Difference between revisions of "Linux Security"
Views
Actions
Namespaces
Variants
Tools
no edit summary
imported>Dalto m (Typo in chmod command) |
imported>Tele |
||
Line 120: | Line 120: | ||
The [[Firewalls]] article has a full description of the Firewall solutions available on Manjaro | The [[Firewalls]] article has a full description of the Firewall solutions available on Manjaro | ||
=Understanding Checksum= | |||
Are used to validate the processed data / files. | |||
By checking the file checksum, you can detect changes to the file, but the method is not perfect. | |||
* The larger the file, the greater the probability of receiving the same checksum. This phenomenon is called collision. This is a disadvantage for checking whether a file is identical and it is also a security defect. | |||
* Algorithms ( MD5, SHA-0, SHA-1) are not recommended to use. Because collisions were found. | |||
* On servers are stored checksums instead of passwords. Because it is almost impossible to recover your passwords. But it is possible to generate several passwords that will match the same checksum. | |||
* Algorithms in which it is more important to detect changes in files than encryption are used to detect changes in the system. Sample programs for check file integrity Tripwire, AIDE. | |||
List of hash functions | |||
https://en.wikipedia.org/wiki/List_of_hash_functions#Unkeyed_cryptographic_hash_functions | |||
[[Category:Contents Page]] | [[Category:Contents Page]] |