How to Install and Uninstall tiger Package on Ubuntu 20.10 (Groovy Gorilla)
Last updated: November 21,2024
1. Install "tiger" package
Please follow the guidance below to install tiger on Ubuntu 20.10 (Groovy Gorilla)
$
sudo apt update
Copied
$
sudo apt install
tiger
Copied
2. Uninstall "tiger" package
Please follow the step by step instructions below to uninstall tiger on Ubuntu 20.10 (Groovy Gorilla):
$
sudo apt remove
tiger
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the tiger package on Ubuntu 20.10 (Groovy Gorilla)
Package: tiger
Architecture: amd64
Version: 1:3.2.4~rc1-2
Priority: optional
Section: universe/admin
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Javier Fernández-Sanguino Peña
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 2516
Depends: net-tools, binutils, bsdmainutils, debconf (>= 0.5) | debconf-2.0, ucf, libc6 (>= 2.4)
Recommends: sendmail | mail-transport-agent, john, chkrootkit, tripwire | aide
Suggests: lsof, lynis
Filename: pool/universe/t/tiger/tiger_3.2.4~rc1-2_amd64.deb
Size: 438496
MD5sum: 94f6f9c50e275423484a882c3316c3a4
SHA1: 659f4ed7a62011f47d9d8d59ceb689cde2a4e7c2
SHA256: 1e9c3cc616a980d8cb5ef11d41fcb0aaeaea0ee725cdeb33964a9eaf36d92253
SHA512: 0b8af2ad0912f8ed3bc82a49eb740d5daba35fd59a60b887632525f1e69af0ea02c5a8971603925a55367a2213275f22a742c6bda5bb6a29772a7e24fbb87176
Homepage: http://savannah.nongnu.org/projects/tiger/
Description-en: security auditing and intrusion detection tools for Linux
TIGER, or the 'tiger' scripts, is a set of tools (Bourne shell scripts and C
programs) which are used to perform a security audit of different operating
systems components. The tools can be both run all at once to generate an
audit report of the system and to detect elements that could be fixed
when hardening it.
.
TIGER has one primary goal: report ways the system's security can be
compromised.
.
Most of the tools are independent, but some of them rely on specialised
external security tools such as John the Ripper, Chkroot and integrity check
tools (like Tripwire, Integrit or Aide) to execute some tasks.
.
The same checks are also configured by default to run periodically and
detect deviations or unauthorised changes. This makes it possible to
used them also as a host intrusion detection mechanism.
This review mechanism relies on the use of the cron task scheduler and an
email delivery system to report errors and deviations.
.
This package provides all the security scripts and data files for Linux.
A separate package is available providing the scripts for other operating
systems so they can be run from a centralised repository.
.
The Linux scripts incorporate specific checks targetting the Debian OS
including: md5sums checks of installed files, location of files not belonging
to packages, and analysis of local listening processes.
.
Alternatives to TIGER available in Debian include lynis and ossec. If you are
aiming for a small set of checks, try checksecurity, lsat or yasat.
Description-md5: 61e93cbb8b6e92c7613b08d02af94721
Architecture: amd64
Version: 1:3.2.4~rc1-2
Priority: optional
Section: universe/admin
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Javier Fernández-Sanguino Peña
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 2516
Depends: net-tools, binutils, bsdmainutils, debconf (>= 0.5) | debconf-2.0, ucf, libc6 (>= 2.4)
Recommends: sendmail | mail-transport-agent, john, chkrootkit, tripwire | aide
Suggests: lsof, lynis
Filename: pool/universe/t/tiger/tiger_3.2.4~rc1-2_amd64.deb
Size: 438496
MD5sum: 94f6f9c50e275423484a882c3316c3a4
SHA1: 659f4ed7a62011f47d9d8d59ceb689cde2a4e7c2
SHA256: 1e9c3cc616a980d8cb5ef11d41fcb0aaeaea0ee725cdeb33964a9eaf36d92253
SHA512: 0b8af2ad0912f8ed3bc82a49eb740d5daba35fd59a60b887632525f1e69af0ea02c5a8971603925a55367a2213275f22a742c6bda5bb6a29772a7e24fbb87176
Homepage: http://savannah.nongnu.org/projects/tiger/
Description-en: security auditing and intrusion detection tools for Linux
TIGER, or the 'tiger' scripts, is a set of tools (Bourne shell scripts and C
programs) which are used to perform a security audit of different operating
systems components. The tools can be both run all at once to generate an
audit report of the system and to detect elements that could be fixed
when hardening it.
.
TIGER has one primary goal: report ways the system's security can be
compromised.
.
Most of the tools are independent, but some of them rely on specialised
external security tools such as John the Ripper, Chkroot and integrity check
tools (like Tripwire, Integrit or Aide) to execute some tasks.
.
The same checks are also configured by default to run periodically and
detect deviations or unauthorised changes. This makes it possible to
used them also as a host intrusion detection mechanism.
This review mechanism relies on the use of the cron task scheduler and an
email delivery system to report errors and deviations.
.
This package provides all the security scripts and data files for Linux.
A separate package is available providing the scripts for other operating
systems so they can be run from a centralised repository.
.
The Linux scripts incorporate specific checks targetting the Debian OS
including: md5sums checks of installed files, location of files not belonging
to packages, and analysis of local listening processes.
.
Alternatives to TIGER available in Debian include lynis and ossec. If you are
aiming for a small set of checks, try checksecurity, lsat or yasat.
Description-md5: 61e93cbb8b6e92c7613b08d02af94721