The Latest in IT Security

Posts Tagged ‘fingerprint’

You probably know by now that Adobe will revoke a compromised code signing certificate in a couple of days. As we seem to have more code signing related security incidents recently, I started to develop a couple of new tools.AnalyzePESig is a tool to check signatures in PE files, just like Sysinternals’ sigcheck. But with […]

Read more ...

02
Mar
2012

When we upload something embarrassing about ourselves to, let?s say Facebook, that?s completely our fault. But there are other subtle ways to get information about us. Let?s say a few words about tracking. Every time you visit a website you request HTML that will be rendered in your local browser. This code may include external […]

Read more ...

I’m sure some of you verify SSH fingerprints before you use a SSH server for the first time. You obtain the fingerprint via another channel, and you compare it with the fingerprint your SSH client presents you.But have you done this with Cisco devices too? Recently I tried to obtain the SSH fingerprint of a […]

Read more ...


Categories

THURSDAY, APRIL 03, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments