Meet the world's most advanced operating system. Again. Instantly find what you're looking for. Get information in an instant with a single click. Mac OS X Tiger delivers 200+ new features which make it easier than ever to find, access and enjoy everything on your computer.
From a rock-solid, developer-friendly UNIX foundation to grid computing, powerful technologies drive Mac OS X Tiger to its leadership role as the world's most advanced operating system.
Hello,
Over the past few years, I've conducted some rather thorough R&D in the field of lexicon-data-structure optimization.
A Trie is a good place to start, followed by a traditional DAWG.
Smaller means faster, but a traditional DAWG encoding operates as a Boolean-graph, unable to index... (1 Reply)
Hey, I am basically a newb when it comes to anything other than gaming on computers. I am working on changing that and as a first step am installing and learning a UNIX system on my mac. Here is the thing. I already partitioned the hard drive using boot camp to install windows, which I... (6 Replies)
Are Mac OS X 10.4.11 Tiger passwords only stored in /var/db/shadow/hash? Or is it also used in NetInfo?
The reason I am asking is because I wonder if I edit the file in /var/db/shadow/hash and replace the hash inside with my own, will it change the password?
Thanks. (0 Replies)
I was installing gdm on the terminal application and my ISP disconnected. When I reconnected and tried to continue the installation, I got the following message:
Waiting for lock on... (0 Replies)
Question:
Can I run a UNIX executable on Mac OS X Tiger?
If so, how is it done?
Background:
I FTP'd my schools UNIX server some C++ code and header files. Then I used Telnet to get g++ to compile them.
I then FTP'd the UNIX executable back to my PowerBook G4.
I've already... (4 Replies)
TIGEXP(8) Administrator Commands TIGEXP(8)NAME
tigexp - UNIX Security Checker Explanation Generator
SYNOPSIS
tigexp msgid [msgid[msgid...]]
tigexp [-f|-F] [security_report]
DESCRIPTION
Tigexp is used to generate explanations of the output from the Tiger security checking package. In the first form, tigexp will generate an
explanation of each of the message ids listed. In the second form, the security report specified will be scanned and explanations gener-
ated. The -f option will generate one explanation for each unique message id in the security report, whereas the -F option will output the
security report with explanations inserted after each entry in the report.
There are five different message levels produced by Tiger. Each of the message levels is the last letter of the message id. The levels are:
ALERT A message of this level indicates that Tiger has detected a possible intrusion attempt or troublesome misconfiguration which can
expose the whole system to attacks.
FAIL Messages of this level indicate a violation of a generic security policy or a possible intrusion. Appropriate action should be taken
to fix this security issue.
WARN Messages of this level indicate a security issue which should be checked further and might indicate a probable vulnerability or
exposure. Most Tiger messages appear in this category.
INFO These includes information messages which are not necessarily a security violation but might be useful for the administrator. Note
that the tigerrc configuration file through the Tiger_Show_INFO_Msgs option determines whether or not Tiger shows these items. The
default behaviour is to not show them.
ERROR These messages are errors in the execution of Tiger (or any of its scripts), this is probably due to a misconfiguration in the pro-
gram, because of a problem in the installation or because a file needed for the test is missing. The script who outputs this error
should be investigated further.
CONFIG Messages with this level inform of stages in the configuration process of Tiger. They are not errors (otherwise ERROR would be used)
but notices for the user running the program explaining, for example, which configuration might be used.
OPTIONS
-f Scan the indicated security report and generate explanations of it. One explanation will be generated for each unique message id in
the security report. If the name of a security report is not given, then the report is read from stdin.
-F Output the indicated security report with explanations inserted after each entry in the report. If the name of a security report is
not given, then the report is read from stdin.
FILES
$TIGERHOMEDIR/doc/explain.idx
SEE ALSO tiger(8)BUGS
If the explanation index is out of date, it doesn't recognize it and generates junk.
Security 12 August 2003 TIGEXP(8)