{"id":12672,"date":"2016-12-27T12:28:51","date_gmt":"2016-12-27T18:28:51","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=12672"},"modified":"2024-06-19T13:42:16","modified_gmt":"2024-06-19T18:42:16","slug":"checksum-ensure-data-integrity","status":"publish","type":"post","link":"https:\/\/www.een.com\/es\/blog\/checksum-ensure-data-integrity\/","title":{"rendered":"Ensure Data Integrity with Checksum"},"content":{"rendered":"<p>At Eagle Eye Networks we are often asked about \u2018Watermarking\u2019 on our recorded video to ensure data integrity. This can be guaranteed by using the \u2018checksum\u2019 approach as used in many digital data transfers. The article below from \u2018Online Tech Tips\u2019 explains \u2018Checksum\u2019 and how it is used to ensure data integrity and some tools to use to work with it.<\/p>\n<p>What is a Checksum and How to Calculate a Checksum**<br \/>\nArticle by <a href=\"http:\/\/www.online-tech-tips.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.online-tech-tips.com\/<\/a><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-12675\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Onlinee-Tech-Tips-Logo.png\" alt=\"onlinee-tech-tips-logo\" width=\"281\" height=\"28\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Onlinee-Tech-Tips-Logo.png 281w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Onlinee-Tech-Tips-Logo-100x10.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Onlinee-Tech-Tips-Logo-200x20.png 200w\" sizes=\"(max-width: 281px) 100vw, 281px\" \/><\/p>\n<p>Are you wondering what a checksum is? You may have noticed that when you download files from certain websites, they have a very long string of numbers and letters called a checksum or MD5 checksum or SHA-1, etc. These really long strings basically act as fingerprints for that particular file, whether it be an EXE, ISO, ZIP, etc. Checksums are used to ensure the integrity of a file after it has been transmitted from one storage device to another. This can be across the Internet or simply between two computers on the same network. Either way, if you want to ensure that the transmitted file is exactly the same as the source file, you can use a checksum.<\/p>\n<p>The checksum is calculated using a hash function and is normally posted along with the download. To verify the integrity of the file, a user calculates the checksum using a checksum calculator program and then compares the two to make sure they match.<\/p>\n<p>Checksums are used not only to ensure a corrupt-free transmission, but also to ensure that the file has not been tampered with. When a good checksum algorithm is used, even a tiny change to the file will result in a completely different checksum value.<\/p>\n<p>The most common checksums are MD5 and SHA-1, but both have been found to have vulnerabilities. This means that malicious tampering can lead to two different files having the same computed hash. Due to these security concerns, the newer SHA-2 is considered the best cryptographic hash function since no attack has been demonstrated on it as of yet.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-12676\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Windows-10-Technical-Preview.png\" alt=\"windows-10-technical-preview\" width=\"453\" height=\"206\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Windows-10-Technical-Preview.png 453w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Windows-10-Technical-Preview-300x136.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Windows-10-Technical-Preview-100x45.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Windows-10-Technical-Preview-200x91.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Windows-10-Technical-Preview-400x182.png 400w\" sizes=\"(max-width: 453px) 100vw, 453px\" \/><\/p>\n<p>As you can see in the screenshot above, the ISO file I am trying to download from Microsoft has a SHA1 checksum listed. Once I download the file, I would use a checksum calculator to verify the integrity of the file.<br \/>\nAbout 99.9% of the time, you really don\u2019t need to care or worry about checksums when downloading files off the Internet. However, if you are downloading something sensitive like anti-virus or privacy software like Tor, it\u2019s probably a good idea to verify the checksum because hackers can create malware-infested versions of critical software in order to gain full access to a system.<\/p>\n<p>There are a ton of different utilities for calculating checksums and I\u2019ll mention only one or two here since the good ones can create multiple hashes for you and can also verify hashes.<\/p>\n<h3>MD5 &amp; SHA Checksum Utility<\/h3>\n<p>The <a href=\"https:\/\/raylin.wordpress.com\/downloads\/md5-sha-1-checksum-utility\/\" target=\"_blank\" rel=\"noopener noreferrer\">MD5 &amp; SHA Checksum Utility<\/a> is my favorite utility for working with checksums because it has all the features I need in the free version. Once you download it, simply run the EXE file to open the program.<\/p>\n<p>The interface is very straightforward and easy to use. Simply click on the Browse button to choose your file and the hashes will automatically be calculated for MD5, SHA-1, SHA-256 and SHA-512.<\/p>\n<p>As you can see the MD5 hash is the shortest and the SHA-512 hash is very long. The longer the hash, the more secure it is.<\/p>\n<p>To verify a hash, just copy and paste it into the Hash box at the very bottom. Click on Verify and it will compare it to the four generated hashes to see if there is a match.<\/p>\n<h3>Online Checksum Calculator<\/h3>\n<p>For those who would rather not download any software onto their systems, an online checksum calculator would be the better choice. The online calculators have more restrictions, mostly the max upload size of the file, but for smaller files, they work just fine.<\/p>\n<p>A site called <a href=\"https:\/\/defuse.ca\/checksums.htm#checksums\/\" target=\"_blank\" rel=\"noopener noreferrer\">Defuse<\/a> has a free file checksum calculator for uploads up to 5MB in size. That\u2019s pretty tiny, so you\u2019ll need to use either the desktop application or the next online tool mentioned below for anything bigger than that.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-12673\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/checksum-firefox.png\" alt=\"checksum-firefox\" width=\"591\" height=\"365\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/checksum-firefox.png 591w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/checksum-firefox-300x185.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/checksum-firefox-100x62.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/checksum-firefox-200x124.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/checksum-firefox-400x247.png 400w\" sizes=\"(max-width: 591px) 100vw, 591px\" \/><\/p>\n<p>If 5 MB is just too small, then check out <a href=\"http:\/\/onlinemd5.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">OnlineMD5<\/a>, another free site that allows you to generate checksums for files up to 4 GB in size. Apparently, it does this without uploading the actual file to their servers. I\u2019m not sure how it works, but it seems to just run the algorithm locally on your system and then just displays it in the browser. Quite a smart way to do it because you don\u2019t have to download extra software and you don\u2019t have to wait forever uploading a large file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-48628\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/MD5-SHA1-Hash-Generator-1.png\" alt=\"MD5-SHA1-Hash-Generator\" width=\"620\" height=\"283\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/MD5-SHA1-Hash-Generator-1.png 620w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/MD5-SHA1-Hash-Generator-1-300x137.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/MD5-SHA1-Hash-Generator-1-100x46.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/MD5-SHA1-Hash-Generator-1-200x91.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/MD5-SHA1-Hash-Generator-1-400x183.png 400w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/MD5-SHA1-Hash-Generator-1-600x274.png 600w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/p>\n<p>This site is also very nice because you can verify a checksum in addition to just calculating one. Hopefully, you now have a better understanding of what a checksum is and how it can be used and calculated. If you are sending or receiving secure files, a checksum is the best way for both parties to verify the integrity of those files. If you have any questions, post a comment. Enjoy!<\/p>\n<p>** Article fully accredited to :- <a href=\"http:\/\/www.online-tech-tips.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.online-tech-tips.com\/<\/a><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-12675\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Onlinee-Tech-Tips-Logo.png\" alt=\"onlinee-tech-tips-logo\" width=\"281\" height=\"28\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Onlinee-Tech-Tips-Logo.png 281w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Onlinee-Tech-Tips-Logo-100x10.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/Onlinee-Tech-Tips-Logo-200x20.png 200w\" sizes=\"(max-width: 281px) 100vw, 281px\" \/><\/p>\n<p>Full address of article :- <a href=\"http:\/\/www.online-tech-tips.com\/cool-websites\/what-is-checksum\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.online-tech-tips.com\/cool-websites\/what-is-checksum\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Eagle Eye Networks we are often asked about \u2018Watermarking\u2019 on our recorded video to ensure data integrity. This can be guaranteed by using the \u2018checksum\u2019 approach as used in &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/es\/blog\/checksum-ensure-data-integrity\/\"> <span class=\"screen-reader-text\">Ensure Data Integrity with Checksum<\/span> Leer m\u00e1s &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":13271,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"163032,64727,125800,98340,140951,139810","_relevanssi_noindex_reason":"","footnotes":""},"categories":[70],"tags":[1273,1274,1272],"class_list":["post-12672","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-video-surveillance","tag-cloud-video-surveillance","tag-security-camera-system","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/posts\/12672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/comments?post=12672"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/posts\/12672\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/media\/13271"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/media?parent=12672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/categories?post=12672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/es\/wp-json\/wp\/v2\/tags?post=12672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}