hashes

hashes

美 [hæʃ]  英 [hæʃ]

  • n.切碎的食物;拼凑起来的东西;大杂烩;推敲
  • v.切细;弄糟;反复推敲
  • 网络哈希;哈希表;散列

词形变化

复数:hashes  现在分词:hashing  过去式:hashed  

同义词

英汉解释

n.
1.
切碎的食物
2.
拼凑起来的东西;大杂烩
3.
重申,复述,推敲
4.
〈英〉傻瓜
5.
〈美俚〉传闻
6.
〈美俚〉麻醉品
v.
1.
切细
2.
弄糟
3.
反复推敲

英英解释

n.

例句

He said he wants the authorities to take the hashes harshest measures loud allowed by law against the attackers and those who helped them.

希望民众采取法律允许范围严厉手段惩罚那些袭击者同伙

Hashes do not keep the entered items in the same order as they were entered. Hash variables always start with the % sign.

哈希并不保证保存数值有序存放哈希变量名称始终%符号开始表示

Many programmers who are familiar with languages like C may not know about hashes, which are also called dictionaries or associative arrays.

许多熟悉C语言程序设计人员可能了解哈希表称作字典相联数组

Have configurations nested more than one layer deep (up to one layer can be handled with the AppConfig hashes).

具有多于深度嵌套配置直到可以AppConfig处理)。

Therefore, Samba must keep a separate password database for the Microsoft hashes; this is referred to as the password back end.

因此Samba必须Microsoft哈希保留单独密码数据库称为密码后台

just to clarify: we do not frequently recalculate checksums or hashes of trusted files. We detect in realtime whenever a file is changed.

重申一下我们不会经常重新评估值得信任文件实时监察文件时候改变

Message authentication algorithms generate message hashes and signatures used to detect tampering and forgery.

消息身份验证算法生成用于检测篡改伪造情况消息哈希签名

When asked to validate a password, the Membership service hashes the presented password, then compares the hash value with its copy.

验证密码会员服务当前密码拷贝进行比较

The anonymous hashes grab the current section and compound class from the global variables set in other parts of the grammar.

匿名文法其它部分全局变量获取当前复合

The integrity of downloaded installation files can be verified via checksums or hashes that are offered by serious providers.

可以通过严肃提供者校验和或者检验下载安装文件完整性

If the hashes agree, Chktrust. Exe verifies that the signer's X. 509 certificate can be traced back to a trusted root certificate.

如果二者一致,Chktrust.exe将验证签名程序X.509证书是否可以追溯信任证书

When a user presents credentials, you can hash the user's password and compare only the hashes of the two.

用户提供凭据可以用户密码比较二者哈希

The time consuming part of a rainbow table attack is building the dictionary of hashes .

耗时彩虹攻击基于字典

It hashes (converts) a number in a large range into a number in a smaller range.

一个范围数字哈希转化一个范围数字

This means that you need a solid understanding of the interaction of references, hashes, and arrays in Perl.

意味需要充分了解引用和数Perl交互作用

In the first part of this article we have examined password hashes and the mechanisms Windows utilizes to create and store these values.

本文第一部分我们介绍密码哈希概念以及Windows用于创建存储这些数值机制

For layered configurations, AppConfig needs to have custom functions installed to interpret hashes deeper than one level.

对于分层配置AppConfig需要安装定制函数解释不止

The number of hashes being recovered simultaneously does not have significant performance impact.

数字同时恢复没有重大表现冲击

Fixed crashes and possible action file corruptions when lines containing hashes are written through the CGI editor.

固定冲击可能采取行动提出反腐倡廉工作含有哈希通过书面cgi总编辑

MQV proposes new key-agreement and -transport protocols that prevent such attacks by adding hashes to make them more efficient and secure.

MQV提出协商传输协议这些协议通过增加方式使更加高效安全从而阻止此类攻击

Once a hash is generated you can copy it to the clipboard, or automatically compare hashes to make sure your file is intact.

一旦生成一个可以复制剪贴板自动比较杂凑确保文件完整

The MLDBM module allows complex Perl hashes to be almost seamlessly stored in a local file.

MLDBM模块可以复杂Perl哈希键无缝保存一个本地文件

You need the mkpasswd program (included in most Linux distributions) for generating the cryptographic hashes of the keystroke signatures.

需要使用mkpasswd程序附带大多数Linux分发版才能生成击键签名密码

The HashTab makes it very simple for Windows users to check these hashes on any file on the system without using external tools.

HashTab使Windows用户非常简单检查这些文件哈希而无需使用外部工具

Provider type, which supports only those functions and algorithms required for hashes and digital signatures.

提供程序类型子集支持哈希数字签名所需那些函数算法

Hashes of two sets of data should match if and only if the corresponding data also matches.

只有对应资料相符资料杂凑相符

Hashes are statistically unique; a different two-byte sequence will not hash to the same value.

哈希统计唯一不同字节序列不会哈希一个

If different views can be provided for hashes, arrays, and scalars, why stop there?

哈希表数组标量提供视图为什么呢?

The other argument mitigating the potential severity of this attack is actually derived from the use of hashes.

减小这种攻击潜在严重性另一个争论实际上源于使用

And for generating encrypted hashes of the mouse-click times, you'll need the mkpasswd program.

并且为了生成鼠标单击次数加密需要mkpasswd程序

If you work with large arrays or hashes and use them as arguments to functions, use a reference instead of the variable directly.

如果使用大型数组hash使用它们作为函数参数那么应该使用它们一个引用应该直接使用它们

Beyond the basic storage of data, hashes are also important in distributed systems.

除了数据储存应用哈希表分布式系统应用也是非常重要

If you need nested hashes or arrays, you may have to do it yourself or assist AppConfig.

如果需要嵌套数组需要自己动手帮助一下AppConfig

Listing 6 provides an example of such a nested eager load using hashes.

清单6使用哈希语法一个嵌套立即加载

Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.

装载加密SAM哈希Windows分区恢复包括Vista

In our bank transfer example, assume we use a primitive MAC that hashes the request along with a secret key.

银行划拨范例假设我们使用一种杂凑请求原始MAC

NET hashes passwords using a non-reversible encryption scheme, so a new password is sent to the user.

NET使用不可加密方案密码进行哈希处理然后密码发送用户

The Standard version can process up to 10 hashes simultaneously and the Pro version has a technical limit of 32, 000.

标准版本可能处理10同时并且赞成版本一个技术极限32,000。

This example will store booleans, scalars, arrays, and hashes in separate tables.

这个示例不同存储布尔标量数组

The fact that a hash can have attributes that are also hashes should be no surprise.

事实上hash可以拥有hash属性并不奇怪