Explore >> Select a destination


You are here

waterpigs.co.uk
| | crackstation.net
9.2 parsecs away

Travel
| | How to hash passwords properly using salt. Why hashes should be salted and how to use salt correctly.
| | notes.volution.ro
8.2 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | lsd.gnunet.org
8.6 parsecs away

Travel
| | This document contains the R 5 N DHT technical specification. R 5 N is a secure distributed hash table (DHT) routing algorithm and data structure for decentralized applications. It features an open peer-to-peer overlay routing mechanism which supports ad-hoc permissionless participation and support for topologies in restricted-route environments. Optionally, the paths data takes through the overlay can be recorded, allowing decentralized applications to use the DHT to discover routes. This document defines the normative wire format of protocol messages, routing algorithms, cryptographic routines and security considerations for use by implementers. This specification was developed outside the IETF and does not have IETF consensus. It is published here to guid...
| | www.dzombak.com
25.2 parsecs away

Travel
|