/india-vs-pakistan.

india-vs-pakistan.

sachin-tendulkar-man-who-became-god.

sachin-tendulkar-man-who-became-god

india-vs-england-2012-2nd-t20i-preview.

india-vs-england-2012-2nd-t20i-preview.

sehwag-gambhirs-smug-overconfidence.

sehwag-gambhirs-smug-overconfidence.

all-proteas-players-to-be-given-game.

all-proteas-players-to-be-given-game.

Showing posts with label Hashing. Show all posts
Showing posts with label Hashing. Show all posts

Monday, July 1, 2013

What is Hacking and hashing

What is Hacking and hashing
Hacking:
Hacking is the process of seeking and exploiting weakness and loopholes in a computer system with either good intention or bad. If it's for a sinister purpose, it's called a cyber-crime while it's for a good reason it's called Ethical Hacking.Computer programming often use ethical hacking to test the reliability and security of existing system.However,certain groups of hackers perform malicious activities to gain access to personal and crucial information such as bank details.They're called Black Hat Hackers.Hacking can be done by Denail of service(DoS) attacks and inclusion of other malware. There are hacker conventions and magazines that focus on security and privacy of networks.Despite their socially sound intentions,Hacker group such as Anonymous indulge in computer crimes.Such groups are known as hacktivists. These days, hacking is a field of study as part of network security courses and is taught in many reputed universities.
Hashing:
Hashing a set of algorithms and methods that allow mapping of a set of varied length characters or strings to fixed length characters or integers.Hashing is essential to maintain data security and privacy in many circumstances.For example, Consider the social apps you see from your smartphone.These app try to access your contact list to find people who are already on that social app.Instead of uploading plain text contact details to their services which leads to a privacy breach, these apps hash the contact numbers and emails using hash keys only known to the app developers. These hashed contacts can then be compared to a user database of the app to find people you may know.This is just one application of hashing.Hashing is also used widely in Cryptography where a cryptography hash function is used. This is uses for password verification on various website. Although hashing is prominently used on client-side,hackers can still break the hash code and gain access to information however those are rare cases.

Gamer City z

Free for your eye videos