book tag
Tagged by Phil Plasma
1. Grab the nearest book.
2. Open the book to page 123.
3. Find the fifth sentence.
4. Post the text of it and the next 3 sentences on your blog along with these instructions.
5. Don’t you dare dig for that “cool” or “intellectual” book in your closet! I know you were thinking about it! Just pick up whatever is closest.
6. Tag three people.
________________
Practical Unix Security by Simson Garfinkle and Gene Spafford, O'Reilly & Associates, Inc.
ISBN : 0-937175-72-2
Be sure to keep the master copy of the file of checksums some place safe (e.g., off-line) where it can't possibly be altered or manipulated by an intruder to mask a change. In addition, be sure to protect the checksum program against change.
There are many checksum algorithms available; Cyclic Redundancy Check (CRC) checksums are common. The sum command available on many different versions of UNIX also calculates a checksum that can determine differences between files.
________________
I don't know many bloggers to tag - so I'll see what I can do to find some bloggers to tag. Check back soon!
0 Comments:
Post a Comment
<< Home