On Saturday 21 June 2003 10:24 am, Dan MacNeil wrote:
> Doing an apt-cache search on "tripwire" and "intrusion"
>
> I came up with these packages:
>
> aide
> bsign
> fcheck
> integrit
>
> I've googled around a bit but haven't found much evaluation...
>
> Does anyone have opi
On Saturday 21 June 2003 10:24 am, Dan MacNeil wrote:
> Doing an apt-cache search on "tripwire" and "intrusion"
>
> I came up with these packages:
>
> aide
> bsign
> fcheck
> integrit
>
> I've googled around a bit but haven't found much evaluation...
>
> Does anyone have opi
> We're setting up 3 new servers and I want to have an
> intrusion detection database.
>
> Ease of use is much, much more important then perfect security.
>
> A while back we installed tripwire from tarball on one system
> but let it get out of date. At another jo
> We're setting up 3 new servers and I want to have an
> intrusion detection database.
>
> Ease of use is much, much more important then perfect security.
>
> A while back we installed tripwire from tarball on one system
> but let it get out of date. At another jo
- Original Message -
From: "Dan MacNeil" <[EMAIL PROTECTED]>
To:
Sent: Sunday, June 22, 2003 3:24 AM
Subject: review host based intrusion detection sytems
> Does anyone have opinions on them?
>
> We're setting up 3 new servers and I want to have an
- Original Message -
From: "Dan MacNeil" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Sunday, June 22, 2003 3:24 AM
Subject: review host based intrusion detection sytems
> Does anyone have opinions on them?
>
> We're setting up 3 new ser
ting up 3 new servers and I want to have an intrusion
detection database.
Ease of use is much, much more important then perfect security.
A while back we installed tripwire from tarball on one system but let it
get out of date. At another job, they had a homegrown system that is very
cumbersome,--
ting up 3 new servers and I want to have an intrusion
detection database.
Ease of use is much, much more important then perfect security.
A while back we installed tripwire from tarball on one system but let it
get out of date. At another job, they had a homegrown system that is very
cumbersome,--
Which particular hack regularly creates a user called r and another called
re on a system?
Where can I get the scripts, and I'll figure out whats needed to make them
stop.
thanks.
9 matches
Mail list logo