A software that allows users and webmasters to check if their files are compromised

May 15, 2012 08:09 GMT  ·  By

This week we take a look at a piece of software called Hash Code Verifier. Developed by BreakTheSecurity, the application is designed to allow users to create file hashes which they can utilize to ensure that their integrity hasn’t been compromised.

There are many cases in which cybercriminals hijack a site and replace the legitimate files offered for download with their own malicious elements. In order to prevent such incidents, some website administrators make available MD5 or SHA hashes that users can compare with the file’s actual hash value.

This way, if the hashes don’t match, customers will know that a plot is at play before executing the files.

Webmasters can also use it to create hashes for their files before posting them on their websites. That way, if they notice any suspicious activity, they can easily check to see if their systems have been compromised, since there’s nothing worse for a site administrator than to learn that he is serving malware to his visitors.

The application can be used to verify file hashes, compare two files, calculate multiple file hashes, and save generated strings in text or HTML. It supports MD5, SHA1, SHA256, SHA512 and CRC32 hash codes, and it can automatically generate hashes when users browse the download sites.

Hash Code Verifier is easy to operate. Users simply have to drag and drop the files they want to generate hashes for into the application.

It works on all major platforms, including Linux, Mac and Windows operating systems. The resources requirements are low, the only component that is needed being the Java Runtime Environment: JRE 1.6, or any newer variant.

Hash Code Verifier for Windows is available for download here Hash Code Verifier for Mac is available for download here Hash Code Verifier for Linux is available for download here