hashes

hashes

美 [hæ?]  英 [hæ?]

  • n.切碎的食物;拼湊起來的東西;大雜燴;推敲
  • v.切細;弄糟;反復推敲
  • 網絡哈希;哈希表;散列

詞形變化

復數:hashes  現在分詞:hashing  過去式:hashed  

同義詞

英漢解釋

n.
1.
切碎的食物
2.
拼湊起來的東西;大雜燴
3.
重申,復述,推敲
4.
〈英〉傻瓜
5.
〈美俚〉傳聞
6.
〈美俚〉麻醉品
v.
1.
切細
2.
弄糟
3.
反復推敲

英英解釋

n.

例句

He said he wants the authorities to take the hashes harshest measures loud allowed by law against the attackers and those who helped them.

希望民眾采取法律允許范圍嚴厲手段懲罰那些襲擊者同伙

Hashes do not keep the entered items in the same order as they were entered. Hash variables always start with the % sign.

哈希并不保證保存數值有序存放哈希變量名稱始終%符號開始表示

Many programmers who are familiar with languages like C may not know about hashes, which are also called dictionaries or associative arrays.

許多熟悉C語言程序設計人員可能了解哈希表稱作字典相聯數組

Have configurations nested more than one layer deep (up to one layer can be handled with the AppConfig hashes).

具有多于深度嵌套配置直到可以AppConfig處理)。

Therefore, Samba must keep a separate password database for the Microsoft hashes; this is referred to as the password back end.

因此Samba必須Microsoft哈希保留單獨密碼數據庫稱為密碼后臺

just to clarify: we do not frequently recalculate checksums or hashes of trusted files. We detect in realtime whenever a file is changed.

重申一下我們不會經常重新評估值得信任文件實時監察文件時候改變

Message authentication algorithms generate message hashes and signatures used to detect tampering and forgery.

消息身份驗證算法生成用于檢測篡改偽造情況消息哈希簽名

When asked to validate a password, the Membership service hashes the presented password, then compares the hash value with its copy.

驗證密碼會員服務當前密碼拷貝進行比較

The anonymous hashes grab the current section and compound class from the global variables set in other parts of the grammar.

匿名文法其它部分全局變量獲取當前復合

The integrity of downloaded installation files can be verified via checksums or hashes that are offered by serious providers.

可以通過嚴肅提供者校驗和或者檢驗下載安裝文件完整性

If the hashes agree, Chktrust. Exe verifies that the signer's X. 509 certificate can be traced back to a trusted root certificate.

如果二者一致,Chktrust.exe將驗證簽名程序X.509證書是否可以追溯信任證書

When a user presents credentials, you can hash the user's password and compare only the hashes of the two.

用戶提供憑據可以用戶密碼比較二者哈希

The time consuming part of a rainbow table attack is building the dictionary of hashes .

耗時彩虹攻擊基于字典

It hashes (converts) a number in a large range into a number in a smaller range.

一個范圍數字哈希轉化一個范圍數字

This means that you need a solid understanding of the interaction of references, hashes, and arrays in Perl.

意味需要充分了解引用和數Perl交互作用

In the first part of this article we have examined password hashes and the mechanisms Windows utilizes to create and store these values.

本文第一部分我們介紹密碼哈希概念以及Windows用于創建存儲這些數值機制

For layered configurations, AppConfig needs to have custom functions installed to interpret hashes deeper than one level.

對于分層配置AppConfig需要安裝定制函數解釋不止

The number of hashes being recovered simultaneously does not have significant performance impact.

數字同時恢復沒有重大表現沖擊

Fixed crashes and possible action file corruptions when lines containing hashes are written through the CGI editor.

固定沖擊可能采取行動提出反腐倡廉工作含有哈希通過書面cgi總編輯

MQV proposes new key-agreement and -transport protocols that prevent such attacks by adding hashes to make them more efficient and secure.

MQV提出協商傳輸協議這些協議通過增加方式使更加高效安全從而阻止此類攻擊

Once a hash is generated you can copy it to the clipboard, or automatically compare hashes to make sure your file is intact.

一旦生成一個可以復制剪貼板自動比較雜湊確保文件完整

The MLDBM module allows complex Perl hashes to be almost seamlessly stored in a local file.

MLDBM模塊可以復雜Perl哈希鍵無縫保存一個本地文件

You need the mkpasswd program (included in most Linux distributions) for generating the cryptographic hashes of the keystroke signatures.

需要使用mkpasswd程序附帶大多數Linux分發版才能生成擊鍵簽名密碼

The HashTab makes it very simple for Windows users to check these hashes on any file on the system without using external tools.

HashTab使Windows用戶非常簡單檢查這些文件哈希而無需使用外部工具

Provider type, which supports only those functions and algorithms required for hashes and digital signatures.

提供程序類型子集支持哈希數字簽名所需那些函數算法

Hashes of two sets of data should match if and only if the corresponding data also matches.

只有對應資料相符資料雜湊相符

Hashes are statistically unique; a different two-byte sequence will not hash to the same value.

哈希統計唯一不同字節序列不會哈希一個

If different views can be provided for hashes, arrays, and scalars, why stop there?

哈希表數組標量提供視圖為什么呢?

The other argument mitigating the potential severity of this attack is actually derived from the use of hashes.

減小這種攻擊潛在嚴重性另一個爭論實際上源于使用

And for generating encrypted hashes of the mouse-click times, you'll need the mkpasswd program.

并且為了生成鼠標單擊次數加密需要mkpasswd程序

If you work with large arrays or hashes and use them as arguments to functions, use a reference instead of the variable directly.

如果使用大型數組hash使用它們作為函數參數那么應該使用它們一個引用應該直接使用它們

Beyond the basic storage of data, hashes are also important in distributed systems.

除了數據儲存應用哈希表分布式系統應用也是非常重要

If you need nested hashes or arrays, you may have to do it yourself or assist AppConfig.

如果需要嵌套數組需要自己動手幫助一下AppConfig

Listing 6 provides an example of such a nested eager load using hashes.

清單6使用哈希語法一個嵌套立即加載

Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.

裝載加密SAM哈希Windows分區恢復包括Vista

In our bank transfer example, assume we use a primitive MAC that hashes the request along with a secret key.

銀行劃撥范例假設我們使用一種雜湊請求原始MAC

NET hashes passwords using a non-reversible encryption scheme, so a new password is sent to the user.

NET使用不可加密方案密碼進行哈希處理然后密碼發送用戶

The Standard version can process up to 10 hashes simultaneously and the Pro version has a technical limit of 32, 000.

標準版本可能處理10同時并且贊成版本一個技術極限32,000。

This example will store booleans, scalars, arrays, and hashes in separate tables.

這個示例不同存儲布爾標量數組

The fact that a hash can have attributes that are also hashes should be no surprise.

事實上hash可以擁有hash屬性并不奇怪