Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: TigerClaws

what is the ‘verification’ part at the bottom about


14 posted on 11/04/2016 5:36:59 PM PDT by Viennacon
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Viennacon

File verification hash. Maybe for BitTorrent.


38 posted on 11/04/2016 5:47:44 PM PDT by Stentor
[ Post Reply | Private Reply | To 14 | View Replies ]

To: Viennacon
what is the ‘verification’ part at the bottom about

Without going into too much of the details of symmetric and asymmetric encryption, those appear to be hashes, assuming they're legit. Such a hash would be used to either decrypt encrypted data or verify the source of a set of data.
63 posted on 11/04/2016 5:58:02 PM PDT by JamesP81
[ Post Reply | Private Reply | To 14 | View Replies ]

To: Viennacon

MD5 hashes. There are programs to verify the identity, validity and non-tampering of files using it.


96 posted on 11/04/2016 6:09:49 PM PDT by UnbelievingScumOnTheOtherSide (Reverse Wickard v Filburn (1942) - and - ISLAM DELENDA EST)
[ Post Reply | Private Reply | To 14 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson