Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/CISOfy/lynis.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMichael Boelen <michael.boelen@cisofy.com>2016-11-08 18:37:27 +0300
committerGitHub <noreply@github.com>2016-11-08 18:37:27 +0300
commit3aae5cd12b18fb2bb4323121306c2f02912d5451 (patch)
tree740cb5e5852f38323441b3575f15513186ea6d9c /README.md
parent0c60cb48590d43a686d47e30b8aa7131144d5e70 (diff)
Update README.md
Diffstat (limited to 'README.md')
-rw-r--r--README.md3
1 files changed, 1 insertions, 2 deletions
diff --git a/README.md b/README.md
index 3a014ffa..cf63d7e1 100644
--- a/README.md
+++ b/README.md
@@ -9,7 +9,7 @@
> Lynis - Security auditing and hardening tool, for UNIX-based systems.
-Lynis is a security auditing for UNIX derivatives like Linux, macOS, *BSD, and others. It performs an **in-depth security scan** and runs on the system itself. The primary goal is to test security defenses and **provide tips for further system hardening**. It will also scan for general system information, vulnerable software packages, and possible configuration issues. Lynis is commonly used by people in the "blue team" to assess the security defenses of their systems.
+Lynis is a security auditing for UNIX derivatives like Linux, macOS, BSD, and others. It performs an **in-depth security scan** and runs on the system itself. The primary goal is to test security defenses and **provide tips for further system hardening**. It will also scan for general system information, vulnerable software packages, and possible configuration issues. Lynis was commonly used by people in the "blue team" to assess the security defenses of their systems. Nowadays, penetration testers also have Lynis in their toolkit.
We believe software should be **simple**, **updated on a regular basis**, and **open**. You should be able to trust, understand, and have the option to change the software. Many agree with us, as the software is being used by thousands every day to protect their systems.
@@ -27,7 +27,6 @@ The software (also) assists with:
- Penetration testing
- Intrusion detection
-
### Audience
Typical users of the software: