Performs security audits and acts as a host-based intrusion detection tool
TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection (if configured to run through cron and by sending e-mail reports).
released on 3 March 2010
Paid supportPaid support available from Advanced=20 Research Corporation based on the 'TARA' tool at http://www-arc.com/tara/index.shtml
|License||Verified by||Verified on||Notes|
|GPLv2||Janet Casey||18 June 2002|
Leaders and contributors
|Javier FernÃ¡ndez-Sanguino PeÃ±a||Maintainer|
|See the AUTHORS and CREDITS files in the distribution for a complete list||Contributor|
Resources and communication
|Bug Tracking||VCS Repository Webview||http://savannah.gnu.org/bugs/?group=3Dtiger|
|Developer||VCS Repository Webview||http://savannah.gnu.org/cvs/?group=tiger|
|Required to build||make|
This entry (in part or in whole) was last reviewed on 10 January 2017.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.