The SET PASSWORD statement allows changing the password for a user in the MySQL server. Provided password is interpreted as a clear text string. The password is passed to the...
SHA-1 is a cryptographic hash function that accepts a string of any length and returns a 160-bit fixed-length digest value, commonly represented as a sequence of 40 hexadecimal digits. SHA-1...
Adler-32 is a checksum calculation algorithm which is commonly used to validate data integrity. It allows to detect data corruption. Adler-32 is used by zlib compression library. Adler-32 checksum is...
Random integer is a number produced by a generator, whose result is unpredictable and does not have any pattern. Programming languages provides various methods to generate random integer in a...
Unix timestamp is the number of seconds that have elapsed since the Unix Epoch (January 1 1970 at 00:00:00 UTC). It is a way to track time. 2,147,483,647 is a...
Working with dates and times sometimes we need to handle different time zones. Programming languages provides various methods to convert date and time from one time zone to another. A...
CRC32 is a checksum calculation algorithm which is commonly used to validate data integrity being transmitted. It allows to detect data corruption. CRC32 checksum is usually represented as an integer...
A hostname is a unique identifier that is assigned to a device (host) connected to the network. A reverse DNS resolution is a process which is used to determine a...
A hostname is a unique identifier that is assigned to a device (host) connected to the network. A hostname resolution is a process which is used to determine an IP...
Random-access memory (RAM, also known as physical memory) is a volatile memory that holds instructions and data of currently running programs. A data is lost when the system is powered...