Difference between revisions of "Linux Security"
Views
Actions
Namespaces
Variants
Tools
no edit summary
imported>Tele |
imported>Tele |
||
Line 131: | Line 131: | ||
* On servers are stored checksums instead of passwords. Because it is almost impossible to recover your passwords. But it is possible to generate several passwords that will match the same checksum. | * On servers are stored checksums instead of passwords. Because it is almost impossible to recover your passwords. But it is possible to generate several passwords that will match the same checksum. | ||
* Algorithms in which it is more important to detect changes in files than encryption are used to detect changes in the system. Sample programs for check file integrity Tripwire, AIDE. | * Algorithms in which it is more important to detect changes in files than encryption are used to detect changes in the system. Sample programs for check file integrity Tripwire, AIDE. | ||
List of hash functions | List of hash functions | ||
Line 137: | Line 136: | ||
=Understanding GPG keys= | |||
* They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method. | |||
* Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file. | |||
[[Category:Contents Page]] | [[Category:Contents Page]] |