środa, grudnia 05, 2007

Rano, raniuteńko

  1. nauka C# - http://docs.google.com/?pli=1#
  2. Dywagacje na temat .NET development - http://rtipton.wordpress.com/category/net-development/
  3. forum VFP - http://www.svfpug.com.au/
  4. http://wiki.script.aculo.us/scriptaculous/revision/show/6/Ajax.Request
  5. Ciekawy blog VFP - http://www.craigbailey.net/foxtabs.htm - tabulator w IDE
  6. Hsia:
    1. http://blogs.msdn.com/calvin_hsia/archive/2007/10/08/5370183.aspx
    2. http://blogs.msdn.com/calvin_hsia/archive/2004/06/18/159550.aspx na ASP stronie
  7. Naprawdę dobry program do tworzenia pakietów instalacyjnych INNOSETUP - http://klub.chip.pl/innosetup/Innosetup/faq.htm#vc
  8. Coś niebywałego - mamy dwa różne (dokładnie certyfikaty), które produkują kolizję - http://www.win.tue.nl/hashclash/TargetCollidingCertificates/
  9. Jak sprawdzić to:
    To get a human-readable view of the contents of the certificates:              openssl x509 -in TargetCollidingCertificate1.cer -inform DER -text     openssl x509 -in TargetCollidingCertificate2.cer -inform DER -text          To verify the signature on the two certificates against the CA certificate,  first convert the certificates to PEM-format ("openssl verify" does not work with the DER format):              openssl x509 -in TargetCollidingCertificate1.cer -inform DER -out TargetCollidingCertificate1.pem     openssl x509 -in TargetCollidingCertificate2.cer -inform DER -out TargetCollidingCertificate2.pem     openssl x509 -in MD5CollisionCA.cer -inform DER -out MD5CollisionCA.pem          and then do the verification:              openssl verify -CAfile MD5CollisionCA.pem TargetCollidingCertificate1.pem     openssl verify -CAfile MD5CollisionCA.pem TargetCollidingCertificate2.pem 
  10. Narzędzia ciekawe z PCTOOLS
  11.  

Brak komentarzy: