The document discusses implementing hash codes using two different hashing algorithms, MD5 and SHA-1. It also mentions gaining exposure to common network tools used on Linux and Windows systems such as Nessus and Wireshark.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
The document discusses implementing hash codes using two different hashing algorithms, MD5 and SHA-1. It also mentions gaining exposure to common network tools used on Linux and Windows systems such as Nessus and Wireshark.
The document discusses implementing hash codes using two different hashing algorithms, MD5 and SHA-1. It also mentions gaining exposure to common network tools used on Linux and Windows systems such as Nessus and Wireshark.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
The document discusses implementing hash codes using two different hashing algorithms, MD5 and SHA-1. It also mentions gaining exposure to common network tools used on Linux and Windows systems such as Nessus and Wireshark.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd