Difference between revisions of "Tiger"
(Added R link) |
m (Removed Hackbot (deletion candidate) from related projects.) |
||
Line 4: | Line 4: | ||
|Full description=TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection (if configured to run through cron and by sending e-mail reports). | |Full description=TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection (if configured to run through cron and by sending e-mail reports). | ||
|Homepage URL=https://savannah.nongnu.org/projects/tiger | |Homepage URL=https://savannah.nongnu.org/projects/tiger | ||
− | |||
|Is High Priority Project=No | |Is High Priority Project=No | ||
|VCS checkout command=:pserver:anoncvs@subversion.gnu.org:/cvsroot/tiger | |VCS checkout command=:pserver:anoncvs@subversion.gnu.org:/cvsroot/tiger | ||
|Computer languages=C,Shell script | |Computer languages=C,Shell script | ||
− | + | |Decommissioned or Obsolete=No | |
− | |Decommissioned | + | |Related projects=RFC,incident.pl,mod_security,scanlogd,logcheck,AIDE,Samhain,Tripwire,Firestorm,Integrit |
− | |||
− | |Related projects=RFC | ||
|Keywords=shell,security,host,Tiger,intrusion,system security,intrusion detection,audit,Bourne | |Keywords=shell,security,host,Tiger,intrusion,system security,intrusion detection,audit,Bourne | ||
|Version identifier=3.2.3 | |Version identifier=3.2.3 | ||
Line 18: | Line 15: | ||
|Version download=http://download.savannah.gnu.org/releases/tiger/tiger-3.2.3.tar.gz | |Version download=http://download.savannah.gnu.org/releases/tiger/tiger-3.2.3.tar.gz | ||
|Version comment=3.2.3 stable released 2010-03-03 | |Version comment=3.2.3 stable released 2010-03-03 | ||
+ | |Last review by=Craig Hutchinson | ||
+ | |Last review date=2018/08/04 | ||
+ | |Submitted date=2011-04-01 | ||
+ | |User level=none | ||
+ | |Paid support=Paid support available from Advanced=20 Research Corporation based on the 'TARA' tool at http://www-arc.com/tara/index.shtml | ||
+ | |Accepts cryptocurrency donations=No | ||
|Test entry=No | |Test entry=No | ||
− | |||
− | |||
− | |||
|Is GNU=No | |Is GNU=No | ||
+ | |Decommissioned/Obsolete=No | ||
|License verified date=2002-06-18 | |License verified date=2002-06-18 | ||
}} | }} |
Latest revision as of 13:06, 3 August 2018
Tiger
https://savannah.nongnu.org/projects/tiger
Performs security audits and acts as a host-based intrusion detection tool
TIGER is a set of Bourne shell scripts, C programs, and data files which are used to perform a security audit of Unix systems. The security audit results are useful both for system analysis (security auditing) and for real-time, host-based intrusion detection (if configured to run through cron and by sending e-mail reports).
Licensing
License
Verified by
Verified on
Notes
Leaders and contributors
Contact(s) | Role |
---|---|
See the AUTHORS and CREDITS files in the distribution for a complete list | Contributor |
Javier Fernández-Sanguino Peña | Maintainer |
Resources and communication
Audience | Resource type | URI |
---|---|---|
Ruby (Ref) | https://rubygems.org/gems/tiger | |
Python (Ref) | https://pypi.org/project/tiger | |
Debian (Ref) | https://tracker.debian.org/pkg/tiger | |
Savannah (Ref) | https://savannah.nongnu.org/projects/tiger | |
R (Ref) | https://cran.r-project.org/web/packages/tiger | |
Support | mailto:tiger-user@nongnu.org | |
Developer | mailto:tiger-devel@nongnu.org |
Software prerequisites
Kind | Description |
---|---|
Required to build | make |
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.