Fingerprint is a general purpose data integrity tool that uses cryptographic hashes to detect changes in files and directory trees. The fingerprint
command scans a directory tree and generates a fingerprint file containing the names and cryptographic hashes of the files in the tree. This snapshot can be later used to generate a list of files that have been created, deleted or modified. If so much as a single bit in the file data has changed, Fingerprint will detect it.
- Preservation: Detect corruption of important data, e.g. web server integrity, optical storage verification.
- Security: Detect changes made by intruders, e.g. firewall integrity, network configuration, software auditing.
- Transfers: Verify file copies and transfers between different systems, e.g. file transfer integrity.
- Sealing: Cryptographically seal critical files, e.g. document verification.
- Notarizing: Prove that documents existed at a particular time.
- Backups: Verify restored backups to ensure that backups are sound, e.g. backup verification and integrity.
Fingerprint can be integrated with other tools to ensure the integrity of an entire network of computers from a single point.
Documentation
- Introduction
-
Installation
-
Generating Fingerprints
-
Comparing Fingerprints
-
Archival Usage
-
Data Preservation
-
Data Transmission
-
Backup Integrity
-
Security Tripwire
-
Cryptographic Sealing
-
Notarizing
-
Final Words