Sponsored Content
Special Forums News, Links, Events and Announcements Mac OS X - Tiger - Meet the world’s most advanced operating system. Post 70225 by Neo on Tuesday 26th of April 2005 09:05:06 PM
Old 04-26-2005
Mac OS X - Tiger - Meet the world’s most advanced operating system.

Tiger Unleased

Quote:
Meet the world's most advanced operating system. Again. Instantly find what you're looking for. Get information in an instant with a single click. Mac OS X Tiger delivers 200+ new features which make it easier than ever to find, access and enjoy everything on your computer.
Advanced UNIX-Based Technology

Quote:
From a rock-solid, developer-friendly UNIX foundation to grid computing, powerful technologies drive Mac OS X Tiger to its leadership role as the world's most advanced operating system.
 

5 More Discussions You Might Find Interesting

1. OS X (Apple)

UNIX executables on Mac OS X Tiger

Question: Can I run a UNIX executable on Mac OS X Tiger? If so, how is it done? Background: I FTP'd my schools UNIX server some C++ code and header files. Then I used Telnet to get g++ to compile them. I then FTP'd the UNIX executable back to my PowerBook G4. I've already... (4 Replies)
Discussion started by: thorninc
4 Replies

2. UNIX for Dummies Questions & Answers

Installing gdm on mac os x tiger

I was installing gdm on the terminal application and my ISP disconnected. When I reconnected and tried to continue the installation, I got the following message: Waiting for lock on... (0 Replies)
Discussion started by: adrianzen
0 Replies

3. OS X (Apple)

Mac OS X Tiger Password Storage

Are Mac OS X 10.4.11 Tiger passwords only stored in /var/db/shadow/hash? Or is it also used in NetInfo? The reason I am asking is because I wonder if I edit the file in /var/db/shadow/hash and replace the hash inside with my own, will it change the password? Thanks. (0 Replies)
Discussion started by: Ricardo-san
0 Replies

4. OS X (Apple)

Help installing a Unix operating system on a mac

Hey, I am basically a newb when it comes to anything other than gaming on computers. I am working on changing that and as a first step am installing and learning a UNIX system on my mac. Here is the thing. I already partitioned the hard drive using boot camp to install windows, which I... (6 Replies)
Discussion started by: Socrates1212
6 Replies

5. Programming

The World's Most Advanced Lexicon-Data-Structure

Hello, Over the past few years, I've conducted some rather thorough R&D in the field of lexicon-data-structure optimization. A Trie is a good place to start, followed by a traditional DAWG. Smaller means faster, but a traditional DAWG encoding operates as a Boolean-graph, unable to index... (1 Reply)
Discussion started by: HeavyJ
1 Replies
TIGERCRON(8)						      Administrator Commands						      TIGERCRON(8)

NAME
tigercron - Cron utility for Tiger UNIX Security Checker SYNOPSIS
tigercron [controlfile] [-B basedir] [tigeroptions...] DESCRIPTION
Tigercron is used to run periodically checks from the Tiger UNIX Security Checker. Tigercron reads a control file which is usually located in '/etc/tiger/cronrc' although it can also be specificied as the first argument when calling the program. The format of this control file is the same as for the cron program, each line indicates when different checks from Tiger will be run. The user can indicate where Tiger is installed through the -B basedir parameter, any other additional options provided in the command line will be passed on to configure to configure Tiger based on them (as described in tiger (8)). Tigercron runs the specified checks and compares their reports with previous stored reports (under /var/log/tiger). It will then mail the user defined in '/etc/tiger/tigerrc' (Tiger_Mail_RCPT) the results. When a module is run, tigercron checks: o If Tiger_Cron_Template is set to Y in tigerrc. If it is, it checks if there is a template stating which are the expected results. o If Tiger_Cron_CheckPrev is set to Y in tigerrc. If it is, it checks if there is a previous run of the module it can check against. A differential report is generated depending on the module reports and previous run and is sent through e-mail. These reports provide an easy way to detect intrusions even if no configuration of templates has been done. In the event of an intrusion a Tiger check might detect something specific (file changes, new processes, new users, etc.) and this alert mechanism provides a way to turn Tiger into a Host Intru- sion Detection System (HIDS). The ability of it to work as a proper HIDS is based on a good customization of the cronrc file. Modules that check events to which the host is most exposed to should be run often in order to detect deviations from normal behaviour. OPTIONS
Tigercron uses the same options as Tiger. A controlfile can be defined also to override the default. FILES
/etc/tiger/tigerrc Configuration file for the Tiger tool. /etc/tiger/cronrc Configuration file for the Tigercron tool. /var/log/tiger Location of the log messages generated by Tiger when run through cron /var/lib/tiger/work Working directory used by Tiger scripts to create temporary files. SEE ALSO
tigexp(8),tiger(8),cron(8),crontab(5) The deficiencies of using tigercron as a HIDS are described in the file README.hostids which is provided with the package. In Debian GNU/Linux you will find this (and other related) documentation at /usr/share/doc/tiger/ BUGS
Currently Tigercron has only one alert mechanism (mail) and signatures are not supported. Thus, alerts could be faked. Also, it is depen- dant on cron and will not work if cron is not working. AUTHOR
This manpage was written by Javier Fernandez-Sanguino. Security 19 September 2003 TIGERCRON(8)
All times are GMT -4. The time now is 11:40 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy