All Hashed Up
An interesting presentation (5.2MB PDF file) on computer forensics I stumbled across a while back discusses, in part, the benefits (and shortcomings) of rolling hashes versus the more conventional type used for file analysis, at least in the context of forensic identification of computer files. Rather than explain how the whole thing works, I’ll just point you to the file, which covers a multitude of other very interesting stuff, as well. However, I must warn you, that, well, the presentation contains imagery that many may find objectionable. Indeed, just consider the prominent warning:
Read the rest of this entry »
