Updated: 11/25/2005; 12:04:45 AM.

XML and software
XML, web and software in general, with notes on Radio Userland resources

daily link  Wednesday, August 18, 2004

Crypto researchers discover flaws: "MD5's flaws that have been identified in the past few days mean that an attacker can generate one hash collision in a few hours on a standard PC. To write a specific back door and cloak it with the same hash collision may be much more time intensive.   Still, Hughes said that programmers should start moving away from MD5. "Right now the algorithm has been shown to be weak," he said. "Before useful (attacks) can be done, it's time to migrate away from it." "  SHA-1 still looks good, but there are new approaches suggested toward cracking it. 

Technology Review: Fingerprinting Your Files has a c lear and simple explanation of MD5 and SHA-1 hash functions, and how they can be used in applications, system security, and compression.

  10:01:10 PM  permalink  

Streamripper: "an Open Source (GPL) application that lets you record streaming mp3 to your hard drive."  It divides the mp3 webcast into separate files for each song.  Instructions online.  6:59:57 AM  permalink  

August 2004
Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31        
Jul   Sep
Subscribe to "XML and software" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.
Click here to visit the Radio UserLand website.


Copyright 2005 © Ken Novak.
Last update: 11/25/2005; 12:04:45 AM.