Difference between revisions of "Integrit"
(New version) |
(Added Debian link) |
||
Line 8: | Line 8: | ||
|Computer languages=C | |Computer languages=C | ||
|Documentation note=User manual available from http://integrit.sourceforge.net/texinfo/integrit.html | |Documentation note=User manual available from http://integrit.sourceforge.net/texinfo/integrit.html | ||
+ | |Accepts cryptocurrency donations=No | ||
|Related projects=RFC,incident.pl,mod_security,Tiger | |Related projects=RFC,incident.pl,mod_security,Tiger | ||
|Keywords=security,checksum,tripwire,system,system security,intrusion detection,intruder,aide,file verification | |Keywords=security,checksum,tripwire,system,system security,intrusion detection,intruder,aide,file verification | ||
Line 15: | Line 16: | ||
|Version download=https://github.com/integrit/integrit/archive/v4.2-rc1.tar.gz | |Version download=https://github.com/integrit/integrit/archive/v4.2-rc1.tar.gz | ||
|Version comment=4.2-rc1 stable released 2014-09-16 | |Version comment=4.2-rc1 stable released 2014-09-16 | ||
− | |Last review by= | + | |Last review by=Bendikker |
− | |Last review date= | + | |Last review date=2018/02/20 |
− | |||
|Submitted date=2011-04-01 | |Submitted date=2011-04-01 | ||
− | |||
|Is GNU=No | |Is GNU=No | ||
|License verified date=2001-02-21 | |License verified date=2001-02-21 | ||
Line 32: | Line 31: | ||
|Role=Maintainer | |Role=Maintainer | ||
|Email=ecashin@users.sourceforge.net | |Email=ecashin@users.sourceforge.net | ||
− | |Resource URL= | + | }} |
+ | {{Resource | ||
+ | |Resource audience=Debian (Ref) | ||
+ | |Resource URL=https://tracker.debian.org/pkg/integrit | ||
}} | }} | ||
{{Resource | {{Resource |
Latest revision as of 12:28, 20 February 2018
Integrit
http://integrit.sourceforge.net/
Intrusion detection system
Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. It creates a database that is a snapshot of the essential parts of your computer system. You put the database somewhere safe, and then use it to make sure that no one has made illicit modifications to the computer system. If there's a break in, you know exactly which files have been modified, added, or removed. Current features include a small memory footprint, a simple and modular design (for a faster learning curve), up-to-date cryptographic algorithms, cascading rulesets, output that can be XML or a human-readable form that can be scanned, an option to reset access times, simultaneous check and update, and a design that is meant for unattended use.
Licensing
License
Verified by
Verified on
Notes
Leaders and contributors
Contact(s) | Role |
---|---|
Ed Cashin | Maintainer |
Resources and communication
Audience | Resource type | URI |
---|---|---|
Debian (Ref) | https://tracker.debian.org/pkg/integrit | |
Bug Tracking,Support | mailto:integrit-users@sourceforge.net | |
Developer | VCS Repository Webview | http://sourceforge.net/cvs/?group_id=15369 |
Developer | mailto:integrit-devel@sourceforge.net |
Software prerequisites
Kind | Description |
---|---|
Weak prerequisite | Boehm garbage collection library |
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.