akemiiwaya — 2013-11-11T13:34:59-05:00 — #1
Originally published at: http://www.howtogeek.com/175526/hashing-algorithms-and-security/
If you need to be sure that a file has been transferred or received intact and in one piece, then a hash algorithm is an excellent way to verify that. YouTube channel Computerphile discusses what hash algorithms are and how they work in their latest video.
techiegeekgirl — 2013-11-14T09:21:43-05:00 — #2
I wish I had the depth of knowledge required to understand all of this to the very roots- so interesting!
geek — 2013-11-21T16:03:11-05:00 — #3
This topic was automatically closed after 10 days. New replies are no longer allowed.