Hi Matthias,--On Samstag, 26. August 2006 02:35 +0200 Matthias Wimmer <[EMAIL PROTECTED]> wrote:
So I'd say which way you are using to generate the resources depends on your goals. E.g. you might not want to show IP addresses or PIDs to not leak information about how you set-up your server.
Another way would be, to hash the ip/pid with sha-256 or something like that, so that information would not be leaked, but would be still unique, what is very important for this application.
greetings Tim
pgp9v9lAjysBO.pgp
Description: PGP signature