HASH


Also found in: Dictionary, Thesaurus, Medical, Financial, Idioms, Encyclopedia, Wikipedia.
Related to HASH: hashtag
AcronymDefinition
HASHHarris's Hawk (bird species)
References in classic literature ?
Alphonso--that's the big buck leopard--got nasty this morning and settled his hash.
Do," said the Hungry Tiger; "and if he makes hash of you I'll willingly eat you for breakfast tomorrow morning.
In like manner, we shall represent human nature at first to the keen appetite of our reader, in that more plain and simple manner in which it is found in the country, and shall hereafter hash and ragoo it with all the high French and Italian seasoning of affectation and vice which courts and cities afford.
Ye've made a sore hash of my brig; I haven't hands enough left to work her; and my first officer (whom I could ill spare) has got your sword throughout his vitals, and passed without speech.
It's very probable, sir, that you won't be wanted upstairs for several minutes, Sir, because MY master is at this moment particularly engaged in settling the hash of YOUR master, Sir; and therefore you'll have leisure, Sir, for a little private talk with me, Sir.
Napoleon, the pyramids, Waterloo, and a wretched skinny old woman, a pawnbroker with a red trunk under her bed--it's a nice hash for Porfiry Petrovitch to digest
Typical Platter: Mercifully, omelettes usually come with "just" hash browns and least with margarine or butter.
EnCase Enterprise, powered by Bit9, solves the increasingly complex problems of keeping file hash libraries and machine profiles up to date, and allowing users to recognize unknown executables, so they can zero in on relevant threats.
By selecting a network-enabled forensics product, administrators can remotely search for known-bad file hash values, recover deleted files, or search files and disks for keywords.
Brand Product UPC Code Simply Potatoes Shredded Hash Browns - 20 oz.
New functionality in the application programming interface (API) for Tripwire Enterprise automates the search for malicious hashes by allowing customers to quickly determine whether a bad hash value exists on monitored systems.
The DesignWare Security IP for SHA-3 is available as a standalone, configurable hash core, or as part of the cryptography software library or integrated in a security subsystem