John wants to try a new hacking tool on his Linux system. As the application comes from a site in his untrusted zone, John wants to ensure that the downloaded tool has not been Trojaned. Which of the following options would indicate the best course of action for John?
A.
Compare the file’s virus signature with the one published on the distribution media
B.
Compare the file’s MD5 signature with the one published on the distribution media
C.
Obtain the application via SSL
D.
Obtain the application from a CD-ROM disc
Explanation:
MD5 was developed by Professor Ronald L. Rivest of MIT. What it does, to quote the executive summary of rfc1321, is:
Stone specialist
http://www.XquielQMVW.com/XquielQMVW