Timestamp bash_history with every command

When working on Linux it is often very helpful to review the commands that you have entered.  For example, you may want to paste some of the commands into a script or may want to recreate the steps to solve the problem you were working on. Here is how I … Continue reading

Has SHA-1 been hacked?

No, not exactly.  The SHA-1 hashing algorithm still does what it is supposed to do.  SHA-1 creates an unpredictable 20 byte “fingerprint” of the data input into the function, in this case a web server certificate.  It is the unpredictability of the output that makes cryptographic hash functions so useful.  … Continue reading

  • The postings and views on this site are my own and do not necessarily reflect the positions, strategies, or opinions of any current or previous employer.