• hash is a command on Unix and Unix-like operating systems that prints the location information for the commands found. The hash command has also been...
    2 KB (204 words) - 18:10, 26 February 2025
  • hashes. Salting also makes it extremely difficult to determine if a person has used the same password for multiple systems. Earlier versions of Unix used...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • Look up hash in Wiktionary, the free dictionary. Hash, hashes, hash mark, or hashing may refer to: Hash (food), a coarse mixture of ingredients, often...
    2 KB (336 words) - 19:13, 29 July 2025
  • Thumbnail for Passwd
    Passwd (category Unix authentication-related software)
    password hashes separate from the other data in the world-readable passwd file. For local files, this is usually /etc/shadow on Linux and Unix systems...
    16 KB (1,958 words) - 07:04, 22 July 2025
  • sha-bang, hashbang, pound-bang, or hash-pling. When a text file with a shebang is used as if it were an executable in a Unix-like operating system, the program...
    25 KB (3,233 words) - 14:31, 31 July 2025
  • Number sign (redirect from Hash sign)
    The symbol # is known as the number sign, hash, or (in North America) the pound sign. The symbol has historically been used for a wide range of purposes...
    42 KB (4,333 words) - 11:39, 5 August 2025
  • Md5sum (redirect from Md5sum (Unix))
    128-bit MD5 hashes, as described in RFC 1321. The MD5 hash functions as a compact digital fingerprint of a file. As with all such hashing algorithms,...
    5 KB (470 words) - 13:50, 17 January 2025
  • the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a...
    15 KB (1,775 words) - 00:53, 23 January 2025
  • Thumbnail for Bash (Unix shell)
    developed for Unix-like operating systems. It is designed as a 100% free alternative for the Bourne shell sh and other proprietary Unix shells. Bash has...
    123 KB (10,522 words) - 02:09, 6 August 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,300 words) - 10:48, 24 July 2025
  • a checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions"....
    10 KB (279 words) - 12:52, 24 May 2025
  • common GNU Unix-like utilities. The Wikibook Guide to Unix has a page on the topic of: Commands List of Unix commands which (command) hash (Unix) "Use Type...
    4 KB (305 words) - 22:07, 19 February 2025
  • Crypt (C) (category Cryptographic hash functions)
    both to generate a new hash for storage and also to hash a proffered password with a recorded salt for comparison. Modern Unix implementations of the...
    28 KB (3,039 words) - 23:27, 21 June 2025
  • commonly found on various Unix versions (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended...
    8 KB (782 words) - 01:16, 12 April 2025
  • Thumbnail for Cron
    Cron (redirect from Crontab (Unix command))
    Chronos, the Greek word for time. The command is generally available on Unix-like operating systems. The actions of cron are driven by a crontab (cron...
    26 KB (3,262 words) - 02:18, 5 August 2025
  • Thumbnail for List of POSIX commands
    which is part of the Single UNIX Specification (SUS). These commands are implemented in many shells on modern Unix, Unix-like and other operating systems...
    22 KB (168 words) - 02:46, 5 August 2025
  • plaintexts, and does not require user interaction. There is also a Unix password hash function with the same name, crypt. Though both are used for securing...
    7 KB (718 words) - 20:05, 18 August 2024
  • to create ElfHash or Elf64 hash that is used in Unix object files with ELF format. Allen Holub has created a portable version of PJW hash algorithm that...
    2 KB (263 words) - 12:47, 25 October 2024
  • MD5 (redirect from MD5 Hash)
    is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and...
    46 KB (4,710 words) - 10:55, 16 June 2025
  • cryptographic hash, such as a SHA-256 based checksum, or the use of read-only media.[citation needed] There are viruses and worms that target Unix-like operating...
    5 KB (524 words) - 13:11, 2 February 2025
  • Thumbnail for Unix shell
    A Unix shell is a shell that provides a command-line user interface for a Unix-like operating system. A Unix shell provides a command language that can...
    16 KB (1,678 words) - 09:42, 29 July 2025
  • LAN Manager (redirect from LM hash)
    which is the LM hash. LAN Manager authentication uses a particularly weak method of hashing a user's password known as the LM hash algorithm, stemming...
    20 KB (1,999 words) - 21:57, 6 July 2025
  • Rainbow table (category Cryptographic hash functions)
    cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such...
    24 KB (3,486 words) - 16:16, 30 July 2025
  • Thumbnail for Key derivation function
    passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys into longer keys...
    13 KB (1,640 words) - 09:32, 1 August 2025
  • Thumbnail for Shell script
    A shell script is a computer program designed to be run by a Unix shell, a command-line interpreter. The various dialects of shell scripts are considered...
    25 KB (3,137 words) - 04:49, 31 July 2025
  • NTLM (redirect from NT Hash)
    CC2, domain name) v2-Hash = HMAC-MD5(NT-Hash, user name, domain name) LMv2 = HMAC-MD5(v2-Hash, SC, CC) NTv2 = HMAC-MD5(v2-Hash, SC, CC*) response = LMv2...
    29 KB (3,408 words) - 17:14, 6 January 2025
  • files. A more popular approach is to generate a hash of the copied file and comparing that to the hash of the original file. File integrity can be compromised...
    6 KB (668 words) - 14:44, 6 June 2024
  • created to get around the AT&T Unix copyright on BSD. It features many extensions like parallelism, transactional control, hashing, and B-tree storage. LMDB:...
    13 KB (1,611 words) - 09:06, 21 June 2025
  • The Unix file system (UFS) is a family of file systems supported by many Unix and Unix-like operating systems. It is a distant descendant of the original...
    17 KB (1,966 words) - 06:52, 12 March 2025
  • Thumbnail for Password
    Morris developed a system of storing login passwords in a hashed form as part of the Unix operating system. The system was based on a simulated Hagelin...
    80 KB (9,049 words) - 01:54, 6 August 2025