Sponsored Content
The Lounge What is on Your Mind? Tiger Woods Wins His 15th Major Championship and his 5th Masters. Post 303033933 by Neo on Sunday 14th of April 2019 10:13:30 PM
Old 04-14-2019
Tiger Woods Wins His 15th Major Championship and his 5th Masters.

Amazing.

Tiger Woods has won his 15th major championship and his 5th Masters, shaping and creating the best sports comeback story of our time.

Congratulations Tiger!!

Tiger's story should inspire everyone in the world to fight everyday of your life for what you love and what you believe in and never give up and never stop trying.

Just a few short years ago Tiger was in such physical pain that he would barely walk and he thought his days on the golf course were over.

Now, Tiger Woods is the 2019 Masters Champion.

Be Inspired!

Image
This User Gave Thanks to Neo For This Post:
 

6 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

can someone please help me with samba wins?

I'm very new to linux - I VPN into my MS server using Fedora laptop dell400 My network that I'm on is 192.168.0.222 The VPN server has an internal address 172.16.0.2 My VPN is successful :) I can ping 172.16.0.2 and even the router of the VPN server 172.16.0.1 and another computer... (1 Reply)
Discussion started by: noamkrief
1 Replies

2. Shell Programming and Scripting

How To Make Decimal Point Fall On The 15th Character On The Screen

If i have a variable which is a decimal number, i.e 34.05 How can you make decimal point fall on the 15th character on the screen? Or any other that you can specify? Can you do it using sed or awk? (3 Replies)
Discussion started by: Vozx
3 Replies

3. Post Here to Contact Site Administrators and Moderators

Please help Moderators. Unix Masters.

Hi Vgersh, I have a quick problem that needs to be solved as soon as possible. I am using a script written by Reborg for doing a file manipulation on files. The script is in the posted forum with title "Script not working as desired". It was working fine but I have a strange situation where... (0 Replies)
Discussion started by: mhssatya
0 Replies

4. UNIX for Dummies Questions & Answers

plz help deliverable unix masters

i have two requirement a file1 has field CNT=1000 i want to take count on file2 which can be like 2000 and replace in file1 so it becomes CNT=2000 a file1 has field TSTMP=2008-11-06-15.54.20.000000 i want to take the file creation date on file2 which can be like... (1 Reply)
Discussion started by: er_zeeshan05
1 Replies

5. UNIX for Dummies Questions & Answers

Script ran by job scheduler fails from the 15th to the 20th of the month

Hi, I have a script that finds the application logs from the previous day and sends it to another server via ftp. The code is something like this: yest_date=`TZ=CST+24 date "+%b %d"` logdir=/app/logs logs=app*.log tmpdir=/tmp cd $logdir for i in `ls -1 $logs` do chkstr=`ls -1l $i | grep... (2 Replies)
Discussion started by: tatchel
2 Replies

6. UNIX for Advanced & Expert Users

Help! SHELL or AWK script - only the masters of the forum will solve

Hello everybody! I have no experience with shell Programmer, but I need to compare 02 files. Txt and generate an output or a new file, after the comparisons. see: If the column 1 of file1 is equal to column 1 of file2, and column 3 of file2 contains the column 4 of file1, output: column1... (4 Replies)
Discussion started by: He2
4 Replies
TIGERCRON(8)						      Administrator Commands						      TIGERCRON(8)

NAME
tigercron - Cron utility for Tiger UNIX Security Checker SYNOPSIS
tigercron [controlfile] [-B basedir] [tigeroptions...] DESCRIPTION
Tigercron is used to run periodically checks from the Tiger UNIX Security Checker. Tigercron reads a control file which is usually located in '/etc/tiger/cronrc' although it can also be specificied as the first argument when calling the program. The format of this control file is the same as for the cron program, each line indicates when different checks from Tiger will be run. The user can indicate where Tiger is installed through the -B basedir parameter, any other additional options provided in the command line will be passed on to configure to configure Tiger based on them (as described in tiger (8)). Tigercron runs the specified checks and compares their reports with previous stored reports (under /var/log/tiger). It will then mail the user defined in '/etc/tiger/tigerrc' (Tiger_Mail_RCPT) the results. When a module is run, tigercron checks: o If Tiger_Cron_Template is set to Y in tigerrc. If it is, it checks if there is a template stating which are the expected results. o If Tiger_Cron_CheckPrev is set to Y in tigerrc. If it is, it checks if there is a previous run of the module it can check against. A differential report is generated depending on the module reports and previous run and is sent through e-mail. These reports provide an easy way to detect intrusions even if no configuration of templates has been done. In the event of an intrusion a Tiger check might detect something specific (file changes, new processes, new users, etc.) and this alert mechanism provides a way to turn Tiger into a Host Intru- sion Detection System (HIDS). The ability of it to work as a proper HIDS is based on a good customization of the cronrc file. Modules that check events to which the host is most exposed to should be run often in order to detect deviations from normal behaviour. OPTIONS
Tigercron uses the same options as Tiger. A controlfile can be defined also to override the default. FILES
/etc/tiger/tigerrc Configuration file for the Tiger tool. /etc/tiger/cronrc Configuration file for the Tigercron tool. /var/log/tiger Location of the log messages generated by Tiger when run through cron /var/lib/tiger/work Working directory used by Tiger scripts to create temporary files. SEE ALSO
tigexp(8),tiger(8),cron(8),crontab(5) The deficiencies of using tigercron as a HIDS are described in the file README.hostids which is provided with the package. In Debian GNU/Linux you will find this (and other related) documentation at /usr/share/doc/tiger/ BUGS
Currently Tigercron has only one alert mechanism (mail) and signatures are not supported. Thus, alerts could be faked. Also, it is depen- dant on cron and will not work if cron is not working. AUTHOR
This manpage was written by Javier Fernandez-Sanguino. Security 19 September 2003 TIGERCRON(8)
All times are GMT -4. The time now is 02:04 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy