Question

Identify two commands in Linux to generate hash value of your name. You can use any...

Identify two commands in Linux to generate hash value of your name. You can use any hash algorithm of your choice. Use CLI mode for this exercise.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

echo "hello" | md5sum // md5 hash calculation
echo "hello" | sha1sum // sha1 sum calculation

if you have any doubt then please ask me without any hesitation in the comment section below , if you like my answer then please thumbs up for the answer , before giving thumbs down please discuss the question it may possible that we may understand the question different way and we can edit and change the answers if you argue, thanks :)

Add a comment
Know the answer?
Add Answer to:
Identify two commands in Linux to generate hash value of your name. You can use any...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • C code: hash program (use the Fowler-Noll-Vo (FNV) hash algorithm) This is a simple program that...

    C code: hash program (use the Fowler-Noll-Vo (FNV) hash algorithm) This is a simple program that you will use in the second part of the assignment. Details of this program is as follows. A hashing algorithm is simply an algorithm that maps data of an arbitrary size into a hash value of a fixed size. On your VM, you should have a program called ”md5sum”, which computes the MD5 hash of a file (or bytes taken from standard input). One...

  • Given the following situation, list any log files or commands that you would use when collecting...

    Given the following situation, list any log files or commands that you would use when collecting information during the troubleshooting process a. A CD_ROM device that worked previously with Linux does not respond to the mount command. b. The system was unable to mount the /home filesystem (/dev/sdaa6) c. A new database application fails to start successfully d. The Modem Manager utility that you have installed cannot recognize any modems on the system e. You have installed a new sound...

  • Demonstrate how you can construct an Iterative Hash h function using the Merkle- Damgard Design. Use...

    Demonstrate how you can construct an Iterative Hash h function using the Merkle- Damgard Design. Use as your compression function f:{0, 1}^v times {0, 1}^b rightarrow {0, 1}^v, AES with 512-bit keys. Explain what the values of v and b will be in your compression function and where in the block cipher (AES) are you using the blocks of the message you want to hash. Using the iterative hash function you just create above, show how a digest for a...

  • These are linux commands. Type cd /usr/share/dict. The file words is the Linux English dictionary. You...

    These are linux commands. Type cd /usr/share/dict. The file words is the Linux English dictionary. You will use egrep to explore this file. Your answers below will be the egrep command that solves the problem. a.List all words that have the letter a followed immediately by the letter z. b.List all words that have the letter a followed sometime later by the letter z (there must be at least one letter in between). c.List all words that start with the...

  • 19. UNIX/Linux normally include two editors: vi and (choose the single best answer). 20. You can...

    19. UNIX/Linux normally include two editors: vi and (choose the single best answer). 20. You can use thecommand to create empty a create b. make c touch d mu 21. Which command can be used to leave vi temporarily to access the command line? 22 If you execute the contents of filel are sorted and the results are stored in file2. a sort file1 -ofile2 b. sort file1 >file2 c sort filel -d file2 d sort filel filez field or...

  • use linux follow instructions , put the commands at each step and screenshot at each step...

    use linux follow instructions , put the commands at each step and screenshot at each step 1.Add a user user1 in the system a)Verify that user1 is created by viewing the passwd file b)What is the primary group of user1? 2.Create a group called cybersecurity a)Verify that the group is created by viewing the group file b)Change the primary group of user1 to cybersecurity c)Verify that the primary group of user1 is changed to cybersecurity 3.Log into user1 account 4.Create...

  • Questions: 1) Write a simple program to create three processes using fork() commands. Use any three...

    Questions: 1) Write a simple program to create three processes using fork() commands. Use any three of the six system calls to show how each child process executes new sub-programs using exec’s minions. Show the output of each of the child process with different data samples.   2) Write a simple program in your Linux environment using C++ to identify PID, PPID and GID for the processes created in Question 1 and display the real and effective user ID.   3) Modify...

  • 4. (15%) Show the commands you would use change the current working directory from student’s home...

    4. (15%) Show the commands you would use change the current working directory from student’s home directory: /home/student to the student’s apache web directory:/var/www/student using: a. (5%) A series of relative commands b. (5%) A single relative command c. (5%) A single absolute command 5. (20%) Suppose you are presently in the /home/student folder and you wish to copy a file (file3.jpg) from the /home/seed/pics directory to your current directory. Provide two sets of copy commands to accomplish your goal:...

  • For this task you will create a reverse SHA lookup website. A user will be able...

    For this task you will create a reverse SHA lookup website. A user will be able to provide a SHA hash value, and you should present the string that created the SHA value. You are given 3 input files, sha1_list.txt, sha224_list.txt, and sha256_list.txt. Each file has the given word followed by its hash value, separated by a colon. Each file uses the algorithm specified in the file name. 2) A user should be able to access an html file called...

  • You are working as the software developer and need to identify the best sorting algorithm. Please...

    You are working as the software developer and need to identify the best sorting algorithm. Please refer to the following URL: https://www.geeksforgeeks.org/sorting-algorithms/ You can pick any two-sorting algorithm. You need to determine which sorting algorithm is the best to sort the array of 10k elements. Use the following steps to help with your solution: Create C++ functions for any two-sorting algorithm. Write down the random array generation function to generate at least 10k elements. Pass the same array into both...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT