Friday, January 13, 2017

Why we generate checksum/hash of a file?




Why we generate checksum/hash of a file?




In previous post, I explained about the checksum or hash generated by the MD5 algorithm. 

Anybody can provide any type of files for download or may change these files later. 

To protect the integrity of the file, we use MD5.

You might have seen that sometimes your download get corrupt because of network issue or sometimes you your-self pause download and later resume it. 

In these scenarios your file get corrupt.
The checksum becomes the figure print for your file which you were downloading earlier and got corrupt. 

It works like a full proof identity of a file and if the file get corrupt, there will be a new digest for it. If the checksum changes, we need to know the file we were downloading was not the same or the file has corrupted during transfer. 

To check that we can execute commands to verify the actual checksum on local machine and verify with the server file with its checksum string.
 

No comments:

Post a Comment

Fixing yum command on linux

You may find yourself having to fix more packages. So you can just remove everything you had installed via  pip and reinstall everythin...