R
RayLopez99
Subject line says it all. I notice on public site that try and
identify a suspect file, often users will relate their experiences but
even experienced users will never mention the checksum. If they did,
we could use a checksum hash finder like FastSum to verify if the file
has been tampered with.
Why don't people refer to checksums more often? Is it because (as I
suspect) that there is no one 'standard' way of calculating checksums,
so different programs will give different numbers? Even if so, you
would think at least the most popular algorithm (FastSum?) would be
mentioned.
RL
identify a suspect file, often users will relate their experiences but
even experienced users will never mention the checksum. If they did,
we could use a checksum hash finder like FastSum to verify if the file
has been tampered with.
Why don't people refer to checksums more often? Is it because (as I
suspect) that there is no one 'standard' way of calculating checksums,
so different programs will give different numbers? Even if so, you
would think at least the most popular algorithm (FastSum?) would be
mentioned.
RL