Tagged: security

A theoretical nightmare 1

A theoretical nightmare

It sounds like the sysadmins’ worst dream: Microsoft publishes a patch addressing a current problem and just a couple of hours later the world has to...

Login via Bluethooth 0

Login via Bluethooth

If you try to go over the top with some things, then you should really do it instead of just using some tiny hacks. What about...

Verify files using MD5 0

Verify files using MD5

How can you verify the integrity of some files as simple as possible? How can you check for manipulations or transmission failures? The question is answered...