On Fri, Apr 22, 2016 at 07:47:27AM -0400, Keith Constable wrote:
> I mentioned protecting the AIDE database and binaries because any results
> generated by AIDE are meaningless unless you can verify that an intruder
> hasn't modified the binaries and database. That said, I understand certain
> applications of AIDE may not warrant such paranoia. It's up to you how far
> you want to take it.

Just out of curiosity, what are your methods to ensure the integrity of
the AIDE binary and the database?

Best regards

Hannes
_______________________________________________
Aide mailing list
Aide@cs.tut.fi
https://mailman.cs.tut.fi/mailman/listinfo/aide

Reply via email to