5 min read
2026-03-02
Downloaded software or an ISO image? Compare the hash with the one listed on the official website. This ensures the file hasn't been modified.
MD5 is vulnerable to collisions — two different files can have the same hash. SHA-256 is significantly more reliable.
After creating a backup, compute the hash. When restoring, compare — this ensures the data is not corrupted.
When publishing files for download, always provide the checksum alongside the link.
In your CI/CD pipeline, add a step to verify hashes of dependencies and build artifacts.
Firmware and software updates
File transfers over unsecured channels
Legally significant documents
Cryptocurrency wallets and keys
Compute and compare hashes with the Checksum Calculator.
See also: Password Strength, IP Validator