What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
The most important benefit of XML is its simplicity. Though... Read More
Manufacturing in the USA is far away down from mid... Read More
Spyware and Adware infest over 90 percent of computers in... Read More
Microsoft PowerPoint has dramatically changed the way in which academic... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
Microsoft Great Plains is one of three Microsoft Business Solutions... Read More
Our opinion is based on our Microsoft Business Solutions Great... Read More
Microsoft Great Plains is main accounting / ERP application... Read More
If you company is small or mid-size special products or... Read More
Microsoft Great Plains and Microsoft CRM become more and more... Read More
I have always had a tendency to focus on the... Read More
It could just be me, but my experiences with document... Read More
People often ask me: What image file formats will Photoshop... Read More
In a previous article, I wrote about OpenOffice... Read More
How to delete the user? This is the first problem... Read More
Language development computer: Computer-based method for aiding language development seems... Read More
I've been active in the Cisco Certification track for four... Read More
Each Industry and market niche has business specific and unique... Read More
Corporate ERP/MRP selection might be tough one, especially considering very... Read More
eStore Advantage allows front-office applications to communicate with back-office business... Read More
Having from five to ten and more favorite screensavers is... Read More
If you copy something from a Web site or elsewhere...... Read More
Pirated software is on the increase and now accounts for... Read More
In order to meet regulatory and corporate compliance requirements reporting... Read More
Microsoft CRM is CRM answer from Microsoft Business Solutions. If... Read More
green cleaning service Lincolnshire ..Customer Relationship Management or CRM is a combination of enterprise... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
The purpose of one of our projects was MS Exchange... Read More
Usually workflow & messaging is realized in CRM and then... Read More
Microsoft Outlook is one of the most widely used software... Read More
Hi, Guys,I believe a lot of programmers are trying to... Read More
The US House of Representatives has recently passed the "Spy... Read More
It???s easy to understand why you might be drawn to... Read More
No matter how much you enjoy your favorite screensavers, sometimes... Read More
This article will not attempt to advocate the use of... Read More
Do you remember that frustrating feeling when you find an... Read More
When it comes to screenplay software each screenwriter needs to... Read More
Let's say that you have a software project that's under... Read More
Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More
Just imagine: you are walking, say, towards your car, and... Read More
Not every software testing project can or should be automated.... Read More
DBxtra is a powerful query and reporting tool that hides... Read More
Viruses and spyware usually show up on your computer one... Read More
Microsoft CRM and IBM Lotus Notes Domino seem to be... Read More
It's all about turn times in the eMedia industry! The... Read More
Running Applications in Compatibility Mode With Windows XP, you can... Read More
Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More
Professional services firm cuts costs and improves productivity with integrated... Read More
We would like first emphasize the change in the paradigm.... Read More
If you've been using MySQL database to store your important... Read More
Software |