wszystkie opcje
buster  ] [  bullseye  ] [  bookworm  ] [  trixie  ] [  sid  ]
[ Pakiet źródłowy: tiger  ]

Pakiet: tiger-otheros (1:3.2.4~rc1-3.2)

Odnośniki dla tiger-otheros

Screenshot

Zasoby systemu Debian:

Pobieranie pakietu źródłowego tiger:

Opiekunowie:

Zasoby zewnętrzne:

Podobne pakiety:

security auditing and intrusion detection scripts for Unix based systems

TIGER, or the 'tiger' scripts, is a set of tools (Bourne shell scripts and C programs) which are used to perform a security audit of different operating systems components. The tools can be both run all at once to generate an audit report of the system and to detect elements that could be fixed when hardening it. They can also be run periodically to compare the operating system status against a baseline and report deviations. In this way, they can be used also as a host intrusion detection mechanism.

This package provides all the scripts for Unix-based operating systems (other than Linux) which are provided in the Tiger application upstream. They are separately packaged in Debian as most users do not need them to run Tiger.

On the other hand, they might be useful for administrators that wish to run Tiger in hosts running different Unix variants in a distributed environment. Hosts can run the Tiger scripts through the network (e.g. NFS) and generate locally reports for analysis and intrusion detection.

Znaczniki: Zaimplementowane w: C, Powłoki sh, bash, ksh, tcsh i inne, Interfejs użytkownika: interface::commandline, role::program, Zakres: Aplikacja, Bezpieczeństwo: Wykrywanie włamań, Integralność plików

Inne pakiety związane z tiger-otheros

  • wymaga
  • poleca
  • sugeruje
  • enhances

Pobieranie tiger-otheros

Pobierz dla wszystkich dostępnych architektur
Architektura Rozmiar pakietu Rozmiar po instalacji Pliki
amd64 285,7 KiB2 437,0 KiB [lista plików]