"Once the domain of hobbyist software developers, open source software
applications--both hosted and locally-installed--are having a major
and positive impact
on the enterprise..."
COMPLETE STORY:
http://nl.internet.com/ct.html?rtr=on&s=1,3gtz,1,b7vc,2sxh,8hyg,jhei
Sunday, 7 October 2007
Checking the Integrity of a Transfer
There are situations in which we have to check the integrity after atransfer. This could be from the network, a CD/DVD, USB or hard disk.In such cases, errors can creep in and partial transfer or corruptedtransfer is possible. When faced with the necessity to ensure theintegrity of critical data, one could use one of these approaches.
Executing this command at both ends should result in identicaloutputs. This works for all files, text or binary. You could also dothe same thing with OpenSSL or GNU Privacy Guard.
or
You could also use diff or cksum for this but the above approach isbetter. Or if you have the luxury to execute sha512sum at both sides,it is even better!
$ sha1sum
Executing this command at both ends should result in identicaloutputs. This works for all files, text or binary. You could also dothe same thing with OpenSSL or GNU Privacy Guard.
$ openssl -sha1
or
$ gpg --print-md sha1
You could also use diff or cksum for this but the above approach isbetter. Or if you have the luxury to execute sha512sum at both sides,it is even better!
Subscribe to:
Posts (Atom)