Hashing Algorithms and Security

By Akemi Iwaya on November 11th, 2013

If you need to be sure that a file has been transferred or received intact and in one piece, then a hash algorithm is an excellent way to verify that. YouTube channel Computerphile discusses what hash algorithms are and how they work in their latest video.

Hashing Algorithms and Security – Computerphile

Akemi Iwaya is a devoted Mozilla Firefox user who enjoys working with multiple browsers and occasionally dabbling with Linux. She also loves reading fantasy and sci-fi stories as well as playing "old school" role-playing games. You can visit her on Twitter and .

  • Published 11/11/13
More Articles You Might Like

Enter Your Email Here to Get Access for Free:

Go check your email!