A theoretical nightmare

It sounds like the sysadmins’ worst dream: Microsoft publishes a patch addressing a current problem and just a couple of hours later the world has to face tons of attacks regarding this issue. Before we disconnect the network and run around in panic, let’s have a look at the facts. In my opinion it’s just a matter of […]

Login via Bluethooth

If you try to go over the top with some things, then you should really do it instead of just using some tiny hacks. What about logging into your computer using a mobile phone? Sounds cool, huh? So let’s use it and get to work. As the title already says, you will need a bluetooth enabled phone, a […]

Verify files using MD5

How can you verify the integrity of some files as simple as possible? How can you check for manipulations or transmission failures? The question is answered quite simple: Checksums. One of the most common checksum techniques out there is MD5 which stands for Message Digest Version 5. The fine thing about md5 is, that it’s just a checksum […]