Using tiger for security audit and intrusion detection | Dark Hacker News