explanation?
from the thoughtful Sam Ruby http://www.intertwingly.net/blog/2005/02/16/SHA-1-Broken
action item?
from security expert, Keith Brown: http://pluralsight.com/blogs/keith/archive/2005/02/16/5907.aspx
http://www.AcehAid.org
Sign up for my newsletter so you don't miss my conference & Pluralsight course announcements!