           SPELL=yara
         VERSION=1.6
          SOURCE="${SPELL}-${VERSION}.tar.gz"
   SOURCE_URL[0]=http://${SPELL}-project.googlecode.com/files/${SOURCE}
     SOURCE_HASH=sha512:fd599c4873cbd5c8f866bd89ebe3fb988bc22af5b982effdf889f7ba30837847eebd4742ab661c9cda02eeaee331819c8453b8ccf8216a54c2ba7a343b8d6745
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-${VERSION}"
        WEB_SITE="http://code.google.com/p/yara-project/"
      LICENSE[0]=GPL
         ENTERED=20110920
           SHORT="malware research tool"
cat << EOF
YARA is a tool aimed at helping malware researchers to identify and classify
malware samples. With YARA you can create descriptions of malware families
based on textual or binary patterns contained on samples of those
families. Each description consists of a set of strings and a Boolean
expression which determines its logic.
EOF
