2011-10-15 14:35:41 +02:00
|
|
|
# HOW TO EDIT THIS FILE:
|
2013-06-05 18:03:18 +02:00
|
|
|
# The "handy ruler" below makes it easier to edit a package description.
|
|
|
|
# Line up the first '|' above the ':' following the base package name, and
|
|
|
|
# the '|' on the right side marks the last column you can put a character in.
|
|
|
|
# You must make exactly 11 lines for the formatting to be correct. It's also
|
|
|
|
# customary to leave one space after the ':' except on otherwise blank lines.
|
2011-10-15 14:35:41 +02:00
|
|
|
|
|
|
|
|-----handy-ruler------------------------------------------------------|
|
|
|
|
tiger: tiger (Report system security vulnerabilities)
|
|
|
|
tiger:
|
|
|
|
tiger: TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts,
|
|
|
|
tiger: C programs and data files which are used to perform a security
|
|
|
|
tiger: audit of UNIX systems. TIGER has one primary goal: report ways
|
|
|
|
tiger: 'root' can be compromised.
|
|
|
|
tiger:
|
|
|
|
tiger: Originally developed by the A&M campus of the Texas University.
|
|
|
|
tiger: Currently it is maintained by: Javier Fernandez-Sanguino
|
|
|
|
tiger:
|
|
|
|
tiger:
|