Difference between revisions of "Linux Security"

no edit summary
imported>Tele
imported>Tele
Line 131: Line 131:
* On servers are stored checksums instead of passwords. Because it is almost impossible to recover your passwords. But it is possible to generate several passwords that will match the same checksum.
* On servers are stored checksums instead of passwords. Because it is almost impossible to recover your passwords. But it is possible to generate several passwords that will match the same checksum.
* Algorithms in which it is more important to detect changes in files than encryption are used to detect changes in the system. Sample programs for check file integrity Tripwire, AIDE.
* Algorithms in which it is more important to detect changes in files than encryption are used to detect changes in the system. Sample programs for check file integrity Tripwire, AIDE.


List of hash functions
List of hash functions
Line 137: Line 136:




=Understanding GPG keys=
* They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method.
* Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file.




[[Category:Contents Page]]
[[Category:Contents Page]]
Anonymous user