Fixed typos

This commit is contained in:
Andrew Murray
2016-04-09 12:31:05 +10:00
parent 1f80738bef
commit 0deb1032cd
3 changed files with 11 additions and 11 deletions

View File

@@ -5,7 +5,7 @@
**Merged pull requests:**
- Typo in Exapmle [\#6](https://github.com/future-architect/vuls/pull/6) ([toli](https://github.com/toli))
- Typo in Example [\#6](https://github.com/future-architect/vuls/pull/6) ([toli](https://github.com/toli))
## [v0.1.0](https://github.com/future-architect/vuls/tree/v0.1.0) (2016-04-04)
**Merged pull requests:**

View File

@@ -24,7 +24,7 @@ To avoid downtime in production environment, it is common for system administrat
This leads to the following problems.
- System administrator will have to constantly watch out for any new vulnerabilities in NVD(National Vulnerability Database) and etc.
- It might be impossible for the system administrator to monitor all the software if there are a large number of software installed in server.
- It is expensive to perform anaylsis to determine the servers affected by new vulnerabilities. The possibility of overlooking a server or two during analysis is there.
- It is expensive to perform analysis to determine the servers affected by new vulnerabilities. The possibility of overlooking a server or two during analysis is there.
Vuls is a tool created to solve the problems listed above. It has the following characteristics.
@@ -194,7 +194,7 @@ $ vuls prepare
```
$ vuls scan
INFO[0000] Begin scannig (config: /home/ec2-user/config.toml)
INFO[0000] Begin scanning (config: /home/ec2-user/config.toml)
... snip ...
@@ -241,7 +241,7 @@ $ vuls tui
![Vuls-Architecture](img/vuls-architecture.png)
## go-cve-dictinary
- Fetch vulnerbility information from NVD, JVN(Japanese), then insert into SQLite.
- Fetch vulnerability information from NVD, JVN(Japanese), then insert into SQLite.
## Vuls
- Scan vulnerabilities on the servers and create a list of the CVE ID
@@ -280,7 +280,7 @@ web/app server in the same configuration under the load balancer
# Usage: Automatic Server Discovery
Discovery subcommand discovers active servers specifed in CIDR range, then print the template of config file(TOML format) to terminal.
Discovery subcommand discovers active servers specified in CIDR range, then print the template of config file(TOML format) to terminal.
```
$ vuls discover -help
@@ -448,7 +448,7 @@ prepare:
-debug
debug mode
-use-unattended-upgrades
[Depricated] For Ubuntu, install unattended-upgrades
[Deprecated] For Ubuntu, install unattended-upgrades
```
----
@@ -490,9 +490,9 @@ scan:
-report-slack
Slack report
-use-unattended-upgrades
[Depricated] For Ubuntu. Scan by unattended-upgrades or not (use apt-get upgrade --dry-run by default)
[Deprecated] For Ubuntu. Scan by unattended-upgrades or not (use apt-get upgrade --dry-run by default)
-use-yum-plugin-security
[Depricated] For CentOS 5. Scan by yum-plugin-security or not (use yum check-update by default)
[Deprecated] For CentOS 5. Scan by yum-plugin-security or not (use yum check-update by default)
```
@@ -588,7 +588,7 @@ If your system is behind HTTP proxy, you have to specify --http-proxy option.
- How to Daemonize go-cve-dictionary
Use Systemd, Upstart or supervisord, daemontools...
- How to update vulnerbility data automatically.
- How to update vulnerability data automatically.
Use job scheduler like Cron (with -last2y option).
- How to cross compile
@@ -607,7 +607,7 @@ Run with --debug, --sql-debug option.
[Riak docs](http://docs.basho.com/riak/latest/ops/tuning/open-files-limit/) is awesome.
- Windows
Use Microsoft Baseline Secuirty Analyzer. [MBSA](https://technet.microsoft.com/en-us/security/cc184924.aspx)
Use Microsoft Baseline Security Analyzer. [MBSA](https://technet.microsoft.com/en-us/security/cc184924.aspx)
----

View File

@@ -130,7 +130,7 @@ func (p *ScanCmd) SetFlags(f *flag.FlagSet) {
// Execute execute
func (p *ScanCmd) Execute(_ context.Context, f *flag.FlagSet, _ ...interface{}) subcommands.ExitStatus {
logrus.Infof("Begin scannig (config: %s)", p.configPath)
logrus.Infof("Begin scanning (config: %s)", p.configPath)
err := c.Load(p.configPath)
if err != nil {
logrus.Errorf("Error loading %s, %s", p.configPath, err)