als0 als0 wik:
if the hash's are overwritten, it can result in a denial of service
condition. Again, checksum security is paramount.
tack
On Thu, 6 Sep 2001, Sach Jobb wrote:
> > In the computer scheme, the analogue of the B cells would be some sort of
> > daemon that constantly checks all files found on the system. The MHA
>
> (snip, snip)
>
> This is a really interesting concept. It's actually quite similar to
> secure bsd's hash key database for binaries. Where the binary won't
> execute if it has been modify because the pair in the database doesn't
> line up any more.
>
> Cheers,
> sach
>
>
--
------------------------------------------
1st Amendment: Void where prohibited
http://freesklyarov.org
http://www.anti-dmca.org