Skip to Content
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
book

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

by Jon Edney, William A. Arbaugh
July 2003
Intermediate to advanced content levelIntermediate to advanced
480 pages
12h 4m
English
Addison-Wesley Professional
Content preview from Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Appendix C. Verifying the Integrity of Downloaded Files

Recently, a trend has occurred in which a malicious Trojan horse is hidden in popular open source programs. The authors of the programs do not do this. Instead, it is done by attackers modifying the source at distribution points such as ftp download sites. The best way to ensure you don't install software that has been modified after the authors created the ZIP or TAR file is to check either the MD5 message digest or the GPG signature of the files you download. The latter is significantly better than the former because the attacker could have easily changed the MD5 value as well.

In this appendix, we walk through the process of verifying the code you download.

Checking the MD5 Digest

Checking ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

CCNA Lee Barken - CISSP MCP CPA
Enterprise Java™ Security: Building Secure J2EE™ Applications

Enterprise Java™ Security: Building Secure J2EE™ Applications

Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
Wireshark for Wireless LANs

Wireshark for Wireless LANs

Jerome Henry / James Garringer

Publisher Resources

ISBN: 0321136209Purchase book