tiger 1:3.2.3-14 source package in Ubuntu
Changelog
tiger (1:3.2.3-14) unstable; urgency=low * debian/control: Add Vcs-Browser and Vcs-Git * Acknowledge NMU for 1:3.2.3-12.1 (Closes: #740625) -- Javier Fernández-Sanguino Peña <email address hidden> Sat, 28 Nov 2015 12:44:53 +0100
Upload details
- Uploaded by:
- Javier Fernández-Sanguino
- Uploaded to:
- Sid
- Original maintainer:
- Javier Fernández-Sanguino
- Architectures:
- any
- Section:
- admin
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Xenial | release | universe | admin |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
tiger_3.2.3-14.dsc | 1.9 KiB | 86eaadee958ef72df70ce1832f1642c0087a8de82b0e106e74feaae391d13aec |
tiger_3.2.3.orig.tar.gz | 991.4 KiB | 80db27618de0d806805e77653e568fb9ae556537cfd5a4b17b6b6c9dc442a415 |
tiger_3.2.3-14.diff.gz | 232.1 KiB | f5386cac78eee27c801733e0d3bdc19c31281519fab9b4eb96c2773acd7072d5 |
Available diffs
- diff from 1:3.2.3-13 to 1:3.2.3-14 (1.9 KiB)
No changes file available.
Binary packages built by this source
- tiger: Report system security vulnerabilities
TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
and data files which are used to perform a security audit of different
operating systems. The tools can be both run altogether once to generate an
audit report of the system and they can also be run periodically to
provide information on changes to the system's security once a
security baseline has been defined. Consequently, they can be used
also as a host intrusion detection mechanism.
.
The tools rely on specialised external security tools such as
John the Ripper, Chkroot and integrity check tools (like Tripwire,
Integrit or Aide) for some of the tasks. The periodic review
mechanism relies on the use of the cron task scheduler and an email
delivery system.
.
TIGER has one primary goal: report ways the system's security can be
compromised.
.
Debian's TIGER incorporates new checks primarily oriented towards
Debian distribution including: md5sums checks of installed files,
location of files not belonging to packages, check of security
advisories and analysis of local listening processes.
.
This package provides all the security scripts and data files.
- tiger-otheros: Scripts to run Tiger in other operating systems
TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
and data files which are used to perform a security audit of different
operating systems. The tools can be both run altogether once to generate an
audit report of the system and they can also be run periodically to
provide information on changes to the system's security once a
security baseline has been defined. Consequently, they can be used
also as a host intrusion detection mechanism.
.
This package provides all the scripts for operating systems other
than Linux provided for in the Tiger distribution. It is provided
in the hope it will be useful for admins that wish to run tiger
in a distributed environment sharing this files through the network
(e.g. NFS).