Security Basics mailing list archives

RE: tool for generating MD5 hash of a file (MS)


From: Jonathan Loh <kj6loh () yahoo com>
Date: Mon, 13 Sep 2004 11:25:43 -0700 (PDT)

I've used fsum, a free program, from <a
href="http://www.slavasoft.com";>slavasoft</a> for a while.  It's a command line
utility.  It can check sums against a file containing checksums.  It supports
12 different checksum algorithms, MD2, MD4, MD5, etc....  But it defaults to
MD5 checksums. 
--- Michael Shirk <shirkdog () cryptomail org> wrote:

Well you can use md5sum.exe for windows (Google this), which allows you to
create the hash and verify files.
Also, in the same search, I found a utility called Fastsum that is free.
http://www.fastsum.com/
Shirkdog
-----Original Message-----
From: omarkhawaja () yahoo com [mailto:omarkhawaja () yahoo com]
Sent: Thursday, September 09, 2004 9:55 AM
To: security-basics () securityfocus com
Subject: tool for generating MD5 hash of a file (MS)
Importance: Low
I am interested in generating a MD5 hash for a file - for the purposing of
verifying its integrity at a later date. I have come across multiple tools
that claim to do this, on a Windows (XP) platform. 
Was hoping to poll this group to determine what your preferences / favorites
are. Any input will be appreciated. Thanks.
__
Omar Khawaja, CISSP
---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.
http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------
http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+
CryptoMail provides free end-to-end message encryption.  
http://www.cryptomail.org/   Ensure your right to privacy.
Traditional email messages are not secure.  They are sent as
clear-text and thus are readable by anyone with the motivation
to acquire a copy.
!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------




__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: