What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://kendennis-rss.homeip.net/
Document Management or Enterprise Information Management is perhaps one of... Read More
Program Flow is what you think it is. How the... Read More
The stakes are high when considering security, privacy, and savings,... Read More
Is Photoshop CS2 worth the upgrade? You bet it is!... Read More
IBM Lotus Notes Domino and Microsoft CRM (Client Relation Management)... Read More
The cornerstone of successful automated office systems is the ability... Read More
It is now common thing when large corporation selects mid-market... Read More
For those who still don't know, Microsoft Publisher helps computer... Read More
Current Microsoft Business Solutions Great Plains has more that 10... Read More
What is installation in the language of technology? Installation... Read More
Microsoft Business Solutions is now in process of creating so... Read More
In the Clinton era the status quo was simple: you... Read More
Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More
If you copy something from a Web site or elsewhere...... Read More
Disclaimer: All the thoughts expressed are my views only! Your... Read More
Words we choose to describe things and phenomena often show... Read More
#5 All your hardware components like Printers, PCs etc come... Read More
Microsoft Great Plains ? ERM from Microsoft Business Solutions and... Read More
DBxtra goes ASPGetting to the information hidden within corporate databases... Read More
Since technology changes so quickly, it is hard to begin... Read More
Introduction to C++Why Learn C++?C++ may at first seem like... Read More
Three highly respected names in Human Resources have joined forces... Read More
Before September of 1995, Microsoft ignored the Internet because their... Read More
Microsoft Business Solutions Small Business Manager is scaled down Great... Read More
Microsoft Great Plains, Navision, Solomon and Axapta are Microsoft Business... Read More
limousine Chicago airport Arthur ..It is really interesting that a bug can create problem... Read More
IBM Lotus Notes with Domino email server is traditional document... Read More
RSS (Really Simple Syndication) is a way for a site... Read More
Microsoft Great Plains is main mid-market application from Microsoft Business... Read More
There are two major WYSIWYG(What You See Is What You... Read More
Learning how to program software seems like a daunting task... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
How would you like to prevent spyware and adware from... Read More
Do you want to get quality software at a reasonable... Read More
Corporate ERP/MRP selection might be tough one, especially considering very... Read More
We will base our prognosis on our Microsoft Business Solutions... Read More
Not every software testing project can or should be automated.... Read More
With the advent of 'Service Pack 2' for Windows XP... Read More
What is IRC?IRC is Internet Relay Chat. It is a... Read More
Are you a database professional? Do you work with a... Read More
When you visit department stores and see that majority of... Read More
Is your PC is slow and wimpy? Then you need... Read More
This article is the fourth of a series of articles... Read More
Remember nice and prosperous Clinton era? When you implemented innovative... Read More
With this small article we are continuing Microsoft Business Solutions... Read More
Imagine something that follows you home and sets itself up... Read More
It's not very often I get excited about a software... Read More
Stealing company information used to be the specialty of spies... Read More
We've all seen the ads on TV for Netzero 3G.... Read More
As you probably know, when Microsoft purchased Great Plains Software... Read More
Software |