Abuse Melding

Je hebt een klacht over de onderstaande posting:

23-06-2004, 13:20 door Anoniem

Scanning techniques » MD5 algorithm With the use of MD5, we can easily create an 128-bit "fingerprint" (or "message digest") of a string or file. By comparing this computed value with a 'known good' MD5 hash, we can be sure (for 99.9%) the compared file is een legitimate file. Rootkit Hunter scans the most important files (with the greatest change of being replaced with a trojaned one). In most cases this files are also our utilities to scan for rootkits. When they are trojaned, they are immediately useless for our investigation and cannot be trusted. By comparing this files first with a MD5 check, we can eliminate this problem in most cases. However, some Linux distributions (and BSD distributions as well) have multiple legitimate files with a different MD5 hash. A possible false negative can the result of this!

Beschrijf je klacht (Optioneel):

captcha