1958 Országos Bajnokság I (men's water polo)

1958 Országos Bajnokság I (men's water polo) was the 52nd water polo championship in Hungary. There were ten teams who played two-round match for the title.

OB I
Season1958
ChampionsSzolnok
1957
1959

Final list

# Team M W D L G+ G- Diff Pts Notes
Szolnoki Dózsa1812608732+5530Champion
Újpesti Dózsa1811527041+2927
BVSC1811348675+1125
4 Vasas SC189638760+2724
5 Ferencvárosi TC1810447357+1624
6 Bp. Honvéd188465859−120
7 Újpesti Tungsram TE1861114456−1213
8 Bp. Spartacus1843114966−1711
9 Bp. Vörös Meteor1822144294−526
10 MTK1800183894−560Relegated to Országos Bajnokság II

* M: Matches W: Win D: Drawn L: Lost G+: Goals earned G-: Goals got P: Point

1958 OB I Champions

Szolnoki Dózsa
3rd Title
Dr. Ottó Boros, István Brinza, Dr. Ferenc Hasznos, György Hegmann, Tivadar Kanizsa, József Kelemen, István Koncz, Ferenc Kuczora, István Pintér, Kázmér Szegedi Varga
Head coach: István Goór

Sources

  • Gyarmati Dezső: Aranykor (Hérodotosz Könyvkiadó és Értékesítő Bt., Budapest, 2002.)


gollark: Even if you reverse-engineer where it gets the hashes from and how it operates, by the nature of the thing you couldn't work out what was being detected without already having samples of it in the first place.
gollark: Anyway, the generality of this solution and the fact that they'll probably keep the exact details private for "security"-through-obscurity reasons also means that, as I have written here (https://osmarks.net/osbill/) in a blog post tangentially mentioning it, someone could just feed it hashes for, say, anti-government memes and find out who is saving those.
gollark: Although I suppose that *someone* probably keeps the originals around in case they have to change the hashing algorithm.
gollark: It's trickier on images (see how PyroBot does it...) but not impossible. (since you want moderately fuzzy matching, unlike SHA256 and such, which will produce an entirely different hash if a single bit is flipped)
gollark: Through the magic of cryptography, you can condense arbitrarily big files down to a fixed-length fingerprint and check if that matches, with basically-zero false positive risk.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.