In the first part of this series we had a laid the ground work that took us a step further towards understanding the necessity of a full fledged Intrusion Detection system (IDS). A good policy is to mix and match the . . .
In the first part of this series we had a laid the ground work that took us a step further towards understanding the necessity of a full fledged Intrusion Detection system (IDS). A good policy is to mix and match the best to form a security grid that should be difficult enough even for the expert cracker to penetrate. The various IDS systems of interest to us throughout this series will be purely Tripwire and Snort.

Before even installing Tripwire let me walk you through the whole 'LOGICALL process of Installing, Configuring and using Tripwire. To understand the whole logical process lets have a look at the Flowchart as given below. The points given below are courtesy the Red Hat Installation guide. It gives us a clear picture as to how should one go about installing and using Tripwire very briefly.