What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
When making a decision to buy any piece of software... Read More
Spyware is software or hardware installed on a computer without... Read More
Spyware is like the new technological nuclear weapon on the... Read More
Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More
Microsoft Business Solutions Great Plains has substantial market share and... Read More
What is a Web Database?A web database is a database... Read More
Before September of 1995, Microsoft ignored the Internet because their... Read More
If you have Microsoft Great Plains and support it... Read More
Have you noticed WordPerfect is gearing up for a comeback... Read More
No matter how much you enjoy your favorite screensavers, sometimes... Read More
This article is the third of a series of articles... Read More
Did you ever want to erase everything on your computer?... Read More
The COSMIC FP (function point) software quality metric, is no... Read More
You would like to protect your documents, wouldn't you? Reasons... Read More
Microsoft Business Solutions Great Plains, Solomon, Navision, Axapta, Microsoft CRM... Read More
Microsoft CRM is CRM application, maintained and supported by Microsoft... Read More
Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More
If you have Microsoft Great Plains and support it for... Read More
Accounts payable is just one area of office management where... Read More
Did you ever give a thought to the number of... Read More
A UNIX Shell is in simplest terms, a command line... Read More
What is Spyware?Spyware monitors your surfing habits and sends the... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
As seeing large number of implementations ? in our case... Read More
There are plenty of articles out there about how to... Read More
top rated cleaning service Des Plaines ..Having from five to ten and more favorite screensavers is... Read More
Several software companies design programs for preventive maintenance. Most of... Read More
C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More
Not all of us have the luxury of working both... Read More
It is possible that if one avoided all sources of... Read More
Microsoft CRM is CRM answer from Microsoft Business Solutions. If... Read More
Microsoft Business Solutions Great Plains serves multiple industries in the... Read More
An integral part of any quality CRM system is lead... Read More
The first thing that you will notice about Linux Red... Read More
Microsoft Great Plains is one of the Microsoft Business Solutions... Read More
So, you've bought a new Macintosh, and now you may... Read More
In today's business world it's all but impossible to escape... Read More
Fundraising software lets you connect with donors in a way... Read More
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More
The destruction of the Soviet Union about 15 years ago,... Read More
How many steps does it take you to locate and... Read More
Trying to figure out a stream in banning one email... Read More
Great Plains Inventory Management (IV) module gives your business a... Read More
You might think you don't need a firewall... Read More
If you have Microsoft Great Plains as main accounting and... Read More
Did you ever want to erase everything on your computer?... Read More
It won't matter how effective your WinRunner Team is if... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Costs of fleet maintenance software can vary widely. It is... Read More
Lotus Notes Domino is very efficient in electronic document workflow... Read More
Software |