Why You Shouldn't Use Microsoft Windows11.

...

LMDE5 - Linux Mint Debian.

LMDE5 - Linux Mint...

Why Should I Not Use Windows10?

Here are a...

Tiger - Unix security audit and intrusion detection tool

English

Tiger - Unix security audit and intrusion detection tool.

Tiger is a security tool that can be use both as a security audit and intrusion detection system. It supports multiple UNIX platforms and it is free and provided under a GPL license. Unlike other tools, Tiger needs only of POSIX tools and is written entirely in shell language.

Unlike Tiger few of the tools available focus on the complete host-side of intrusion detection.

Tiger it is not a logchecker, nor it focused in integrity analysis. It does "the other stuff", it checks the system configuration and status.

Version: 3.2.4~rc1-3

For LMDE5 users, you can use the Software Manager to install the program.

How to install via a terminal window:

sudo apt-get install tiger

Press Enter.

How to use Tiger:

tiger -H

Press Enter.

This command will scan your entire system, looking for Rootkits, doing system checks and create a .HTML report.

Note: This can take hours or NOT !

To read the .html report from the commandline install w3m:

sudo apt-get install w3m

Press Enter.

Now open the .html report with w3m ( as root ):

w3m /var/log/tiger/security.report.computername.220705-20:39.html

Press Enter.

It gives you a very detailed and insightful report of your system.

How to exit w3m HTML reader:

Hit q button and type: y and press Enter. Done.


Now if you want to run Tiger regularly:

First off:

Make sure you are using a 'tigerrc' file to your liking. This file is by default shipped with all checks enabled. You should probably edit it to enable only the checks you are interested in.

You have two options when running 'tiger' regularly.  The first is to simply run 'tiger' out of cron.  Since on large systems, a full run can take hours, this is probably not desirable.

The more desirable is to use 'tigercron'.  With 'tigercron', it is possible to run the individual scripts spread out over a time period (some can be run three times a day, others once a week or month).

If you want to use Tiger as a host-IDS:

Tiger, as a host IDS , is better completed with some other tools:

  • An integrity checker such as Tripwire (or a replacement like Aide).
  • A logchecker (like logcheck) to look for security information in the log files.
  • An specific tool to detect rootkits: chkrootkit, rkhunter
  • Perhaps a Network IDS such as Snort.
  • Perhaps a portscanner detection such as portsentry, scanlogd, scandetd or psad (provided by Bastille)

Also there is a module (tripwire_run) which can be used to run tripwire through Tiger, and a sysadmin could easily fit any other security checks
into similar modules.

You should read this before deploying Tiger as a IDS.

Developers website

 

Games For Linux

Windows has always been the preferred platform for gaming, but after STEAM's interest in Linux more game developers are making their games natively available for Linux.

Disclaimer

All information on this website is published in good faith and for general educational purposes and for use in safe testing environments only. While linuxexperten.com strives to make the information on this site as accurate as possible, linuxexperten.com does not warrant its completeness, reliability and accuracy.

We are not responsible for any losses or damages associated with the use of our website. While we strive to provide only links to useful websites, we have no control over the content of these sites and links to other sites do not constitute a recommendation for all content contained on these websites.

 

Site Information

This is a professional review site that receives compensation from the companies whose products reviewed. Each service or product are thoroughly tested and given high marks if considered to be the very best. Independently owned and the opinions expressed here are no one elses.