what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 56 of 56 RSS Feed

Files

afick-1.6-0.tgz
Posted Jan 8, 2004
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Two new options were added - One detects changed files during program scan and the other is to display CPU stats. Bugs were fixed.
tags | tool, integrity
systems | windows, unix
SHA-256 | ae526f6650d9c0196964d717e60afd17c16aa9578ea1efe526350d8ed132e695
afick-1.5-0.tgz
Posted Dec 14, 2003
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: A new directive (exclude_suffix) has been added, the tk interface has been improved with a progress bar, and some bugs have been repaired.
tags | tool, integrity
systems | windows, unix
SHA-256 | 29bd843065eb80f97412ba332da5f2b486df98084b60b42a6a3c0686998ac39e
afick-1.4-0.tgz
Posted Nov 21, 2003
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Added an auto-control to check afick changes, various code tuning and bug fixes.
tags | tool, integrity
systems | windows, unix
SHA-256 | a9418042c3490f68bb352a42942e86fffb10c67a8e8be9dc065aa60b8d9a1ebc
afick-1.3-0.tgz
Posted Oct 17, 2003
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

tags | tool, integrity
systems | windows, unix
SHA-256 | 319c038feea039d99bc264bf7faf901520c708b0ff8141263a79afba5ce9e2f0
osiris-1.3.0.tar.gz
Posted Feb 24, 2000
Authored by The Schmoo Group | Site schmoo.com

Osiris catalogs specified directories of files, including MD5 hashes, modification dates, and file attributes into a specified database and/or to STDOUT as directed. The second program, scale, compares two such databases against each other. It will output, either to a file or STDOUT, any differences it finds between the two catalogs including missing or additional files, differing MD5 hashes, modification dates, and file attributes. Together, the two programs give an administrator the tools to follow changes in files on a server or workstation. This keeps an administrator apprised of possible attacks and/or nasty little trojans.

Changes: MacOSX support, addition of Haval and SHA hashes, a counter to let you know how far along osiris is when indexing files.
tags | tool, trojan, integrity
SHA-256 | c48763a329c092fdd7ae1e56352b3f3bbf1abf79d7b4aa0a4fbf94e4fdde0c38
osiris-1.2.0.tar.gz
Posted Jan 31, 2000
Authored by The Schmoo Group | Site schmoo.com

Osirus file integrity checker, Unix version. Osiris catalogs specified directories of files, including MD5 hashes, modification dates, and file attributes into a specified database and/or to STDOUT as directed. The second program, scale, compares two such databases against each other. It will output, either to a file or STDOUT, any differences it finds between the two catalogs including missing or additional files, differing MD5 hashes, modification dates, and file attributes. Together, the two programs give an administrator the tools to follow changes in files on a server or workstation. This keeps an administrator apprised of possible attacks and/or nasty little trojans.

Changes: The new version has a 50% increase in speed due to code optimization. 1.2.0 logs all SUID/SGID files and notes any changes in SUID/SGID status from previous indices. A few miscellaneous flags have been added to make Osiris cron-friendly.
tags | tool, trojan, integrity
systems | unix
SHA-256 | e117cd4982447361dd2d6be2535f7c88bb8a5103588d77470956f97da012861f
Page 3 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Sam Bankman-Fried's Sentencing Hearing Over FTX Fraud Begins Today
Posted Mar 28, 2024

tags | headline, fraud, cryptography
Sellafield To Be Prosecuted For IT Security Offenses
Posted Mar 28, 2024

tags | headline, government, britain, flaw
These 17,000 Microsoft Exchange Servers Are A Ticking Time Bomb
Posted Mar 28, 2024

tags | headline, microsoft, email, flaw
Analyse, Hunt, And Classify Malware Using .NET Metadata
Posted Mar 27, 2024

tags | headline, hacker, malware, microsoft
VPN Apps On Google Play Turn Android Devices Into Proxies
Posted Mar 27, 2024

tags | headline, privacy, phone, flaw, google
Fortinet FortiClient EMS SQL Injection Flaw Exploited In The Wild
Posted Mar 27, 2024

tags | headline, hacker, flaw
Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year
Posted Mar 27, 2024

tags | headline, flaw, google, zero day
Ray AI Framework Vulnerability Exploited To Hack Hundreds Of Clusters
Posted Mar 27, 2024

tags | headline, hacker, flaw
Justice Dept Indicts 7 Accused In 14 Year Long Hack Campaign By Chinese Government
Posted Mar 26, 2024

tags | headline, hacker, government, usa, china, cyberwar, spyware, backdoor
Ransomware Can Mean Life Or Death At Hospital, But DEF CON Hackers Have A Plan
Posted Mar 26, 2024

tags | headline, hacker, malware, conference, cryptography
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close