What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
Do you want to get quality software at a reasonable... Read More
Intro This concise article will tell you in plain English... Read More
C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More
If you company is small or mid-size special products or... Read More
ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
Currently Microsoft Business Solutions is on the way of creating... Read More
Preventive Maintenance (PM) is defined as scheduled work done on... Read More
Homeland security, airport security, Internet security ??" these days we???re... Read More
When Great Plains Software was designing and developing Great Plains... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
This article will not attempt to advocate the use of... Read More
Linux essentials:It's free for download but you have to pay... Read More
1. What determines the software price? Is it Per Seat... Read More
2005 ? Back to the Future.What does the future hold?... Read More
Current Microsoft Business Solutions Great Plains has more that 10... Read More
The fact that a software tester is a most infamous... Read More
We don't think about mainframe software pricing anymore, we just... Read More
During the years of our consulting practice, which comes back... Read More
Microsoft Business Solutions Great Plains has I'd say end user... Read More
Microsoft Business Solutions CRM is now approaching the phase of... Read More
When making a decision to buy any piece of software... Read More
There are two approaches for application integration:? Programmer's approach ?... Read More
GroupwareThe internet is full of 1.5 million to 7 million... Read More
There are many commands that are used in linux on... Read More
recurring housekeeping Highland Park ..Here is some free software tools to help you build... Read More
Several software companies design programs for preventive maintenance. Most of... Read More
Logistics automation is often considered as barcoding extension to Sales... Read More
Task Manager is a Windows system utility that displays thetasks... Read More
This article will not attempt to advocate the use of... Read More
Homeland security, airport security, Internet security ??" these days we???re... Read More
Using professional icons in your application or website can bring... Read More
Whether you are a small consultancy firm, a medium sized... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
MSN messenger is a pretty cool invention. I mean I'm... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
First we had the original Google search that evolved into... Read More
Microsoft Great Plains is main mid-market application from Microsoft Business... Read More
Do you remember that frustrating feeling when you find an... Read More
Current Microsoft Business Solutions Great Plains has more that 10... Read More
So, you've bought a new Macintosh, and now you may... Read More
Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More
Shareware is software that you can try before you buy;... Read More
If you look back to the history, you will see... Read More
Anyone who has ever used Microsoft Word knows that it... Read More
There are certain pluses and minuses in both cases and... Read More
Microsoft Retail Management System serves retail single store as well... Read More
Looking at all the ads which promise to get rid... Read More
I love new technology. I am still ready to wait... Read More
The cornerstone of successful automated office systems is the ability... Read More
Software |