@bmm6o already answered your main question.
To answer your PPS: the data shown on that webpage is not a hash of any kind. It is an encoding of a structure, using a method called PEM, originally developed for a complete Privacy Enhanced Mail scheme which fell by the wayside, but the PEM encoding is still used a good deal in cryptography. In general that consists of "BEGIN" and "END" lines surrounding base64-encoded data, which is usually an ASN.1 DER structure. For a public key, the DER structure is the SubjectPublicKeyInfo field defined by X.509, the most widely used standard for digital certificates. For example the initial (apparently default) value I see on the webpage
-----BEGIN PUBLIC KEY-----
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCrSwmLyDboN9ElaE2gv42VqkKq
en2NWg4nyBd+1by70lwAPMuEuUiIvSb+5f52wH93zPEdt0W/2ugMQB24eprS+2Gy
PEllSB8o7sPOMgNV3KYAWjCTllpoCCjPcbNNPaFr7Lq/31yC9fBcgcgStz77xmUB
etNPd6J0OKj3vDLBSwIDAQAB
-----END PUBLIC KEY-----
decodes as a structure containing the following RSA public key (displayed by OpenSSL in hex)
Modulus:
00:ab:4b:09:8b:c8:36:e8:37:d1:25:68:4d:a0:bf:
8d:95:aa:42:aa:7a:7d:8d:5a:0e:27:c8:17:7e:d5:
bc:bb:d2:5c:00:3c:cb:84:b9:48:88:bd:26:fe:e5:
fe:76:c0:7f:77:cc:f1:1d:b7:45:bf:da:e8:0c:40:
1d:b8:7a:9a:d2:fb:61:b2:3c:49:65:48:1f:28:ee:
c3:ce:32:03:55:dc:a6:00:5a:30:93:96:5a:68:08:
28:cf:71:b3:4d:3d:a1:6b:ec:ba:bf:df:5c:82:f5:
f0:5c:81:c8:12:b7:3e:fb:c6:65:01:7a:d3:4f:77:
a2:74:38:a8:f7:bc:32:c1:4b
Exponent: 65537 (0x10001)
which as you see does contain a (large) modulus and a (small, conventional) public exponent.
DEL
tag. – e-sushi Jan 29 '16 at 07:52