Typical use:
- Check for new or modified files in ftp folders.
- Check for modified files in web site folders by hackers (defacing).
- Check for remote control files uploaded by hackers via existing file upload scripts.
Features:
- Supports multiple include and exclude masks with wildcards.
- Special alert mask for known malicious files.
- Logging and profile support.
- Direct email delivery without the need for an smtp host.
- Interface for easy command line setup.
- Includes example profiles for inspiration.