Cryptographic hash function
Also, the presence of additional software on a server can make a system more vulnerable to attack. 5. * Free space on a hard disk is space that you can use for partitions. A affiliates is a data structure that resides in a partition. 7. *If the system experiences a catastrophic failure and the hard disks are destroyed or missing, RAID will be useless. You cannot use RAID to replace a file when it is deleted by accident. 9. * SHAH (Secure Hash Algorithm 2) is a one-way hash function.
A one-way unction takes a variable-length message and produces a fixed-length hash (string of characters). When you run SHAH against a file, it always produces the same hash. If the file is changed, SHAH produces a different hash. When Bunt creates an ISO image file, it runs SHAH against the file and publishes the resulting hash. After you download the file and run SHAH against the downloaded copy of the file, if the resulting hash is the same as the one Bunt published, the file is correct.