Re: tool for generating MD5 hash of a file (MS)

From: Lucas (lucaskeli_at_fastmail.fm)
Date: 09/13/04

  • Next message: Clement Dupuis: "RE: learning ethical hacking"
    Date: Mon, 13 Sep 2004 12:23:27 -0500
    To: security-basics@securityfocus.com
    
    

    Openssl, both Unix and Windows flavors support md5 hashes.

    kdl

    K.D. Lucas
    lucaskeli@fastmail.fm

    Michael Shirk wrote:

    >Well you can use md5sum.exe for windows (Google this), which allows you to create the hash and verify files.
    >Also, in the same search, I found a utility called Fastsum that is free.
    >http://www.fastsum.com/
    >Shirkdog
    >-----Original Message-----
    >From: omarkhawaja@yahoo.com [mailto:omarkhawaja@yahoo.com]
    >Sent: Thursday, September 09, 2004 9:55 AM
    >To: security-basics@securityfocus.com
    >Subject: tool for generating MD5 hash of a file (MS)
    >Importance: Low
    >I am interested in generating a MD5 hash for a file - for the purposing of
    >verifying its integrity at a later date. I have come across multiple tools
    >that claim to do this, on a Windows (XP) platform.
    >Was hoping to poll this group to determine what your preferences / favorites
    >are. Any input will be appreciated. Thanks.
    >__
    >Omar Khawaja, CISSP
    >---------------------------------------------------------------------------
    >Computer Forensics Training at the InfoSec Institute. All of our class sizes
    >are guaranteed to be 12 students or less to facilitate one-on-one
    >interaction with one of our expert instructors. Gain the in-demand skills of
    >a certified computer examiner, learn to recover trace data left behind by
    >fraud, theft, and cybercrime perpetrators. Discover the source of computer
    >crime and abuse so that it never happens again.
    >http://www.infosecinstitute.com/courses/computer_forensics_training.html
    >----------------------------------------------------------------------------
    >http://www.infosecinstitute.com/courses/computer_forensics_training.html
    >----------------------------------------------------------------------------
    >
    >
    >!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+
    >CryptoMail provides free end-to-end message encryption.
    >http://www.cryptomail.org/ Ensure your right to privacy.
    >Traditional email messages are not secure. They are sent as
    >clear-text and thus are readable by anyone with the motivation
    >to acquire a copy.
    >!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+!+
    >
    >
    >---------------------------------------------------------------------------
    >Computer Forensics Training at the InfoSec Institute. All of our class sizes
    >are guaranteed to be 12 students or less to facilitate one-on-one
    >interaction with one of our expert instructors. Gain the in-demand skills of
    >a certified computer examiner, learn to recover trace data left behind by
    >fraud, theft, and cybercrime perpetrators. Discover the source of computer
    >crime and abuse so that it never happens again.
    >
    >http://www.infosecinstitute.com/courses/computer_forensics_training.html
    >----------------------------------------------------------------------------
    >
    >
    >

    ---------------------------------------------------------------------------
    Computer Forensics Training at the InfoSec Institute. All of our class sizes
    are guaranteed to be 12 students or less to facilitate one-on-one
    interaction with one of our expert instructors. Gain the in-demand skills of
    a certified computer examiner, learn to recover trace data left behind by
    fraud, theft, and cybercrime perpetrators. Discover the source of computer
    crime and abuse so that it never happens again.

    http://www.infosecinstitute.com/courses/computer_forensics_training.html
    ----------------------------------------------------------------------------


  • Next message: Clement Dupuis: "RE: learning ethical hacking"

    Relevant Pages

    • Re: a tool like nestat
      ... >a certified computer examiner, learn to recover trace data left behind by ... >fraud, theft, and cybercrime perpetrators. ...
      (Security-Basics)
    • Re: a tool like nestat
      ... > a certified computer examiner, learn to recover trace data left behind by ... > fraud, theft, and cybercrime perpetrators. ...
      (Security-Basics)
    • Re: [lists] Web ports list
      ... >a certified computer examiner, learn to recover trace data left behind by ... >fraud, theft, and cybercrime perpetrators. ...
      (Security-Basics)
    • Re: tool for generating MD5 hash of a file (MS)
      ... >a certified computer examiner, learn to recover trace data left behind by ... >fraud, theft, and cybercrime perpetrators. ...
      (Security-Basics)