单词 | hash |
释义 | hashes是hash的复数
复数:hashes 现在分词:hashing 过去式:hashed v. chop,cut up,mince,grind,shred 例句释义: 切碎的食物,拼凑起来的东西,大杂烩,推敲,切细,弄糟,反复推敲,哈希,哈希表,散列 1. He said he wants the authorities to take the hashes harshest measures loud allowed by law against the attackers and those who helped them. 他说,希望民众采取法律允许范围内最严厉的手段惩罚那些袭击者和其同伙。 dictsearch.appspot.com 2. Hashes do not keep the entered items in the same order as they were entered. Hash variables always start with the % sign. 哈希并不保证被保存数值的有序存放,哈希变量名称始终用%符号开始表示。 dictsearch.appspot.com 3. Many programmers who are familiar with languages like C may not know about hashes, which are also called dictionaries or associative arrays. 许多熟悉像C的语言的程序设计人员可能不了解哈希表,它也称作字典或相联数组。 www.ibm.com 4. Have configurations nested more than one layer deep (up to one layer can be handled with the AppConfig hashes). 具有多于一层深度的嵌套配置(直到可以被AppConfig散列处理的一层)。 www.ibm.com 5. Therefore, Samba must keep a separate password database for the Microsoft hashes; this is referred to as the password back end. 因此,Samba必须为Microsoft哈希保留单独的密码数据库;这就被称为密码后台。 www.ibm.com 6. just to clarify: we do not frequently recalculate checksums or hashes of trusted files. We detect in realtime whenever a file is changed. 重申一下:我们不会经常重新评估值得信任的文件,我门会实时监察文件时候被改变。 bbs.kafan.cn 7. Message authentication algorithms generate message hashes and signatures used to detect tampering and forgery. 消息身份验证算法生成用于检测篡改和伪造情况的消息哈希值和签名。 msdn2.microsoft.com 8. When asked to validate a password, the Membership service hashes the presented password, then compares the hash value with its copy. 当验证密码时,会员服务将当前密码散列,并与它的拷贝值进行比较。 www.cnblogs.com 9. The anonymous hashes grab the current section and compound class from the global variables set in other parts of the grammar. 匿名散列从文法其它部分的全局变量集获取当前的节和复合类。 www-128.ibm.com 10. The integrity of downloaded installation files can be verified via checksums or hashes that are offered by serious providers. 可以通过严肃的提供者所给出的校验和或者散列来检验下载的安装文件的完整性。 www-128.ibm.com 1. If the hashes agree, Chktrust. Exe verifies that the signer's X. 509 certificate can be traced back to a trusted root certificate. 如果二者一致,Chktrust.exe将验证签名程序的X.509证书是否可以追溯到受信任的根证书。 msdn2.microsoft.com 2. When a user presents credentials, you can hash the user's password and compare only the hashes of the two. 当用户提供凭据时,您可以散列用户的密码并仅比较二者的哈希。 msdn2.microsoft.com 3. The time consuming part of a rainbow table attack is building the dictionary of hashes . 耗时的彩虹表攻击法是基于字典的词。 dictsearch.appspot.com 4. It hashes (converts) a number in a large range into a number in a smaller range. 它把一个大范围的数字哈希(转化)成一个小范围的数字。 blog.sina.com.cn 5. This means that you need a solid understanding of the interaction of references, hashes, and arrays in Perl. 这意味着需要充分了解引用、散列和数组在Perl中的交互作用。 www.ibm.com 6. In the first part of this article we have examined password hashes and the mechanisms Windows utilizes to create and store these values. 在本文的第一部分中,我们介绍了密码哈希的概念,以及Windows用于创建和存储这些数值的机制。 www.bing.com 7. For layered configurations, AppConfig needs to have custom functions installed to interpret hashes deeper than one level. 对于分层配置,AppConfig需要安装有定制函数,以解释不止一层深的散列。 www-128.ibm.com 8. The number of hashes being recovered simultaneously does not have significant performance impact. 数字切细同时恢复没有重大表现冲击。 dictsearch.appspot.com 9. Fixed crashes and possible action file corruptions when lines containing hashes are written through the CGI editor. 固定的冲击及可能采取的行动提出反腐倡廉工作时,系含有哈希值是通过书面与cgi总编辑。 dictsearch.appspot.com 10. MQV proposes new key-agreement and -transport protocols that prevent such attacks by adding hashes to make them more efficient and secure. MQV提出了新的密钥协商和传输协议,这些协议通过增加散列的方式使其更加高效和安全,从而阻止此类攻击。 www.certicom.com 1. Once a hash is generated you can copy it to the clipboard, or automatically compare hashes to make sure your file is intact. 一旦你生成一个散列可以将它复制到剪贴板,或自动比较杂凑,以确保您的文件是完整的。 www.jisuxz.com 2. The MLDBM module allows complex Perl hashes to be almost seamlessly stored in a local file. MLDBM模块可以将复杂的Perl哈希键值无缝地保存在一个本地文件中。 www.ibm.com 3. You need the mkpasswd program (included in most Linux distributions) for generating the cryptographic hashes of the keystroke signatures. 您需要使用mkpasswd程序(附带于大多数Linux分发版中)才能生成击键签名的密码散列。 www.ibm.com 4. The HashTab makes it very simple for Windows users to check these hashes on any file on the system without using external tools. 该HashTab使Windows用户非常简单的来检查这些文件的哈希值而无需使用外部工具。 bbs.360.cn 5. Provider type, which supports only those functions and algorithms required for hashes and digital signatures. 提供程序类型的子集,它只支持哈希和数字签名所需的那些函数和算法。 msdn2.microsoft.com 6. Hashes of two sets of data should match if and only if the corresponding data also matches. 只有在对应的资料也相符时,两组资料的杂凑才会相符。 technet.microsoft.com 7. Hashes are statistically unique; a different two-byte sequence will not hash to the same value. 哈希在统计上是唯一的;不同的双字节序列不会哈希为同一个值。 msdn2.microsoft.com 8. If different views can be provided for hashes, arrays, and scalars, why stop there? 要为哈希表、数组和标量都提供视图多好呀,为什么不呢? www-128.ibm.com 9. The other argument mitigating the potential severity of this attack is actually derived from the use of hashes. 减小这种攻击的潜在严重性的另一个争论实际上源于散列的使用。 www.ibm.com 10. And for generating encrypted hashes of the mouse-click times, you'll need the mkpasswd program. 并且为了生成鼠标单击次数的加密散列,您需要mkpasswd程序。 www.ibm.com 1. If you work with large arrays or hashes and use them as arguments to functions, use a reference instead of the variable directly. 如果使用大型数组或hash表,并使用它们作为函数的参数,那么应该使用它们的一个引用,而不应该直接使用它们。 www.ibm.com 2. Beyond the basic storage of data, hashes are also important in distributed systems. 除了在数据储存中的应用外,哈希表在分布式系统中的应用也是非常重要的。 www.bing.com 3. If you need nested hashes or arrays, you may have to do it yourself or assist AppConfig. 如果您需要嵌套的散列或数组,则需要自己动手或帮助一下AppConfig。 www.ibm.com 4. Listing 6 provides an example of such a nested eager load using hashes. 清单6给出了使用哈希语法的一个嵌套的立即加载。 www.ibm.com 5. Loads hashes from encrypted SAM recovered from a Windows partition, Vista included. 装载从加密的SAM哈希Windows分区恢复,包括Vista。 wenwen.soso.com 6. In our bank transfer example, assume we use a primitive MAC that hashes the request along with a secret key. 在银行划拨范例中,假设我们使用了一种随秘钥杂凑请求的原始MAC。 www-128.ibm.com 7. NET hashes passwords using a non-reversible encryption scheme, so a new password is sent to the user. NET会使用不可逆的加密方案对密码进行哈希处理,然后将新密码发送给用户。 technet.microsoft.com 8. The Standard version can process up to 10 hashes simultaneously and the Pro version has a technical limit of 32, 000. 标准版本可能处理10同时切细,并且赞成版本有一个技术极限32,000。 dictsearch.appspot.com 9. This example will store booleans, scalars, arrays, and hashes in separate tables. 这个示例将在不同表中存储布尔值、标量、数组和散列。 www.ibm.com 10. The fact that a hash can have attributes that are also hashes should be no surprise. 事实上,hash可以拥有hash属性,这并不奇怪。 www.ibm.com 1. The loadMetaPhones subroutine is straightforward code that creates two hashes of metaphone keys and values. loadMetaPhones子例程是创建变音位关键字和值的两个散列的简单代码。 www.ibm.com 2. In brute force approach, all candidate plaintexts and corresponding hashes are computed one by one. 蛮力的方法,在所有的候选人plaintexts计算和相应的数据。 wenku.baidu.com 3. That's why you should never rely on hashes alone-- always add some salt to your hash so the resulting hash values are unique. 这就是为什么你无论何时都不该仅仅依赖hash——永远给hash加些salt以获得独一无二的hash结果值。 www.infoq.com 4. XML: : Simple converts XML documents to references to hashes and arrays of hashes. Simple将XML文档转换为对散列和散列数组的引用。 www.ibm.com 5. Gperf hashes a predefined set of keywords, then quickly performs lookups for these same keywords. Gperf混编了一组预定义的关键字,然后对这些关键字执行快速查找。 www.ibm.com 6. Disk based hashes is a method to create multidimensional binary trees on disk. 是在磁盘上创建多维二叉树的一个方法。 dbopen.org 7. Arrays and hashes, however, are more complex. 然而,数组和散列更为复杂。 www.ibm.com 8. As mentioned earlier, messages and certificates make use of cryptographic hashes to verify integrity. 正如前面所提到的那样,消息和证书使用加密哈希来验证完整性。 www.ibm.com 9. The module maintains two hashes internally, and automatically creates a reverse mapping in the second one when the first one gets data. 该模块在内部维护两个散列,并在第一个散列获得数据时自动在第二个散列中创建反向映射。 www-128.ibm.com 10. First, the bridgehead servers compare their MD5 hashes to detect any changes to link state information. 首先,桥头服务器比较其MD5哈希值,检测链路状态信息是否发生任何变化。 technet.microsoft.com 1. The following list is ordered by scalar variables first, then the arrays, then the hashes. 下列内容按照先标量变量、后数组、最后散列的顺序排列。 wiki.perlchina.org 2. Hashes are similar to the Java HashMap and Hashtable classes. 散列与Java中的HashMap和Hashtable类很相似。 www-128.ibm.com 3. The technique works by comparing cryptographic hashes instead of real names. 这项技术的原理是比较杂凑加密档案,而非真正的名字。 dictsearch.appspot.com 4. The algorithm hashes to the proper list and then deletes the item from the list. 算法找到正确的链表,从链表中删除数据项。 blog.sina.com.cn 5. The computed hashes are compared with the target hash. 计算数据与目标散列。 wenku.baidu.com 6. As more and more complex keys are matched to hashes, the likelihood of coming up with a match for any given password increases. 随着越来越复杂的关键字被匹配到散列上,匹配到已知密码上的可能性增加了。 www.ibm.com 7. The HMAC process mixes a secret key with the message data and hashes the result. HMAC进程将密钥与消息数据混合,并对结果进行哈希运算。 msdn2.microsoft.com 8. A provider type that, like RsqSig, only supports hashes and digital signatures. 仅支持哈希和数字签名的提供程序类型(例如RsqSig)。 msdn2.microsoft.com 9. Perhaps the biggest complaint with NTLMv2 created hashes is that Windows does not utilize a technique called salting. 对于使用NTLMv2创建的哈希,可能最大的不足在于Windows无法使用一种名为Salting的技术。 www.bing.com 10. Hashes are incredibly useful for accessing data that does not have an obvious ordering. 哈希表在访问没有明显顺序的数据方面难以置信的有用。 www.ibm.com 1. These are common hashes that are used to verify the integrity and authenticity of files. 这些都是常见的、用来验证完整性和真实性的哈希值。 dictsearch.appspot.com 2. Let's look at the three main types of tied variables: scalars, arrays, and hashes. 让我们来研究三类主要的绑定变量:标量、数组和散列。 www.ibm.com 3. Both Git and Mercurial do this by using SHA1 hashes to identify data (files, trees, changesets, etc). Git和Hg都是使用SHA1哈希值来辨别数据(文件、修订树、修改集等等)。 www.bing.com 4. This is especially true if you need to process complex command-line switches to create multi-level hashes. 这对于您需要处理复杂的命令行开关以创建多层散列时尤为有用。 www-128.ibm.com 5. Tied hashes are easier to write than tied arrays, and more useful. 绑定的散列比绑定的数组更易于编写,而且更有用。 www.ibm.com 6. SQL Server 6. 5 Saves password hashes in a format that is no longer supported. SQLServer6.5保存密码哈希的格式不再受支持。 msdn2.microsoft.com 7. Hashes and symbols - using hashes and symbols make it easy to express relationships and identify objects Hash和符号(Symbol)——使用Hash和符号可使表达关系和标识对象更加容易 www.infoq.com 8. Blocks - blocks encapsulate executable logic, and allow the logic to be stored (in hashes) for later execution Block——Block可以封装可运行逻辑,并允许逻辑储存起来(置于Hash中),用于稍后执行 www.infoq.com 9. An array of references to anonymous hashes 一个匿名哈希表的数组引用 wiki.perlchina.org 10. You can also store the properties in one or more named hashes and pass them to the required method: 你也可以将属性存储在一个或多个具名散列中并将需要的方法传递给它们: blog.sina.com.cn |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。