Yeah checking hashed values of software is used to confirm changes or lack there of.
I use a piece of a hashed value in encrypted url qury strings to make sure the value wasn't changed between requests. Hash has a ton of uses. On Mar 12, 2015 9:15 AM, "DURETTE, STEVEN J" <sd1...@att.com> wrote: > > Hashes have other uses as well. I pull data from a source database that > has over 3 gigs of data in it and every hour the owners of that database > flag all the rows as updated even if they weren't. I need to pick up just > the changed rows, so I pull down the primary key and a hash of all of the > rest of the fields (but not the changed flag) and compare it to what I have > in my database. If the key matches and the hash doesn't then I pull down > that row. I went from pulling down 3 gigs every hour to just a few hundred > rows (< 1 meg). > > Hashes have all sorts of uses! > > -----Original Message----- > From: Dave Watts [mailto:dwa...@figleaf.com] > Sent: Thursday, March 12, 2015 9:09 AM > To: cf-talk > Subject: Re: Decrypting MD5 > > > > So basically MD5 is useless if you can't decrypt the value! That sucks. > > I don't know about useless. Hashing is not the same as encryption. > They're intended to solve different problems. > > Let's say you're using a Windows network, with Active Directory. > Active Directory doesn't actually know your password, because it > doesn't need to know. All it needs to know is, did you enter the > correct password when you hit Ctrl+Alt+Delete this morning - and it > doesn't need to know what the password is in that case. Your > workstation takes your plaintext password, generates a hash, and sends > it to AD. AD compares the hash to the one it stored when you set your > password in the first place. If they match, there's an extremely high > likelihood that the plaintext passwords match as well. > > Dave Watts, CTO, Fig Leaf Software > 1-202-527-9569 > http://www.figleaf.com/ > http://training.figleaf.com/ > > Fig Leaf Software is a Service-Disabled Veteran-Owned Small Business > (SDVOSB) on GSA Schedule, and provides the highest caliber vendor- > authorized instruction at our training centers, online, or onsite. > > > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Order the Adobe Coldfusion Anthology now! http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion Archive: http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:360242 Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm