To: TigerClaws
what is the ‘verification’ part at the bottom about
To: Viennacon
File verification hash. Maybe for BitTorrent.
38 posted on
11/04/2016 5:47:44 PM PDT by
Stentor
To: Viennacon
what is the verification part at the bottom about
Without going into too much of the details of symmetric and asymmetric encryption, those appear to be hashes, assuming they're legit. Such a hash would be used to either decrypt encrypted data or verify the source of a set of data.
63 posted on
11/04/2016 5:58:02 PM PDT by
JamesP81
To: Viennacon
MD5 hashes. There are programs to verify the identity, validity and non-tampering of files using it.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson