Difference between revisions of "Linux Security"

no edit summary
imported>Dalto
m (Typo in chmod command)
imported>Tele
Line 120: Line 120:


The [[Firewalls]] article has a full description of the Firewall solutions available on Manjaro
The [[Firewalls]] article has a full description of the Firewall solutions available on Manjaro
=Understanding Checksum=
Are used to validate the processed data / files.
By checking the file checksum, you can detect changes to the file, but the method is not perfect.
* The larger the file, the greater the probability of receiving the same checksum. This phenomenon is called collision. This is a disadvantage for checking whether a file is identical and it is also a security defect.
* Algorithms ( MD5, SHA-0, SHA-1) are not recommended to use. Because collisions were found.
* On servers are stored checksums instead of passwords. Because it is almost impossible to recover your passwords. But it is possible to generate several passwords that will match the same checksum.
* Algorithms in which it is more important to detect changes in files than encryption are used to detect changes in the system. Sample programs for check file integrity Tripwire, AIDE.
List of hash functions
https://en.wikipedia.org/wiki/List_of_hash_functions#Unkeyed_cryptographic_hash_functions




[[Category:Contents Page]]
[[Category:Contents Page]]
Anonymous user