Monthly Archives: August 2014

How to Run an MD5 or SHA-1 Hash on Windows

A cryptographic hash value can be thought of, and is often referred to as, a fingerprint. They are also referred to as simply hashes or check-sums. What they are though are alphanumeric identifiers produced by a cryptographic function being run on a file.

In addition to just being plain cool, this can be very useful if you have an occupation where you may need to verify updated versions of a particular file, or if you need to differentiate unique files of the same name.

Continue reading