What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
Microsoft SQL Server is the leader for inexpensive and middle... Read More
One of the things we can be as certain of... Read More
Corporate ERP/MRP selection might be tough one, especially considering very... Read More
The major reason I recommend getting your hands on real... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
The destruction of the Soviet Union about 15 years ago,... Read More
With this small article we are continuing Microsoft Business Solutions... Read More
The purpose of Project Management Software is to provide an... Read More
Once upon a time not so long ago, there was... Read More
Case study: A secretary using Corel WordPerfect 7 is often... Read More
With any good luck and a good amount of hard... Read More
Microsoft CRM has built-in conversion tool, however you should probably... Read More
Every day millions of new web documents emerge on the... Read More
Task Manager is a Windows system utility that displays thetasks... Read More
Designing without tables by using CSS layouts is fast becoming... Read More
C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More
If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More
Sometimes your PC will start acting strange for no apparent... Read More
Customer Relationship Management (CRM) is a strategy and processes used... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
Beginning with Domino version R4 it has integration with the... Read More
We've all seen the ads on TV for Netzero 3G.... Read More
With so many Microsoft Windows related viruses, errors, and other... Read More
According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More
Just stress testing one of the latest Linux distributions. Been... Read More
Green Bay Hummer H2 SUV rentals ..It's all about turn times in the eMedia industry! The... Read More
Many Webmasters have never bothered to view their website's server... Read More
If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More
I provide, here clear explanations and a count of function... Read More
This article will not attempt to advocate the use of... Read More
Great Plains Accounting, accounting package for mid-size and small companies... Read More
As we could imagine, if you are reading this article... Read More
Midsize business or non-profit organization should decide if one-vendor solution... Read More
Mike Dunville* had a decision to make. As the new... Read More
Microsoft Great Plains is main mid-market application from Microsoft Business... Read More
Need software to record your voice, streaming audio or musical... Read More
SyncUp, a file synchronizer is designed to assist the home... Read More
In the previous ISDN article, we looked at how and... Read More
Microsoft CRM is CRM application, maintained and supported by Microsoft... Read More
Vince Lombardi once said that, "The achievements of an organization... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
IBM Lotus Notes Domino and Microsoft CRM (Client Relation Management)... Read More
Anti-virus software is used to find, remove or fix files... Read More
Most people don't use Photoshop to its fullest capabilities. Here... Read More
Are you a database professional? Do you work with a... Read More
Microsoft Great Plains serves the wide spectrum of horizontal markets.... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
The vast majority of us will have, at some point,... Read More
Sales are all about leverage, because there is only so... Read More
This article is the third of a series of articles... Read More
Software |