Result for 3EAEF7D0CDACB65202035D78FCF4BACB1B46FAFC

Query result

Key Value
FileName./usr/sbin/twprint
FileSize1175047
MD5AAEB25C0EE483519CB0F6928EB6EDC30
SHA-13EAEF7D0CDACB65202035D78FCF4BACB1B46FAFC
SHA-25646F92E3A818AB55782505D2C0585F2A1E910734338CA75C75680070C3AA3DB72
SSDEEP24576:WLSeh5AFgGH3gzhhI72oa1oacD0zvZu//I:yjIHH3whe2oa1oasp/I
TLSHT1FE453B5E78B0CEDACC56DE76692F83AB93A11571CC6D09C88B47C3AFA5E53488913730
hashlookup:parent-total2
hashlookup:trust60

Network graph view

Parents (Total: 2)

The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD55C9BA90FD8FC795716629EF5DE3BE6AA
PackageArchs390
PackageDescriptionTripwire is a very valuable security tool for Linux systems, if it is installed to a clean system. Tripwire should be installed right after the OS installation, and before you have connected your system to a network (i.e., before any possibility exists that someone could alter files on your system). When Tripwire is initially set up, it creates a database that records certain file information. Then when it is run, it compares a designated set of files and directories to the information stored in the database. Added or deleted files are flagged and reported, as are any files that have changed from their previously recorded state in the database. When Tripwire is run against system files on a regular basis, any file changes will be spotted when Tripwire is run. Tripwire will report the changes, which will give system administrators a clue that they need to enact damage control measures immediately if certain files have been altered.
PackageNametripwire
PackageRelease11.fc12
PackageVersion2.4.1.2
SHA-166D195618B59FEB721811830AF759E8FBEB6DBF1
SHA-25601B55468BE9FC8E0C5C879C3C64C40FDF15D49ED7E5772B429FDDCBBD7DD6C46
Key Value
MD52C817B77338DA63109913F025F75279D
PackageArchs390
PackageDescriptionTripwire is a very valuable security tool for Linux systems, if it is installed to a clean system. Tripwire should be installed right after the OS installation, and before you have connected your system to a network (i.e., before any possibility exists that someone could alter files on your system). When Tripwire is initially set up, it creates a database that records certain file information. Then when it is run, it compares a designated set of files and directories to the information stored in the database. Added or deleted files are flagged and reported, as are any files that have changed from their previously recorded state in the database. When Tripwire is run against system files on a regular basis, any file changes will be spotted when Tripwire is run. Tripwire will report the changes, which will give system administrators a clue that they need to enact damage control measures immediately if certain files have been altered.
PackageNametripwire
PackageRelease11.fc12
PackageVersion2.4.1.2
SHA-1F5DE9414556A97E760120CB3B9A53EFAEB00FFD2
SHA-256E8345C942E85199C9709494DFDDB74B82B303857D76C7621601846F98B8B157D