What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
Manufacturing in the USA is far away down from mid... Read More
Some introduction into Great Plains Software products, now Microsoft Business... Read More
As Mozilla Firefox nears 10% market share, with well over... Read More
Microsoft Business Solutions Great Plains as new ERP for multinational... Read More
We would like first emphasize the change in the paradigm.... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
When you need a phone number, you do a quick... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
In this short FAQ style article we would like to... Read More
Shareware has been fighting the stigma of being misunderstood for... Read More
The purpose of Project Management Software is to provide an... Read More
A wiki is an editable text-based website. But you don't... Read More
As you probably know, when Microsoft purchased Great Plains Software... Read More
Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More
In the previous ISDN article, we looked at how and... Read More
With thousands of web pages added to the Net every... Read More
Great Plains Accounting, accounting package for mid-size and small companies... Read More
While Adobe is the most known maker of PDF tools,... Read More
After seeing many people complain about their weak Internet security... Read More
Usually, the easiest way to tell you have spyware is... Read More
In this small article we will show you the possible... Read More
Microsoft Outlook is one of the most widely used software... Read More
We would like to give you several situations, when you... Read More
Microsoft Business Solutions Great Plains is very popular ERP platform... Read More
IBM Lotus Domino or Microsoft Exchange?The severe competition continues for... Read More
reliable home cleaners Buffalo Grove ..Healthcare facilities such as clinics, hospitals, and biomedical laboratories can... Read More
In order to meet regulatory and corporate compliance requirements reporting... Read More
Formatting and reinstalling windows 98 is very easy if you... Read More
An operating system (abbreviated OS) is essentially the path through... Read More
Follow the steps below to quickly design, generate, and deploy... Read More
One day, you suddenly realize that your computer started to... Read More
With the advent of 'Service Pack 2' for Windows XP... Read More
eStore Advantage allows front-office applications to communicate with back-office business... Read More
For those who still don't know, Microsoft Publisher helps computer... Read More
We would like to give you pluses and minuses of... Read More
Running Applications in Compatibility Mode With Windows XP, you can... Read More
MS CRM is very close to document workflow automation, including... Read More
1. What determines the software price? Is it Per Seat... Read More
Handling character strings in Java is supported through two final... Read More
Some introduction into Great Plains Software products, now Microsoft Business... Read More
1. With mapping software you can create a report that... Read More
Do you want to get quality software at a reasonable... Read More
How would you like to prevent spyware and adware from... Read More
I love new technology. I am still ready to wait... Read More
Not every software testing project can or should be automated.... Read More
Looking at all the ads which promise to get rid... Read More
Mike Dunville* had a decision to make. As the new... Read More
Microsoft Business Solutions Great Plains has Project Accounting module where... Read More
Do you remember that frustrating feeling when you find an... Read More
As you probably know, when Microsoft purchased Great Plains Software... Read More
Software |