On Fri, Apr 22, 2016 at 07:47:27AM -0400, Keith Constable wrote: > I mentioned protecting the AIDE database and binaries because any results > generated by AIDE are meaningless unless you can verify that an intruder > hasn't modified the binaries and database. That said, I understand certain > applications of AIDE may not warrant such paranoia. It's up to you how far > you want to take it.
Just out of curiosity, what are your methods to ensure the integrity of the AIDE binary and the database? Best regards Hannes _______________________________________________ Aide mailing list Aide@cs.tut.fi https://mailman.cs.tut.fi/mailman/listinfo/aide