tiger 1:3.2.3-14 source package in Ubuntu

Changelog

tiger (1:3.2.3-14) unstable; urgency=low

  * debian/control: Add Vcs-Browser and Vcs-Git
  * Acknowledge NMU for 1:3.2.3-12.1 (Closes: #740625)

 -- Javier Fernández-Sanguino Peña <email address hidden>  Sat, 28 Nov 2015 12:44:53 +0100

Upload details

Uploaded by:
Javier Fernández-Sanguino
Uploaded to:
Sid
Original maintainer:
Javier Fernández-Sanguino
Architectures:
any
Section:
admin
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Xenial release universe admin

Downloads

File Size SHA-256 Checksum
tiger_3.2.3-14.dsc 1.9 KiB 86eaadee958ef72df70ce1832f1642c0087a8de82b0e106e74feaae391d13aec
tiger_3.2.3.orig.tar.gz 991.4 KiB 80db27618de0d806805e77653e568fb9ae556537cfd5a4b17b6b6c9dc442a415
tiger_3.2.3-14.diff.gz 232.1 KiB f5386cac78eee27c801733e0d3bdc19c31281519fab9b4eb96c2773acd7072d5

Available diffs

No changes file available.

Binary packages built by this source

tiger: Report system security vulnerabilities

 TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
 and data files which are used to perform a security audit of different
 operating systems. The tools can be both run altogether once to generate an
 audit report of the system and they can also be run periodically to
 provide information on changes to the system's security once a
 security baseline has been defined. Consequently, they can be used
 also as a host intrusion detection mechanism.
 .
 The tools rely on specialised external security tools such as
 John the Ripper, Chkroot and integrity check tools (like Tripwire,
 Integrit or Aide) for some of the tasks. The periodic review
 mechanism relies on the use of the cron task scheduler and an email
 delivery system.
 .
 TIGER has one primary goal: report ways the system's security can be
 compromised.
 .
 Debian's TIGER incorporates new checks primarily oriented towards
 Debian distribution including: md5sums checks of installed files,
 location of files not belonging to packages, check of security
 advisories and analysis of local listening processes.
 .
 This package provides all the security scripts and data files.

tiger-otheros: Scripts to run Tiger in other operating systems

 TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
 and data files which are used to perform a security audit of different
 operating systems. The tools can be both run altogether once to generate an
 audit report of the system and they can also be run periodically to
 provide information on changes to the system's security once a
 security baseline has been defined. Consequently, they can be used
 also as a host intrusion detection mechanism.
 .
 This package provides all the scripts for operating systems other
 than Linux provided for in the Tiger distribution. It is provided
 in the hope it will be useful for admins that wish to run tiger
 in a distributed environment sharing this files through the network
 (e.g. NFS).