hashes
美 [hæ?]
英 [hæ?] 
- n.切碎的食物;拼湊起來的東西;大雜燴;推敲
- v.切細;弄糟;反復推敲
- 網絡哈希;哈希表;散列
詞形變化
復數:hashes 現在分詞:hashing 過去式:hashed 同義詞
英漢解釋
英英解釋
例句
He said he wants the authorities to take the hashes harshest measures loud allowed by law against the attackers and those who helped them.
他說,希望民眾采取法律允許范圍內最嚴厲的手段懲罰那些襲擊者和其同伙。
Hashes do not keep the entered items in the same order as they were entered. Hash variables always start with the % sign.
哈希并不保證被保存數值的有序存放,哈希變量名稱始終用%符號開始表示。
Many programmers who are familiar with languages like C may not know about hashes, which are also called dictionaries or associative arrays.
許多熟悉像C的語言的程序設計人員可能不了解哈希表,它也稱作字典或相聯數組。
Have configurations nested more than one layer deep (up to one layer can be handled with the AppConfig hashes).
具有多于一層深度的嵌套配置(直到可以被AppConfig散列處理的一層)。
Therefore, Samba must keep a separate password database for the Microsoft hashes; this is referred to as the password back end.
因此,Samba必須為Microsoft哈希保留單獨的密碼數據庫;這就被稱為密碼后臺。
just to clarify: we do not frequently recalculate checksums or hashes of trusted files. We detect in realtime whenever a file is changed.
重申一下:我們不會經常重新評估值得信任的文件,我門會實時監察文件時候被改變。
Message authentication algorithms generate message hashes and signatures used to detect tampering and forgery.
消息身份驗證算法生成用于檢測篡改和偽造情況的消息哈希值和簽名。
When asked to validate a password, the Membership service hashes the presented password, then compares the hash value with its copy.
當驗證密碼時,會員服務將當前密碼散列,并與它的拷貝值進行比較。
The anonymous hashes grab the current section and compound class from the global variables set in other parts of the grammar.
匿名散列從文法其它部分的全局變量集獲取當前的節和復合類。
The integrity of downloaded installation files can be verified via checksums or hashes that are offered by serious providers.
可以通過嚴肅的提供者所給出的校驗和或者散列來檢驗下載的安裝文件的完整性。
If the hashes agree, Chktrust. Exe verifies that the signer's X. 509 certificate can be traced back to a trusted root certificate.
如果二者一致,Chktrust.exe將驗證簽名程序的X.509證書是否可以追溯到受信任的根證書。
When a user presents credentials, you can hash the user's password and compare only the hashes of the two.
當用戶提供憑據時,您可以散列用戶的密碼并僅比較二者的哈希。
The time consuming part of a rainbow table attack is building the dictionary of hashes .
耗時的彩虹表攻擊法是基于字典的詞。
It hashes (converts) a number in a large range into a number in a smaller range.
它把一個大范圍的數字哈希(轉化)成一個小范圍的數字。
This means that you need a solid understanding of the interaction of references, hashes, and arrays in Perl.
這意味著需要充分了解引用、散列和數組在Perl中的交互作用。
In the first part of this article we have examined password hashes and the mechanisms Windows utilizes to create and store these values.
在本文的第一部分中,我們介紹了密碼哈希的概念,以及Windows用于創建和存儲這些數值的機制。
For layered configurations, AppConfig needs to have custom functions installed to interpret hashes deeper than one level.
對于分層配置,AppConfig需要安裝有定制函數,以解釋不止一層深的散列。
The number of hashes being recovered simultaneously does not have significant performance impact.
數字切細同時恢復沒有重大表現沖擊。
Fixed crashes and possible action file corruptions when lines containing hashes are written through the CGI editor.
固定的沖擊及可能采取的行動提出反腐倡廉工作時,系含有哈希值是通過書面與cgi總編輯。
MQV proposes new key-agreement and -transport protocols that prevent such attacks by adding hashes to make them more efficient and secure.
MQV提出了新的密鑰協商和傳輸協議,這些協議通過增加散列的方式使其更加高效和安全,從而阻止此類攻擊。
Once a hash is generated you can copy it to the clipboard, or automatically compare hashes to make sure your file is intact.
一旦你生成一個散列可以將它復制到剪貼板,或自動比較雜湊,以確保您的文件是完整的。
The MLDBM module allows complex Perl hashes to be almost seamlessly stored in a local file.
MLDBM模塊可以將復雜的Perl哈希鍵值無縫地保存在一個本地文件中。
You need the mkpasswd program (included in most Linux distributions) for generating the cryptographic hashes of the keystroke signatures.
您需要使用mkpasswd程序(附帶于大多數Linux分發版中)才能生成擊鍵簽名的密碼散列。
The HashTab makes it very simple for Windows users to check these hashes on any file on the system without using external tools.
該HashTab使Windows用戶非常簡單的來檢查這些文件的哈希值而無需使用外部工具。
Provider type, which supports only those functions and algorithms required for hashes and digital signatures.
提供程序類型的子集,它只支持哈希和數字簽名所需的那些函數和算法。
Hashes of two sets of data should match if and only if the corresponding data also matches.
只有在對應的資料也相符時,兩組資料的雜湊才會相符。
Hashes are statistically unique; a different two-byte sequence will not hash to the same value.
哈希在統計上是唯一的;不同的雙字節序列不會哈希為同一個值。
If different views can be provided for hashes, arrays, and scalars, why stop there?
要為哈希表、數組和標量都提供視圖多好呀,為什么不呢?
The other argument mitigating the potential severity of this attack is actually derived from the use of hashes.
減小這種攻擊的潛在嚴重性的另一個爭論實際上源于散列的使用。
And for generating encrypted hashes of the mouse-click times, you'll need the mkpasswd program.
并且為了生成鼠標單擊次數的加密散列,您需要mkpasswd程序。
If you work with large arrays or hashes and use them as arguments to functions, use a reference instead of the variable directly.
如果使用大型數組或hash表,并使用它們作為函數的參數,那么應該使用它們的一個引用,而不應該直接使用它們。
Beyond the basic storage of data, hashes are also important in distributed systems.
除了在數據儲存中的應用外,哈希表在分布式系統中的應用也是非常重要的。
If you need nested hashes or arrays, you may have to do it yourself or assist AppConfig.
如果您需要嵌套的散列或數組,則需要自己動手或幫助一下AppConfig。
Listing 6 provides an example of such a nested eager load using hashes.
清單6給出了使用哈希語法的一個嵌套的立即加載。
Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
裝載從加密的SAM哈希Windows分區恢復,包括Vista。
In our bank transfer example, assume we use a primitive MAC that hashes the request along with a secret key.
在銀行劃撥范例中,假設我們使用了一種隨秘鑰雜湊請求的原始MAC。
NET hashes passwords using a non-reversible encryption scheme, so a new password is sent to the user.
NET會使用不可逆的加密方案對密碼進行哈希處理,然后將新密碼發送給用戶。
The Standard version can process up to 10 hashes simultaneously and the Pro version has a technical limit of 32, 000.
標準版本可能處理10同時切細,并且贊成版本有一個技術極限32,000。
This example will store booleans, scalars, arrays, and hashes in separate tables.
這個示例將在不同表中存儲布爾值、標量、數組和散列。
The fact that a hash can have attributes that are also hashes should be no surprise.
事實上,hash可以擁有hash屬性,這并不奇怪。