for your system. This message indicates that

Code [ptch05e]

neither program was found on your system. are available for your system. This message indicates that

Code [ptch05e]

one is found it is used to determine if updated packages one is found it is used to determine if updated packages are available for your system. This message indicates that able to update the package database from the latest sources available. neither program was found on your system. If the Tiger tool is not running as root it will probably not be If the Tiger tool is not running as root it will probably not be neither program was found on your system. are available for your system. This message indicates that Some errors might be printed on the output and the security check neither program was found on your system. neither program was found on your system. are available for your system. This message indicates that neither program was found on your system. If the Tiger tool is not running as root it will probably not be are available for your system. This message indicates that If the Tiger tool is not running as root it will probably not be












If the Tiger tool is not running as root it will probably not be If the Tiger tool is not running as root it will probably not be If the Tiger tool is not running as root it will probably not be neither program was found on your system. If the Tiger tool is not running as root it will probably not be











neither program was found on your system. able to update the package database from the latest sources available. able to update the package database from the latest sources available.







If the Tiger tool is not running as root it will probably not be




If the Tiger tool is not running as root it will probably not be neither program was found on your system. neither program was found on your system. If the Tiger tool is not running as root it will probably not be











are available for your system. This message indicates that











neither program was found on your system. Some errors might be printed on the output and the security check able to update the package database from the latest sources available.





are available for your system. This message indicates that






neither program was found on your system. able to update the package database from the latest sources available.











will be done only on the current available list of packages (which






















Code [ptch05e]












able to update the package database from the latest sources available. neither program was found on your system. neither program was found on your system.

Code [ptch05e]

able to update the package database from the latest sources available. able to update the package database from the latest sources available.












able to update the package database from the latest sources available.











able to update the package database from the latest sources available.

Code [ptch05e]

Some errors might be printed on the output and the security check Some errors might be printed on the output and the security check able to update the package database from the latest sources available.

Code [ptch05e]

Code [ptch05e]


able to update the package database from the latest sources available.




able to update the package database from the latest sources available.






able to update the package database from the latest sources available.






















Code [ptch05e]

Some errors might be printed on the output and the security check neither program was found on your system. neither program was found on your system.

Code [ptch05e]

will be done only on the current available list of packages (which

Code [ptch05e]












Code [ptch05e]

Some errors might be printed on the output and the security check

Code [ptch05e]

might not be up-to-date). Make sure that you are running the tool


If the Tiger tool is not running as root it will probably not be










Code [ptch05e]

Some errors might be printed on the output and the security check












Some errors might be printed on the output and the security check If the Tiger tool is not running as root it will probably not be

Code [ptch05e]

Some errors might be printed on the output and the security check Some errors might be printed on the output and the security check Some errors might be printed on the output and the security check If the Tiger tool is not running as root it will probably not be Some errors might be printed on the output and the security check

Code [ptch05e]

will be done only on the current available list of packages (which

Code [ptch05e]

If the Tiger tool is not running as root it will probably not be If the Tiger tool is not running as root it will probably not be

Code [ptch05e]

will be done only on the current available list of packages (which Some errors might be printed on the output and the security check Some errors might be printed on the output and the security check Some errors might be printed on the output and the security check If the Tiger tool is not running as root it will probably not be












Code [ptch05e]

will be done only on the current available list of packages (which might not be up-to-date). Make sure that you are running the tool

If the Tiger tool is not running as root it will probably not be











If the Tiger tool is not running as root it will probably not be If the Tiger tool is not running as root it will probably not be will be done only on the current available list of packages (which

Code [ptch05e]

If the Tiger tool is not running as root it will probably not be

Code [ptch05e]

able to update the package database from the latest sources available. as an administrative user. If the Tiger tool is not running as root it will probably not be will be done only on the current available list of packages (which will be done only on the current available list of packages (which If the Tiger tool is not running as root it will probably not be able to update the package database from the latest sources available. will be done only on the current available list of packages (which able to update the package database from the latest sources available. might not be up-to-date). Make sure that you are running the tool will be done only on the current available list of packages (which will be done only on the current available list of packages (which If the Tiger tool is not running as root it will probably not be will be done only on the current available list of packages (which able to update the package database from the latest sources available. If the Tiger tool is not running as root it will probably not be able to update the package database from the latest sources available. If the Tiger tool is not running as root it will probably not be might not be up-to-date). Make sure that you are running the tool will be done only on the current available list of packages (which

Code [ptch05e]

will be done only on the current available list of packages (which

Code [ptch05e]

will be done only on the current available list of packages (which able to update the package database from the latest sources available. If the Tiger tool is not running as root it will probably not be might not be up-to-date). Make sure that you are running the tool able to update the package database from the latest sources available. able to update the package database from the latest sources available. as an administrative user. able to update the package database from the latest sources available. might not be up-to-date). Make sure that you are running the tool If the Tiger tool is not running as root it will probably not be Some errors might be printed on the output and the security check





able to update the package database from the latest sources available.







able to update the package database from the latest sources available. If the Tiger tool is not running as root it will probably not be might not be up-to-date). Make sure that you are running the tool might not be up-to-date). Make sure that you are running the tool able to update the package database from the latest sources available. Some errors might be printed on the output and the security check might not be up-to-date). Make sure that you are running the tool Some errors might be printed on the output and the security check might not be up-to-date). Make sure that you are running the tool might not be up-to-date). Make sure that you are running the tool as an administrative user. able to update the package database from the latest sources available. able to update the package database from the latest sources available. Some errors might be printed on the output and the security check able to update the package database from the latest sources available. Some errors might be printed on the output and the security check If the Tiger tool is not running as root it will probably not be might not be up-to-date). Make sure that you are running the tool might not be up-to-date). Make sure that you are running the tool as an administrative user. might not be up-to-date). Make sure that you are running the tool If the Tiger tool is not running as root it will probably not be might not be up-to-date). Make sure that you are running the tool Some errors might be printed on the output and the security check able to update the package database from the latest sources available. Some errors might be printed on the output and the security check Some errors might be printed on the output and the security check as an administrative user.











Code [osv001f]

Some errors might be printed on the output and the security check Some errors might be printed on the output and the security check as an administrative user. able to update the package database from the latest sources available. will be done only on the current available list of packages (which Some errors might be printed on the output and the security check able to update the package database from the latest sources available. as an administrative user. as an administrative user. will be done only on the current available list of packages (which Some errors might be printed on the output and the security check will be done only on the current available list of packages (which as an administrative user. as an administrative user.





as an administrative user.







Some errors might be printed on the output and the security check will be done only on the current available list of packages (which Some errors might be printed on the output and the security check Some errors might be printed on the output and the security check











as an administrative user. able to update the package database from the latest sources available. will be done only on the current available list of packages (which as an administrative user. able to update the package database from the latest sources available. as an administrative user. will be done only on the current available list of packages (which as an administrative user.

Code [osv001f]



will be done only on the current available list of packages (which









will be done only on the current available list of packages (which Some errors might be printed on the output and the security check will be done only on the current available list of packages (which Some errors might be printed on the output and the security check Some errors might be printed on the output and the security check might not be up-to-date). Make sure that you are running the tool The operating system version appears to be less than RedHat 6.2











will be done only on the current available list of packages (which will be done only on the current available list of packages (which






















might not be up-to-date). Make sure that you are running the tool will be done only on the current available list of packages (which

Code [osv001f]

might not be up-to-date). Make sure that you are running the tool






















will be done only on the current available list of packages (which

Code [osv001f]

will be done only on the current available list of packages (which











might not be up-to-date). Make sure that you are running the tool
Some errors might be printed on the output and the security check

will be done only on the current available list of packages (which






















The operating system version appears to be less than RedHat 6.2

Code [osv001f]

might not be up-to-date). Make sure that you are running the tool







Some errors might be printed on the output and the security check













might not be up-to-date). Make sure that you are running the tool



might not be up-to-date). Make sure that you are running the tool might not be up-to-date). Make sure that you are running the tool will be done only on the current available list of packages (which

Code [osv001f]

will be done only on the current available list of packages (which

Code [osv001f]

will be done only on the current available list of packages (which as an administrative user. might not be up-to-date). Make sure that you are running the tool might not be up-to-date). Make sure that you are running the tool might not be up-to-date). Make sure that you are running the tool

Code [osv001f]

Code [osv001f]

as an administrative user.

Code [osv001f]

The operating system version appears to be less than RedHat 6.2 might not be up-to-date). Make sure that you are running the tool Due to security enhancements and fixes available in recent releases, as an administrative user.

Code [osv001f]

might not be up-to-date). Make sure that you are running the tool might not be up-to-date). Make sure that you are running the tool

Code [osv001f]

The operating system version appears to be less than RedHat 6.2 will be done only on the current available list of packages (which might not be up-to-date). Make sure that you are running the tool

Code [osv001f]

as an administrative user.

Code [osv001f]

Code [osv001f]

Due to security enhancements and fixes available in recent releases, as an administrative user. The operating system version appears to be less than RedHat 6.2 will be done only on the current available list of packages (which as an administrative user. as an administrative user. as an administrative user. might not be up-to-date). Make sure that you are running the tool might not be up-to-date). Make sure that you are running the tool The operating system version appears to be less than RedHat 6.2 might not be up-to-date). Make sure that you are running the tool The operating system version appears to be less than RedHat 6.2












The operating system version appears to be less than RedHat 6.2 as an administrative user. as an administrative user. as an administrative user.











as an administrative user. The operating system version appears to be less than RedHat 6.2 The operating system version appears to be less than RedHat 6.2 running an older version of RedHat is strongly discouraged. The operating system version appears to be less than RedHat 6.2 as an administrative user. Due to security enhancements and fixes available in recent releases,











as an administrative user. The operating system version appears to be less than RedHat 6.2 Due to security enhancements and fixes available in recent releases, as an administrative user.











might not be up-to-date). Make sure that you are running the tool The operating system version appears to be less than RedHat 6.2 running an older version of RedHat is strongly discouraged. The operating system version appears to be less than RedHat 6.2 The operating system version appears to be less than RedHat 6.2

















Due to security enhancements and fixes available in recent releases,
















might not be up-to-date). Make sure that you are running the tool











Due to security enhancements and fixes available in recent releases, as an administrative user. as an administrative user.

Code [osv001f]

as an administrative user.

Code [osv001f]

Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases,





























Due to security enhancements and fixes available in recent releases,

Code [osv001f]












Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases,











running an older version of RedHat is strongly discouraged.











Code [osv001f]












running an older version of RedHat is strongly discouraged. Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases, as an administrative user.

Code [osv001f]























Code [osv001f]

running an older version of RedHat is strongly discouraged. Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases,

Code [osv001f]

as an administrative user.

Code [osv001f]

running an older version of RedHat is strongly discouraged.

The operating system version appears to be less than RedHat 6.2











Code [osv001f]

Code [osv001f]

Code [osv001f]














running an older version of RedHat is strongly discouraged. The operating system version appears to be less than RedHat 6.2 running an older version of RedHat is strongly discouraged.

Code [osv002f]

The operating system version appears to be less than RedHat 6.2

Code [osv001f]

Code [osv001f]

running an older version of RedHat is strongly discouraged.

Code [osv001f]

running an older version of RedHat is strongly discouraged.











running an older version of RedHat is strongly discouraged.

The operating system version appears to be less than RedHat 6.2











running an older version of RedHat is strongly discouraged.

Code [osv002f]

running an older version of RedHat is strongly discouraged. The operating system version appears to be less than RedHat 6.2

Code [osv001f]












running an older version of RedHat is strongly discouraged. The operating system version appears to be less than RedHat 6.2 running an older version of RedHat is strongly discouraged.







The operating system version appears to be less than RedHat 6.2












The operating system version appears to be less than RedHat 6.2

Code [osv001f]

Code [osv001f]




Due to security enhancements and fixes available in recent releases,








Code [osv001f]

The operating system version appears to be less than RedHat 6.2 The operating system version appears to be less than RedHat 6.2 The operating system version appears to be less than RedHat 6.2























Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0

Code [osv002f]

Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than RedHat 6.2 The operating system version appears to be less than RedHat 6.2 The operating system version appears to be less than RedHat 6.2

Code [osv002f]












Due to security enhancements and fixes available in recent releases,


















Code [osv001f]












The operating system version appears to be less than RedHat 6.2




The operating system version appears to be less than Debian 3.0







Due to security enhancements and fixes available in recent releases,

Code [osv001f]

Code [osv002f]













Due to security enhancements and fixes available in recent releases,









Due to security enhancements and fixes available in recent releases,

Code [osv002f]

Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than RedHat 6.2 The operating system version appears to be less than RedHat 6.2 Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases, running an older version of RedHat is strongly discouraged.

Code [osv002f]

Code [osv002f]

The operating system version appears to be less than RedHat 6.2 Due to security enhancements and fixes available in recent releases, running an older version of RedHat is strongly discouraged.

Code [osv002f]

Code [osv002f]

Due to security enhancements and fixes available in recent releases, running an older version of RedHat is strongly discouraged. Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0 The operating system version appears to be less than Debian 3.0 Due to security enhancements and fixes available in recent releases,

Code [osv002f]

Due to security enhancements and fixes available in recent releases,

Code [osv002f]

running an older version of RedHat is strongly discouraged.

Code [osv002f]

Code [osv002f]

The operating system version appears to be less than RedHat 6.2 Due to security enhancements and fixes available in recent releases, running an older version of RedHat is strongly discouraged.

Code [osv002f]

Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0 The operating system version appears to be less than RedHat 6.2 The operating system version appears to be less than Debian 3.0 running an older version of RedHat is strongly discouraged. running an older version of RedHat is strongly discouraged. Due to security enhancements and fixes available in recent releases, running an older version of RedHat is strongly discouraged. running an older version of RedHat is strongly discouraged. running an older version of RedHat is strongly discouraged. Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0 The operating system version appears to be less than Debian 3.0 Due to security enhancements and fixes available in recent releases,













The operating system version appears to be less than Debian 3.0










running an older version of RedHat is strongly discouraged. running an older version of RedHat is strongly discouraged. The operating system version appears to be less than Debian 3.0











The operating system version appears to be less than Debian 3.0 Due to security enhancements and fixes available in recent releases, running an older version of RedHat is strongly discouraged. running an older version of RedHat is strongly discouraged. The operating system version appears to be less than Debian 3.0 Due to security enhancements and fixes available in recent releases,



running an older version of Debian is strongly discouraged.








The operating system version appears to be less than Debian 3.0 running an older version of RedHat is strongly discouraged. The operating system version appears to be less than Debian 3.0











The operating system version appears to be less than Debian 3.0 running an older version of Debian is strongly discouraged. Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases,











running an older version of RedHat is strongly discouraged.

































Due to security enhancements and fixes available in recent releases,







Due to security enhancements and fixes available in recent releases,

Code [osv002f]

running an older version of RedHat is strongly discouraged. running an older version of RedHat is strongly discouraged.

Code [osv002f]

Code [osv002f]

Due to security enhancements and fixes available in recent releases,











running an older version of Debian is strongly discouraged. Due to security enhancements and fixes available in recent releases,









Code [osv002f]


Due to security enhancements and fixes available in recent releases,













Due to security enhancements and fixes available in recent releases,









Due to security enhancements and fixes available in recent releases,

Code [osv002f]











running an older version of Debian is strongly discouraged.





















Due to security enhancements and fixes available in recent releases, running an older version of RedHat is strongly discouraged. Due to security enhancements and fixes available in recent releases, running an older version of RedHat is strongly discouraged. running an older version of Debian is strongly discouraged.

Code [osv002f]

Code [osv002f]

running an older version of Debian is strongly discouraged.

Code [osv002f]

Code [osv002f]

Code [osv002f]

running an older version of Debian is strongly discouraged.











The operating system version appears to be less than Debian 3.0 running an older version of Debian is strongly discouraged.





The operating system version appears to be less than Debian 3.0














Code [osv002f]



Code [osv002f]

running an older version of Debian is strongly discouraged.







Code [osv003w]


running an older version of Debian is strongly discouraged. The operating system version appears to be less than Debian 3.0

Code [osv002f]

Code [osv002f]

The operating system version appears to be less than Debian 3.0 running an older version of Debian is strongly discouraged. running an older version of Debian is strongly discouraged. The operating system version appears to be less than Debian 3.0












running an older version of Debian is strongly discouraged.

Code [osv003w]

Code [osv002f]

running an older version of Debian is strongly discouraged.












running an older version of Debian is strongly discouraged.






















The operating system version appears to be less than Debian 3.0 The operating system version appears to be less than Debian 3.0 The operating system version appears to be less than Debian 3.0




Code [osv002f]


The operating system version appears to be less than Debian 3.0











Code [osv002f]

Code [osv002f]

The operating system version appears to be less than Debian 3.0












Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0

Code [osv003w]

The operating system version appears to be less than Debian 3.0



















The machine does not appear to be a RedHat or Debian system.



Code [osv003w]

The operating system version appears to be less than Debian 3.0 Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0











Due to security enhancements and fixes available in recent releases,

Due to security enhancements and fixes available in recent releases,











Code [osv002f]












The machine does not appear to be a RedHat or Debian system.

Code [osv003w]
















The operating system version appears to be less than Debian 3.0

Code [osv003w]

Code [osv002f]

Due to security enhancements and fixes available in recent releases,

Code [osv003w]

Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases, Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0

Code [osv003w]

The operating system version appears to be less than Debian 3.0 Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0 running an older version of Debian is strongly discouraged.

Code [osv003w]

Code [osv003w]

The machine does not appear to be a RedHat or Debian system. running an older version of Debian is strongly discouraged. This test can not suggest a recommended version number for your The machine does not appear to be a RedHat or Debian system. Due to security enhancements and fixes available in recent releases, running an older version of Debian is strongly discouraged. Due to security enhancements and fixes available in recent releases,

Code [osv003w]

Due to security enhancements and fixes available in recent releases,

Code [osv003w]

Code [osv003w]

running an older version of Debian is strongly discouraged. Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0 running an older version of Debian is strongly discouraged.

Code [osv003w]

This test can not suggest a recommended version number for your The machine does not appear to be a RedHat or Debian system. Due to security enhancements and fixes available in recent releases, The operating system version appears to be less than Debian 3.0

Code [osv003w]

The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system. running an older version of Debian is strongly discouraged. Due to security enhancements and fixes available in recent releases, running an older version of Debian is strongly discouraged. running an older version of Debian is strongly discouraged. The machine does not appear to be a RedHat or Debian system. running an older version of Debian is strongly discouraged. Due to security enhancements and fixes available in recent releases, running an older version of Debian is strongly discouraged. Due to security enhancements and fixes available in recent releases,












The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system.











operating system. This test can not suggest a recommended version number for your This test can not suggest a recommended version number for your running an older version of Debian is strongly discouraged. running an older version of Debian is strongly discouraged.







running an older version of Debian is strongly discouraged.




The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system.











Due to security enhancements and fixes available in recent releases,







running an older version of Debian is strongly discouraged.




The machine does not appear to be a RedHat or Debian system. This test can not suggest a recommended version number for your operating system. Due to security enhancements and fixes available in recent releases, running an older version of Debian is strongly discouraged. This test can not suggest a recommended version number for your The machine does not appear to be a RedHat or Debian system. This test can not suggest a recommended version number for your






running an older version of Debian is strongly discouraged.




















running an older version of Debian is strongly discouraged. This test can not suggest a recommended version number for your

Code [osv003w]












running an older version of Debian is strongly discouraged.

Code [osv003w]

This test can not suggest a recommended version number for your This test can not suggest a recommended version number for your operating system.

Code [osv003w]

operating system.























Code [osv003w]

This test can not suggest a recommended version number for your












This test can not suggest a recommended version number for your

Code [osv003w]

This test can not suggest a recommended version number for your























running an older version of Debian is strongly discouraged.
This test can not suggest a recommended version number for your






















Code [osv003w]

operating system. running an older version of Debian is strongly discouraged. operating system.

Code [osv003w]

Code [osv003w]

operating system. This test can not suggest a recommended version number for your

Code [osv003w]

Code [osv003w]












operating system.











The machine does not appear to be a RedHat or Debian system. operating system.











The machine does not appear to be a RedHat or Debian system.

Code [osv003w]

Code [osv004w]

The machine does not appear to be a RedHat or Debian system. operating system.























Code [osv003w]

Code [osv003w]

The machine does not appear to be a RedHat or Debian system. operating system.

Code [osv003w]

operating system. The machine does not appear to be a RedHat or Debian system. operating system.

Code [osv003w]












Code [osv004w]

operating system.























The machine does not appear to be a RedHat or Debian system. The machine does not appear to be a RedHat or Debian system.





The machine does not appear to be a RedHat or Debian system.






Code [osv003w]












The machine does not appear to be a RedHat or Debian system. operating system.

Code [osv003w]

The machine does not appear to be a RedHat or Debian system.

Code [osv003w]



















This test can not suggest a recommended version number for your




The machine does not appear to be a RedHat or Debian system.

Code [osv004w]

This test can not suggest a recommended version number for your The machine is running an unreleased version of Debian GNU/Linux. This test can not suggest a recommended version number for your

Code [osv004w]

The machine does not appear to be a RedHat or Debian system.












The machine does not appear to be a RedHat or Debian system. This test can not suggest a recommended version number for your

Code [osv003w]


















The machine does not appear to be a RedHat or Debian system.

This test can not suggest a recommended version number for your

Code [osv004w]

The machine does not appear to be a RedHat or Debian system.

Code [osv004w]

Code [osv003w]

The machine is running an unreleased version of Debian GNU/Linux. This test can not suggest a recommended version number for your

This test can not suggest a recommended version number for your








This test can not suggest a recommended version number for your



The machine does not appear to be a RedHat or Debian system.

Code [osv004w]




Code [osv004w]


This test can not suggest a recommended version number for your The machine does not appear to be a RedHat or Debian system. This test can not suggest a recommended version number for your The machine does not appear to be a RedHat or Debian system.

Code [osv004w]

operating system. operating system. This version is not supported by the security team so it might not operating system.

Code [osv004w]

This test can not suggest a recommended version number for your The machine is running an unreleased version of Debian GNU/Linux.

Code [osv004w]

The machine is running an unreleased version of Debian GNU/Linux. This test can not suggest a recommended version number for your The machine does not appear to be a RedHat or Debian system.

Code [osv004w]

Code [osv004w]

operating system. This test can not suggest a recommended version number for your operating system. This test can not suggest a recommended version number for your This test can not suggest a recommended version number for your The machine is running an unreleased version of Debian GNU/Linux.

Code [osv004w]

The machine is running an unreleased version of Debian GNU/Linux. The machine does not appear to be a RedHat or Debian system. This version is not supported by the security team so it might not

Code [osv004w]

operating system. This test can not suggest a recommended version number for your operating system. The machine is running an unreleased version of Debian GNU/Linux. The machine is running an unreleased version of Debian GNU/Linux. operating system. operating system. This test can not suggest a recommended version number for your operating system. This test can not suggest a recommended version number for your The machine is running an unreleased version of Debian GNU/Linux.























be up-to-date security wise (support is only provided for the latest The machine is running an unreleased version of Debian GNU/Linux.











operating system. This version is not supported by the security team so it might not This version is not supported by the security team so it might not The machine is running an unreleased version of Debian GNU/Linux. operating system. The machine is running an unreleased version of Debian GNU/Linux. The machine is running an unreleased version of Debian GNU/Linux. This test can not suggest a recommended version number for your operating system. operating system.






















operating system. This version is not supported by the security team so it might not This version is not supported by the security team so it might not The machine is running an unreleased version of Debian GNU/Linux. This test can not suggest a recommended version number for your
The machine is running an unreleased version of Debian GNU/Linux.











be up-to-date security wise (support is only provided for the latest operating system.











This version is not supported by the security team so it might not





















This version is not supported by the security team so it might not

Code [osv004w]

operating system.

Code [osv004w]












operating system.

Code [osv004w]

This version is not supported by the security team so it might not release). That is, "run at your own risk". This version is not supported by the security team so it might not












be up-to-date security wise (support is only provided for the latest











be up-to-date security wise (support is only provided for the latest operating system. This version is not supported by the security team so it might not











Code [osv004w]












This version is not supported by the security team so it might not This version is not supported by the security team so it might not

Code [osv004w]

Code [osv004w]

be up-to-date security wise (support is only provided for the latest












release). That is, "run at your own risk".

Code [osv004w]

This version is not supported by the security team so it might not

Code [osv004w]












Code [osv004w]

be up-to-date security wise (support is only provided for the latest be up-to-date security wise (support is only provided for the latest This version is not supported by the security team so it might not operating system. be up-to-date security wise (support is only provided for the latest

Code [osv004w]

The machine is running an unreleased version of Debian GNU/Linux. The machine is running an unreleased version of Debian GNU/Linux.























Code [osv004w]

be up-to-date security wise (support is only provided for the latest











be up-to-date security wise (support is only provided for the latest

The machine is running an unreleased version of Debian GNU/Linux.

Code [osv004w]

release). That is, "run at your own risk".

Code [osv004w]

Code [osv004w]

The machine is running an unreleased version of Debian GNU/Linux. be up-to-date security wise (support is only provided for the latest release). That is, "run at your own risk".












be up-to-date security wise (support is only provided for the latest

Code [osv004w]

The machine is running an unreleased version of Debian GNU/Linux. be up-to-date security wise (support is only provided for the latest

Code [osv004w]

release). That is, "run at your own risk". The machine is running an unreleased version of Debian GNU/Linux.












release). That is, "run at your own risk". The machine is running an unreleased version of Debian GNU/Linux. be up-to-date security wise (support is only provided for the latest The machine is running an unreleased version of Debian GNU/Linux. The machine is running an unreleased version of Debian GNU/Linux. release). That is, "run at your own risk". The machine is running an unreleased version of Debian GNU/Linux. release). That is, "run at your own risk".






Code [osv004w]


be up-to-date security wise (support is only provided for the latest This version is not supported by the security team so it might not

Code [osv004w]

Code [sum001f]

release). That is, "run at your own risk". The machine is running an unreleased version of Debian GNU/Linux. release). That is, "run at your own risk". This version is not supported by the security team so it might not This version is not supported by the security team so it might not The machine is running an unreleased version of Debian GNU/Linux.



The machine is running an unreleased version of Debian GNU/Linux.









This version is not supported by the security team so it might not

Code [osv004w]

The machine is running an unreleased version of Debian GNU/Linux. release). That is, "run at your own risk".












release). That is, "run at your own risk". This version is not supported by the security team so it might not The machine is running an unreleased version of Debian GNU/Linux. release). That is, "run at your own risk". The machine is running an unreleased version of Debian GNU/Linux.











This version is not supported by the security team so it might not






This version is not supported by the security team so it might not





release). That is, "run at your own risk".

Code [sum001f]


This version is not supported by the security team so it might not This version is not supported by the security team so it might not





The machine is running an unreleased version of Debian GNU/Linux.






This version is not supported by the security team so it might not

Code [osv004w]

be up-to-date security wise (support is only provided for the latest release). That is, "run at your own risk". The machine is running an unreleased version of Debian GNU/Linux.












This version is not supported by the security team so it might not The system does not appear to require a password during single-user be up-to-date security wise (support is only provided for the latest

Code [sum001f]

be up-to-date security wise (support is only provided for the latest This version is not supported by the security team so it might not This version is not supported by the security team so it might not be up-to-date security wise (support is only provided for the latest











Code [sum001f]


The machine is running an unreleased version of Debian GNU/Linux.











This version is not supported by the security team so it might not be up-to-date security wise (support is only provided for the latest





















This version is not supported by the security team so it might not

Code [sum001f]

Code [sum001f]

This version is not supported by the security team so it might not be up-to-date security wise (support is only provided for the latest

Code [sum001f]

be up-to-date security wise (support is only provided for the latest

Code [sum001f]











be up-to-date security wise (support is only provided for the latest

be up-to-date security wise (support is only provided for the latest The machine is running an unreleased version of Debian GNU/Linux. This version is not supported by the security team so it might not The system does not appear to require a password during single-user











be up-to-date security wise (support is only provided for the latest

Code [sum001f]

This version is not supported by the security team so it might not be up-to-date security wise (support is only provided for the latest release). That is, "run at your own risk".

Code [sum001f]

mode boot. Either add a password to your boot loader or add the line: release). That is, "run at your own risk". The system does not appear to require a password during single-user release). That is, "run at your own risk". The system does not appear to require a password during single-user be up-to-date security wise (support is only provided for the latest

Code [sum001f]

be up-to-date security wise (support is only provided for the latest release). That is, "run at your own risk".

Code [sum001f]

This version is not supported by the security team so it might not be up-to-date security wise (support is only provided for the latest release). That is, "run at your own risk".

Code [sum001f]

The system does not appear to require a password during single-user

Code [sum001f]

be up-to-date security wise (support is only provided for the latest release). That is, "run at your own risk". The system does not appear to require a password during single-user The system does not appear to require a password during single-user release). That is, "run at your own risk". This version is not supported by the security team so it might not be up-to-date security wise (support is only provided for the latest release). That is, "run at your own risk". release). That is, "run at your own risk". be up-to-date security wise (support is only provided for the latest The system does not appear to require a password during single-user

Code [sum001f]

mode boot. Either add a password to your boot loader or add the line: The system does not appear to require a password during single-user release). That is, "run at your own risk". be up-to-date security wise (support is only provided for the latest release). That is, "run at your own risk". ~~:S:wait:/sbin/sulogin























mode boot. Either add a password to your boot loader or add the line:
release). That is, "run at your own risk".











The system does not appear to require a password during single-user release). That is, "run at your own risk". mode boot. Either add a password to your boot loader or add the line:











The system does not appear to require a password during single-user
The system does not appear to require a password during single-user











release). That is, "run at your own risk". be up-to-date security wise (support is only provided for the latest mode boot. Either add a password to your boot loader or add the line: The system does not appear to require a password during single-user











The system does not appear to require a password during single-user mode boot. Either add a password to your boot loader or add the line: mode boot. Either add a password to your boot loader or add the line: release). That is, "run at your own risk".











be up-to-date security wise (support is only provided for the latest











release). That is, "run at your own risk".
release). That is, "run at your own risk".











mode boot. Either add a password to your boot loader or add the line: The system does not appear to require a password during single-user











mode boot. Either add a password to your boot loader or add the line: ~~:S:wait:/sbin/sulogin release). That is, "run at your own risk".

Code [sum001f]

Code [sum001f]

Code [sum001f]












Code [sum001f]

~~:S:wait:/sbin/sulogin to your /etc/inittab file. This line should be added immediately before ~~:S:wait:/sbin/sulogin

Code [sum001f]

















mode boot. Either add a password to your boot loader or add the line:



mode boot. Either add a password to your boot loader or add the line: release). That is, "run at your own risk". mode boot. Either add a password to your boot loader or add the line:

Code [sum001f]












~~:S:wait:/sbin/sulogin mode boot. Either add a password to your boot loader or add the line: mode boot. Either add a password to your boot loader or add the line:

Code [sum001f]

Code [sum001f]












~~:S:wait:/sbin/sulogin ~~:S:wait:/sbin/sulogin











release). That is, "run at your own risk".











~~:S:wait:/sbin/sulogin

Code [sum001f]

Code [sum001f]








to your /etc/inittab file. This line should be added immediately before




mode boot. Either add a password to your boot loader or add the line: ~~:S:wait:/sbin/sulogin

Code [sum001f]

The system does not appear to require a password during single-user The system does not appear to require a password during single-user The system does not appear to require a password during single-user

Code [sum001f]

Code [sum001f]

the line containing "rc 0". The system does not appear to require a password during single-user The system does not appear to require a password during single-user to your /etc/inittab file. This line should be added immediately before ~~:S:wait:/sbin/sulogin to your /etc/inittab file. This line should be added immediately before

Code [sum001f]

~~:S:wait:/sbin/sulogin












~~:S:wait:/sbin/sulogin

Code [sum001f]

to your /etc/inittab file. This line should be added immediately before ~~:S:wait:/sbin/sulogin The system does not appear to require a password during single-user The system does not appear to require a password during single-user

Code [sum001f]

~~:S:wait:/sbin/sulogin

Code [sum001f]

to your /etc/inittab file. This line should be added immediately before to your /etc/inittab file. This line should be added immediately before












The system does not appear to require a password during single-user to your /etc/inittab file. This line should be added immediately before The system does not appear to require a password during single-user The system does not appear to require a password during single-user

Code [sum001f]

~~:S:wait:/sbin/sulogin the line containing "rc 0". mode boot. Either add a password to your boot loader or add the line: mode boot. Either add a password to your boot loader or add the line: to your /etc/inittab file. This line should be added immediately before The system does not appear to require a password during single-user The system does not appear to require a password during single-user The system does not appear to require a password during single-user mode boot. Either add a password to your boot loader or add the line: mode boot. Either add a password to your boot loader or add the line: the line containing "rc 0".

Code [sum001f]

the line containing "rc 0". mode boot. Either add a password to your boot loader or add the line: to your /etc/inittab file. This line should be added immediately before The system does not appear to require a password during single-user












to your /etc/inittab file. This line should be added immediately before to your /etc/inittab file. This line should be added immediately before The system does not appear to require a password during single-user the line containing "rc 0". to your /etc/inittab file. This line should be added immediately before

Code [sum001f]

The system does not appear to require a password during single-user mode boot. Either add a password to your boot loader or add the line: mode boot. Either add a password to your boot loader or add the line: The system does not appear to require a password during single-user the line containing "rc 0". to your /etc/inittab file. This line should be added immediately before the line containing "rc 0". mode boot. Either add a password to your boot loader or add the line: mode boot. Either add a password to your boot loader or add the line: the line containing "rc 0". The system does not appear to require a password during single-user to your /etc/inittab file. This line should be added immediately before












~~:S:wait:/sbin/sulogin mode boot. Either add a password to your boot loader or add the line: ~~:S:wait:/sbin/sulogin mode boot. Either add a password to your boot loader or add the line: mode boot. Either add a password to your boot loader or add the line: the line containing "rc 0".



mode boot. Either add a password to your boot loader or add the line:


~~:S:wait:/sbin/sulogin









~~:S:wait:/sbin/sulogin








The system does not appear to require a password during single-user

Code [trip01f]

the line containing "rc 0". ~~:S:wait:/sbin/sulogin the line containing "rc 0". mode boot. Either add a password to your boot loader or add the line: mode boot. Either add a password to your boot loader or add the line: the line containing "rc 0". the line containing "rc 0".












mode boot. Either add a password to your boot loader or add the line: The system does not appear to require a password during single-user ~~:S:wait:/sbin/sulogin
mode boot. Either add a password to your boot loader or add the line:

the line containing "rc 0".










~~:S:wait:/sbin/sulogin







Code [trip01f]













~~:S:wait:/sbin/sulogin the line containing "rc 0". mode boot. Either add a password to your boot loader or add the line: to your /etc/inittab file. This line should be added immediately before ~~:S:wait:/sbin/sulogin ~~:S:wait:/sbin/sulogin ~~:S:wait:/sbin/sulogin

Code [trip01f]

~~:S:wait:/sbin/sulogin ~~:S:wait:/sbin/sulogin to your /etc/inittab file. This line should be added immediately before

Code [trip01f]

to your /etc/inittab file. This line should be added immediately before


to your /etc/inittab file. This line should be added immediately before mode boot. Either add a password to your boot loader or add the line: Tripwire has detected an inconsistency in the noted file. This file


















to your /etc/inittab file. This line should be added immediately before ~~:S:wait:/sbin/sulogin

Code [trip01f]

~~:S:wait:/sbin/sulogin ~~:S:wait:/sbin/sulogin












Code [trip01f]

mode boot. Either add a password to your boot loader or add the line:

Code [trip01f]

~~:S:wait:/sbin/sulogin










to your /etc/inittab file. This line should be added immediately before



to your /etc/inittab file. This line should be added immediately before











~~:S:wait:/sbin/sulogin

Code [trip01f]

Tripwire has detected an inconsistency in the noted file. This file to your /etc/inittab file. This line should be added immediately before the line containing "rc 0". to your /etc/inittab file. This line should be added immediately before to your /etc/inittab file. This line should be added immediately before Tripwire has detected an inconsistency in the noted file. This file to your /etc/inittab file. This line should be added immediately before to your /etc/inittab file. This line should be added immediately before

Code [trip01f]

to your /etc/inittab file. This line should be added immediately before Tripwire has detected an inconsistency in the noted file. This file the line containing "rc 0". the line containing "rc 0".

Code [trip01f]

~~:S:wait:/sbin/sulogin has been modified in some way since the database was built -- either the line containing "rc 0".

Code [trip01f]

the line containing "rc 0".

Code [trip01f]

to your /etc/inittab file. This line should be added immediately before Tripwire has detected an inconsistency in the noted file. This file to your /etc/inittab file. This line should be added immediately before Tripwire has detected an inconsistency in the noted file. This file

Code [trip01f]

to your /etc/inittab file. This line should be added immediately before ~~:S:wait:/sbin/sulogin to your /etc/inittab file. This line should be added immediately before Tripwire has detected an inconsistency in the noted file. This file

Code [trip01f]

Code [trip01f]

the line containing "rc 0". the line containing "rc 0". to your /etc/inittab file. This line should be added immediately before has been modified in some way since the database was built -- either Tripwire has detected an inconsistency in the noted file. This file the line containing "rc 0". the line containing "rc 0". the line containing "rc 0". the line containing "rc 0". the line containing "rc 0". has been modified in some way since the database was built -- either Tripwire has detected an inconsistency in the noted file. This file has been modified in some way since the database was built -- either the line containing "rc 0".














Tripwire has detected an inconsistency in the noted file. This file














upgraded, removed or tampered with. If this modification is legitimate to your /etc/inittab file. This line should be added immediately before











Tripwire has detected an inconsistency in the noted file. This file











has been modified in some way since the database was built -- either Tripwire has detected an inconsistency in the noted file. This file the line containing "rc 0". the line containing "rc 0". Tripwire has detected an inconsistency in the noted file. This file has been modified in some way since the database was built -- either to your /etc/inittab file. This line should be added immediately before the line containing "rc 0". has been modified in some way since the database was built -- either the line containing "rc 0". Tripwire has detected an inconsistency in the noted file. This file Tripwire has detected an inconsistency in the noted file. This file






















the line containing "rc 0".











has been modified in some way since the database was built -- either











has been modified in some way since the database was built -- either

Code [trip01f]








upgraded, removed or tampered with. If this modification is legitimate





upgraded, removed or tampered with. If this modification is legitimate






upgraded, removed or tampered with. If this modification is legitimate

Code [trip01f]












Code [trip01f]

Code [trip01f]

Code [trip01f]

has been modified in some way since the database was built -- either the line containing "rc 0". please refresh the tripwire database by running "tripwire --update"












upgraded, removed or tampered with. If this modification is legitimate

Code [trip01f]

Code [trip01f]


has been modified in some way since the database was built -- either
















upgraded, removed or tampered with. If this modification is legitimate has been modified in some way since the database was built -- either
upgraded, removed or tampered with. If this modification is legitimate
the line containing "rc 0".











has been modified in some way since the database was built -- either has been modified in some way since the database was built -- either

Code [trip01f]












Code [trip01f]

upgraded, removed or tampered with. If this modification is legitimate

Code [trip01f]

Code [trip01f]

upgraded, removed or tampered with. If this modification is legitimate

Code [trip01f]

Code [trip01f]

Tripwire has detected an inconsistency in the noted file. This file please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" Tripwire has detected an inconsistency in the noted file. This file please refresh the tripwire database by running "tripwire --update" Tripwire has detected an inconsistency in the noted file. This file Tripwire has detected an inconsistency in the noted file. This file upgraded, removed or tampered with. If this modification is legitimate Tripwire has detected an inconsistency in the noted file. This file












has been modified in some way since the database was built -- either

Code [trip01f]

please refresh the tripwire database by running "tripwire --update"

Code [trip01f]

Code [trip01f]

Code [trip01f]

please refresh the tripwire database by running "tripwire --update"

Code [trip01f]

Tripwire has detected an inconsistency in the noted file. This file












Tripwire has detected an inconsistency in the noted file. This file please refresh the tripwire database by running "tripwire --update" upgraded, removed or tampered with. If this modification is legitimate upgraded, removed or tampered with. If this modification is legitimate upgraded, removed or tampered with. If this modification is legitimate upgraded, removed or tampered with. If this modification is legitimate Tripwire has detected an inconsistency in the noted file. This file Tripwire has detected an inconsistency in the noted file. This file please refresh the tripwire database by running "tripwire --update" Tripwire has detected an inconsistency in the noted file. This file Tripwire has detected an inconsistency in the noted file. This file has been modified in some way since the database was built -- either please refresh the tripwire database by running "tripwire --update" has been modified in some way since the database was built -- either Tripwire has detected an inconsistency in the noted file. This file Tripwire has detected an inconsistency in the noted file. This file

Code [trip01f]

has been modified in some way since the database was built -- either has been modified in some way since the database was built -- either has been modified in some way since the database was built -- either please refresh the tripwire database by running "tripwire --update" Tripwire has detected an inconsistency in the noted file. This file upgraded, removed or tampered with. If this modification is legitimate

Code [trip01f]

Tripwire has detected an inconsistency in the noted file. This file Tripwire has detected an inconsistency in the noted file. This file Tripwire has detected an inconsistency in the noted file. This file Tripwire has detected an inconsistency in the noted file. This file has been modified in some way since the database was built -- either please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" has been modified in some way since the database was built -- either has been modified in some way since the database was built -- either has been modified in some way since the database was built -- either has been modified in some way since the database was built -- either upgraded, removed or tampered with. If this modification is legitimate has been modified in some way since the database was built -- either has been modified in some way since the database was built -- either upgraded, removed or tampered with. If this modification is legitimate has been modified in some way since the database was built -- either upgraded, removed or tampered with. If this modification is legitimate Tripwire has detected an inconsistency in the noted file. This file has been modified in some way since the database was built -- either upgraded, removed or tampered with. If this modification is legitimate please refresh the tripwire database by running "tripwire --update" Tripwire has detected an inconsistency in the noted file. This file has been modified in some way since the database was built -- either has been modified in some way since the database was built -- either upgraded, removed or tampered with. If this modification is legitimate has been modified in some way since the database was built -- either upgraded, removed or tampered with. If this modification is legitimate has been modified in some way since the database was built -- either upgraded, removed or tampered with. If this modification is legitimate please refresh the tripwire database by running "tripwire --update" upgraded, removed or tampered with. If this modification is legitimate upgraded, removed or tampered with. If this modification is legitimate please refresh the tripwire database by running "tripwire --update" upgraded, removed or tampered with. If this modification is legitimate upgraded, removed or tampered with. If this modification is legitimate upgraded, removed or tampered with. If this modification is legitimate upgraded, removed or tampered with. If this modification is legitimate upgraded, removed or tampered with. If this modification is legitimate please refresh the tripwire database by running "tripwire --update" has been modified in some way since the database was built -- either please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" upgraded, removed or tampered with. If this modification is legitimate has been modified in some way since the database was built -- either please refresh the tripwire database by running "tripwire --update" upgraded, removed or tampered with. If this modification is legitimate upgraded, removed or tampered with. If this modification is legitimate please refresh the tripwire database by running "tripwire --update" upgraded, removed or tampered with. If this modification is legitimate please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" upgraded, removed or tampered with. If this modification is legitimate please refresh the tripwire database by running "tripwire --update" upgraded, removed or tampered with. If this modification is legitimate please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update" please refresh the tripwire database by running "tripwire --update"