What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://KenDennis-RSS.homeip.net/
![]() |
|
![]() |
|
![]() |
|
![]() |
IntroductionPHP can be used for a lot of different things,... Read More
What is 'adware'?Adware is basically software or scripts that are... Read More
When you first think about multicurrency ? you probably have... Read More
2005 ? Back to the Future.What does the future hold?... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
Ad-Aware and Spybot are probably the two most well known... Read More
Executive SummaryAn effective plan for entering, cleaning and updating the... Read More
TCO (Total Cost Ownership) is the buzzword in... Read More
Several software companies design programs for preventive maintenance. Most of... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
I completed an experiment recently. I wanted to find out... Read More
When my daughter was getting into AOL instant messaging (AIM)... Read More
Healthcare facilities such as clinics, hospitals, and biomedical laboratories can... Read More
The intentions of this short tutorial are not to teach... Read More
Need help making sense of algebra? Have algebra lectures in... Read More
SOFTWARE PIRACY We regularly hear reports... Read More
There are many commands that are used in linux on... Read More
Anti-virus software is used to find, remove or fix files... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
If you would like to pick something from Microsoft, or... Read More
Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More
Follow the steps below to quickly design, generate, and deploy... Read More
Microsoft Great Plains and Microsoft CRM become more and more... Read More
Microsoft CRM is new player on the CRM software... Read More
At the end of XX century, in the late 1990th... Read More
It's not very often I get excited about a software... Read More
Bad News - the Threat is Bigger than it SeemedHow... Read More
The various resume software offered, particularly on the internet, can... Read More
In today's business world it's all but impossible to escape... Read More
Words we choose to describe things and phenomena often show... Read More
Microsoft CRM is now on the scene and it is... Read More
Microsoft Business Solutions Great Plains is very popular ERP platform... Read More
Microsoft Great Plains may be recommended for international freight forwarding... Read More
When you visit department stores and see that majority of... Read More
And kill the best layout software in the process of... Read More
IBM Lotus Domino or Microsoft Exchange?The severe competition continues for... Read More
Customer Relationship Management, abbreviated "CRM," is the term for a... Read More
In our opinion, traditional approach when you select ERP/MRP system... Read More
MS CRM is very close to document workflow automation, including... Read More
Microsoft Business Solutions Great Plains fits to majority of horizontal... Read More
At the end of XX century, in the late 1990th... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More
Pirated software is on the increase and now accounts for... Read More
Microsoft CRM is relatively new player on the now becoming... Read More
Our opinion is based on our Microsoft Business Solutions Great... Read More
Following tips help you to learn a software in lesser... Read More
What is 'adware'?Adware is basically software or scripts that are... Read More
Case study: A secretary using Corel WordPerfect 7 is often... Read More
Make-or-Break Factors in Success and ProfitabilityFor quick printers, estimating can... Read More
In part III of this ISDN primer, we learned that... Read More
If you are in a business that passes documents around... Read More
What is installation in the language of technology? Installation... Read More
This article is the first of a series of articles... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Microsoft Business Solutions is now in process of creating so... Read More
Microsoft Business Solutions Great Plains serves to the wide spectrum... Read More
If you've been using MySQL database to store your important... Read More
It is possible that if one avoided all sources of... Read More
Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More
We are in a transition phase in the Managerial Administration... Read More
Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More
Finding the best spyware removers to detect and remove spyware... Read More
Great Plains Inventory Management (IV) module gives your business a... Read More
Great Plains Purchase Order Processing (POP) module makes up one-third... Read More
Many Webmasters have never bothered to view their website's server... Read More
Software |