Prev
Next
7.4. Checksums
Red Hat Enterprise Linux now uses the SHA-256 digest algorithm for data verification and authentication in more places than before, upgrading from the cryptographically weaker SHA-1 and MD5 algorithms.
Prev
7.3. LDAP
Up
Home
Next
7.5. Pluggable Authentication Modules (PAM)