Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/books/disa_stig/disa_stig_part2.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ If all goes well, you should receive a screen that looks something like this one

DISA is just one of many Security Profiles supported by the Rocky Linux SCAP definitions. We also have profiles for:

* [ANSSI](https://www.ssi.gouv.fr/en/)
* [ANSSI](https://cyber.gouv.fr/en)
* [CIS](https://cisecurity.org)
* [Australian Cyber Security Center](https://cyber.gov.au)
* [NIST-800-171](https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final)
Expand Down
1 change: 0 additions & 1 deletion docs/guides/automation/cronie.md
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,6 @@ The content discussed so far are simplistic options, but what about more complex
Check the /var/log/cron* file, use `journalctl -u crond.service` to check the information about the daemon process, whether the script has x permission, etc., for troubleshooting.
3. In addition to cronie, what cron variants are there?
[fcron](http://fcron.free.fr/), the latest version is 3.3.0 (dev, 2016-08-14).
[bcron](http://untroubled.org/bcron/), the latest version is 0.11 (2015-08-12).
[cronsun](https://github.com/shunfei/cronsun), the latest version 0.3.5 (2018-11-20).

## Summary
Expand Down