What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More
2005 ? Back to the Future.What does the future hold?... Read More
Several years ago Microsoft purchased Great Plains Software, then Navision... Read More
It won't matter how effective your WinRunner Team is if... Read More
Just when you thought you were Web savvy, one more... Read More
One of the main reasons business owners and entrepreneurs use... Read More
Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More
Microsoft Business Solutions Great Plains serves multiple industries in the... Read More
Document Management or Enterprise Information Management is perhaps one of... Read More
Did you ever give a thought to the number of... Read More
Microsoft Business Solutions ? Great Plains has captured the US... Read More
Background: For many organizations like ours, the interim target of... Read More
Microsoft CRM is now on the scene and it is... Read More
The Windows Indexing Service provides you with the ability to... Read More
Microsoft Business Solutions Great Plains is mid and even corporate... Read More
How to delete the user? This is the first problem... Read More
In order to meet regulatory and corporate compliance requirements reporting... Read More
Hey Guys! Don't raise your eyebrows or fear by hearing... Read More
Follow the steps below to quickly design, generate, and deploy... Read More
Microsoft Great Plains as ERP and Microsoft CRM as... Read More
Finally, you have some time to personalize your desktop with... Read More
Well, even if the combination might look very unusual, we... Read More
Spyware, what it is and what it does. Basically, spyware... Read More
Just stress testing one of the latest Linux distributions. Been... Read More
Internet worms. Is your PC infected?If your computer has become... Read More
after renovation cleaning Highland Park ..Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More
When you visit department stores and see that majority of... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
The purpose of Project Management Software is to provide an... Read More
eStore Advantage allows front-office applications to communicate with back-office business... Read More
Finally, you have some time to personalize your desktop with... Read More
Currently Microsoft Business Solutions is on the way of creating... Read More
Features Additionally, Vista will include many other new features.Aero Vista... Read More
Hey Guys! Don't raise your eyebrows or fear by hearing... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
I completed an experiment recently. I wanted to find out... Read More
This article illustrates the best practices to improve the performance... Read More
We are in a transition phase in the Managerial Administration... Read More
In part III of this ISDN primer, we learned that... Read More
A wiki is an editable text-based website. But you don't... Read More
Java has come along a long way. Many would agree... Read More
I've been active in the Cisco Certification track for four... Read More
XML parser is a software module to read documents and... Read More
Every organization which creates collaborative documents, whether they are budgets,... Read More
This article is the third of a series of articles... Read More
FTP stands for "file transfer protocol". FTP is basically a... Read More
When Windows fails to boot it is normally caused by... Read More
Microsoft Great Plains is now targeting large and midsize businesses... Read More
Simply put, fleet maintenance allows companies to monitor and maintain... Read More
One of the things we can be as certain of... Read More
Software |