- Clustering XEN with Heartbeat and Advanced HASI
... /home/geeko/i386cd-3.1.iso The md5 hash matches up and that is what I wanted to see from the NFS domU . I ...
Article - variia - 15 Jul 2009 - 3:46pm - 8 comments - 1 attachment - 3 groups
- Query and Verify Packages with RPM
... Among other things, verifying compares the size, MD5 sum, permissions, type, owner and group of each file. Any ...
Article - kramarao - 25 Jun 2009 - 9:19am - 0 comments - 1 attachment - 3 groups
- RPM Package Verification and Repair
... they therefore often show up as having a different size or md5 checksum from the original, but this is expected.... they're configuration ... RPM package must specify which of the options (Size, Mode, md5, User-owner, Group-owner, Timestamp, etc.) are saved by the package when ...
Article - aburgemeister - 23 Jun 2009 - 12:21pm - 0 comments - 0 attachments - 4 groups
- Examples of Jim Willeke's Dump UP Tool
... took the password typed by the user, hashed it with MD5 (or is it MD4, whatever, it does not really matter) and sends that on ... there is NFS which sometimes uses MD4 (or is it MD5, whatever, it is the other one from LANMAN). Yet another password ...
Article - geoffc - 18 Jun 2009 - 5:18pm - 0 comments - 1 attachment - 2 groups
- Access Novell Archive and Version Services PostgreSQL Database Over a TCP/IP Network
... of hosts. METHOD can be "trust", "reject", "md5", "crypt", "password", "krb5", "ident", or "pam". Note that "password" sends passwords in clear text; "md5" is preferred since it sends encrypted passwords. In your favorite ...
Article - gsanjeev - 13 Feb 2009 - 5:58pm - 0 comments - 0 attachments - 2 groups
- Securing IDM SOAP Driver and SOAP Web Services Using SSL and Mutual Authentication
... Mon Aug 20 00:19:39 IST 2018 Certificate fingerprints: MD5: 7E:BA:A1:97:36:2E:5F:88:CD:34:F0:00:17:F2:9B:BA SHA1: ... 20 00:19:39 IST 2018 Certificate fingerprints: MD5: 7E:BA:A1:97:36:2E:5F:88:CD:34:F0:00:17:F2:9B:BA SHA1: ...
Article - anilkss - 20 Jan 2009 - 10:46am - 0 comments - 0 attachments - 2 groups
- Extending the LDAP Console
... to base 64, encrypt/decrypt strings, calculate MD5 /SHA1 hashes within the tool, etc. Sample AES Encryption / ...
Article - rkalfane - 31 Oct 2008 - 10:25am - 0 comments - 1 attachment - 2 groups
- Port Scan Detection
... download the 'PortSentry' utility  along with its MD5 checksum to check the authenticity of the 'PortSentry' archive ... server1:/usr/src # md5sum -c portsentry-1.2.tar.gz.md5 portsentry-1.2.tar.gz: OK Figure 2.1: Checking authenticity. ...
Article - DamianMyerscough - 6 Jun 2008 - 4:44pm - 0 comments - 0 attachments - 3 groups
- Detecting rootkits
... you will need to download the source tarball and the MD5 signatures to check the authenticity of the source tarball. Once you ... of these files into the same directory you can issue the md5 command supplied with the '-c' qualifier as shown in Figure 2.1. ...
Article - DamianMyerscough - 30 May 2008 - 2:09pm - 3 comments - 0 attachments - 3 groups
- GnuPG (GNU Privacy Guard)
... DSA, RSA, AES, 3DES, Blowfish, Twofish, CAST5, MD5 , SHA-1, RIPE-MD-160 and TIGER", "English, Danish, Dutch, Esperanto, ... 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512 Compression: Uncompressed, ZIP, ...
Article - DamianMyerscough - 1 May 2008 - 12:39pm - 0 comments - 0 attachments - 3 groups