Hashes scripts download

[

hashes script overview « 1 - 30 » of 101 scripts

]
«« « 1234 » »»
336 336

... list and hash data structures.Tutorial on Perl ... list and hash data structures. ...

... to be crackable, so this module stores the hashes in ... table using phpass, and removes the insecure MD5 hashes in the user table.Installation ... Unpack in your modules folder ... usually /sites/all/modules/) and enable under Administer ...

... WP user table.InstallationUnpack and upload it to the /wp-content/plugins/ directory.Activate the plugin through the ... menu in WordPress. Demands ...

... sort an array of hashes will sort an array of hashes by keysort an array of hashes ... will sort an array of hashes by key ...

... Sometimes you only want to temporarily do an add, and this is how ... pulled it offSometimes you only want to temporarily do an add, and this is how ...

... defaults in this way gets rather tedious. Fortunately, Ruby's Hash ... when it comes to setting default values, we want this to work the other way ... we only want values in the defaults hash to be merged if ... do not exist in the original hash. Again, Ruby comes to our rescue ...

... will produce an alternative output!The use of var ... will produce an alternative output ...

... The Perl Cookbook is ... comprehensive collection of problems, solutions, and practical examples for anyone programming in Perl. You ...

... hashes, as well as adjustable character libraries. Input text is shuffled according to rules generated COMPLETELY from ... the password, so without the password there is no way to even come close. ... No patterns will remain evident, false patterns will appear. Basically nothing about the encrypted text ...

... This authentication script allows you to protect any number of pages ... that prints out the contents of the protected page after ... user has authenticated. The log in information is stored in ... MySQL database, and the passwords are stored as md5 hashes. ...

... This is an experimental Perl module that allows you to use lists as ... the keys for multi-level hashes. Excellent for parse tree generation and other similar tasks where you need ... to create very deep trees or the tree depth is not known in advance. ... real performance win on very deep trees over ...

... SplitHash is designed for support of file size limitted OSes. It transparently splits ... File database into as many distinct files as desired. It also distributes hash entries between ... the files using ... randomization algorithm. It has the effect of allowing DB ...

... eros provides extensive content management ... as well as permission management with ... specific url to add or edit content. eros relies heavily upon trusted open source technologies such ... for markup within gfiles, polls, etc--basically anywhere that input is accepted from ...

... single master password and various account names, one can create an infinite number of ... unique account passwords.These unique account passwords are commonly called password hashes, domain-specific passwords, or ... per-site passwords.The project aims to provide multiple implementations of its ... account passwords are available at any time.Ports for the Web, ...

... It contains concepts from other programming languages, but it ... direct descendant from any other language. In Seed7, new statements and operators can be declared easily. ... Functions with type results and type parameters are more elegant than ... when other solutions are more obvious. Most important functions of Seed7 ...

... do this via whole program analysis and other language optimizations. Demands ... Happy Haskell parser generatorNews in the current jhc version ... general compiler cache by default rather than object files. This ... means work done by jhc is shared between projects, jhc uses cryptographic hashes ...

... but focuses on efficiency and ease of use. PureFTPd is ... System accounts can immediately have FTP access. Authentication via PAM ... modules is also supported. Accounts below an uid ... 500 for daemon accounts) can be disallowed. ...

... group of people creates and updates one chat-file on ... server with encrypted content for ... private conversation and nobodys business. The file can be accessed ... server where AnoChat runs, and which time to log on. The ...

... This module provides methods for manipulation of database tables. It provides you ... the methods for retrieving and storing data in SQL databases. It also provides methods for all of ... the more important SQL commands ... can delay writes. ...

... on memcached, no data is stored anywhere, and it lets memcached do most of ... the lifecycle management. Atrack also aims to respect your privacy ... what is needed for the most basic tracking (hashes/keys and ip ... and nothing is stored permanently anywhere, not even hashes and ip ... kept in memory until they are expired by memcached and never written to disk or any other ...

... This script uses the md5 module included with python to compute md5 hashes ... of files passed to it on the command line. ...

... The first class generates ... random text within HTML formatting tags. It may return an MD5 or SHA1 hash of the generated ... mathematical operation between two random values is generated by the second class. It may also return ... an MD5 or SHA1 of the operation result. The results of both classes can be ...

... SHA-256, SHA-384 and SHA-512. News in the current jsSHA version ... Added the HMAC algorithm for all supported hashes ... using both ASCII and hex keys)• As ... result of adding HMAC, added support for hash input text to be hex ... ASCII representation of hex)• Added multiple variants of safeAdd functions, resulting in ...

... will generate PHP parse errors due to the way PHP evaluates hashes ... Global variables can be accessed using the usual ... array method. For instance, to get the script URL, you ... method found in most PHP template classes is gone. Instead, all assigned variables must be ...

... It can compare hashes from torrent metadata file with an actual torrent data directory to ... of which files or pieces need to be downloaded again and how much data remains to be ... downloaded in MB. Even if the original torrent data has been updated or changed this class can ...

... setup ruby install.rb install Most important functions of BitStruct:• Extensible with user-defined field classes. ... BitStruct.describe prints out documentation of all the fields of ... inspect and BitStruct#inspect_detailed can be used for prettified display of contents. ...

... simple class CGI wrapping the CGI protocol.Template provides ... simple way to work with templates.Sessions are hashes of strings. Sessions stored in shared memory with ... default key ftok("/tmp/session",57) By default maximum number of sessions is set ... to 512 and maximum session size is set to 2048 bytes.Sessions stored as ...

... Examples for the three listed APIs weren ... chose to do something quick and dirty. "MY_API_KEY" and other params would need to be removed ... to make this more generic.A naive mapping of API method calls that take hashes, and returns an ...

... libferris makes the file system and other hierarchical storage systems easier to use.Other than mounting things as ... filesystem, the other core concept of libferris is extraction of interesting metadata from your libferris ... height of an image file become first class metadata citizens along with ...

... This perl library contains functions for dealing with databases. It ... used as the foundation for all the other Relations modules. It may be useful for people that ... deal with databases in Perl as well.Relations has functions for creating SQL clauses ... from hashes, arrays and strings. It also has functions for converting strings to arrays or hashes, if ...

Scripting hashes programming is written in computer programming languages that is typically interpreted and can be typed directly from a keyboard. Hashes scripts are often distinguished from executable files. This hashes scripts are safe to use virus free and spyware free.

«« « 1234 » »»