hashes
美 [hæʃ]
英 [hæʃ] 
- n.切碎的食物;拼凑起来的东西;大杂烩;推敲
- v.切细;弄糟;反复推敲
- 网络哈希;哈希表;散列
词形变化
复数:hashes 现在分词:hashing 过去式:hashed 同义词
英汉解释
英英解释
例句
He said he wants the authorities to take the hashes harshest measures loud allowed by law against the attackers and those who helped them.
他说,希望民众采取法律允许范围内最严厉的手段惩罚那些袭击者和其同伙。
Hashes do not keep the entered items in the same order as they were entered. Hash variables always start with the % sign.
哈希并不保证被保存数值的有序存放,哈希变量名称始终用%符号开始表示。
Many programmers who are familiar with languages like C may not know about hashes, which are also called dictionaries or associative arrays.
许多熟悉像C的语言的程序设计人员可能不了解哈希表,它也称作字典或相联数组。
Have configurations nested more than one layer deep (up to one layer can be handled with the AppConfig hashes).
具有多于一层深度的嵌套配置(直到可以被AppConfig散列处理的一层)。
Therefore, Samba must keep a separate password database for the Microsoft hashes; this is referred to as the password back end.
因此,Samba必须为Microsoft哈希保留单独的密码数据库;这就被称为密码后台。
just to clarify: we do not frequently recalculate checksums or hashes of trusted files. We detect in realtime whenever a file is changed.
重申一下:我们不会经常重新评估值得信任的文件,我门会实时监察文件时候被改变。
Message authentication algorithms generate message hashes and signatures used to detect tampering and forgery.
消息身份验证算法生成用于检测篡改和伪造情况的消息哈希值和签名。
When asked to validate a password, the Membership service hashes the presented password, then compares the hash value with its copy.
当验证密码时,会员服务将当前密码散列,并与它的拷贝值进行比较。
The anonymous hashes grab the current section and compound class from the global variables set in other parts of the grammar.
匿名散列从文法其它部分的全局变量集获取当前的节和复合类。
The integrity of downloaded installation files can be verified via checksums or hashes that are offered by serious providers.
可以通过严肃的提供者所给出的校验和或者散列来检验下载的安装文件的完整性。
If the hashes agree, Chktrust. Exe verifies that the signer's X. 509 certificate can be traced back to a trusted root certificate.
如果二者一致,Chktrust.exe将验证签名程序的X.509证书是否可以追溯到受信任的根证书。
When a user presents credentials, you can hash the user's password and compare only the hashes of the two.
当用户提供凭据时,您可以散列用户的密码并仅比较二者的哈希。
The time consuming part of a rainbow table attack is building the dictionary of hashes .
耗时的彩虹表攻击法是基于字典的词。
It hashes (converts) a number in a large range into a number in a smaller range.
它把一个大范围的数字哈希(转化)成一个小范围的数字。
This means that you need a solid understanding of the interaction of references, hashes, and arrays in Perl.
这意味着需要充分了解引用、散列和数组在Perl中的交互作用。
In the first part of this article we have examined password hashes and the mechanisms Windows utilizes to create and store these values.
在本文的第一部分中,我们介绍了密码哈希的概念,以及Windows用于创建和存储这些数值的机制。
For layered configurations, AppConfig needs to have custom functions installed to interpret hashes deeper than one level.
对于分层配置,AppConfig需要安装有定制函数,以解释不止一层深的散列。
The number of hashes being recovered simultaneously does not have significant performance impact.
数字切细同时恢复没有重大表现冲击。
Fixed crashes and possible action file corruptions when lines containing hashes are written through the CGI editor.
固定的冲击及可能采取的行动提出反腐倡廉工作时,系含有哈希值是通过书面与cgi总编辑。
MQV proposes new key-agreement and -transport protocols that prevent such attacks by adding hashes to make them more efficient and secure.
MQV提出了新的密钥协商和传输协议,这些协议通过增加散列的方式使其更加高效和安全,从而阻止此类攻击。
Once a hash is generated you can copy it to the clipboard, or automatically compare hashes to make sure your file is intact.
一旦你生成一个散列可以将它复制到剪贴板,或自动比较杂凑,以确保您的文件是完整的。
The MLDBM module allows complex Perl hashes to be almost seamlessly stored in a local file.
MLDBM模块可以将复杂的Perl哈希键值无缝地保存在一个本地文件中。
You need the mkpasswd program (included in most Linux distributions) for generating the cryptographic hashes of the keystroke signatures.
您需要使用mkpasswd程序(附带于大多数Linux分发版中)才能生成击键签名的密码散列。
The HashTab makes it very simple for Windows users to check these hashes on any file on the system without using external tools.
该HashTab使Windows用户非常简单的来检查这些文件的哈希值而无需使用外部工具。
Provider type, which supports only those functions and algorithms required for hashes and digital signatures.
提供程序类型的子集,它只支持哈希和数字签名所需的那些函数和算法。
Hashes of two sets of data should match if and only if the corresponding data also matches.
只有在对应的资料也相符时,两组资料的杂凑才会相符。
Hashes are statistically unique; a different two-byte sequence will not hash to the same value.
哈希在统计上是唯一的;不同的双字节序列不会哈希为同一个值。
If different views can be provided for hashes, arrays, and scalars, why stop there?
要为哈希表、数组和标量都提供视图多好呀,为什么不呢?
The other argument mitigating the potential severity of this attack is actually derived from the use of hashes.
减小这种攻击的潜在严重性的另一个争论实际上源于散列的使用。
And for generating encrypted hashes of the mouse-click times, you'll need the mkpasswd program.
并且为了生成鼠标单击次数的加密散列,您需要mkpasswd程序。
If you work with large arrays or hashes and use them as arguments to functions, use a reference instead of the variable directly.
如果使用大型数组或hash表,并使用它们作为函数的参数,那么应该使用它们的一个引用,而不应该直接使用它们。
Beyond the basic storage of data, hashes are also important in distributed systems.
除了在数据储存中的应用外,哈希表在分布式系统中的应用也是非常重要的。
If you need nested hashes or arrays, you may have to do it yourself or assist AppConfig.
如果您需要嵌套的散列或数组,则需要自己动手或帮助一下AppConfig。
Listing 6 provides an example of such a nested eager load using hashes.
清单6给出了使用哈希语法的一个嵌套的立即加载。
Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
装载从加密的SAM哈希Windows分区恢复,包括Vista。
In our bank transfer example, assume we use a primitive MAC that hashes the request along with a secret key.
在银行划拨范例中,假设我们使用了一种随秘钥杂凑请求的原始MAC。
NET hashes passwords using a non-reversible encryption scheme, so a new password is sent to the user.
NET会使用不可逆的加密方案对密码进行哈希处理,然后将新密码发送给用户。
The Standard version can process up to 10 hashes simultaneously and the Pro version has a technical limit of 32, 000.
标准版本可能处理10同时切细,并且赞成版本有一个技术极限32,000。
This example will store booleans, scalars, arrays, and hashes in separate tables.
这个示例将在不同表中存储布尔值、标量、数组和散列。
The fact that a hash can have attributes that are also hashes should be no surprise.
事实上,hash可以拥有hash属性,这并不奇怪。