IT Trenches:

hash

1

August 16, 2010  6:56 PM

Automated file integrity monitoring using MD5 or SHA-1 hashing



Posted by: Troy Tate
automated reporting, automation, batch file, change monitoring, email report, file hashing, file integrity monitoring, hash, hashing

I recently had a task to monitor some file folders for changes to files and report when changes were made to the files. The reporting requirements were just to notify each day if files and what files were changed. There were no requirements to track who made the changes due to the limited access to...

January 6, 2009  4:45 PM

Swiss-army knife for public network testing



Posted by: Troy Tate
connectivity testing, crypto, crypto testing, cryptography, dns, hash, icmp, ping, public network, ssh, SSL, tcp, testing, toolkit, tools, tracert, typosquatting, udp, website

Sometimes it is necessary to test connectivity outside of your private company network. There are several resources I use. I will share a couple of those with you in this posting. One of my favorite and most frequently used sites is

Bookmark and Share     1 Comment     RSS Feed     Email a friend


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: