Please start a new thread. The problem posted by the originator of this thread has been solved. In your new thread, you might want to give us a hint about what you mean by "hash links".
I dont knwo how to start a new thread it wont let me .. so you dont know what a hash link is... hah well look it up on wakepedia to get a definition then i suppose u wont be of help to me.. i can tell you that one form of hash link is cryptographic hash links
First, to post a new message, click the "New Message" link at the top of the forum. It's not that hard.
There is no such thing as wakepedia. It's called Wikipedia, found at
www.wikipedia.com.
There is no such thing as a hash link, they are simply cryptographic hashes. If you want to know more (much more), look at Security Now
here. Scroll down to Episodes 33, 34, 35 and 37. They are audio podcasts, or you can download a PDF transcript and read it.
Well, I stand corrected. After a little judicious Googling, there apparently is a technology called "hash link." It is used in various forms by virtually all P2P networks. It utilizes the unique finger print of a file to accurately identify a legitimate file from a bogus one.
Since the primary function of P2P networks is to steal copyrighted material, any further comment on my part would be a violation of the Dell Community Forum Terms of Service.
I suggest you learn how to steal copyrighted material on your own. Better yet, consider actually paying for the copyrighted material you would otherwise steal.
ok dush i didnt spell the site right.. there are such things as has links and it would appear that you arent educated enough to answer the question that is all
actually i do not steal my p2p files thank you and to suggest i do would find you in a very deep legal proceeding so i suggest you correct yourself once again
1.2. Hash functions and non-cryptographic uses
A typical non-cryptographic use for hash functions is for validating that the contents of a file have not been changed in transit. The originator computes the hash of the contents of the file and transfers it to the recipient of the file. The recipient uses the same hash function and verifies that the two hash values are the same.
The property of good hash functions that there is even probability that each bit in the output is a 0 or 1 for an arbitrary input makes hashes particularly good for human-based content validation. If a single bit in the input is changed, or the length of the input is changed by a single bit, it is likely that half of the bits in the output will change, and thus the representation of the hash will change radically.
Hash values are usually expressed in hexadecimal notation. Thus, the hash value of a file (using the
..hah.. hurts to be shown up by someone ... rather pathetic really since as of the mourning of last i had no prior education to the has functions.. but i suppose... you do work for dell so i should give you a break since it is in fact one of the low grade computer companies
volcano11
2 Intern
•
28K Posts
0
December 23rd, 2006 21:00
Message Edited by volcano11 on 12-23-200605:37 PM
proflashrtist
7 Posts
0
December 24th, 2006 10:00
_Paladin
795 Posts
0
December 24th, 2006 11:00
_Paladin
795 Posts
0
December 24th, 2006 12:00
proflashrtist
7 Posts
0
December 24th, 2006 12:00
proflashrtist
7 Posts
0
December 24th, 2006 12:00
1.2. Hash functions and non-cryptographic uses
A typical non-cryptographic use for hash functions is for validating that the contents of a file have not been changed in transit. The originator computes the hash of the contents of the file and transfers it to the recipient of the file. The recipient uses the same hash function and verifies that the two hash values are the same.
The property of good hash functions that there is even probability that each bit in the output is a 0 or 1 for an arbitrary input makes hashes particularly good for human-based content validation. If a single bit in the input is changed, or the length of the input is changed by a single bit, it is likely that half of the bits in the output will change, and thus the representation of the hash will change radically.
Hash values are usually expressed in hexadecimal notation. Thus, the hash value of a file (using the
..hah.. hurts to be shown up by someone ... rather pathetic really since as of the mourning of last i had no prior education to the has functions.. but i suppose... you do work for dell so i should give you a break since it is in fact one of the low grade computer companies