Released New Tool – Download Hash Verifier

Today we have released our new tool, DownloadHashVerifier – 56th tool from SecurityXploded.com.  This is a FREE tool to easily & quickly verify the integrity of your downloaded file.

.


Hash verification is a standard mechanism used to verify that downloaded file is original and not tempered. Often it happens that hackers modify the download files on the server and plant it with trojans/spywares. Upon downloading and installing such softwares your PC will get infected eventually. To prevent such things, websites generally publish MD5 or SHA256 hash of the original file so that you can verify the same after you have downloaded the file.
.

DownloadHashVerifier is designed to make this hash verification task easier and faster for end users.

.

Here are the smart features of DownloadHashVerifier

  • Supports popular MD5 & SHA256 hash verification
  • Auto Hash Detection – Automatically detects input hash data as MD5 or SHA256
  • Automatically validates & copies the hash data from clipboard
  • ‘Drag & Drop’ feature to quickly choose your downloaded file.
  • Save the verification result to HTML or TEXT file

.

For more feature details and download, visit DownloadHashVerifier

Similar posts
  • Microsoft MCSE Certification: Your Ne... Microsoft MCSE is the most in-demand certification for all those professionals who work in the Information Technology industry. Most IT companies prefer hiring those workers who carry the Microsoft MCSE certificate. That is why most of the IT job applicants today try to get certified by Microsoft. In the competitive job market, MCSE helps an [...]
  • Computer Security Tips: Stay Safe Onl... In recent times cyber security has raised the level of awareness and public consciousness as never before. Both large corporations and big organizations try to take care of online security as much as they can. That’s why cyber criminals and hackers have focused more on smaller companies and single entrepreneurs. This awful tendency leads to [...]
  • SecurityXploded Mentorship Programme ... I am writing this blog to share my SecurityXploded Student Mentorship Programme experience with the future students of this programme. My mentorship programme started last year in August when I was in 2nd year of MS at IIIT-Allahabad. I knew about SecurityXploded community since I used to follow their blogs, training programmes and security tools [...]
  • Code Injection and API Hooking Techni... Hooking covers a range of techniques used for many purposes like debugging, monitoring, intercepting messages, extending functionality etc. Hooking is also used by a lot of rootkits to camouflage themselves on the system. Rootkits use various hooking techniques when they have to hide a process, hide a network port, redirect file writes to some different [...]
  • Announcement – SecurityXploded ... From the past two years we are working actively on couple of projects to support the security community. As you all may already know that we have successfully completed our reversing and malware analysis training programme and we are very glad that it was very helpful for everyone. In my opinion the success of any [...]

Leave a Reply