Performs security audits and acts as a host-based intrusion detection tool
TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection (if configured to run through cron and by sending e-mail reports).
released on 3 March 2010
Paid supportPaid support available from Advanced=20 Research Corporation based on the 'TARA' tool at http://www-arc.com/tara/index.shtml
|License||Verified by||Verified on||Notes|
|GPLv2||Janet Casey||18 June 2002|
Leaders and contributors
|Javier FernÃ¡ndez-Sanguino PeÃ±a||Maintainer|
|See the AUTHORS and CREDITS files in the distribution for a complete list||Contributor|
Resources and communication
|Bug Tracking||VCS Repository Webview||http://savannah.gnu.org/bugs/?group=3Dtiger|
|Developer||VCS Repository Webview||http://savannah.gnu.org/cvs/?group=tiger|
|Required to build||make|
This entry (in part or in whole) was last reviewed on 10 January 2017.