Result for 0413C1EAB439084F2A0C25E54D2F5854B269B463

Query result

Key Value
FileName./usr/sbin/tripwire
FileSize1481380
MD5DD7C144592BEA6733D4E41B463F78096
SHA-10413C1EAB439084F2A0C25E54D2F5854B269B463
SHA-256C2901FA10F563024457FA67BD63B2B487A2F9020B7F141C18BFBC21ED4F55552
SSDEEP24576:c8Pguz6DOEQKdR9iun0wjA4W9LZjvwTkXJXrD/ceZ:Cu2DOEX0GA4WFMkXNEeZ
TLSHT1A0653C5D68B48FE9CD57DA777C6FC357A2A11871C8AC08C88B47C7AF69F52489823720
hashlookup:parent-total2
hashlookup:trust60

Network graph view

Parents (Total: 2)

The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD55C9BA90FD8FC795716629EF5DE3BE6AA
PackageArchs390
PackageDescriptionTripwire is a very valuable security tool for Linux systems, if it is installed to a clean system. Tripwire should be installed right after the OS installation, and before you have connected your system to a network (i.e., before any possibility exists that someone could alter files on your system). When Tripwire is initially set up, it creates a database that records certain file information. Then when it is run, it compares a designated set of files and directories to the information stored in the database. Added or deleted files are flagged and reported, as are any files that have changed from their previously recorded state in the database. When Tripwire is run against system files on a regular basis, any file changes will be spotted when Tripwire is run. Tripwire will report the changes, which will give system administrators a clue that they need to enact damage control measures immediately if certain files have been altered.
PackageNametripwire
PackageRelease11.fc12
PackageVersion2.4.1.2
SHA-166D195618B59FEB721811830AF759E8FBEB6DBF1
SHA-25601B55468BE9FC8E0C5C879C3C64C40FDF15D49ED7E5772B429FDDCBBD7DD6C46
Key Value
MD52C817B77338DA63109913F025F75279D
PackageArchs390
PackageDescriptionTripwire is a very valuable security tool for Linux systems, if it is installed to a clean system. Tripwire should be installed right after the OS installation, and before you have connected your system to a network (i.e., before any possibility exists that someone could alter files on your system). When Tripwire is initially set up, it creates a database that records certain file information. Then when it is run, it compares a designated set of files and directories to the information stored in the database. Added or deleted files are flagged and reported, as are any files that have changed from their previously recorded state in the database. When Tripwire is run against system files on a regular basis, any file changes will be spotted when Tripwire is run. Tripwire will report the changes, which will give system administrators a clue that they need to enact damage control measures immediately if certain files have been altered.
PackageNametripwire
PackageRelease11.fc12
PackageVersion2.4.1.2
SHA-1F5DE9414556A97E760120CB3B9A53EFAEB00FFD2
SHA-256E8345C942E85199C9709494DFDDB74B82B303857D76C7621601846F98B8B157D