What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
Professional services firm cuts costs and improves productivity with integrated... Read More
Microsoft Office program is a programming tool called Visual Basic... Read More
Spyware is like the new technological nuclear weapon on the... Read More
Costs of fleet maintenance software can vary widely. It is... Read More
Many Webmasters have never bothered to view their website's server... Read More
Vince Lombardi once said that, "The achievements of an organization... Read More
Imagine something that follows you home and sets itself up... Read More
Microsoft Business Solutions CRM and IBM Lotus Notes Domino, being... Read More
Microsoft Business Solutions CRM proved to be reliable solution in... Read More
In our small article we'll consider Microsoft Business Solutions Great... Read More
Around the same time Microsoft made its move with .Net... Read More
Former Great Plains Software Dynamics/eEnterprise and currently Microsoft Business Solutions... Read More
Microsoft SQL Server is the leader for inexpensive and middle... Read More
Document Management or Enterprise Information Management is perhaps one of... Read More
In linux, one of great commands for finding out information... Read More
Have you noticed WordPerfect is gearing up for a comeback... Read More
Document Manager and Version HistoryIn previous articles I have discussed... Read More
Mike Dunville* had a decision to make. As the new... Read More
According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More
There are two approaches for application integration:? Programmer's approach ?... Read More
Currently Microsoft Business Solutions is on the way of creating... Read More
Microsoft Great Plains is main Microsoft Business Solutions accounting package... Read More
In the new era of internet marketing the problem of... Read More
Once a business idea is selected, it is highly recommended... Read More
Language development computer: Computer-based method for aiding language development seems... Read More
whole house cleaning Park Ridge ..Microsoft Business Solutions Great Plains is Dexterity-written application and currently... Read More
In the early days of the personal computer, we're talking... Read More
Finding the best spyware removers to detect and remove spyware... Read More
Microsoft Business Solutions Great Plains version 8.5, 8.0, 7.5, Great... Read More
When you own a small business, time is money. And... Read More
User interfaces and accessibility are some of the most important... Read More
Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More
Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More
Small can be beautiful! Working with Knoppix for the past... Read More
Adobe Photoshop is one of the world's leading graphics editing... Read More
Our opinion is based on our Microsoft Business Solutions Great... Read More
Passwords protect your most sensitive personal, financial and business information.... Read More
MS CRM is very close to document workflow automation, including... Read More
Java has come along a long way. Many would agree... Read More
Hey Guys! Don't raise your eyebrows or fear by hearing... Read More
.Net Framework is a platform or development environment to seamlessly... Read More
At the end of XX century, in the late 1990th... Read More
It is really interesting that a bug can create problem... Read More
Lotus Domino/Notes ? Microsoft Great Plains tandem as ERP with... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More
Formatting and reinstalling windows 98 is very easy if you... Read More
What is Interactive Mapping?Interactive mapping is a visual display medium... Read More
I have always had a tendency to focus on the... Read More
Ad-Aware and Spybot are probably the two most well known... Read More
Software |