hash   8299

« earlier    

Guide to hashCode() in Java | Baeldung
Learn how hashCode() works and how to implement it correctly.
hashcode  java  function  hash 
6 days ago by lgtout
bttown/dht: golang dht(Distributed Hash Table) node
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects.
golang  distributed  hash  table  dht 
10 days ago by geetarista
hashing - Is there a built-in checksum utility on Windows 7? - Super User
CertUtil is a pre-installed Windows utility that can be used to generate hash checksums:

<code>certUtil -hashfile pathToFileToCheck [HashAlgorithm]
HashAlgorithm choices: MD2 MD4 MD5 SHA1 SHA256 SHA384 SHA512</code>

So for example, the following generates an MD5 checksum for the file C:\TEMP\MyDataFile.img:

<code>CertUtil -hashfile C:\TEMP\MyDataFile.img MD5</code>

To get output similar to *Nix systems you can add some PowerShell magic:

<code style="language-powershell">$(CertUtil -hashfile C:\TEMP\MyDataFile.img MD5)[1] -replace " ",""</code>
windows  hashing  checksum  hash  md5  sha1  commandline  utility  software  solution 
17 days ago by kme
Consistent Hashing: Algorithmic Tradeoffs – Damian Gryski – Medium
Here’s a problem. I have a set of keys and values. I also have some servers for a key-value store. This could be memcached, Redis, MySQL, whatever. I want to distribute the keys across the servers so…
hash  algorithms  sharding  consistent 
18 days ago by geetarista

« earlier    

related tags

_eimi  ab-testing  account  active  activerecord  ad  algorithm  algorithms  argument  array  article  attack  audio  auth  authentication  back  bcrypt  benchmark  bestpractice  bestpractices  bitcoin  bitmain  blockchain  browns  browser  bundesnetzagentur  c++  c  checklist  checksum  cis3360  cis4615  cisco  cli  clojure  collections  collision  commandline  comparison  computing  consensus  consistent-hashing  consistent  conversion  convert  cop3502  cpu  cracker  cracking  craft-plugin  craft  crc  crypto  cryptography  cs  cs1  cuckoo  cv  cybersecurity  data  data_structures  database  datastructure  db  deep-learning  dht  directory  distributed  download  encryption  ethereum  eyboard  facebook  filehash  forward  framework  function  functions  gan  gem  gems  generative  git  github  go  golang  google  grid  hack  hacking  harness  hashcat  hashcode  hashes  hashing  hashtable  haskell  highwayhash  history  hm  image-hash  image-hashing  image  imageprocessing  immutable  important  index  intel  ipv6  isotope  java  javascript  jquery  jvm  khanacademy  learn  library  linkedlist  log  lsh  mac  management  md5  merkle  minimal  mitm  mph  multi-modal  network  node.js  nonce  npm  nwesi  ocaml  open-source  opensource  pass  password  passwords  pdf  pentest  pentesting  perf  perfect  photos  php  posteo  postexploitation  powershell  practices  privacy  programming  python  pytorch  quality  quantum  rails  rainbow  random  recht  recipe  recovery  reference  relay  research  resource  resources  responder  reverse  ring  ruby  safety  science  search-engine  security  sha  sha1  sha256  sha3  sharding  siamese  sign  signature  simhash  similarity  siphash  software  solution  strings  structures  subprocess  succinct  swift  table  tile  tlbx  tools  transformation  tree  tries  triplet  tuple  tutorial  type:application  uid  url  user  utilities  utility  video  webdev  windows 

Copy this bookmark: