What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
Are you a whiz at calculating financial information? Not the... Read More
Now is the time to look at an alternative to... Read More
Microsoft Great Plains, former Great Plains Software Dynamics / eEnterprise... Read More
Spyware and Adware infest over 90 percent of computers in... Read More
IBM Lotus Notes with Domino email server is traditional document... Read More
When reading an article where some term is used often,... Read More
It could just be me, but my experiences with document... Read More
Microsoft Business Solutions ? Great Plains has captured the US... Read More
As Mozilla Firefox nears 10% market share, with well over... Read More
The java programming language is becoming more and more popular... Read More
When you think... Read More
When you visit department stores and see that majority of... Read More
Microsoft Business Solutions Great Plains has several options to enable... Read More
C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More
Think of this, first we had the HAM Radio, then... Read More
Before September of 1995, Microsoft ignored the Internet because their... Read More
Currently Microsoft Business Solutions is on the way of creating... Read More
I have always regretted how Microsoft price gouges and rips... Read More
MSN messenger is a pretty cool invention. I mean I'm... Read More
Small can be beautiful! Working with Knoppix for the past... Read More
XML Server can be a Web Server that stores the... Read More
Microsoft Business Solutions Great Plains and MS CRM (client relation... Read More
Almost all new and major brand of PCs come with... Read More
Viruses and spyware usually show up on your computer one... Read More
Since Version 8.0 Microsoft Business Solutions Great Plains & Great... Read More
disinfecting cleaning services Winnetka ..Whether you need to close a sale, gather end-user feedback,... Read More
In today's business world it's all but impossible to escape... Read More
Words we choose to describe things and phenomena often show... Read More
In the previous ISDN article, we looked at how and... Read More
Microsoft Business Solutions Great Plains is written in Great Plains... Read More
Remember nice and prosperous Clinton era? When you implemented innovative... Read More
The title of "software engineer" has got to be among... Read More
What is a Web Database?A web database is a database... Read More
For those who are unclear on the differences between the... Read More
Does Microsoft care for WebmastersIt's always been a problem with... Read More
Siebel is traditional CRM market leader, however and mostly due... Read More
Microsoft CRM is winning market share step-by-step from such the... Read More
TCO (Total Cost Ownership) is the buzzword in... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Former Great Plains Software Dynamics/eEnterprise, and currently Microsoft Business Solutions... Read More
What is RAID RECOVERY?RAID stands for Redundant Array of Inexpensive... Read More
Remember old good days when your company probably had Great... Read More
(1) Avoid using the same variable again and again for... Read More
If you've been using MySQL database to store your important... Read More
Google Inc. has launched a new software package that allows... Read More
Microsoft Great Plains is main Microsoft Business Solutions accounting package... Read More
Mapping Software Improves Data VisualizationFrom the outset, it is important... Read More
Microsoft Business Solutions CRM is web-based CRM application, deploying all... Read More
Do you want to get quality software at a reasonable... Read More
An integral part of any quality CRM system is lead... Read More
Software |