Remember the MD2 and MD5 message digests?
还记得MD 2和MD 5消息摘要吗?
It then will output the MD5-encrypted password.
然后输出使用MD 5加密的口令。
The session id is a 32 byte long MD5 hash value.
sessionid就是个一32位的md5hash值。
This security realm example uses "MD5" with "hex."
这个安全领域示例使用了十六进制编码的MD5。
Run an md5 algorithm against the binary class files.
对二进制类文件运行md5算法。
The two hash types currently in use are MD5 and SHA1.
当前使用的两种哈希类型是MD5和SHA1。
The files are digitally signed using both PGP and md5.
文件使用PGP和MD 5进行了数字签名。
The MD5 algorithm is the DE facto hashing standard for digests.
MD 5算法是事实上的标准摘要哈希算法。
Verify that the sources are not corrupted by using MD5 message digests
通过使用MD5消息摘要,验证源代码没有受到破坏
Will output the MD5 digest of the string "hello" in hexadecimal format.
将采用十六进制的格式输出字符串“hello”的MD 5摘要。
Copy this into your grub.conf after password -md5 but on the same line.
将这个口令拷贝到grub . conf中password - md 5之后,但是要在同一行上。
Choosing between MD5 and SHA-1 is a tradeoff between security and performance.
在MD5和SHA - 1之间作选择是安全性和性能之间的权衡。
For example, take the MD5 hash of "foobar" : 3858f62230ac3c915f300c664312c63f.
举例来说,利用“foobar”的MD 5散列:3858f 62230ac3c 915f 300c 664312c63f。
It USES the user ID as the key, and the value is the password stored as an MD5 hash.
它使用用户标识作为密钥,其值为作为MD 5散列存储的密码。
Now the MD5 algorithm will falsely verify that the signature matches the new contents.
因此MD 5算法会错误地认为签名与新内容是匹配的。
This revision is actually the MD5 hash of the document, automatically added by CouchDB.
这个修订实际上是文档的MD 5哈希表,由CouchDB自动添加。
To generate an md5 password, run the tool grub-md5-crypt (as root), which comes with GRUB.
为了生成一个md5口令, 请运行 GRUB 所附带的 grub-md5-crypt工具(以root 身份)。
This script will populate the database with the MD5 digest passwords encoded in hex format.
这个脚本将使用十六进制格式编码的MD 5摘要密码来填充数据库。
In 0.21 seconds, the first result is "Google Hash: md5(foobar) = 3858f62230ac3c915f300c664312c63f".
秒内,第一个结果是“GoogleHash:md5(foobar) = 3858f62230ac3c915f300c664312c63f”。
It's clever because it is quite resistant to attack, even in the face of weaknesses in MD5 and SHA-1.
说它聪明的原因是即使面对MD5和SHA - 1的弱点,它的防攻击能力还很强。
To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.
为防止此类攻击,基于md5哈希的根证书和签名者证书不应受信任。
It can also use a password encrypted with the MD5 algorithm as opposed to the plain text password of LILO.
它还使用一个通过MD 5算法加密的密码,而不是LILO的纯文本密码。
Changing to a more complex algorithm, say from MD5 to SHA-2, 16 does little to restore password integrity.
变更为更复杂的算法,比方说从MD 5变更为SHA - 2,16对恢复秘密的完整性没什么作用。
The technique we use to generate the token is based on computing an MD5 hash from the content of the page.
我们用来产生记号的技术是基于从页面内容计算MD 5哈希值。
The SHA algorithm is more secure, producing a 160-bit output compared to the MD5 algorithm's 128-bit output.
与MD 5算法的128位输出相比,sha算法更安全,它产生160位输出。
The md5() function hashes whatever string is fed to it and turns it into a 32-character fixed-length string.
md5()函数可以散列反馈的任何字符串,并将其转变为固定长度为 32 个字符的字符串。
Robust checksum algorithms like MD5 and SHA do much more than simply take the remainder when dividing by 256.
健壮的校验和算法如md5和SHA并不仅仅取其除以256的余数,它完成的要多得多。
The password option specifies the MD5-encrypted password used to gain access to GRUB's interactive boot options.
password选项指定了使用MD 5加密的口令,用于访问GRUB的交互式引导选项。
Since MD5 hashing has been broken, the client wisely stipulated that all keys must be signed using SHA-1 instead.
由于MD5 散列法已经被破坏,客户明智地规定,所有密匙必须使用 SHA-1 签名。
If the network is insecure, but you're either not very paranoid or concerned about minimizing CPU resources, use md5.
如果您的网络不够安全,但您不是特别多疑,或者不是很关心最小化cpu资源的使用,那么应该使用md5。
应用推荐