Hashes

Some articles on hashes:

Autovivification - Hashes
... 'A' => HASH(0x837d50c) 'B' => HASH(0x83c71e8) 'C' => HASH(0x83c7218) 'D' => 1 DB Hashes several layers deep were created automatically without any declarations ...
Kad Network - Usage
... Kad network uses a UDP-based protocol to Find sources for eD2k hashes ... Search for eD2k hashes based on keywords in the file name ... Find comments and ratings for files (hashes) ...
Cain And Abel (software) - Features
... injection Ability to record VoIP conversations Decoding scrambled passwords Calculating hashes Traceroute Revealing password boxes Uncovering cached ...
Voodoo Chat - Security
... The second is the use of system hashes ... Voodoo's client generates a set of system hashes from pieces of serial numbers within the hardware of the users computer ... The users hashes are checked against the global hash ban list on "The King", then checked against the banned hash list on the specific server they're logging on to ...
Lamport Signature - Example - Verifying The Signature
... He also hashes the message to get a 256-bit hash sum ... uses the bits in the hash sum to pick out 256 of the hashes in Alice's public key ... He picks the hashes in the same manner that Alice picked the random numbers for the signature ...