Difference between revisions of "Integrit"
(Created page with "{{Entry |Name=Integrit |Short description=Intrusion detection system |Full description=Integrit is an alternative to file integrity verification programs like tripwire and aide. ...") |
(New version) |
||
Line 3: | Line 3: | ||
|Short description=Intrusion detection system | |Short description=Intrusion detection system | ||
|Full description=Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. It creates a database that is a snapshot of the essential parts of your computer system. You put the database somewhere safe, and then use it to make sure that no one has made illicit modifications to the computer system. If there's a break in, you know exactly which files have been modified, added, or removed. Current features include a small memory footprint, a simple and modular design (for a faster learning curve), up-to-date cryptographic algorithms, cascading rulesets, output that can be XML or a human-readable form that can be scanned, an option to reset access times, simultaneous check and update, and a design that is meant for unattended use. | |Full description=Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. It creates a database that is a snapshot of the essential parts of your computer system. You put the database somewhere safe, and then use it to make sure that no one has made illicit modifications to the computer system. If there's a break in, you know exactly which files have been modified, added, or removed. Current features include a small memory footprint, a simple and modular design (for a faster learning curve), up-to-date cryptographic algorithms, cascading rulesets, output that can be XML or a human-readable form that can be scanned, an option to reset access times, simultaneous check and update, and a design that is meant for unattended use. | ||
+ | |Homepage URL=http://integrit.sourceforge.net/ | ||
|User level=none | |User level=none | ||
− | |||
|Component programs=i-viewdb,i-ls,integrit | |Component programs=i-viewdb,i-ls,integrit | ||
− | |||
− | |||
|Computer languages=C | |Computer languages=C | ||
|Documentation note=User manual available from http://integrit.sourceforge.net/texinfo/integrit.html | |Documentation note=User manual available from http://integrit.sourceforge.net/texinfo/integrit.html | ||
− | |||
− | |||
− | |||
− | |||
|Related projects=RFC,incident.pl,mod_security,Tiger | |Related projects=RFC,incident.pl,mod_security,Tiger | ||
|Keywords=security,checksum,tripwire,system,system security,intrusion detection,intruder,aide,file verification | |Keywords=security,checksum,tripwire,system,system security,intrusion detection,intruder,aide,file verification | ||
− | | | + | |Version identifier=4.2-rc1 |
− | |Last review by= | + | |Version date=2014/09/16 |
− | |Last review date= | + | |Version status=stable |
+ | |Version download=https://github.com/integrit/integrit/archive/v4.2-rc1.tar.gz | ||
+ | |Version comment=4.2-rc1 stable released 2014-09-16 | ||
+ | |Last review by=Alejandroindependiente | ||
+ | |Last review date=2017/02/27 | ||
|Submitted by=Database conversion | |Submitted by=Database conversion | ||
|Submitted date=2011-04-01 | |Submitted date=2011-04-01 | ||
− | | | + | |Status= |
− | | | + | |Is GNU=No |
− | | | + | |License verified date=2001-02-21 |
− | | | + | }} |
+ | {{Project license | ||
+ | |License=GPLv2orlater | ||
+ | |License verified by=Janet Casey | ||
|License verified date=2001-02-21 | |License verified date=2001-02-21 | ||
− | |||
}} | }} | ||
{{Person | {{Person | ||
+ | |Real name=Ed Cashin | ||
|Role=Maintainer | |Role=Maintainer | ||
− | |||
|Email=ecashin@users.sourceforge.net | |Email=ecashin@users.sourceforge.net | ||
|Resource URL= | |Resource URL= | ||
Line 53: | Line 53: | ||
|Security=system | |Security=system | ||
|Use=security | |Use=security | ||
− | |||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
{{Software prerequisite | {{Software prerequisite | ||
Line 63: | Line 58: | ||
|Prerequisite description=Boehm garbage collection library | |Prerequisite description=Boehm garbage collection library | ||
}} | }} | ||
+ | {{Featured}} |
Revision as of 15:41, 27 February 2017
Integrit
http://integrit.sourceforge.net/
Intrusion detection system
Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. It creates a database that is a snapshot of the essential parts of your computer system. You put the database somewhere safe, and then use it to make sure that no one has made illicit modifications to the computer system. If there's a break in, you know exactly which files have been modified, added, or removed. Current features include a small memory footprint, a simple and modular design (for a faster learning curve), up-to-date cryptographic algorithms, cascading rulesets, output that can be XML or a human-readable form that can be scanned, an option to reset access times, simultaneous check and update, and a design that is meant for unattended use.
Licensing
License
Verified by
Verified on
Notes
Leaders and contributors
Contact(s) | Role |
---|---|
Ed Cashin | Maintainer |
Resources and communication
Audience | Resource type | URI |
---|---|---|
Debian (Ref) | https://tracker.debian.org/pkg/integrit | |
Bug Tracking,Support | mailto:integrit-users@sourceforge.net | |
Developer | VCS Repository Webview | http://sourceforge.net/cvs/?group_id=15369 |
Developer | mailto:integrit-devel@sourceforge.net |
Software prerequisites
Kind | Description |
---|---|
Weak prerequisite | Boehm garbage collection library |
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.