als0 als0 wik:
if the hash's are overwritten, it can result in a denial of service
condition.  Again, checksum security is paramount.

tack

On Thu, 6 Sep 2001, Sach Jobb wrote:

> > In the computer scheme, the analogue of the B cells would be some sort of
> > daemon that constantly checks all files found on the system.  The MHA
>
> (snip, snip)
>
> This is a really interesting concept. It's actually quite similar to
> secure bsd's hash key database for binaries. Where the binary won't
> execute if it has been modify because the pair in the database doesn't
> line up any more.
>
> Cheers,
> sach
>
>

-- 
------------------------------------------
1st Amendment: Void where prohibited
http://freesklyarov.org
http://www.anti-dmca.org

Reply via email to