It takes a snapshot of existing program files and compares it Using the prior snapshot. In the event the analytical technique documents ended up edited or deleted, an warn is shipped into the administrator to analyze. An example of HIDS use can be seen on mission-crucial machines, which are not expected to change their layout.It supports a wide ran