Mostly we're lazy. We go to a software publisher's web site and download files and just assume that what's in the file is what the publisher claims it to be. The problem is that these days web sites are frequently compromised by hackers and it only requires one of the bad guys to add an evil payload to a downloaded file to ruin your day and if you're really unlucky, a malware inclusion such as ransomware could ruin your life.
So, verifying file integrity is crucially important and vendors should publish hashes and or checksums for every file they offer for download. Alas, many still don't. Febooti, a company I wrote about a couple of posts ago for their Windows Automation software, do just that; they
Febooti not only provides MD5 hashes for all their software titles but also offers SHA-1, RIPEMD-160, and CRC32 check and, to make it easy to perform verification offers their own freeware hash verification tool that runs on all 32 and 64-bit versions of Microsoft Windows.
This tool performs a large number of verificatoion algorithms including MD2, MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Whirlpool, Tiger-192,RIPEMD-128, RIPEMD-160, RIPEMD-256, and RIPEMD-320 and a list of Hash Test Vectors to verify that the tool works correctly.
After you install the software you might wonder where it is as there is no visible executable in Programs. Febooti have cunningly made the software integrate with the system; it's available in the right-click context menu under "Properties."
This is a great freeware tool and something you should have to hand and use every time there's an opportunity to verify whether you've got the file you think you have. While it might seem like a pain to do this, the reality is that hacking is becoming a progressively bigger threat and it's no longer a question of "will" you come across a compromised download site but "when."
With more and more workloads going to the cloud, and the top vendors being as competitive as they’ve...
Sample some of the toughest job interview questions for technology professionals, as rounded up by...
The U.S. government reportedly pays Geek Squad technicians to dig through your PC for files to give to...
So far, there’s no reason to think this issue is affecting other iPhone devices.
Of the Everests that IT faces daily, identity and access management is a particular challenge. These 10...
New and dynamic authentication factors can help prevent identity theft.
A fresh round-up of venture-backed Internet of Things startups with a focus on enterprise IT.