#hashing
Explore tagged Tumblr posts
moult · 1 year ago
Text
Tumblr media
fox, furze, flowers, flour
brush-tails rush trails
26 notes · View notes
megcheese · 2 years ago
Text
The Scrunchie Problem
Last year in August I had a brilliant idea.  I will use some scrap red sequined fabric from my stash and create a couple scrunchies for the annual Red Dress Run.  It will be easy!  I already have everything I need:  fabric, elastic, thread, sewing machine.  I can knock these out in an hour or two. 
So I pull out the quilting cutting mat and fabric pizza wheel and make 2” strips. And thinking about how I’d like my seams to be both clean and easy, I sew the short ends of the fabric to make a loop first.  Then the long edge leaving about 1” hole for turning the fabric. 
But when I go to turn the fabric after making those seams, I get stuck.  At first, I think I’m just physically stuck.  The pencil I’m using to turn the fabric tube inside out is starting to get gunked up from the sequin glue.  And I can��t seem to get the full turn out. 
My hole must be too small and my fabric tube too narrow.  That’s okay.  I will sew the next strip the same way but leave a larger hole.  But this time when the turn out won’t seem to complete, I realize what I’ve done wrong.  My wrong-side-out shape was a doughnut.  But my right-side-out shape was… tube snake.
Tumblr media
Do you remember these toys?  IT’s a tube filled with water or gel and when you squeeze it, the inner part shoots to the outside and the entire thing pops out of your hand. 
So how did my doughnut become a tube snake?  
Both shapes are a form of a torus, or a circular toroid.  The torus has two raidii, where r is the radius of a wedge of the doughnut and R is the radius of the entire doughnut ring.  If we think of our donut ring as a latitude ring, once we turn it inside out, the latitude has become a meridian.  So, our two radii have swapped places.  Little r is now the overall radius and big R is now the wedge cross-section radius.  Our shape has a large difference in scale between the two radii, so the new shape isn’t a doughnut. We get our tube snake.  The tube snake is still a toroid, just a doughnut that has been stretched out to be tall. 
Now that we understand the geometry, how do we sew a scrunchie correctly?  I felt the internet had a lack of good instructions for this task, despite seeming so simple and like it would be a common craft idea.  So I’m here to help! 
Scrunchie Sewing Pattern Instructions
1.  Cut out a strip of fabric.  2” was a bit narrow, 4” makes a good average sized scrunchie, and 6” will make a big bold scrunchie.  The length should be about 24”, but exact measurements are not important. 
2. Fold your fabric in half “hot dog” style and pin the long edges together.  Sew the long edges together leaving a gap between 1” and 2” in the center. 
Tumblr media
Fabric Key
Tumblr media
Step 2
3. Now we have to bring the short edges together by pulling one end inside of the fabric tube.  We are making the tube snake on purpose!  The shape will be turned such that the right side of the fabric is the inside surface of the tube snake and only the wrong side is exposed.  Align the raw short edges of the tube.  Pin and sew the complete ring.  Please note that this seam is the entire circumference of little r and only through two layers of fabric. 
Tumblr media
Step 3
4. Now when we turn our shape with the right-side-out, we will have one big long doughnut. 
5. Measure out a strip of elastic.  I usually use ¼” width elastic and about 8” of length, but I have very thick hair and regularly destroy hair ties.  Adjust based on your fit. 
6. Feed the elastic strip through the tube taking care not to lose the tail end.  I like to use two safety pins: one securing the tail to the opening and the second to help me feed through the tube.  Sew the ends of the elastic to each other in a flat seam. 
7. Last step is to close the opening.  If you’re feeling fancy you can breakout the hand needle and close with an invisible (ladder) stitch.  But if you’re a machine girl, tuck the raw edges in and sew a short straight seam over the opening. 
And you’ve done it!  You made a scrunchie! 
Tumblr media
Bonus Round! 
What if I wanted to use an off-the-shelf hair elastic instead of a strip?  I had black chiffon scraps from a jumpsuit that was too long for my petite height.  My white ¼” elastic would be visible (and unattractive) in a scrunchie made from that fabric.  How would I get an already looped black elastic in there?  I under-thought my very 1st scrunchie attempt.  Time to OVER-think it!
In order to get your already loop-shaped hair elastic in your scrunchie, the elastic needs to be integrated in step 1.  That means when you fold your strip in half hot dog style, the hairtie is already in the hotdog bun.  Fold the fabric around the loop.  Part of the hair elastic will be exposed at the ends of the fabric strip. It will look like an inside-out scrunchie already.  Take care when sewing your long edge seam to stretch the section of fabric under the machine.  Don’t let the scrunchie folds get sewn in. 
When you turn your fabric to sew the short edge seam, about half of your hair elastic will be exposed with the other half inside the tube snake. This time you need to be sure not to catch the elastic when you sew the seam.
And here comes the magic.  When you turn the fabric right-sides out, the hair elastic is carried to the inner tube.  Close your last opening as before.
 
Tumblr media Tumblr media
Can you even tell that I went the extra mile to use a black elastic?
Applications to other sewing projects
My most recent sewing project is a bridesmaid’s dress for me to wear at my sister’s wedding.  My requirements were fairly open:  black chiffon, maxi length.  So I decided to make my own and selected a pattern from Simplicity, S8870 in “View A.” 
Tumblr media Tumblr media
You’ll notice that the dress has a one-strap design with a loose drape that is attached at the left shoulder and then hangs over the right arm.  The steps of the pattern have you sew that drape into the shoulder seam before any other steps that associate the overlay and lining or front and back of the bodice.  Next, I had to understitch the neckline.  Then came my secret application of The Scrunchie Problem.
“38. Tightly roll up drape for View A or Sleeve for View D.  FOR VIEWS A, B, D- Stitch lining to bodice at entire armhole edge being careful not to catch drape for View A or sleeves for View D.” 
I couldn’t see the drape anywhere in the diagram for that step so I rolled my drape cinnamon roll style and pulled it out of the way of my new seam.  But I made the mistake of pulling it to the outside of my new seam.  I did it again! I created a new tube snake that I can never pull my drape all the way out of! 
The correct interpretation of that step was to roll the drape dosa style and hide within the shoulder section.  That’s why I couldn’t see it in the diagram. 
Wrap up
I hope I've inspired you to make a scrunchie. It’s a great use for scrap fabric. Especially from maxi dresses that us unfortunate, short ladies had to cut several inches off of the bottom. 
What should I share next? Finished bridesmaid dress? Finished wedding present quilt? Or something I haven't even decided to make yet?
Tumblr media
5 notes · View notes
thehumanmechanic · 2 days ago
Text
FUCK, thinking of tags is making me laugh.
0 notes
crypto28ro · 1 month ago
Text
Blockchain-ul pentru Protecția Drepturilor de Autor
Sisteme Descentralizate care Asigură Urmărirea și Remunerarea Creatorilor 1. Introducere Drepturile de autor (copyright) și gestionarea lor adecvată stau la baza economiei creative, oferind în mod tradițional un cadru legal ce permite creatorilor de conținut (autori, muzicieni, cineaști, designeri, fotografi etc.) să controleze difuzarea lucrărilor lor și să beneficieze financiar de pe urma…
0 notes
amomorii · 3 months ago
Text
Tumblr media
Yule Ball, 1994
"Can we talk?"
9K notes · View notes
toyastales · 6 months ago
Text
Tumblr media
Breakfast Platter
9K notes · View notes
fortunatelycoldengineer · 8 months ago
Text
Tumblr media
Test Your Knowledge: Quiz Challenge!!! 📝🧠
Which hash function is used in the division method?🤔
For more interesting quizzes, check the link below! 📚 https://bit.ly/42qN0sr
For the explanation of the right answer, you can check Q.No. 20 of the above link. 📖
0 notes
algobuddy · 1 year ago
Text
youtube
1 note · View note
micro-pc-tech · 1 year ago
Text
Which of the following is a technique used to protect data integrity?
Which of the following is a technique used to protect data integrity? A. Encryption B. Hashing C. Steganography D. Both A and B
The correct answer is:
D. Both A and B
Both encryption and hashing are techniques used to protect data integrity.
Encryption is primarily used to protect data confidentiality by encoding information so that only authorized parties can access it. However, some encryption methods also offer integrity protection by including checksums or cryptographic hashes to detect if the data has been altered.
Hashing is a technique that involves creating a fixed-size hash value from a set of data. It is used to verify the integrity of the data by comparing the hash value of the data before and after transmission or storage to check for any alterations.
Therefore, both encryption and hashing can be used to protect data integrity. Steganography, while useful for hiding information within other files or media, does not inherently protect data integrity.
0 notes
jcmarchi · 1 year ago
Text
7 tips for preventing pernicious password-based breaches - CyberTalk
New Post has been published on https://thedigitalinsider.com/7-tips-for-preventing-pernicious-password-based-breaches-cybertalk/
7 tips for preventing pernicious password-based breaches - CyberTalk
Tumblr media Tumblr media
EXECUTIVE SUMMARY:
Remember the infamous 2021 SolarWinds supply chain attack? Cyber criminals were able to coordinate the attack because an intern rendered the password ‘solarwinds123’ publicly accessible via a GitHub repository, in 2018. While this led to an extreme business compromise situation, SolarWinds is not the only organization that’s ever struggled with password management…
World Password Day is celebrated on the first Thursday in May and serves as an annual reminder to reevaluate and upgrade organizational password security.
In fact, research shows that eighty-one percent of corporate data breaches occur due to poor password management — an avoidable problem that can cost an organization as much or more than $4.35 million, which is the average cost of a data breach.
Despite the seeming triviality of passwords, as evidenced by the SolarWinds episode, it can prove exceedingly difficult for organizations to recover – financially and reputationally – from password-based breaches. In this article, brush up on best practices for preventing serious incidents that start with a password.
7 tips for preventing password-based breaches
1. Leverage strong password requirements. Although no password is ever entirely hack-proof, longer passwords are challenging for cyber criminals to guess, decipher or otherwise exploit.
Require a minimum number of password characters, a mix of upper and lower case letters, numbers and special characters. In addition, due to the nature of cyber criminal tactics, consider disallowing the use of dictionary words, common phrases and personal information within passwords.
2. Enable multi-factor authentication (MFA). In the event that a password or multiple passwords are compromised, multi-factor authentication (MFA) provides an extra layer of security. MFA should be applied for all user accounts and critical systems.
One factor in the MFA model is typically a standard password – something that the employee knows. While another factor, like a code received via text, is generally something that the employee has. Biometrics can theoretically represent yet another factor, however, experts advise against widely applying biometric authentication mechanisms for security purposes.
3.“Hashing” and “salting” passwords. These protocols are recommended by the National Institute of Standards and Technology (NIST). In case the terms are unfamiliar, NIST defines a hash as “a function that maps a bit string of arbitrary length to a fixed-length bit string”. In other words, the practice of hashing effectively scrambles the password characters in a way that ensures that a database never exposes a list of plain text passwords to cyber criminals. Salting involves adding supplementary data to passwords ahead of hashing, rendering stored passwords particularly challenging to exploit.
4. Educate and empower employees. Ensure that your organization’s employees are aware of common phishing tactics used to gain passwords. Emphasize that hackers commonly pose as trustworthy parties and/or may send users malicious webpages through which to input credentials. When it comes to employee education, review a variety of plausible scenarios through which cyber criminals may attempt to pinch passwords. Empower employees to protect their credentials.
5. Leverage a lockout mechanisms. NIST suggests locking a user out of password protected accounts in the event that an incorrect password has been input multiple consecutive times. NIST says that no more than 100 login attempts should be permitted. Many organizations opt to lock accounts after three to five incorrect login attempts.
6. Apply the principle of least privilege. Provide employees with the privileges that they require in order to effectively complete job requirements. Avoid providing employees with superfluous permissions. This way, in the event of account compromise, the damage will likely be limited.
7. Respond to suspicious activity. Set up alerts that can provide your team with information about suspicious activities, such as a substantive series of failed login attempts from unfamiliar locations. Ensure that your team investigates and responds to these alerts, as this will help prevent potential breaches.
For more password security insights, please see CyberTalk.org’s past coverage. To receive inspiring cyber security insights, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.
0 notes
lonndoodles · 1 year ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
HEAD CANON: What if walking mushrooms sat on decaying corpses to get their nutrients. A useful tactic when they roam dungeon areas that aren't their typical environments and can't provide them food so this is how they adapt 👀 hufhufhfuf
alternatively:
Tumblr media
14K notes · View notes
frog707 · 1 year ago
Text
I love hash tables.
0 notes
bacchuschucklefuck · 9 months ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
no more fan-ta-sizing about it! everything's already changed~
#dimension 20#fantasy high junior year#fhjy#figueroth faeth#riz gukgak#adaine abernant#fabian seacaster#gorgug thistlespring#kristen applebees#fh class quangle#my! class swap thing! I guess this is like the poster for it now#got overinvested and finished it properly instead of winging it lol#in closeup order: cleric!gorgug; bard!riz; rogue!fabian; sorcerer!kristen; barbarian!fig; artificer!adaine#this one does have the harpoon gun I'd give fabian during sophomore year but literally only figured out for this piece lol#I like how it looks tho Im glad I hashed it out#thinking abt power armor adaine a lot tbh... she has the transhumanist audacity. she's villain-adjacent enough#to attempt unspeakable acts of body improvement#(its funny bc to wear a rig like that would Also demand a certain level of physical strength from you)#also yeah this is the thing with riz holding a megaphone that got me considering#its fun! it fits the aesthetics! maybe it'd grant him range for bardics#maybe he gets to keep that Im just not sure how he'd carry it around lol#fig gets to have all of her makeup... I like almost never remember to draw it usually kdsjfhdjk listen. I just forgor#I always forget makeup is real#also dont ask me what's in kristen's thermos it Is usually tea but you truly never know#sometimes its soup. it can be lighter fluid. soap perhaps. hot chocolate#also if u come knocking on my door abt kristen's somatic in this piece: I wont be home#she gets to be gross especially bc shes funny and 17yo and gay. we give it to her#okay I. whoo I should lay down. finally I can move on to other things#cheers! wahoo. yahha perhaps
4K notes · View notes
greenisms · 1 year ago
Text
Call me Dracula with the way I gotta do everything around this fucking house
6K notes · View notes
crypto28ro · 2 months ago
Text
X16R – Algoritmul Dinamic de Proof-of-Work pentru Criptomonede
IntroducereÎn lumea criptomonedelor, algoritmii de proof-of-work (PoW) sunt esențiali pentru securizarea rețelelor și validarea tranzacțiilor. Unul dintre acești algoritmi inovatori este X16R, folosit inițial de criptomoneda Ravencoin și adoptat de și alte proiecte alternative. X16R se remarcă prin utilizarea unei lanțuri dinamice de 16 funcții de hashing, menită să descurajeze centralizarea…
0 notes
stump-not-found · 3 months ago
Text
Tumblr media Tumblr media Tumblr media
an old comic i drew as kind of a vibe check for a longer form comic i've been chewin on since TBOB came out, "Nevermind All That"
as a concept its got bill's perspective torn between earth and theraprism . lotta stupid introspection . like the sopranos but if it was written by someone who has never watched the sopranos and knows nothing about the sopranos
2K notes · View notes