a directory.
Code [con001c]
Code [con001c]
Code [con001c]
Code [con001c]
Code [con001c]
a directory.
Code [con002c]
a directory.
Code [con001c]
Code [con001c]
Code [con001c]
Code [con001c]
Code [con002c]
Code [con002c]
The configuration file listed was not read because it was
Code [con001c]
Code [con001c]
The configuration file listed was not read because it was
Code [con002c]
The configuration file listed was not read because it was
The configuration file listed was not read because it was
The configuration file listed was not read because it was
Code [con002c]
Code [con002c]
Code [con001c]
a directory.
Code [con002c]
Code [con001c]
Code [con002c]
a directory.
The configuration file listed was not read because it was
Code [con001c]
Code [con002c]
Code [con002c]
Code [con001c]
modifying the configuration file.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
a directory.
The configuration file listed was not read because it was
Code [con002c]
The configuration file listed was not read because it was
The configuration file listed was not read because it was
a directory.
The configuration file listed was not read because it was
a directory.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
Code [con002c]
a directory.
Code [con002c]
a directory.
a directory.
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
Code [con002c]
The configuration file listed was not read because it was
The configuration file listed was not read because it was
modifying the configuration file.
Code [con001c]
The configuration file listed was not read because it was
The configuration file listed was not read because it was
The configuration file listed was not read because it was
a directory.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
Code [con002c]
Code [con002c]
a directory.
a directory.
not owned by `root'. This is to prevent someone from
Code [con003c]
a directory.
Code [con002c]
not owned by `root'. This is to prevent someone from
Code [con002c]
modifying the configuration file.
Code [con002c]
Code [con002c]
Code [con002c]
Code [con002c]
not owned by `root'. This is to prevent someone from
not owned by `root'. This is to prevent someone from
Code [con003c]
modifying the configuration file.
not owned by `root'. This is to prevent someone from
Code [con002c]
Code [con002c]
Code [con002c]
Code [con002c]
Code [con002c]
modifying the configuration file.
Code [con002c]
Code [con002c]
Code [con003c]
not owned by `root'. This is to prevent someone from
Code [con002c]
The configuration file listed was not read because it was
Code [con002c]
Code [con003c]
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
Code [con002c]
Code [con003c]
Code [con003c]
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
not owned by `root'. This is to prevent someone from
not owned by `root'. This is to prevent someone from
not owned by `root'. This is to prevent someone from
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
Code [con003c]
Code [con003c]
Code [con002c]
Code [con003c]
The configuration file listed was not read because it was
writable by non-root users. This is to prevent someone from
modifying the configuration file.
modifying the configuration file.
Code [con003c]
Code [con003c]
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
modifying the configuration file.
modifying the configuration file.
The configuration file listed was not read because it was
Code [con003c]
Code [con003c]
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
modifying the configuration file.
The configuration file listed was not read because it was
modifying the configuration file.
modifying the configuration file.
modifying the configuration file.
not owned by `root'. This is to prevent someone from
Code [con003c]
Code [con003c]
modifying the configuration file.
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
Code [con003c]
The configuration file listed was not read because it was
modifying the configuration file.
Code [con003c]
The configuration file listed was not read because it was
modifying the configuration file.
Code [con003c]
Code [con004c]
Code [con003c]
writable by non-root users. This is to prevent someone from
Code [con003c]
writable by non-root users. This is to prevent someone from
writable by non-root users. This is to prevent someone from
modifying the configuration file.
Code [con003c]
Code [con003c] Code [con003c]
modifying the configuration file.
Code [con004c]
Code [con003c]
modifying the configuration file.
Code [con003c]
Code [con003c]
Code [con003c]
Code [con003c]
Code [con003c]
Informational message describing which configuration files are
writable by non-root users. This is to prevent someone from
Code [con003c]
writable by non-root users. This is to prevent someone from
Code [con004c]
modifying the configuration file.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
Code [con003c]
Code [con003c]
The configuration file listed was not read because it was
Code [con003c]
Code [con004c]
Code [con004c]
Code [con004c]
Code [con004c]
Code [con004c]
The configuration file listed was not read because it was
being used during the checks.
Code [con003c]
modifying the configuration file.
Informational message describing which configuration files are
modifying the configuration file.
The configuration file listed was not read because it was
Code [con004c]
writable by non-root users. This is to prevent someone from
Code [con004c]
The configuration file listed was not read because it was
The configuration file listed was not read because it was
writable by non-root users. This is to prevent someone from
Code [con004c]
Informational message describing which configuration files are
Code [con004c]
modifying the configuration file.
Code [con004c]
modifying the configuration file.
Informational message describing which configuration files are
writable by non-root users. This is to prevent someone from
Informational message describing which configuration files are
modifying the configuration file.
modifying the configuration file.
modifying the configuration file.
Code [con004c]
modifying the configuration file.
writable by non-root users. This is to prevent someone from
Code [con004c]
Informational message describing which configuration files are
Informational message describing which configuration files are
writable by non-root users. This is to prevent someone from
The configuration file listed was not read because it was
writable by non-root users. This is to prevent someone from
Code [con004c]
modifying the configuration file.
Informational message describing which configuration files are
Code [con005c]
writable by non-root users. This is to prevent someone from
Informational message describing which configuration files are
modifying the configuration file.
writable by non-root users. This is to prevent someone from
Code [con004c]
Code [con005c]
modifying the configuration file.
being used during the checks.
modifying the configuration file.
writable by non-root users. This is to prevent someone from
Code [con004c]
Code [con004c]
modifying the configuration file.
Configuration files, specific to the type of system that `tiger' is being
being used during the checks.
modifying the configuration file.
being used during the checks.
Code [con004c]
Code [con004c]
Code [con004c]
Code [con004c]
Code [con004c]
Code [con005c]
Code [con004c]
Code [con004c]
Code [con005c]
Code [con004c]
run on, do not exist. It may not be possible to perform all of the checks
Code [con005c] Code [con004c]
Informational message describing which configuration files are
Code [con005c]
Code [con004c]
Code [con004c]
Code [con004c]
Code [con005c]
Code [con005c]
Code [con004c]
Code [con005c]
Code [con005c]
Code [con004c]
Code [con005c]
Code [con005c]
being used during the checks.
due to the lack of certain files. Some checks that are performed may
Code [con004c]
Configuration files, specific to the type of system that `tiger' is being
Configuration files, specific to the type of system that `tiger' is being
being used during the checks.
being used during the checks.
Code [con005c]
being used during the checks.
Configuration files, specific to the type of system that `tiger' is being
Informational message describing which configuration files are
Informational message describing which configuration files are
Informational message describing which configuration files are
Informational message describing which configuration files are
being used during the checks.
Code [con005c]
Configuration files, specific to the type of system that `tiger' is being
Code [con004c]
Code [con005c]
Configuration files, specific to the type of system that `tiger' is being
Informational message describing which configuration files are
being used during the checks.
Configuration files, specific to the type of system that `tiger' is being
Configuration files, specific to the type of system that `tiger' is being
run on, do not exist. It may not be possible to perform all of the checks
Code [con005c]
being used during the checks.
being used during the checks.
Configuration files, specific to the type of system that `tiger' is being
Code [con005c]
being used during the checks.
Code [con005c]
run on, do not exist. It may not be possible to perform all of the checks
Configuration files, specific to the type of system that `tiger' is being
Code [con005c]
run on, do not exist. It may not be possible to perform all of the checks
run on, do not exist. It may not be possible to perform all of the checks
Code [con005c]
Code [con005c]
Code [con005c]
due to the lack of certain files. Some checks that are performed may
run on, do not exist. It may not be possible to perform all of the checks
Code [con005c]
due to the lack of certain files. Some checks that are performed may
Code [con005c]
Code [con005c]
due to the lack of certain files. Some checks that are performed may
being used during the checks.
Configuration files, specific to the type of system that `tiger' is being
Code [con005c]
due to the lack of certain files. Some checks that are performed may
due to the lack of certain files. Some checks that are performed may
Code [con006e]
Configuration files, specific to the type of system that `tiger' is being
Configuration files, specific to the type of system that `tiger' is being
Code [con005c]
due to the lack of certain files. Some checks that are performed may
Code [con005c]
Code [con005c]
also generate incorrect or incomplete information.
Configuration files, specific to the type of system that `tiger' is being
run on, do not exist. It may not be possible to perform all of the checks
Code [con006e]
also generate incorrect or incomplete information.
Code [con005c]
run on, do not exist. It may not be possible to perform all of the checks
Code [con005c]
Configuration files, specific to the type of system that `tiger' is being
also generate incorrect or incomplete information.
run on, do not exist. It may not be possible to perform all of the checks
Code [con005c]
Code [con005c]
due to the lack of certain files. Some checks that are performed may
Code [con006e]
Code [con005c]
run on, do not exist. It may not be possible to perform all of the checks
Code [con006e]
Code [con006e]
Code [con006e]
due to the lack of certain files. Some checks that are performed may
run on, do not exist. It may not be possible to perform all of the checks
Code [con006e]
The indicated option was not recognized. The valid options are:
run on, do not exist. It may not be possible to perform all of the checks
Code [con006e]
also generate incorrect or incomplete information.
Code [con006e]
due to the lack of certain files. Some checks that are performed may
Code [con006e]
due to the lack of certain files. Some checks that are performed may
run on, do not exist. It may not be possible to perform all of the checks
also generate incorrect or incomplete information.
due to the lack of certain files. Some checks that are performed may
The indicated option was not recognized. The valid options are:
Code [con006e]
run on, do not exist. It may not be possible to perform all of the checks
Code [con006e]
also generate incorrect or incomplete information.
Code [con006e]
also generate incorrect or incomplete information.
also generate incorrect or incomplete information.
The indicated option was not recognized. The valid options are:
run on, do not exist. It may not be possible to perform all of the checks
Code [con006e]
-B tiger_home Specify tiger home directory
Code [con006e]
also generate incorrect or incomplete information.
The indicated option was not recognized. The valid options are:
run on, do not exist. It may not be possible to perform all of the checks
The indicated option was not recognized. The valid options are:
due to the lack of certain files. Some checks that are performed may
The indicated option was not recognized. The valid options are:
The indicated option was not recognized. The valid options are:
Code [con006e]
due to the lack of certain files. Some checks that are performed may
The indicated option was not recognized. The valid options are:
also generate incorrect or incomplete information.
Code [con006e]
also generate incorrect or incomplete information.
Code [con006e]
Code [con006e]
due to the lack of certain files. Some checks that are performed may
Code [con006e]
-B tiger_home Specify tiger home directory
Code [con006e]
Code [con006e]
The indicated option was not recognized. The valid options are:
also generate incorrect or incomplete information.
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
Code [con006e]
Code [con006e]
-d directory Specify directory to create security logs in
The indicated option was not recognized. The valid options are:
-B tiger_home Specify tiger home directory
Code [con006e]
-B tiger_home Specify tiger home directory
Code [con006e]
Code [con006e]
also generate incorrect or incomplete information.
Code [con006e]
-B tiger_home Specify tiger home directory
Code [con006e]
Code [con006e]
The indicated option was not recognized. The valid options are:
-B tiger_home Specify tiger home directory
Code [con006e]
-d directory Specify directory to create security logs in
-B tiger_home Specify tiger home directory
The indicated option was not recognized. The valid options are:
The indicated option was not recognized. The valid options are:
The indicated option was not recognized. The valid options are:
Code [con006e]
Code [con006e]
-d directory Specify directory to create security logs in
The indicated option was not recognized. The valid options are:
-w directory Specify directory to use for scratch files
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
Code [con006e]
The indicated option was not recognized. The valid options are:
The indicated option was not recognized. The valid options are:
-d directory Specify directory to create security logs in
-w directory Specify directory to use for scratch files
-B tiger_home Specify tiger home directory
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
-d directory Specify directory to create security logs in
The indicated option was not recognized. The valid options are:
Code [con006e]
-B tiger_home Specify tiger home directory
The indicated option was not recognized. The valid options are:
-d directory Specify directory to create security logs in
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
The indicated option was not recognized. The valid options are:
-d directory Specify directory to create security logs in
-d directory Specify directory to create security logs in
-B tiger_home Specify tiger home directory
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
The indicated option was not recognized. The valid options are:
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
-B tiger_home Specify tiger home directory
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
-w directory Specify directory to use for scratch files
The indicated option was not recognized. The valid options are:
-B tiger_home Specify tiger home directory
-B tiger_home Specify tiger home directory
-w directory Specify directory to use for scratch files
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
Insert explanations into output
-w directory Specify directory to use for scratch files
-B tiger_home Specify tiger home directory
-B tiger_home Specify tiger home directory
-w directory Specify directory to use for scratch files
Insert explanations into output
-d directory Specify directory to create security logs in
-d directory Specify directory to create security logs in
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
-B tiger_home Specify tiger home directory
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
-w directory Specify directory to use for scratch files
-d directory Specify directory to create security logs in
-d directory Specify directory to create security logs in
-d directory Specify directory to create security logs in
-B tiger_home Specify tiger home directory
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
-w directory Specify directory to use for scratch files
-d directory Specify directory to create security logs in
-d directory Specify directory to create security logs in
Insert explanations into output
-w directory Specify directory to use for scratch files
-B tiger_home Specify tiger home directory
-d directory Specify directory to create security logs in
-d directory Specify directory to create security logs in
Insert explanations into output
-d directory Specify directory to create security logs in
Generate separate explanation report
-w directory Specify directory to use for scratch files
Insert explanations into output
-d directory Specify directory to create security logs in
Insert explanations into output
-d directory Specify directory to create security logs in
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
Generate separate explanation report
Insert explanations into output
-d directory Specify directory to create security logs in
Insert explanations into output
-d directory Specify directory to create security logs in
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
Insert explanations into output
-w directory Specify directory to use for scratch files
Insert explanations into output
-w directory Specify directory to use for scratch files
-d directory Specify directory to create security logs in
Insert explanations into output
Insert explanations into output
Insert explanations into output
-d directory Specify directory to create security logs in
Insert explanations into output
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
Insert explanations into output
-w directory Specify directory to use for scratch files
Generate separate explanation report
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
-d directory Specify directory to create security logs in
Generate separate explanation report
Insert explanations into output
-S Perform partial checks of disk-less client
Generate separate explanation report
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
-w directory Specify directory to use for scratch files
Generate separate explanation report
Insert explanations into output
Generate separate explanation report
-S Perform partial checks of disk-less client
Insert explanations into output
Insert explanations into output
-w directory Specify directory to use for scratch files
Insert explanations into output
-w directory Specify directory to use for scratch files
Generate separate explanation report
Generate separate explanation report
Insert explanations into output
Generate separate explanation report
Insert explanations into output
-w directory Specify directory to use for scratch files
Generate separate explanation report
Generate separate explanation report
-w directory Specify directory to use for scratch files
Generate separate explanation report
Generate separate explanation report
Insert explanations into output
Insert explanations into output
Generate separate explanation report
-S Perform partial checks of disk-less client
Insert explanations into output
Insert explanations into output
Insert explanations into output
-w directory Specify directory to use for scratch files
-S Perform partial checks of disk-less client
Generate separate explanation report
Insert explanations into output
configuration files on server.
Insert explanations into output
Insert explanations into output
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
Generate separate explanation report
configuration files on server.
Generate separate explanation report
Generate separate explanation report
Generate separate explanation report
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
Insert explanations into output
Insert explanations into output
Generate separate explanation report
Generate separate explanation report
Insert explanations into output
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
Generate separate explanation report
Generate separate explanation report
configuration files on server.
Generate separate explanation report
Insert explanations into output
Generate separate explanation report
configuration files on server.
Generate separate explanation report
Code [con007c]
-S Perform partial checks of disk-less client
Generate separate explanation report
configuration files on server.
Generate separate explanation report
configuration files on server.
configuration files on server.
Code [con007c]
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
configuration files on server.
-S Perform partial checks of disk-less client
configuration files on server.
Generic configuration files for this system do not exist. The
Generate separate explanation report
-S Perform partial checks of disk-less client
Code [con007c]
configuration files on server.
-S Perform partial checks of disk-less client
Generate separate explanation report
Code [con007c]
-S Perform partial checks of disk-less client
Code [con007c]
Code [con007c]
-S Perform partial checks of disk-less client
Code [con007c]
configuration files on server.
checking system will continue on, attempting to locate items it
Generic configuration files for this system do not exist. The
Code [con007c]
configuration files on server.
Generic configuration files for this system do not exist. The
Code [con007c]
configuration files on server.
Code [con007c]
Code [con007c]
-S Perform partial checks of disk-less client
configuration files on server.
-S Perform partial checks of disk-less client
Code [con007c]
Generic configuration files for this system do not exist. The
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
configuration files on server.
Code [con007c]
Generic configuration files for this system do not exist. The
Generic configuration files for this system do not exist. The
Code [con007c]
Code [con007c]
configuration files on server.
checking system will continue on, attempting to locate items it
checking system will continue on, attempting to locate items it
configuration files on server.
Code [con007c]
checking system will continue on, attempting to locate items it
not be performed, and many that are attempted may function
Code [con007c]
Code [con007c]
Code [con007c]
needs, and using default configuration files. Many checks will
checking system will continue on, attempting to locate items it
Code [con007c]
Code [con007c]
checking system will continue on, attempting to locate items it
checking system will continue on, attempting to locate items it
checking system will continue on, attempting to locate items it
Code [con007c]
needs, and using default configuration files. Many checks will
configuration files on server.
configuration files on server.
Code [con007c]
Generic configuration files for this system do not exist. The
configuration files on server.
checking system will continue on, attempting to locate items it
needs, and using default configuration files. Many checks will
needs, and using default configuration files. Many checks will
Code [con007c]
Code [con007c]
incorrectly, generating incorrect output.
incorrectly, generating incorrect output.
Code [con007c]
Code [con007c]
not be performed, and many that are attempted may function
Generic configuration files for this system do not exist. The
configuration files on server.
needs, and using default configuration files. Many checks will
needs, and using default configuration files. Many checks will
needs, and using default configuration files. Many checks will
Generic configuration files for this system do not exist. The
needs, and using default configuration files. Many checks will
Code [con007c]
Generic configuration files for this system do not exist. The
Code [con007c]
Generic configuration files for this system do not exist. The
Code [con007c]
Code [con007c]
checking system will continue on, attempting to locate items it
not be performed, and many that are attempted may function
incorrectly, generating incorrect output.
Generic configuration files for this system do not exist. The
checking system will continue on, attempting to locate items it
Code [con007c]
Code [con007c]
Code [con007c]
checking system will continue on, attempting to locate items it
not be performed, and many that are attempted may function
Generic configuration files for this system do not exist. The
incorrectly, generating incorrect output.
incorrectly, generating incorrect output.
not be performed, and many that are attempted may function
needs, and using default configuration files. Many checks will
not be performed, and many that are attempted may function
Code [con008e]
Code [con008e]
checking system will continue on, attempting to locate items it
checking system will continue on, attempting to locate items it
Generic configuration files for this system do not exist. The
checking system will continue on, attempting to locate items it
needs, and using default configuration files. Many checks will
needs, and using default configuration files. Many checks will
not be performed, and many that are attempted may function
Code [con007c]
needs, and using default configuration files. Many checks will
incorrectly, generating incorrect output.
needs, and using default configuration files. Many checks will
incorrectly, generating incorrect output.
incorrectly, generating incorrect output.
needs, and using default configuration files. Many checks will
checking system will continue on, attempting to locate items it
Code [con008e]
not be performed, and many that are attempted may function
incorrectly, generating incorrect output.
Generic configuration files for this system do not exist. The
Code [con008e]
not be performed, and many that are attempted may function
Code [con008e]
Code [con008e]
checking system will continue on, attempting to locate items it
Code [con008e]
needs, and using default configuration files. Many checks will
checking system attempted to continue on, but could not locate
checking system will continue on, attempting to locate items it
Code [con008e]
Code [con008e]
incorrectly, generating incorrect output.
incorrectly, generating incorrect output.
checking system will continue on, attempting to locate items it
Code [con008e]
Generic configuration files for this system do not exist. The
incorrectly, generating incorrect output.
Code [con008e]
not be performed, and many that are attempted may function
Generic configuration files for this system do not exist. The
needs, and using default configuration files. Many checks will
Code [con008e]
not be performed, and many that are attempted may function
incorrectly, generating incorrect output.
needs, and using default configuration files. Many checks will
Generic configuration files for this system do not exist. The
Generic configuration files for this system do not exist. The
Code [con008e]
needs, and using default configuration files. Many checks will
the default configuration files either. This is an installation
Code [con008e]
not be performed, and many that are attempted may function
incorrectly, generating incorrect output.
Code [con008e]
Code [con008e]
Code [con008e]
Generic configuration files for this system do not exist. The
Code [con008e]
Generic configuration files for this system do not exist. The
problem. It may be necessary to indicate the location of the
not be performed, and many that are attempted may function
Code [con008e]
the default configuration files either. This is an installation
Code [con008e]
Code [con008e]
checking system attempted to continue on, but could not locate
checking system attempted to continue on, but could not locate
checking system attempted to continue on, but could not locate
not be performed, and many that are attempted may function
the default configuration files either. This is an installation
The configuration file listed was not read because it was
a directory.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
a directory.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
a directory.
a directory.
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
not owned by `root'. This is to prevent someone from
a directory.
not owned by `root'. This is to prevent someone from
a directory.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
modifying the configuration file.
a directory.
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
modifying the configuration file.
not owned by `root'. This is to prevent someone from
not owned by `root'. This is to prevent someone from
not owned by `root'. This is to prevent someone from
modifying the configuration file.
The configuration file listed was not read because it was
modifying the configuration file.
a directory.
The configuration file listed was not read because it was
modifying the configuration file.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
modifying the configuration file.
modifying the configuration file.
modifying the configuration file.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
The configuration file listed was not read because it was
The configuration file listed was not read because it was
The configuration file listed was not read because it was
modifying the configuration file.
modifying the configuration file.
The configuration file listed was not read because it was
modifying the configuration file.
not owned by `root'. This is to prevent someone from
writable by non-root users. This is to prevent someone from
The configuration file listed was not read because it was
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
writable by non-root users. This is to prevent someone from
modifying the configuration file.
The configuration file listed was not read because it was
modifying the configuration file.
not owned by `root'. This is to prevent someone from
The configuration file listed was not read because it was
The configuration file listed was not read because it was
writable by non-root users. This is to prevent someone from
modifying the configuration file.
The configuration file listed was not read because it was
not owned by `root'. This is to prevent someone from
modifying the configuration file.
writable by non-root users. This is to prevent someone from
writable by non-root users. This is to prevent someone from
The configuration file listed was not read because it was
modifying the configuration file.
The configuration file listed was not read because it was
writable by non-root users. This is to prevent someone from
modifying the configuration file.
writable by non-root users. This is to prevent someone from
not owned by `root'. This is to prevent someone from
writable by non-root users. This is to prevent someone from
modifying the configuration file.
modifying the configuration file.
writable by non-root users. This is to prevent someone from
modifying the configuration file.
modifying the configuration file.
modifying the configuration file.
writable by non-root users. This is to prevent someone from
modifying the configuration file.
writable by non-root users. This is to prevent someone from
modifying the configuration file.
The configuration file listed was not read because it was
modifying the configuration file.
writable by non-root users. This is to prevent someone from
The configuration file listed was not read because it was
Informational message describing which configuration files are
The configuration file listed was not read because it was
modifying the configuration file.
modifying the configuration file.
modifying the configuration file.
modifying the configuration file.
The configuration file listed was not read because it was
The configuration file listed was not read because it was
The configuration file listed was not read because it was
The configuration file listed was not read because it was
modifying the configuration file.
The configuration file listed was not read because it was
modifying the configuration file.
being used during the checks.
writable by non-root users. This is to prevent someone from
The configuration file listed was not read because it was
writable by non-root users. This is to prevent someone from
writable by non-root users. This is to prevent someone from
writable by non-root users. This is to prevent someone from
writable by non-root users. This is to prevent someone from
The configuration file listed was not read because it was
writable by non-root users. This is to prevent someone from
writable by non-root users. This is to prevent someone from
The configuration file listed was not read because it was
being used during the checks.
modifying the configuration file.
Informational message describing which configuration files are
writable by non-root users. This is to prevent someone from
Informational message describing which configuration files are
being used during the checks.
Informational message describing which configuration files are
being used during the checks.
being used during the checks.
modifying the configuration file.
Informational message describing which configuration files are
being used during the checks.
Informational message describing which configuration files are
modifying the configuration file.
Informational message describing which configuration files are
being used during the checks.
being used during the checks.
modifying the configuration file.
being used during the checks.
being used during the checks.
being used during the checks.
Informational message describing which configuration files are
Configuration files, specific to the type of system that `tiger' is being
Informational message describing which configuration files are
modifying the configuration file.
being used during the checks.
Informational message describing which configuration files are
Informational message describing which configuration files are
Informational message describing which configuration files are
Informational message describing which configuration files are
Informational message describing which configuration files are
being used during the checks.
Configuration files, specific to the type of system that `tiger' is being
being used during the checks.
run on, do not exist. It may not be possible to perform all of the checks
Informational message describing which configuration files are
Informational message describing which configuration files are
Informational message describing which configuration files are
being used during the checks.
Configuration files, specific to the type of system that `tiger' is being
run on, do not exist. It may not be possible to perform all of the checks
due to the lack of certain files. Some checks that are performed may
being used during the checks.
being used during the checks.
Informational message describing which configuration files are
Configuration files, specific to the type of system that `tiger' is being
Configuration files, specific to the type of system that `tiger' is being
also generate incorrect or incomplete information.
Informational message describing which configuration files are
run on, do not exist. It may not be possible to perform all of the checks
run on, do not exist. It may not be possible to perform all of the checks
Configuration files, specific to the type of system that `tiger' is being
being used during the checks.
run on, do not exist. It may not be possible to perform all of the checks
due to the lack of certain files. Some checks that are performed may
run on, do not exist. It may not be possible to perform all of the checks
also generate incorrect or incomplete information.
Informational message describing which configuration files are
run on, do not exist. It may not be possible to perform all of the checks
run on, do not exist. It may not be possible to perform all of the checks
being used during the checks.
due to the lack of certain files. Some checks that are performed may
being used during the checks.
being used during the checks.
due to the lack of certain files. Some checks that are performed may
Configuration files, specific to the type of system that `tiger' is being
Configuration files, specific to the type of system that `tiger' is being
also generate incorrect or incomplete information.
due to the lack of certain files. Some checks that are performed may
run on, do not exist. It may not be possible to perform all of the checks
Configuration files, specific to the type of system that `tiger' is being
also generate incorrect or incomplete information.
due to the lack of certain files. Some checks that are performed may
run on, do not exist. It may not be possible to perform all of the checks
also generate incorrect or incomplete information.
due to the lack of certain files. Some checks that are performed may
Configuration files, specific to the type of system that `tiger' is being
also generate incorrect or incomplete information.
due to the lack of certain files. Some checks that are performed may
Configuration files, specific to the type of system that `tiger' is being
Configuration files, specific to the type of system that `tiger' is being
also generate incorrect or incomplete information.
run on, do not exist. It may not be possible to perform all of the checks
also generate incorrect or incomplete information.
run on, do not exist. It may not be possible to perform all of the checks
run on, do not exist. It may not be possible to perform all of the checks
The indicated option was not recognized. The valid options are:
also generate incorrect or incomplete information.
also generate incorrect or incomplete information.
run on, do not exist. It may not be possible to perform all of the checks
Configuration files, specific to the type of system that `tiger' is being
Configuration files, specific to the type of system that `tiger' is being
also generate incorrect or incomplete information.
Configuration files, specific to the type of system that `tiger' is being
due to the lack of certain files. Some checks that are performed may
run on, do not exist. It may not be possible to perform all of the checks
The indicated option was not recognized. The valid options are:
Configuration files, specific to the type of system that `tiger' is being
due to the lack of certain files. Some checks that are performed may
also generate incorrect or incomplete information.
run on, do not exist. It may not be possible to perform all of the checks
due to the lack of certain files. Some checks that are performed may
Configuration files, specific to the type of system that `tiger' is being
run on, do not exist. It may not be possible to perform all of the checks
Configuration files, specific to the type of system that `tiger' is being
due to the lack of certain files. Some checks that are performed may
due to the lack of certain files. Some checks that are performed may
due to the lack of certain files. Some checks that are performed may
also generate incorrect or incomplete information.
Configuration files, specific to the type of system that `tiger' is being
run on, do not exist. It may not be possible to perform all of the checks
due to the lack of certain files. Some checks that are performed may
run on, do not exist. It may not be possible to perform all of the checks
also generate incorrect or incomplete information.
Configuration files, specific to the type of system that `tiger' is being
due to the lack of certain files. Some checks that are performed may
also generate incorrect or incomplete information.
due to the lack of certain files. Some checks that are performed may
The indicated option was not recognized. The valid options are:
due to the lack of certain files. Some checks that are performed may
also generate incorrect or incomplete information.
-B tiger_home Specify tiger home directory
The indicated option was not recognized. The valid options are:
due to the lack of certain files. Some checks that are performed may
The indicated option was not recognized. The valid options are:
also generate incorrect or incomplete information.
due to the lack of certain files. Some checks that are performed may
The indicated option was not recognized. The valid options are:
also generate incorrect or incomplete information.
also generate incorrect or incomplete information.
also generate incorrect or incomplete information.
-B tiger_home Specify tiger home directory
The indicated option was not recognized. The valid options are:
also generate incorrect or incomplete information.
also generate incorrect or incomplete information.
The indicated option was not recognized. The valid options are:
-B tiger_home Specify tiger home directory
-B tiger_home Specify tiger home directory
The indicated option was not recognized. The valid options are:
-B tiger_home Specify tiger home directory
-B tiger_home Specify tiger home directory
The indicated option was not recognized. The valid options are:
-B tiger_home Specify tiger home directory
The indicated option was not recognized. The valid options are:
The indicated option was not recognized. The valid options are:
The indicated option was not recognized. The valid options are:
Insert explanations into output
-S Perform partial checks of disk-less client
Generate separate explanation report
-S Perform partial checks of disk-less client
Generate separate explanation report
-S Perform partial checks of disk-less client
configuration files on server.
Generate separate explanation report
-S Perform partial checks of disk-less client
Generate separate explanation report
configuration files on server.
configuration files on server.
configuration files on server.
-S Perform partial checks of disk-less client
configuration files on server.
Generic configuration files for this system do not exist. The
-S Perform partial checks of disk-less client
-S Perform partial checks of disk-less client
checking system will continue on, attempting to locate items it
-S Perform partial checks of disk-less client
configuration files on server.
configuration files on server.
needs, and using default configuration files. Many checks will
configuration files on server.
needs, and using default configuration files. Many checks will
configuration files on server.
configuration files on server.
Generic configuration files for this system do not exist. The
checking system will continue on, attempting to locate items it
-S Perform partial checks of disk-less client
Generic configuration files for this system do not exist. The
configuration files on server.
Generic configuration files for this system do not exist. The
Generic configuration files for this system do not exist. The
Generic configuration files for this system do not exist. The
checking system will continue on, attempting to locate items it
Generic configuration files for this system do not exist. The
configuration files on server.
Generic configuration files for this system do not exist. The
not be performed, and many that are attempted may function
configuration files on server.
Generic configuration files for this system do not exist. The
needs, and using default configuration files. Many checks will
configuration files on server.
checking system will continue on, attempting to locate items it
checking system will continue on, attempting to locate items it
not be performed, and many that are attempted may function
Generic configuration files for this system do not exist. The
Generic configuration files for this system do not exist. The
checking system will continue on, attempting to locate items it
Generic configuration files for this system do not exist. The
needs, and using default configuration files. Many checks will
not be performed, and many that are attempted may function
not be performed, and many that are attempted may function
needs, and using default configuration files. Many checks will
not be performed, and many that are attempted may function
needs, and using default configuration files. Many checks will
checking system will continue on, attempting to locate items it
Generic configuration files for this system do not exist. The
Generic configuration files for this system do not exist. The
Generic configuration files for this system do not exist. The
checking system will continue on, attempting to locate items it
checking system will continue on, attempting to locate items it
incorrectly, generating incorrect output.
needs, and using default configuration files. Many checks will
checking system will continue on, attempting to locate items it
Generic configuration files for this system do not exist. The
incorrectly, generating incorrect output.
checking system will continue on, attempting to locate items it
not be performed, and many that are attempted may function
not be performed, and many that are attempted may function
not be performed, and many that are attempted may function
incorrectly, generating incorrect output.
Generic configuration files for this system do not exist. The
Generic configuration files for this system do not exist. The
needs, and using default configuration files. Many checks will
checking system will continue on, attempting to locate items it
Generic configuration files for this system do not exist. The
incorrectly, generating incorrect output.
needs, and using default configuration files. Many checks will
Generic configuration files for this system do not exist. The
checking system will continue on, attempting to locate items it
not be performed, and many that are attempted may function
Generic configuration files for this system do not exist. The
incorrectly, generating incorrect output.
Generic configuration files for this system do not exist. The
needs, and using default configuration files. Many checks will
needs, and using default configuration files. Many checks will
checking system will continue on, attempting to locate items it
incorrectly, generating incorrect output.
not be performed, and many that are attempted may function
needs, and using default configuration files. Many checks will
not be performed, and many that are attempted may function
not be performed, and many that are attempted may function
needs, and using default configuration files. Many checks will
checking system will continue on, attempting to locate items it
not be performed, and many that are attempted may function
needs, and using default configuration files. Many checks will
checking system will continue on, attempting to locate items it
not be performed, and many that are attempted may function
incorrectly, generating incorrect output.
checking system attempted to continue on, but could not locate
incorrectly, generating incorrect output.
not be performed, and many that are attempted may function
not be performed, and many that are attempted may function
needs, and using default configuration files. Many checks will
not be performed, and many that are attempted may function
incorrectly, generating incorrect output.
Generic configuration files for this system do not exist. The
needs, and using default configuration files. Many checks will
not be performed, and many that are attempted may function
the default configuration files either. This is an installation
incorrectly, generating incorrect output.
incorrectly, generating incorrect output.
incorrectly, generating incorrect output.
checking system attempted to continue on, but could not locate
Generic configuration files for this system do not exist. The
Generic configuration files for this system do not exist. The
needs, and using default configuration files. Many checks will
Generic configuration files for this system do not exist. The
checking system attempted to continue on, but could not locate
incorrectly, generating incorrect output.
checking system attempted to continue on, but could not locate
Generic configuration files for this system do not exist. The
not be performed, and many that are attempted may function
checking system attempted to continue on, but could not locate
incorrectly, generating incorrect output.
Generic configuration files for this system do not exist. The
not be performed, and many that are attempted may function
checking system attempted to continue on, but could not locate
not be performed, and many that are attempted may function
incorrectly, generating incorrect output.
incorrectly, generating incorrect output.
problem. It may be necessary to indicate the location of the
Generic configuration files for this system do not exist. The