Hi Matthias,

--On Samstag, 26. August 2006 02:35 +0200 Matthias Wimmer <[EMAIL PROTECTED]> wrote:

So I'd say which way you are using to generate the resources depends on
your goals. E.g. you might not want to show IP addresses or PIDs to not
leak information about how you set-up your server.

Another way would be, to hash the ip/pid with sha-256 or something like that, so that information would not be leaked, but would be still unique, what is very important for this application.

greetings

Tim

Attachment: pgp9v9lAjysBO.pgp
Description: PGP signature

Reply via email to