public marks

PUBLIC MARKS with tag hash

July 2006

June 2006

April 2006

January 2006

MD5 Crack

by MageDealer
MD5 cracking site that uses Rainbow Tables and big dictionary search for md5 hash cracking

September 2005

Handy Dandy Guides - MD5 hash calculator

by Gean
Para alterar as senhas do mySQL em MD5

August 2005

GData: An Online MD5 Hash Database

by vsy
太恐怖了... 你可以試著把MD5丟進去...如果可以被找出來反譯... 趕快換密碼吧!!~~

April 2005

February 2005

Javascript md5 (and md4 and sha1)

by nhoizey & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

Javascript md5 (and md4 and sha1)

by Krome & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

Javascript md4, md5 and sha1 algorithms

by benoit & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

January 2005

PUBLIC TAGS related to tag hash

array +   automatically +   calculator +   code +   crack +   cracking +   criptographia +   cryptography +   development +   encoding +   encryption +   Enumerable +   function +   game +   javascript +   md4 +   md5 +   mysql +   nachi +   ophcrack +   ouiouioui +   passwords +   php +   programming +   prototype +   recovery +   reverse +   ruby +   security +   SHA +   sha1 +   source +   tools +   utile +   vb.net +   web +   資料安全 +