{"id":1088,"date":"2013-02-17T20:29:50","date_gmt":"2013-02-17T18:29:50","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=1088"},"modified":"2013-02-19T14:13:49","modified_gmt":"2013-02-19T12:13:49","slug":"fileverifier-and-karens-hasher-gui-tools-for-fingerprinting-your-files-with-sha-512","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1088","title":{"rendered":"FileVerifier++ and Karen&#8217;s Hasher, GUI Tools for fingerprinting your files with SHA-512"},"content":{"rendered":"<p>In an earlier blog, a GUI tool called <a title=\"WinMD5, Tool for maintaining integrity of important files and documents\" href=\"http:\/\/saisa.eu\/blogs\/Guidance\/?p=416\">WinMD5<\/a> was recommended for maintaining integrity of your files. However, hash calculation based on SHA-512 is more security nowadays.<\/p>\n<p>For example, if you need to proof to others, that you possessed a certain file (ie. evidence), then at least 2 things are needed:<\/p>\n<ul>\n<li>\n<div>better fingerprinting, ie. hash calculation (this blog)<\/div>\n<\/li>\n<li>\n<div>signed timestamp from third party (see another <a title=\"Protecting your work by timestamping your file fingerprints\" href=\"http:\/\/saisa.eu\/blogs\/Guidance\/?p=1097\">blog<\/a> )<\/div>\n<\/li>\n<\/ul>\n<p>In this blog especially 2 open source GUI tools with SHA-512 hash calculation are mentioned, <a href=\"http:\/\/sourceforge.net\/projects\/fileverifier\">FileVerifier++<\/a> and <a href=\"http:\/\/www.karenware.com\/powertools\/pthasher.asp\">Karen&#8217;s Hasher<\/a> .<\/p>\n<blockquote>\n<p>Wikipedia:<\/p>\n<p>A <a href=\"http:\/\/en.wikipedia.org\/wiki\/Message_digest\">cryptographic hash function<\/a> is a hash function; that is, an algorithm that takes an arbitrary block of data and returns a fixed-size bit string, the hash value, such that any change to the data will change the hash value. In information security contexts, cryptographic hash values are sometimes called (digital) fingerprints, checksums, or just hash values.<\/p>\n<\/blockquote>\n<p><strong>Tools<\/strong><\/p>\n<ul class=\"noindent\"><\/ul>\n<div><a href=\"http:\/\/sourceforge.net\/projects\/fileverifier\">FileVerifier++<\/a><\/div>\n<ul>\n<li>\n<div>\n<div>Open source, just unpack, no installation needed<\/div>\n<\/div>\n<\/li>\n<li>\n<div>\n<div>Drag&amp;Drop<\/div>\n<\/div>\n<\/li>\n<li>\n<div>\n<div>Files, Folders, Verify, store hashes into file<\/div>\n<\/div>\n<\/li>\n<li>\n<div>\n<div><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2013\/02\/hash-fileverifier-2.png\"><img loading=\"lazy\" alt=\"hash-FileVerifier\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2013\/02\/hash-fileverifier-2-small.png\" width=\"550\" height=\"241\" \/><\/a><\/div>\n<\/div>\n<\/li>\n<\/ul>\n<ul class=\"noindent\"><\/ul>\n<div><a href=\"http:\/\/www.karenware.com\/powertools\/pthasher.asp\">Karen&#8217;s Hasher<\/a><\/div>\n<ul>\n<li>\n<div>Open source, installation needed<\/div>\n<\/li>\n<li>\n<div>File, Folder, Verify, store hashes into file or clipboard<\/div>\n<\/li>\n<li>\n<div><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2013\/02\/hash-karenhasher-1.png\"><img loading=\"lazy\" alt=\"hash-KarenHasher\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2013\/02\/hash-karenhasher-1-small.png\" width=\"550\" height=\"353\" \/><\/a><\/div>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Other Hash Tools<\/strong><\/p>\n<ul dir=\"ltr\">\n<li>\n<div><a href=\"http:\/\/fsumfe.sourceforge.net\/\">Fsum Frontend<\/a> (and <a href=\"http:\/\/www.slavasoft.com\/fsum\/index.htm\">FSUM<\/a> )<\/div>\n<ul>\n<li>\n<div>Files, Folders, Verify, store hashes into file<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li>\n<div><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2013\/02\/hash-fsum-frontend-1.png\"><img loading=\"lazy\" alt=\"hash-Fsum-frontend\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2013\/02\/hash-fsum-frontend-1-small.png\" width=\"550\" height=\"296\" \/><\/a><\/div>\n<\/li>\n<li>\n<div><a href=\"http:\/\/sourceforge.net\/projects\/hashtool\/\">HashTool<\/a><\/div>\n<ul>\n<li>\n<div>\n<div>Open source<\/div>\n<\/div>\n<\/li>\n<li>\n<div>Single File<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li>\n<div><a href=\"http:\/\/code.google.com\/p\/winhasher\">WinHasher<\/a><\/div>\n<ul>\n<li>\n<div>Open source<\/div>\n<\/li>\n<li>\n<div>Single file, verify<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li>\n<div>HashCalculator<\/div>\n<ul>\n<li>\n<div>Open source<\/div>\n<\/li>\n<li>\n<div>Single file, copy hash to clipboard<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/xylemstudios.com\/products\/hashslash.php\">HashSlash<\/a><\/li>\n<li>\n<ul>\n<li>\n<div>\n<div>Drag&amp;Drop<\/div>\n<\/div>\n<\/li>\n<li>\n<div>\n<div>Single File, copy result without file name into clipboard<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.abelhadigital.com\/multihasher\">MultiHasher<\/a>\n<ul>\n<li>portable<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.subisoft.com\/\">ComputeHash<\/a>\n<ul>\n<li>Integrated with explorer, right mouse button menu<\/li>\n<li>single file, copy hash into file or clipboard<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Links<\/strong><\/p>\n<ul dir=\"ltr\">\n<li>\n<div><a href=\"http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/secure_hashing.html#Approved%20Algorithms\">SHA details<\/a> at NIST<\/div>\n<\/li>\n<\/ul>\n<ul class=\"noindent\"><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In an earlier blog, a GUI tool called WinMD5 was recommended for maintaining integrity of your files. However, hash calculation based on SHA-512 is more security nowadays. For example, if you need to proof to others, that you possessed a &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1088\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[17,49,11,6,33,10,7],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1088"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1088"}],"version-history":[{"count":1,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1088\/revisions"}],"predecessor-version":[{"id":1099,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1088\/revisions\/1099"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}