7 Feb 2013 by Sergey Alexandrovich Kryukov
Please see my comment. First question needs clarification, but you can answer it yourself if you read on the rest.First of all, please see:http://en.wikipedia.org/wiki/Cryptographic_hash_function[^],http://en.wikipedia.org/wiki/Sha2[^].If should explain you what happens if you...