Encryption is a two way process.
Hashing is unidirectional.
In order to find the source value of hashed text,
we need to hash all the optional strings (for example: hash a column data from a table), and to compare to the hashed string.
The copy-pastes and explanations blog for SQL code, errors and daily cases! This blog is a 'list' of actions that always good to have available. The copy-paste concept here is short and clear explanations and descriptions (no long stories!) and - of course - the code to take (copy) and use (paste). The blog deals in the database (mostly) and software issues.
No comments:
Post a Comment