akemiiwaya at November 11th, 2013 13:34 — #1
Originally published at: http://www.howtogeek.com/175526/hashing-algorithms-and-security/
If you need to be sure that a file has been transferred or received intact and in one piece, then a hash algorithm is an excellent way to verify that. YouTube channel Computerphile discusses what hash algorithms are and how they work in their latest video.
techiegeekgirl at November 14th, 2013 09:21 — #2
I wish I had the depth of knowledge required to understand all of this to the very roots- so interesting!
geek at November 21st, 2013 16:03 — #3
This topic was automatically closed after 10 days. New replies are no longer allowed.