It's that time again. Let's see what people have been searching for...
winnie the pope A bear of very little brain? Very long abstain? Very much ordain?
Legitimate power in the workplace I haven't seen it yet. Have you?
drag drop Lotus Notes C sample If you mean doclinks, I haven't seen this, either.
repair outlook express dx I have just one word for you: uninstall
things going on in nashua nh Wherever I go, here I am
which template is the rule in lotus inbox all your rules are belong to (wRulesDlg)
what is schwartz I wish I knew
tom cruise matt lauder Quite the opposite, actually
Purifying hash Cryptographers are working on this very hard, but somehow I don't think that's what you had in mind
the child null in chad I think I saw a public service announcement about this on cable very late at night
Hanover IBM Notes Try another "n", unless you're interested in Northern New Hampshire
1. Stan Rogers07/02/2005 06:55:10 PM
I've been working with the Purifying hash algorithm, and I have to say that I can't see much practical use for it. The problem is that in order to completely purify the has, all data have to be removed, so all word lengths, character values and rotations are set to zero before the hash is first produced, then all of the hash bits are set to zero before the hash length is set to zero. The purified hash is then Base64-encoded, then trimmed to a null string before being returned. While it is perfectly secure in that one cannot brute force the original message, there seems (to me at least) to be an insurmountable problem with collisions. And there's a lot of code there to return "".