3
7.2.2 dbupdate.........................................................................................................74
7.3 Firewall Protection......................................................................................................74
7.3.1 fsfwc ...............................................................................................................75
7.4 Integrity Checking ......................................................................................................75
7.4.1 fsic ..................................................................................................................75
7.4.2 fsims ...............................................................................................................76
7.5 General Command Line Tools ...................................................................................76
7.5.1 fssetlanguage .................................................................................................76
7.5.2 fsma................................................................................................................77
7.5.3 fsav-config ......................................................................................................78
AppendixA Installation Prerequisites 79
A.1 All 64-bit Distributions ............................................................................................... 80
A.2 Red Hat Enterprise Linux 4........................................................................................80
A.3 Debian 3.1 and Ubuntu 5.04, 5.10, 6.06 ....................................................................81
A.4 SuSE..........................................................................................................................82
A.5 Turbolinux 10 .............................................................................................................82
AppendixB Installing Required Kernel Modules Manually 83
B.1 Introduction ............................................................................................................... 84
B.2 Before Installing Required Kernel Modules................................................................84
B.3 Installation Instructions...............................................................................................84
AppendixC Riskware Types 86
C.1 Riskware Categories and Platforms.......................................................................... 87
AppendixD List of Used System Resources 90
D.1 Overview ................................................................................................................... 91
D.2 Installed Files .............................................................................................................91
D.3 Network Resources....................................................................................................91
D.4 Memory ......................................................................................................................92
D.5 CPU............................................................................................................................92