Skip to main content

Posts

Showing posts from June, 2011

Lifetime of cryptographic Hash functions

Many times developers ask which Hash is the best to work with currently. As I always suggest using SHA-2 family (SHA-224, SHA-256, SHA-384, SHA-512) as they are still not known to be broken, I found this chart very convincing and useful to compare between them: As you can see only popular SHA-2 are still remain undefeated. Reference: http://valerieaurora.org/hash.html

Wireless Security- Best Practices

This article is about different kind of Best Practices that should be followed when using Wireless LAN. A liitle lazy to write it again :) . The article has been published into June 2011 Issue of ClubHack Magazine (Page 20-24). It can be downloaded here .