![]() This hash, when used, ensures that the file you downloaded is exactly the same file the author uploaded, and hasn't been tampered with in any way, Trojan added, etc. ![]() This is useful, even crucial, in all kinds of situations where data integrity is important.įor instance, these days, it's not uncommon to find MD5 hashes (and less rarely now, SHA1 hashes) published alongside downloads, even Windows downloads. Peace of mind! BLAKE2, SHA1 and MD5 hashes are used to verify that a file or group of files has not changed. No more! Now I have checksum, and it suffers from none of these problems as well as adding quite a few tricks of its own. I always knew that data verification should be simple, even easy, but it invariably ended up a chore.Įither the brain-dead programs don't know how to recurse, or don't even pretend to, or they give the MD5 hash files daft, generic names, or they can't handle long file names, or foreign file names, or multiple files, or they run in MS DOS, or choke on UTF-8, or are painfully slow, or insist on presenting me with a complex interface, or don't have any decent hashing algorithms, or don't know how to synchronize new files with old, or have no shell integration or any combination of these things and I would usually end up shouting "FFS! JUST DO IT!!!". ![]() In the decade before checksum, I must have installed and uninstalled dozens, perhaps hundreds of Windows MD5 hashing utilities, and overwhelmingly they leave me muttering "brain-dead POS!" under my breath, or words to that effect, or not under my breath. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |