![]() ![]() | ||
Programming Projects
Hash Calculator
Introduction - Foreword-PreambleAs with several utilites I'm not going to go into any great detail regarding this one, as there is really very little point in doing so, the coding is quite involved, and an explanation of digests and encryption goes well beyond the scope of this manual, and an understanding of it isn't at all necessary, as long as it provides the necessary integrity check of any software being supplied or downloaded.Whether supplied by a commercial software supplier or otherwise! ANY Trustworthy supplier - especially if being downloaded via the Internet - will provide the end user with an integrity validation checksum, this in most cases will be in the form of an MD5 or SHA1 Hash Checksum. This provides the User with a validation check of what has been supplied and/or downloaded, as it would be very near impossible for any hacker to be able to add any interrogative or destructive code to any software after it has been originally archived by the programmer, and yet still maintain the correct hash checksum! If the reader is at all interested, a quick search on any one of the many search engines, will turn up a host of information regarding Cryptography, Encryption and Hash Digests, but understand, this is certainly not reading for the beginner or the faint hearted! as even amongst very accomplished programmers this still remains a very specialised subject! NEW Due to requests, See my Cryptography Primer
The Hash Calculator Dialog
NB. The Basic Dialog is Sizeable, but only by width, this allows the larger checksum values to be displayed easily! without the need to traverse a default sized textBox!
Hash/Digest Selection
All Images Captured (With Cursor) using: SCREENCAPTURE by JRS EpilogueWhat more could be said other than ...
The Secret Awaits Eyes Unclouded by Ambition
General Disclaimer/Liability Limitation - Legal Issues All Software, Manuals and Opinions Irrespective or Regardless of Complexity or Simplicity are Governed and Constrained by the MjO computing Terms and Conditions, and also as Set-Out Herein. • This Application and Manual are Copyright © MjO-JRS - But are Completely Free to Use! [1] This Software is provided "As Is" and in no event shall I, the author, be liable for any consequential, special, incidental or indirect damages of any kind arising out of the delivery, performance, use or inability to use this Software. As with any Software or Projects undertaken or written by me, it has been done with great care, but I do not warrant that the Software is Error Free. You may 'Not' Attempt to Reverse Compile, Modify or otherwise translate or Disassemble the Software in whole or in Part, or make any adjustments to the Useage Manual. You the User must agree to the said terms and conditions prior to using this Software and assume all responsibility in its use and utilisation. Use of this Software shall be Deemed to be your absolute and unequivical acceptance and agreement with these terms and conditions as set out herein and in all cases. If your Country is not party to the constraints of the Limitation of Liability, this exclusion will not apply to you, and in all such situations you are 'Not Allowed' under any circumstances whatsoever or wheresoever to download or use this Software. The Software will always be supplied with an MD5 and/or SHA1 Checksum Please Ensure that you use this to ascertain - as far as possible - that the Data has not been tampered with, or has not been infected with any Destructive Code or Virus, since being initially archived by me the author, but, the end user is Always advised to Virus Check any executable file including this one, by means and/or methods not related to the provision of this Software, or indeed to the provision of any Software to ensure Complete Data and System Integrity.
Reference [1] Legal Terms and Conditions © MjO-JRS 1996-2016 |
||
![]() |