hash

#hash added by firefox and ie at the end of url in search-results page (Google personal search)

is there any way to avoid firefox and ie to reload the page adding the hash-tag to the url. due to that i refine results by time with adding &as_qdr=d to the end of url, i have a problem with theese hashtags in url, because anything behind them seems to be unfunctional. It does not happen with Chrome, but Firefox reloads the page after...

#hash added by firefox and ie at the end of url in search-results page (Google personal search)

is there any way to avoid firefox and ie to reload the page adding the hash-tag to the url. due to that i refine results by time with adding &as_qdr=d to the end of url, i have a problem with theese hashtags. It does not happen with Chrome, but Firefox reloads the page after query adding this nightmare hash d?=¿)a¿?)!!m!!"!"·n I am t...

Are there any easy to use libraries for hashing data arrays?

I am thinking about using CRC32 or SHA1, possibly both in C program I develop on Linux (Ubuntu). Are there any easy to use libraries for either? Cutting and pasting a CRC32 algorithm into the source code of my program seems simple enough, but doing the same for SHA1 feels slightly shaky. Are there any easy to use libraries, preferably...

Tiger Hash intermediate values

This isnt much of a programming question. its more of a reference question: does anyone know any programs/text files/whatever that show how the Tiger hash works? im trying to find some way to see the intermediate values of the hash. i found this website but the java implementation is weird and shows incorrect values despite getting prop...

Can anyone help me to code Reverse algo function for CRC64 in C#?

I am working on CRC64 Reversing algorithm on C# but unable to code it. If anyone can help me out, it will be nice of him. I am desperate to complete the coding. ...

Does anyone have CRC128 and CRC256 Code in C++ and C#?

I am learning, trying to get thoughts behind CRC. I can't find CRC128 and CRC256 code anywhere. If anyone of you have the C++ or C# Code for them, please share them with me. Also provide online links to the websites. I am a newbie and can't code it by myself at all, neither can convert theories and mathematics to the coding. So I ask for...

Trying to hash a password.

Note: I will not be using salts. Thanks for your advice though! I'm testing how to hash a password using SHA1 and can't seem to wrap my head around it. My database column is Password char(40) not null. Here's my code: using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.IO; using System.Se...

How to store hashes in MySQL databases without using text fields

I'm storing unique user-agents in a MySQL MyISAM table so when I have to look if it exists in the table, I check the md5 hash that is stored next to the TEXT field. User-Agents { id - INT user-agent - TEXT hash - VARCHAR(32) // md5 } There is any way to do the same but using a 32-bit integer and not a text h...

How to store the php result of md5("test", true) in a BINARY field of a MySQL MyISAM table

How can I store the result of: $store = md5("test", true); mysql_query(...) in a mysql db with a string query? ...

Do i really need to hash passwords?

I am building a project, which has a pretty basic login system. There will NO REGISTRATION system available, the users will be added manually. Also i protected the databases data input gates very well. So after all, do i still need to hash and even salt the users passwords? And if your answer is yes, the next question is why? ...

Generate secret code for password reset

I'm doing a module which allow users to reset password. I noticed how most websites they provide a confirmation link which contain query string that has a unique hash. My question is: How can I generate this unique hash each time the same user request forgot password? Should I store this hash in database and use it for verification late...

Need a secure way to publicly display hash values

I am building a windows application to store backups of sensitive files. The purpose of my application is to store a copy of a file with its hash. The program or user will then display the hash publicly in case the user needs to prove they had the backup of the sensitive file at a certain time. Motivation: Some situations where this m...

Hash Passwords php

I have a very basic logon system, that authenticates users by the means of a user table in a mysql database with php. can someone explain what the point of hashing passwords it, how to do it with php, and what is actually stored in the database. Thanks ...

How to find the size of the hash table?

Hi, I've a hash table defined like this typedef std::unordered_map<unsigned long long int,unsigned long long int> table_map; and in the program, I read the contents of the a file into a buffer using fread like this: fread(buffer, sizeof(long long int), 1024, file1); I declare the hash table as table_map c1; Now i create a hash...

Access hash reference data using strings representing the hash structure

Let's assume that I have a complex hash reference $hash_ref, and I would like to access data in it by doing something like this: my $string1 = "{books}"; my $string2 = "{31335}->{book_name}"; print Dumper($hash_ref->$string1->$string2); Of course, this doesn't work, but I hope it explains what I'd like to do. Obviously, there are man...

Logout hashes, how are they handled ?

What's the way the logout hashes are usually handled in php? on a lot of sites there's usually logout hashes to confirm that the user that's logging out is teh correct user, how is this usually handled ? Examples http://domain.com/user/logout/nil4ytwojytjwoytjwy5tw5 nil4ytwojytjwoytjwy5tw5 being the hash Just an update of my res...

How to find out if a Perl hash is multidimensional?

Assuming I have a hash like this: $hash_ref = { 'hashes' => { 'h1' => { 'klf' => '1', 'moomooland' => '1' }, 'h2' => { 'klf' => '2', 'moomooland' => '2' }, 'h3' => { 'klf' => '3', 'moomooland' => '3' } }, 'keys' => { 'k1' => 'key1', 'k2' => 'key2', 'k3' => 'key3' } } How could I find out, as easy as ...

Perl accessing/changing deep hash by array list

I want to delete an element of a hash(of any depth) which has the first key as $key[0], the second key as $key[1] etc, until @key is finished. For example, if @key=(23,56,78) then i want to manipulate $hash{23}{56}{78}. I don't know beforehand how many elements @key has. I have been trying to use the following: my %the_path; my $temp=...

Easy to remember fingerprints for data?

I need to create fingerprints for RSA keys that users can memorize or at least easily recognize. The following ideas have come to mind: Break the SHA1 hash into portions of, say 4 bits and use them as coordinates for Bezier splines. Draw the splines and use that picture as a fingerprint. Use the SHA1 hash as input for some fractal algo...

How do I make a member of a class a hash in Perl?

I am trying to write a package in perl. I need one of the members to be a hash. However, when I reference and run the program, I cannot get it to work with the usual syntax. If I have: sub new { my $class = shift; my $self = { textfile => shift, placeholders => () }; bless $self, $class; return $self; } Is there any way of mak...