The problem with that reasoning is that someone else argues
along the same lines. There are tons of people writing
Windows applications, so we should discuss all Windows
vulnerability here. However, the original post wasn't about
warning us about a newly discovered vulnerability, it has been
known for years. The original post was a
question:
what's that exploit?.
I fail to see how that's Perl related, or why this forum is
an appropriate place to ask. The fact that there isn't an
"MD5 monks" doesn't make this appropriate either. There are
a billion things for which there's no "X monks", does that
mean all questions about them should be asked here?
However, while there isn't an MD5 website in the same form
as perlmonks, there is a whole lot of information about MD5
readily available on the web. For instance, at the website
of the developers of the MD5 algorithm, RSA (www.rsasecurity.com). They have a FAQ, which discusses
MD5 - and guess what? The FAQ discusses the vulnerabilities as well.
Abigail
Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data!
Titles consisting of a single word are discouraged, and in most cases are disallowed outright.
Read Where should I post X? if you're not absolutely sure you're posting in the right place.
Please read these before you post! —
Posts may use any of the Perl Monks Approved HTML tags:
- a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, details, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, summary, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr
You may need to use entities for some characters, as follows. (Exception: Within code tags, you can put the characters literally.)
| |
For: |
|
Use: |
| & | | & |
| < | | < |
| > | | > |
| [ | | [ |
| ] | | ] |
Link using PerlMonks shortcuts! What shortcuts can I use for linking?
See Writeup Formatting Tips and other pages linked from there for more info.