2 Intern

 • 

28K Posts

December 23rd, 2006 21:00

Please start a new thread.   The problem posted by the originator of this thread has been solved.  In your new thread, you might want to give us a hint about what you mean by "hash links".
 
Steve

Message Edited by volcano11 on 12-23-200605:37 PM

December 24th, 2006 10:00

I dont knwo how to start a new thread it wont let me .. so you dont know what a hash link is... hah well look it up on wakepedia to get a definition then i suppose u wont be of help to me.. i can tell you that one form of hash link is cryptographic hash links

795 Posts

December 24th, 2006 11:00

proflashrtist,
 
First, to post a new message, click the "New Message" link at the top of the forum.  It's not that hard.
 
There is no such thing as wakepedia.  It's called Wikipedia, found at www.wikipedia.com.
 
There is no such thing as a hash link, they are simply cryptographic hashes.  If you want to know more (much more), look at Security Now here.  Scroll down to Episodes 33, 34, 35 and 37.  They are audio podcasts, or you can download a PDF transcript and read it.

795 Posts

December 24th, 2006 12:00

proflashrtist,
 
Well, I stand corrected.  After a little judicious Googling, there apparently is a technology called "hash link."  It is used in various forms by virtually all  P2P networks.  It utilizes the unique finger print of a file to accurately identify a legitimate file from a bogus one.
 
Since the primary function of P2P networks is to steal copyrighted material, any further comment on my part would be a violation of the Dell Community Forum Terms of Service. 
 
I suggest you learn how to steal copyrighted material on your own.  Better yet, consider actually paying for the copyrighted material you would otherwise steal.
 
"...that is all"  - Yes, it is.

December 24th, 2006 12:00

ok dush i didnt spell the site right.. there are such things as has links and it would appear that you arent educated enough to answer the question that is all

December 24th, 2006 12:00

actually i do not steal my p2p files thank you and to suggest i do would find you in a very deep legal proceeding so i suggest you correct yourself once again

1.2. Hash functions and non-cryptographic uses

A typical non-cryptographic use for hash functions is for validating that the contents of a file have not been changed in transit. The originator computes the hash of the contents of the file and transfers it to the recipient of the file. The recipient uses the same hash function and verifies that the two hash values are the same.

The property of good hash functions that there is even probability that each bit in the output is a 0 or 1 for an arbitrary input makes hashes particularly good for human-based content validation. If a single bit in the input is changed, or the length of the input is changed by a single bit, it is likely that half of the bits in the output will change, and thus the representation of the hash will change radically.

Hash values are usually expressed in hexadecimal notation. Thus, the hash value of a file (using the




..hah.. hurts to be shown up by someone ... rather pathetic really since as of the mourning of last i had no prior education to the has functions.. but i suppose... you do work for dell so i should give you a break since it is in fact one of the low grade computer companies

No Events found!

Top