How to use Hash Values
Write a 2 -3 page paper on how one can use hash values to log into a system, crack a network, etc.
Be sure to explain how hash values are used and misused in a system.
Cite your sources!!!!
its related to cryptogarphy
APA format
citations and references.