hash is a command on Unix and Unix-like operating systems that prints the location information for the commands found. The hash command has also been...
2 KB (204 words) - 18:10, 26 February 2025
Salt (cryptography) (redirect from Salted hash)
hashes. Salting also makes it extremely difficult to determine if a person has used the same password for multiple systems. Earlier versions of Unix used...
13 KB (1,527 words) - 22:35, 14 June 2025
Look up hash in Wiktionary, the free dictionary. Hash, hashes, hash mark, or hashing may refer to: Hash (food), a coarse mixture of ingredients, often...
2 KB (336 words) - 19:13, 29 July 2025
Passwd (category Unix authentication-related software)
password hashes separate from the other data in the world-readable passwd file. For local files, this is usually /etc/shadow on Linux and Unix systems...
16 KB (1,958 words) - 07:04, 22 July 2025
sha-bang, hashbang, pound-bang, or hash-pling. When a text file with a shebang is used as if it were an executable in a Unix-like operating system, the program...
25 KB (3,233 words) - 14:31, 31 July 2025
Number sign (redirect from Hash sign)
The symbol # is known as the number sign, hash, or (in North America) the pound sign. The symbol has historically been used for a wide range of purposes...
42 KB (4,333 words) - 11:39, 5 August 2025
Md5sum (redirect from Md5sum (Unix))
128-bit MD5 hashes, as described in RFC 1321. The MD5 hash functions as a compact digital fingerprint of a file. As with all such hashing algorithms,...
5 KB (470 words) - 13:50, 17 January 2025
the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a...
15 KB (1,775 words) - 00:53, 23 January 2025
developed for Unix-like operating systems. It is designed as a 100% free alternative for the Bourne shell sh and other proprietary Unix shells. Bash has...
123 KB (10,522 words) - 02:09, 6 August 2025
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
49 KB (6,300 words) - 10:48, 24 July 2025
a checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions"....
10 KB (279 words) - 12:52, 24 May 2025
common GNU Unix-like utilities. The Wikibook Guide to Unix has a page on the topic of: Commands List of Unix commands which (command) hash (Unix) "Use Type...
4 KB (305 words) - 22:07, 19 February 2025
Crypt (C) (category Cryptographic hash functions)
both to generate a new hash for storage and also to hash a proffered password with a recorded salt for comparison. Modern Unix implementations of the...
28 KB (3,039 words) - 23:27, 21 June 2025
commonly found on various Unix versions (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended...
8 KB (782 words) - 01:16, 12 April 2025
Cron (redirect from Crontab (Unix command))
Chronos, the Greek word for time. The command is generally available on Unix-like operating systems. The actions of cron are driven by a crontab (cron...
26 KB (3,262 words) - 02:18, 5 August 2025
List of POSIX commands (redirect from List of Unix utilities)
which is part of the Single UNIX Specification (SUS). These commands are implemented in many shells on modern Unix, Unix-like and other operating systems...
22 KB (168 words) - 02:46, 5 August 2025
plaintexts, and does not require user interaction. There is also a Unix password hash function with the same name, crypt. Though both are used for securing...
7 KB (718 words) - 20:05, 18 August 2024
to create ElfHash or Elf64 hash that is used in Unix object files with ELF format. Allen Holub has created a portable version of PJW hash algorithm that...
2 KB (263 words) - 12:47, 25 October 2024
cryptographic hash, such as a SHA-256 based checksum, or the use of read-only media.[citation needed] There are viruses and worms that target Unix-like operating...
5 KB (524 words) - 13:11, 2 February 2025
A Unix shell is a shell that provides a command-line user interface for a Unix-like operating system. A Unix shell provides a command language that can...
16 KB (1,678 words) - 09:42, 29 July 2025
LAN Manager (redirect from LM hash)
which is the LM hash. LAN Manager authentication uses a particularly weak method of hashing a user's password known as the LM hash algorithm, stemming...
20 KB (1,999 words) - 21:57, 6 July 2025
Rainbow table (category Cryptographic hash functions)
cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such...
24 KB (3,486 words) - 16:16, 30 July 2025
Key derivation function (redirect from Password hash)
passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys into longer keys...
13 KB (1,640 words) - 09:32, 1 August 2025
Shell script (redirect from Unix shell scripting)
A shell script is a computer program designed to be run by a Unix shell, a command-line interpreter. The various dialects of shell scripts are considered...
25 KB (3,137 words) - 04:49, 31 July 2025
files. A more popular approach is to generate a hash of the copied file and comparing that to the hash of the original file. File integrity can be compromised...
6 KB (668 words) - 14:44, 6 June 2024
created to get around the AT&T Unix copyright on BSD. It features many extensions like parallelism, transactional control, hashing, and B-tree storage. LMDB:...
13 KB (1,611 words) - 09:06, 21 June 2025
The Unix file system (UFS) is a family of file systems supported by many Unix and Unix-like operating systems. It is a distant descendant of the original...
17 KB (1,966 words) - 06:52, 12 March 2025
Morris developed a system of storing login passwords in a hashed form as part of the Unix operating system. The system was based on a simulated Hagelin...
80 KB (9,049 words) - 01:54, 6 August 2025