On 2010-04-03 15:25, "Joyce Chapman" <[log in to unmask]> wrote:
> 3. Checksums! Oh so very very very important.
Many of the standard algorithms have been compromised, however, and
increasing key strength is not necessarily a guarantor of security/ arbiter
of authenticity. As a good first step I'd recommend that you talk to your IT
department about implementing a very robust, self-correcting filesystem.
Sun's ZFS is a good place to start as many of the checks you mention are
built into the file management system.
Library Digital Projects Officer
University College Cork
+353 (0)21 420-5107 (work)
+353 (0)85 715-3952 (cell/mobile)
[log in to unmask]@gmail.com