tripwire-open-source VS book

Compare tripwire-open-source vs book and see what are their differences.

book

A FOSS hackers guide to the CLI, privacy, security, self hosting, and the internet. (by hashbang)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
tripwire-open-source book
5 3
801 68
0.0% -
0.0 0.0
almost 3 years ago 11 months ago
C++ Dockerfile
GNU General Public License v3.0 only -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

tripwire-open-source

Posts with mentions or reviews of tripwire-open-source. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-15.
  • MDSHA1 for security
    1 project | /r/Defcon | 15 Jun 2023
    Tripwire's open source distribution specifically. It supports SHA1, MD5, HAVAL and CRC32. All individually are not cryptographically secure but the combination of them makes it unlikely that an attacker could modify a single file in such a way as to find a collision on multiple hashes.
  • Ask HN: How do you trust that your personal machine is not compromised?
    6 projects | news.ycombinator.com | 15 Jan 2023
    I'm looking at current options, this[1] for example is packaged for Fedora, which is my daily driver.

    But then I got to thinking, if I'm going to do a clean Fedora install for the tripwire (it's best practice) I might as well try Fedora Silverblue[2]. Silverblue is an immutable system so it kinda makes a tripwire less useful because no one can change any system files. Only files in your home directory and /etc can be modified statefully.

    1. https://github.com/Tripwire/tripwire-open-source/

    2. https://silverblue.fedoraproject.org/

  • Server Hardening
    4 projects | /r/Proxmox | 22 Dec 2022
    Active Measures - Includes (IDS/IPS) such as open-source Suricata or Snort on pfSense, and File Integrity Monitoring (FIM), such as the commercial Tripwire and dated, open-source Tripwire, or the open-source Wazuh installed on servers. These can be combined into a Security Information and Event Management (SIEM) system like the open-source solution, Security Onion. Wazuh itself has evolved into a SIEM.
  • Recent Apple Updates Leading to WiFi Issues
    4 projects | news.ycombinator.com | 8 Dec 2022
    This reminds me of the general idea behind [Tripwire](https://github.com/Tripwire/tripwire-open-source) for macOS. I last looked into it back in 2005 (we went with other approaches), so it may have changed since then, but it monitors for changes, and allow you to revert them or deploy them to other computer (as in a lab, etc).
  • Please help me to make rootkit detector.
    1 project | /r/linuxquestions | 3 Feb 2021
    Yes, tripwire. https://github.com/Tripwire/tripwire-open-source

book

Posts with mentions or reviews of book. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-15.
  • Ask HN: How do you trust that your personal machine is not compromised?
    6 projects | news.ycombinator.com | 15 Jan 2023
    > For details on how I use Qubes specifically see: https://github.com/hashbang/book/blob/master/content/docs/se...

    How is this not a contradiction?

    >6. Manual PRIVILEGED SYSTEM mutations MUST be approved, witnessed, and recorded

    >7. PRIVILEGED SYSTEM mutatations MUST be automated and repeatable via code

  • Ask HN: What are you doing to secure your software supply chain?
    2 projects | news.ycombinator.com | 16 Dec 2021
    Some of my clients pay to do double review of all dependencies.

    Others go as far as distributed deterministic builds to ensure CI/CD systems themselves are not compromised.

    Here are the latest public iterations of my recommendations.

    https://github.com/talos-systems/rfcs/blob/main/001-software...

    Also here are complimentary practices to ensure the production engineers that must have access to CI/CD systems etc don't themselves become a weak link in the supply chain (which happens a -lot-).

    https://github.com/hashbang/book/blob/master/content/docs/se...

    Shameless plug: My company Distrust (short for Distributed Trust), offers auditing, consulting, and support so companies can avoid single points of failure in their supply chains from third party libs to the hands of end users. Happy to chat with anyone that wants some outside eyes in this area!

What are some alternatives?

When comparing tripwire-open-source and book you can also consider the following projects:

OpenHashTab - 📝 File hashing and checking shell extension

mvt - MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.

BLUESPAWN - An Active Defense and EDR software to empower Blue Teams

silverblue-site - Historic website for Fedora Silverblue. Now at https://gitlab.com/fedora/websites-apps/fedora-websites/fedora-websites-3.0

Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

madaidans-insecurities.github.io

digestpp - C++11 header-only message digest library

rfcs

cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io

awdl_wifi_scripts - Scripts to disable awdl