A theoretical nightmare

It sounds like the sysadmins’ worst dream: Microsoft publishes a patch addressing a current problem and just a couple of hours later the world has to face tons of attacks regarding this issue. Before we disconnect the network and run around in panic, let’s have a look at the facts. In my opinion it’s just a matter of […]

Verify files using MD5

How can you verify the integrity of some files as simple as possible? How can you check for manipulations or transmission failures? The question is answered quite simple: Checksums. One of the most common checksum techniques out there is MD5 which stands for Message Digest Version 5. The fine thing about md5 is, that it’s just a checksum […]