X-Nico

3 unusual facts about hash


Shadi Abu Hash'hash

Shadi Nadmi Abu Hash'hash (born January 20, 1981), is a Jordanian footballer of Palestinian origin football player who plays as a defensive midfielder and defender for Al-Taawon FC of KSA and the Jordan national football team.

Syro-Ephraimite War

Isaiah concludes these prophecies concerning his children (Shear-Jashub (meaning 'a remnant returns', Isaiah 7.3), Immanuel (meaning 'God is with us'), and Maher-shalal-hash-baz (meaning 'quick to plunder, speedy to spoil') by saying, 'Here am I, and the children the LORD has given me. We are signs and symbols in Israel from the LORD Almighty, who dwells on Mount Zion.' (Isaiah 8.18 NIV) Interestingly enough, the context continues into chapter 9 which also uses a birth of a child as its object.

The next chapter details another prophecy about a child by the name of Maher-shalal-hash-baz (meaning 'Quick to plunder, speedy to spoil').


1991 Tifariti offensive

Meanwhile, the Royal Moroccan Air Force bombed Tifariti again, killing at least five civilians, wounding 20 and destroying the infrastructure of the town, according to Hash Ahmed, then POLISARIO representative in Madrid, who added that ten thousand refugees on the Tifariti region were fleeing, and a hundred were disappeared.

89th Grey Cup

Trailing 4-3 late in the second quarter, Calgary quarterback Marcus Crandell hit a streaking Marc Boerigter down the left hash marks for a 68-yard touchdown.

BitComet

Since version 0.86 BitComet includes discussion and stat-tracking features which send information about torrents to the Bitcomet.com servers, including the torrent hash.

Brandi Glanville

Brandi and Scheana Marie met at SUR Restaurant to hash out their differences on the first season of Vanderpump Rules on the Bravo Network.

CrushFTP Server

Encryption is supported for files "at rest" using PGP, as well as for passwords using an MD5 or SHA, SHA512, MD4 non-reversible hash.

DHT

Distributed hash table, a type of distributed system that provides hash table–like functionality

Feature hashing

When a second hash function ξ is used to determine the sign of a feature's value, the expected mean of each column in the output array becomes zero because ξ causes some collisions to cancel out.

FNV

Fowler–Noll–Vo hash function, a non-cryptographic hash function created by Glenn Fowler, Landon Curt Noll, and Phong Vo

Hash chain

Binary hash chains are commonly used in association with a Hash tree.

Hash Jar Tempo

Hash Jar Tempo is a collaborative musical project between the members of Philadelphia-based psychedelic band Bardo Pond and experimental guitarist and composer Roy Montgomery.

Hash oil

Due largely to its potential for explosions -- making hash oil via butane extraction is presently illegal in California.

Jenkins hash function

The Jenkins hash functions are a collection of (non-cryptographic) hash functions for multi-byte keys designed by Bob Jenkins.

Key size

Mainstream symmetric ciphers (such as AES or Twofish) and collision resistant hash functions (such as SHA) are widely conjectured to offer greater security against known quantum computing attacks.

Leftover hash lemma

The leftover hash lemma is a lemma in cryptography first stated by Russell Impagliazzo, Leonid Levin, and Michael Luby.

Microsoft Excel

The situation changed fundamentally in Excel 2007, where the modern AES algorithm with a key of 128 bits started being used for decryption, and a 50,000-fold use of the hash function SHA1 reduced the speed of brute-force attacks down to hundreds of passwords per second.

Ophcrack

This is necessary if the generation of the LM hash is disabled (this is default for Windows Vista), or if the password is longer than 14 characters (in which case the LM hash is not stored).

Password strength

Standard cryptographic hashes, such as the Secure Hash Algorithm series, are very hard to reverse, so an attacker who gets hold of the hash value cannot directly recover the password.

Quicknet

This is achieved by using the same Cryptographic hash function in JavaScript code on the client-side, as well as PHP code on the server-side, to generate and compare hash results based on users’ passwords and some random data.

Randomness extractor

NIST Special Publication 800-90B (draft) recommends several extractors, including the SHA hash family and states that if the amount of entropy input is twice the number of bits output from them, that output can be considered essentially fully random.

Rob Barraco

Rob Barraco is a keyboardist who has played with Phil Lesh and Friends, The Dead, Dark Star Orchestra, Chris Robinson & New Earth Mud, the Zen Tricksters, Red Flannel Hash, and The Dragonflys.

Security Accounts Manager

The Security Accounts Manager (SAM) file in Windows XP, Windows Vista and Windows 7 stores users' passwords in a hashed format (in LM hash and NTLM hash).

Tamper-evident

The document, email, or file to be protected is used to generate a signed hash, a number generated from the contents of the document.

Tater

Tater Tots, registered trademark for a commercial form of hash browns, a deep-fried grated potato side-dish

TSIG

RFC 4635 was circulated to allow RFC 3174 Secure Hash Algorithm (SHA1) hashing and FIPS PUB 180-2 SHA-2 hashing to replace MD5.

UMAC

It is easy to construct a class of hash functions when D is field.

WinMX

If a file was found, the hash of the file along with IP address and Primary node details of the user with the file was sent to the user who made the search.


see also