Sponsored Content
Operating Systems OS X (Apple) OS X Support RSS Mac OS X 10.4 Tiger requires Apple Remote Desktop v2.2 Post 302257561 by Linux Bot on Wednesday 12th of November 2008 01:30:04 PM
Old 11-12-2008
Mac OS X 10.4 Tiger requires Apple Remote Desktop v2.2

Apple Remote Desktop 1.2 is not supported in Mac OS X 10.4 "Tiger." If you install Apple Remote Desktop 1.2 on a computer running Tiger, you will find that it does not work properly. Tiger requires Apple Remote Desktop 2.2.

More from Apple OS X Support ...
 

5 More Discussions You Might Find Interesting

1. News, Links, Events and Announcements

Mac OS X - Tiger - Meet the world’s most advanced operating system.

Tiger Unleased Advanced UNIX-Based Technology (0 Replies)
Discussion started by: Neo
0 Replies

2. OS X (Apple)

UNIX executables on Mac OS X Tiger

Question: Can I run a UNIX executable on Mac OS X Tiger? If so, how is it done? Background: I FTP'd my schools UNIX server some C++ code and header files. Then I used Telnet to get g++ to compile them. I then FTP'd the UNIX executable back to my PowerBook G4. I've already... (4 Replies)
Discussion started by: thorninc
4 Replies

3. UNIX for Dummies Questions & Answers

Installing gdm on mac os x tiger

I was installing gdm on the terminal application and my ISP disconnected. When I reconnected and tried to continue the installation, I got the following message: Waiting for lock on... (0 Replies)
Discussion started by: adrianzen
0 Replies

4. OS X (Apple)

Mac OS X Tiger Password Storage

Are Mac OS X 10.4.11 Tiger passwords only stored in /var/db/shadow/hash? Or is it also used in NetInfo? The reason I am asking is because I wonder if I edit the file in /var/db/shadow/hash and replace the hash inside with my own, will it change the password? Thanks. (0 Replies)
Discussion started by: Ricardo-san
0 Replies

5. UNIX for Dummies Questions & Answers

Remote desktop for mac unix commands

So Ive been a bit confused dealing with ssh keys or something else, who knows maybe someone can help. I run a set of computers on a network which are all running mac os x lion. I have a lion server serving them all up. I run remote desktop to update them and do anything else "tech" support... (13 Replies)
Discussion started by: jcahn93
13 Replies
TIGERCRON(8)						      Administrator Commands						      TIGERCRON(8)

NAME
tigercron - Cron utility for Tiger UNIX Security Checker SYNOPSIS
tigercron [controlfile] [-B basedir] [tigeroptions...] DESCRIPTION
Tigercron is used to run periodically checks from the Tiger UNIX Security Checker. Tigercron reads a control file which is usually located in '/etc/tiger/cronrc' although it can also be specificied as the first argument when calling the program. The format of this control file is the same as for the cron program, each line indicates when different checks from Tiger will be run. The user can indicate where Tiger is installed through the -B basedir parameter, any other additional options provided in the command line will be passed on to configure to configure Tiger based on them (as described in tiger (8)). Tigercron runs the specified checks and compares their reports with previous stored reports (under /var/log/tiger). It will then mail the user defined in '/etc/tiger/tigerrc' (Tiger_Mail_RCPT) the results. When a module is run, tigercron checks: o If Tiger_Cron_Template is set to Y in tigerrc. If it is, it checks if there is a template stating which are the expected results. o If Tiger_Cron_CheckPrev is set to Y in tigerrc. If it is, it checks if there is a previous run of the module it can check against. A differential report is generated depending on the module reports and previous run and is sent through e-mail. These reports provide an easy way to detect intrusions even if no configuration of templates has been done. In the event of an intrusion a Tiger check might detect something specific (file changes, new processes, new users, etc.) and this alert mechanism provides a way to turn Tiger into a Host Intru- sion Detection System (HIDS). The ability of it to work as a proper HIDS is based on a good customization of the cronrc file. Modules that check events to which the host is most exposed to should be run often in order to detect deviations from normal behaviour. OPTIONS
Tigercron uses the same options as Tiger. A controlfile can be defined also to override the default. FILES
/etc/tiger/tigerrc Configuration file for the Tiger tool. /etc/tiger/cronrc Configuration file for the Tigercron tool. /var/log/tiger Location of the log messages generated by Tiger when run through cron /var/lib/tiger/work Working directory used by Tiger scripts to create temporary files. SEE ALSO
tigexp(8),tiger(8),cron(8),crontab(5) The deficiencies of using tigercron as a HIDS are described in the file README.hostids which is provided with the package. In Debian GNU/Linux you will find this (and other related) documentation at /usr/share/doc/tiger/ BUGS
Currently Tigercron has only one alert mechanism (mail) and signatures are not supported. Thus, alerts could be faked. Also, it is depen- dant on cron and will not work if cron is not working. AUTHOR
This manpage was written by Javier Fernandez-Sanguino. Security 19 September 2003 TIGERCRON(8)
All times are GMT -4. The time now is 04:29 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy