<s>
The	O
Computer	B-Application
Oracle	I-Application
and	I-Application
Password	I-Application
System	I-Application
(	O
COPS	B-Application
)	O
was	O
the	O
first	O
vulnerability	O
scanner	O
for	O
Unix	B-Application
operating	I-Application
systems	I-Application
to	O
achieve	O
widespread	O
use	O
.	O
</s>
<s>
COPS	B-Application
is	O
a	O
software	B-Application
suite	I-Application
comprising	O
at	O
least	O
12	O
small	O
vulnerability	O
scanners	O
,	O
each	O
programmed	O
to	O
audit	O
one	O
part	O
of	O
the	O
operating	B-General_Concept
system	I-General_Concept
:	O
</s>
<s>
Are	O
they	O
shell	B-Language
scripts	I-Language
?	O
</s>
<s>
Are	O
NFS	B-Protocol
mounts	O
unrestricted	O
?	O
</s>
<s>
After	O
COPS	B-Application
,	O
Farmer	O
developed	O
another	O
vulnerability	O
scanner	O
called	O
SATAN	B-Protocol
(	O
Security	B-Protocol
Administrator	I-Protocol
Tool	I-Protocol
for	I-Protocol
Analyzing	I-Protocol
Networks	I-Protocol
)	O
.	O
</s>
<s>
COPS	B-Application
is	O
generally	O
considered	O
obsolete	O
,	O
but	O
it	O
is	O
not	O
uncommon	O
to	O
find	O
systems	O
which	O
are	O
set	O
up	O
in	O
an	O
insecure	O
manner	O
that	O
COPS	B-Application
will	O
identify	O
.	O
</s>
