03-21-2002
Please be more specific. File security? network security? intrusion detection? secure programming techniques? What are you interested in?
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
okay, im having some trouble. Go ahead, call me a retard, but i keep getting stuck. Suppose i want to open a Picture of Jesus(for the sake of simplicity) using unix. I type:
open Desktop/Pictures/Jesus.jpg
It opens, and its all well and good. But, suppose i want to open a picture called Joe... (4 Replies)
Discussion started by: HipCracka
4 Replies
2. UNIX for Dummies Questions & Answers
What command would I use to list the first lines of all
text files within my Unix directory or within any directory
inside there? I was using "find" , "head" and "-exec" commands like this:
find ~/Unix -name "*.txt" -exec head {} \;
But its not perfectly working, please help me.... (2 Replies)
Discussion started by: carrera911
2 Replies
3. UNIX for Dummies Questions & Answers
Hey guys,
I've seen this posted a few times when i searched but I kinda want to know the cleanest way of doing it.
On Solaris 8 and Solaris 9
What is the best way to disable telnet ssh1 and remote root login premanently?
I've seen posts that say edit /etc/services edit this edit that... (3 Replies)
Discussion started by: kingdbag
3 Replies
4. UNIX for Dummies Questions & Answers
hi friends,
How to obtain list of groups we r a member of and redirect it to a file.
how to append the details of current OS to a file.
how to append the estimated file space to a file.
how to append the details of users loged on along wth their current activity into a file.
Thank you...I'm... (3 Replies)
Discussion started by: bobby36
3 Replies
5. Solaris
Hi,
I am a novice in Unix installation.
Was experimenting with it.
During installation, i created 2 partitions ( what i am calling ).
One for the OS which was named SOLARIS & other was named PRI_DOS.
Now on completion of installation, where has my PRI_DOS portion gone.
How do i... (8 Replies)
Discussion started by: vibhor_agarwali
8 Replies
6. Solaris
Hello,
I'm new to solaris and have an experience with linux. When we see network interface I can see qfe, hme, le0. What is that mean? Is it depend on the network card? (11 Replies)
Discussion started by: mokkan
11 Replies
7. UNIX for Dummies Questions & Answers
Hi all
today i gone through worst interview of my life that for hour questions were so basic but i never though about them now i am figuring out answers my self but i would appreciate if you ppl help me ... i am listing some of the questions i remember ..
1 )
$ cat a.sh
#! /usr/bin/ksh... (4 Replies)
Discussion started by: zedex
4 Replies
8. Shell Programming and Scripting
Hi,
I'm new to this and very much interested to learn unix.
Can any one explain me the symbols y we use this is scripting(~ and $).
It would be great if some one explain with the eg.
Thanks
Naveen A (2 Replies)
Discussion started by: Pranaveen
2 Replies
LEARN ABOUT DEBIAN
tigexp
TIGEXP(8) Administrator Commands TIGEXP(8)
NAME
tigexp - UNIX Security Checker Explanation Generator
SYNOPSIS
tigexp msgid [msgid[msgid...]]
tigexp [-f|-F] [security_report]
DESCRIPTION
Tigexp is used to generate explanations of the output from the Tiger security checking package. In the first form, tigexp will generate an
explanation of each of the message ids listed. In the second form, the security report specified will be scanned and explanations gener-
ated. The -f option will generate one explanation for each unique message id in the security report, whereas the -F option will output the
security report with explanations inserted after each entry in the report.
There are five different message levels produced by Tiger. Each of the message levels is the last letter of the message id. The levels are:
ALERT A message of this level indicates that Tiger has detected a possible intrusion attempt or troublesome misconfiguration which can
expose the whole system to attacks.
FAIL Messages of this level indicate a violation of a generic security policy or a possible intrusion. Appropriate action should be taken
to fix this security issue.
WARN Messages of this level indicate a security issue which should be checked further and might indicate a probable vulnerability or
exposure. Most Tiger messages appear in this category.
INFO These includes information messages which are not necessarily a security violation but might be useful for the administrator. Note
that the tigerrc configuration file through the Tiger_Show_INFO_Msgs option determines whether or not Tiger shows these items. The
default behaviour is to not show them.
ERROR These messages are errors in the execution of Tiger (or any of its scripts), this is probably due to a misconfiguration in the pro-
gram, because of a problem in the installation or because a file needed for the test is missing. The script who outputs this error
should be investigated further.
CONFIG Messages with this level inform of stages in the configuration process of Tiger. They are not errors (otherwise ERROR would be used)
but notices for the user running the program explaining, for example, which configuration might be used.
OPTIONS
-f Scan the indicated security report and generate explanations of it. One explanation will be generated for each unique message id in
the security report. If the name of a security report is not given, then the report is read from stdin.
-F Output the indicated security report with explanations inserted after each entry in the report. If the name of a security report is
not given, then the report is read from stdin.
FILES
$TIGERHOMEDIR/doc/explain.idx
SEE ALSO
tiger(8)
BUGS
If the explanation index is out of date, it doesn't recognize it and generates junk.
Security 12 August 2003 TIGEXP(8)