No, not exactly. The SHA-1 hashing algorithm still does what it is supposed to do. SHA-1 creates an unpredictable 20 byte “fingerprint” of the data input into the function, in this case a web server certificate. It is the unpredictability of the output that makes cryptographic hash functions so useful. … Continue reading
Search this site
- Create an EC2 that runs Chrome for sandboxed websurfing
- Check Multiple AWS S3 Buckets for Missing Default Encryption
- The Equifax Data Breach and the Apache Struts Vulnerability
- Test Early, Test Often
- Linux Hardening
- Information Security at Startup Companies
- Timestamp bash_history with every command
- Has SHA-1 been hacked?
Forbes: Everything You Want To Know About Anthos - Google's Hybrid And Multi-Cloud Platform.
Flanked by communications workers, Pres Trump declares that "the race to 5G is a race American must win." "It's a race that we will win," he says of the nezxt generation wireless system. He says the private sector will lead the way, the Government doesn't have to spend a lot.
Walk-through techniques that can be used to perform forensics on AWS EC2 instances with @KennethGHartman at #SANSCloudSummit.
Summit Agenda: https://t.co/94wxI47ELm
Super exciting announcement! #MSFT released their very own Web App, Linux app and Windows Desktop App Security Scanner (fuzzer+) TODAY. It's the tool that all of Microsoft uses to secure the software that WE make.
Now with a working link!