What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More
Microsoft Business Solutions CRM and IBM Lotus Notes Domino, being... Read More
Not all of us have the luxury of working both... Read More
You might think you don't need a firewall... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Our hosted solution allow you to run your own search... Read More
Fundraising software lets you connect with donors in a way... Read More
We would like to give you pluses and minuses of... Read More
Microsoft Business Solutions CRM proved to be reliable solution in... Read More
All of us know that Microsoft bought former Great Plains... Read More
Many Webmasters have never bothered to view their website's server... Read More
Microsoft Outlook is one of the most widely used software... Read More
The first thing that you will notice about Linux Red... Read More
Ad-Aware and Spybot are probably the two most well known... Read More
An integral part of any quality CRM system is lead... Read More
Microsoft Business Solutions Great Plains is very popular ERP platform... Read More
Following tips help you to learn a software in lesser... Read More
Designing without tables by using CSS layouts is fast becoming... Read More
Former Great Plains Software Dynamics/eEnterprise, and currently Microsoft Business Solutions... Read More
A few months back I really got sick of my... Read More
Preventive Maintenance (PM) is defined as scheduled work done on... Read More
When you think... Read More
If you feel intimidated when someone tries to teach you... Read More
C++ Function templates are those functions which can handle different... Read More
Microsoft Business Solutions Great Plains was historically designed to serve... Read More
insured cleaning company Morton Grove ..Best Software Act! is very popular CRM for small and... Read More
Remember old good days when your company probably had Great... Read More
The term "document management" and "paperless office" is the subject... Read More
Costs of fleet maintenance software can vary widely. It is... Read More
The Software 2005 conference is now a wrap. This conference,... Read More
Microsoft SQL Server is the leader for inexpensive and middle... Read More
The Windows registry is a huge database that ensures normal... Read More
In this small article we will show you the possible... Read More
It's not very often I get excited about a software... Read More
If there still are few unprotected computers left, I haven't... Read More
According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More
This article is the first of a series of articles... Read More
I've been active in the Cisco Certification track for four... Read More
Are you ready? SQL Server 2005, the next-generation data management... Read More
Microsoft CRM customization techniques are very diversified and based on... Read More
Handling character strings in Java is supported through two final... Read More
One of the main reasons business owners and entrepreneurs use... Read More
Microsoft Business Solutions is emerging as very attractive vendor for... Read More
There are so many different programs that clutter up your... Read More
An operating system (abbreviated OS) is essentially the path through... Read More
The various resume software offered, particularly on the internet, can... Read More
Lotus Domino/Notes ? Microsoft Great Plains tandem as ERP with... Read More
With many manufacturing shops heading over seas in favor of... Read More
Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More
... Read More
Software |