What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
The purpose of one of our projects was MS Exchange... Read More
The software giants don't do everything and don't always produce... Read More
C++ Function templates are those functions which can handle different... Read More
Most people understand that the "hardware" part of their computer... Read More
As you probably know, when Microsoft purchased Great Plains Software... Read More
What is RAID RECOVERY?RAID stands for Redundant Array of Inexpensive... Read More
.NET platform does not support multiple inheritance. Do not confuse... Read More
There are several kinds of software piracy. The bottom line... Read More
Formatting and reinstalling windows 98 is very easy if you... Read More
1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More
One of the main reasons business owners and entrepreneurs use... Read More
ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief... Read More
Microsoft Business Solutions Great Plains serves multiple industries in the... Read More
How would you like to prevent spyware and adware from... Read More
Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More
Let us give you - developer some hints in the... Read More
While Adobe is the most known maker of PDF tools,... Read More
Introduction: The creating of a computer program involves a number... Read More
Fleet Maintenance Management is a critical position in any company... Read More
Microsoft Business Solutions Great Plains, former Great Plains Software eEnterprise,... Read More
I completed an experiment recently. I wanted to find out... Read More
A UNIX Shell is in simplest terms, a command line... Read More
Microsoft Business Solutions ? Great Plains is designed to meet... Read More
Logistics automation is often considered as barcoding extension to Sales... Read More
This article illustrates the best practices to improve the performance... Read More
Airbnb cleaning service Bannockburn ..Sticky Noteshttp://www.deprice.com/stickynote.htmWith StickyNote 9.0, you can create beautiful 3D notes... Read More
It is really interesting that a bug can create problem... Read More
Every day millions of new web documents emerge on the... Read More
I've been active in the Cisco Certification track for four... Read More
Logistics automation is often considered as barcoding extension to Sales... Read More
In the real world a "fire wall" is a fireproof... Read More
Running Applications in Compatibility Mode With Windows XP, you can... Read More
2005 ? Back to the Future.What does the future hold?... Read More
Fortunately one of the most common reasons cited for the... Read More
Usually, the easiest way to tell you have spyware is... Read More
Before being able to choose a secure Internet communication system,... Read More
Almost all new and major brand of PCs come with... Read More
Microsoft Business Solutions Navision serves both European and American megamarkets.... Read More
IBM Lotus Notes with Domino email server is traditional document... Read More
Handling character strings in Java is supported through two final... Read More
Our hosted solution allow you to run your own search... Read More
Microsoft Great Plains is main Microsoft Business Solutions product, targeted... Read More
Microsoft Business Solutions Great Plains is very popular ERP/MRP applications... Read More
The first topic we are going to discuss... Read More
If you have Microsoft Great Plains and support it... Read More
Microsoft Business Solutions Great Plains, Navision, Axapta, Solomon and CRM... Read More
Spyware is software or hardware installed on a computer without... Read More
Stealing company information used to be the specialty of spies... Read More
If someone entered your home, uninvited and installed numerous cameras... Read More
In order to meet regulatory and corporate compliance requirements reporting... Read More
Software |