||Avoiding Trojans and Rootkits|
|Subject:||MD5 vs. PGP|
You use an example of an ftp site with some files on it, and a file containing checksums to verify the integrity of these files. Let's presume the site in question has been hacked, and the software trojaned - it wouldn't take much for the attacker to modify the file containing MD5 sums to reflect the checksums on his modified version of the tarballs, etc.
Showing messages 1 through 1 of 1.
MD5 vs. PGP
2003-12-11 09:33:26 anonymous2 [View]