What is Tripwire?
Tripwire is a form intrusion detection system (IDS) that helps you keep tabs on the integrity of the files on your computer. Quite simply it will help identify files or modifications made to your system in the event someone compromised your system.
How does Tripwire work?
Tripwire works on a pretty easy to understand concept. Basically, when you install Tripwire on your linux box you tell it to scan your system and create a database of checksums and information. Once you have a good reference point or database setup, you then scan your system on a regular basis for modifications to your file system.
Why would I want run a file system integrity software?
If you have ever had your system compromised by a cracker, it's an extremely frustrating time. You never know what they have done, where they have been, or what files they have modified or installed. This type of application helps in the recovery process. Quite often crackers will installed a group of applications on your system called a rootkit. A rootkit overwrites many of your commonly used system files to help hide the tracks of the cracker, or leave a backdoor on your system so he can return at a later date. Often the types of files modified are ones such as ps and netstat. By installing their own version of applications like these they can hide the fact there is additional daemons and processes running the background.
How do I put Tripwire to practical use?
Tripwire can be configured to send you e-mails at a set time interval via Sendmail or SMTP. On small systems it wouldn't be unreasonable to have your system checked several times a day and have Tripwire e-mail you the results. If you don't want the results e-mailed you can store the information in a file for later review. I believe it is a handy tool to have the logs e-mailed to you, so a problem can be quickly identified.
Thought Tripwire won't protect you from hackers, it will help you identify the level of which your system has been compromised and if scanned at regular time intervals should help you reduce the amount of time for which your system has been compromised. If your system has been broken in to, then the best thing to do is isolate the machine from the network and rebuilt it from know good backups and try to determine the method of entry.
Ken Dennis
http://KenDennis-RSS.homeip.net/
![]() |
|
![]() |
|
![]() |
|
![]() |
It's no secret that software companies operate in a very... Read More
The Windows Indexing Service provides you with the ability to... Read More
While I was preparing some personal background information for a... Read More
Microsoft Great Plains serves majority of US based horizontal and... Read More
Costs of fleet maintenance software can vary widely. It is... Read More
Whether you need to close a sale, gather end-user feedback,... Read More
The intuitive algorithm.Roger Penrose considered it impossible. Thinking could never... Read More
Stealing company information used to be the specialty of spies... Read More
As Mozilla Firefox nears 10% market share, with well over... Read More
Today's business world is fast-paced. No matter what it is... Read More
A few months back I really got sick of my... Read More
In our small article we'll consider Microsoft Business Solutions Great... Read More
1. What determines the software price? Is it Per Seat... Read More
Spyware is software or hardware installed on a computer without... Read More
If there still are few unprotected computers left, I haven't... Read More
Microsoft Business Solutions Navision is main ERP application for European,... Read More
Running Applications in Compatibility Mode With Windows XP, you can... Read More
Hey Guys! Don't raise your eyebrows or fear by hearing... Read More
Have you ever noticed that when you look at your... Read More
Anti-virus software is used to find, remove or fix files... Read More
This short paper will expand on two key reasons to... Read More
While I was in college, if you would have asked... Read More
TikiWiki is open source software - it is written in... Read More
Software development is a risky business.Many software developers are barely... Read More
Customer Relationship Management or CRM is a combination of enterprise... Read More
In linux, one of great commands for finding out information... Read More
How many steps does it take you to locate and... Read More
Microsoft Great Plains and Microsoft CRM become more and more... Read More
Crystal Reports is the most flexible tool on the market... Read More
The purpose of Project Management Software is to provide an... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
It is now common thing when large corporation selects mid-market... Read More
Shareware is software that you can try before you buy;... Read More
Introduction: The creating of a computer program involves a number... Read More
Itâ??s easy to understand why you might be drawn to... Read More
When it comes to screenplay software each screenwriter needs to... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
During the years of our consulting practice, which comes back... Read More
Finally, you have some time to personalize your desktop with... Read More
If you have been using the Internet for any amount... Read More
Whether you are an experienced web programmer or a complete... Read More
You might think you don't need a firewall... Read More
Since its release in 1987, QuarkXpress had made an immediate... Read More
The cornerstone of successful automated office systems is the ability... Read More
Microsoft Business Solutions Great Plains as new ERP for multinational... Read More
So, why should you use any O/R mapping tool? I... Read More
This tutorial covers OLAP solutions used by Data warehouses and... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
As Mozilla Firefox nears 10% market share, with well over... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
When reading an article where some term is used often,... Read More
Microsoft-Outlook is a pretty amazing program. So much more than... Read More
When Windows fails to boot it is normally caused by... Read More
You would like to protect your documents, wouldn't you? Reasons... Read More
Designing without tables by using CSS layouts is fast becoming... Read More
CD and DVD replication is a process that works by... Read More
After seeing many people complain about their weak Internet security... Read More
Microsoft has never released a service pack for Windows98 SE,... Read More
Microsoft Great Plains is one of three Microsoft Business Solutions... Read More
There are so many different programs that clutter up your... Read More
Are you a database professional? Do you work with a... Read More
Remember old good days when your company probably had Great... Read More
The adware and spyware definitions list is very long. But... Read More
Case study: A secretary using Corel WordPerfect 7 is often... Read More
Spyware and Adware infest over 90 percent of computers in... Read More
Software |