Difference between revisions of "Tiger"

From Free Software Directory
Jump to: navigation, search
(Created page with "{{Entry |Name=Tiger |Short description=Performs security audits and acts as a host-based intrusion detection tool |Full description=TIGER is a set of Bourne shell scripts, C prog...")
 
(New version)
Line 3: Line 3:
 
|Short description=Performs security audits and acts as a host-based intrusion detection tool
 
|Short description=Performs security audits and acts as a host-based intrusion detection tool
 
|Full description=TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection (if configured to run through cron and by sending e-mail reports).
 
|Full description=TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection (if configured to run through cron and by sending e-mail reports).
 +
|Homepage URL=http://savannah.nongnu.org/projects/tiger/
 
|User level=none
 
|User level=none
|Status=Live
 
|Component programs=
 
|Homepage URL=http://savannah.nongnu.org/projects/tiger/
 
 
|VCS checkout command=:pserver:anoncvs@subversion.gnu.org:/cvsroot/tiger
 
|VCS checkout command=:pserver:anoncvs@subversion.gnu.org:/cvsroot/tiger
 
|Computer languages=C,Shell script
 
|Computer languages=C,Shell script
|Documentation note=
 
 
|Paid support=Paid support available from Advanced=20 Research Corporation based on the 'TARA' tool at http://www-arc.com/tara/index.shtml
 
|Paid support=Paid support available from Advanced=20 Research Corporation based on the 'TARA' tool at http://www-arc.com/tara/index.shtml
|IRC help=
 
|IRC general=
 
|IRC development=
 
 
|Related projects=RFC,Hackbot,incident.pl,mod_security,scanlogd,logcheck,AIDE,Samhain,Tripwire,Firestorm,Integrit
 
|Related projects=RFC,Hackbot,incident.pl,mod_security,scanlogd,logcheck,AIDE,Samhain,Tripwire,Firestorm,Integrit
 
|Keywords=shell,security,host,Tiger,intrusion,system security,intrusion detection,audit,Bourne
 
|Keywords=shell,security,host,Tiger,intrusion,system security,intrusion detection,audit,Bourne
|Is GNU=n
+
|Version identifier=3.2.3
|Last review by=Janet Casey
+
|Version date=2010/03/03
|Last review date=2009-01-23
+
|Version status=stable
 +
|Version download=http://download.savannah.gnu.org/releases/tiger/tiger-3.2.3.tar.gz
 +
|Version comment=3.2.3 stable released 2010-03-03
 +
|Last review by=Alejandroindependiente
 +
|Last review date=2017/01/10
 
|Submitted by=Database conversion
 
|Submitted by=Database conversion
 
|Submitted date=2011-04-01
 
|Submitted date=2011-04-01
|Version identifier=3.2
+
|Status=
|Version date=2003-04-22
+
|Is GNU=No
|Version status=stable
+
|License verified date=2002-06-18
|Version download=http://savannah.nongnu.org/download/tiger/tiger-3.2.tar.gz
+
}}
 +
{{Project license
 +
|License=GPLv2
 +
|License verified by=Janet Casey
 
|License verified date=2002-06-18
 
|License verified date=2002-06-18
|Version comment=3.2 stable released 2003-04-22
 
 
}}
 
}}
 
{{Person
 
{{Person
 +
|Real name=Javier Fernández-Sanguino Peña
 
|Role=Maintainer
 
|Role=Maintainer
|Real name=Javier Fernández-Sanguino Peña
 
 
|Email=jfs@debian.org
 
|Email=jfs@debian.org
 
|Resource URL=
 
|Resource URL=
 
}}
 
}}
 
{{Person
 
{{Person
 +
|Real name=See the AUTHORS and CREDITS files in the distribution for a complete list
 
|Role=Contributor
 
|Role=Contributor
|Real name=See the AUTHORS and CREDITS files in the distribution for a complete list
 
|Email=
 
 
|Resource URL=
 
|Resource URL=
 
}}
 
}}
Line 64: Line 63:
 
|Security=system
 
|Security=system
 
|Use=security
 
|Use=security
}}
 
{{Project license
 
|License=GPLv2
 
|License verified by=Janet Casey
 
|License verified date=2002-06-18
 
 
}}
 
}}
 
{{Software prerequisite
 
{{Software prerequisite
Line 74: Line 68:
 
|Prerequisite description=make
 
|Prerequisite description=make
 
}}
 
}}
 +
{{Featured}}

Revision as of 19:15, 9 January 2017

[edit]

Tiger

https://savannah.nongnu.org/projects/tiger
Performs security audits and acts as a host-based intrusion detection tool

TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection (if configured to run through cron and by sending e-mail reports).



Download

http://download.savannah.gnu.org/releases/tiger/tiger-3.2.3.tar.gz

version 3.2.3 (stable)
released on 3 March 2010




Paid support available from Advanced=20 Research Corporation based on the 'TARA' tool at http://www-arc.com/tara/index.shtml

VCS Checkout

:pserver:anoncvs@subversion.gnu.org:/cvsroot/tiger

Categories

Related Projects





Licensing

License

Verified by

Verified on

Notes

Verified by

Janet Casey

Verified on

18 June 2002




Leaders and contributors

Contact(s)Role
Javier Fernández-Sanguino Peña Maintainer
See the AUTHORS and CREDITS files in the distribution for a complete list Contributor


Resources and communication

AudienceResource typeURI
DeveloperE-mailmailto:tiger-devel@nongnu.org
R (Ref)https://cran.r-project.org/web/packages/tiger
SupportE-mailmailto:tiger-user@nongnu.org
Debian (Ref)https://tracker.debian.org/pkg/tiger
Savannah (Ref)https://savannah.nongnu.org/projects/tiger
Python (Ref)https://pypi.org/project/tiger
Ruby (Ref)https://rubygems.org/gems/tiger


Software prerequisites

KindDescription
Required to buildmake

This entry (in part or in whole) was last reviewed on 4 August 2018.



Entry





































Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.