Skip to main content

Get File Checksums Using Windows Built-In Tools

Put simply, a checksum (also referred to as a hash value or hash sum) Is a unique string consisting of numbers and letters, that helps check & Identify errors In data. It's also used to determine whether a given file has been tampered with, by comparing the checksum of the original file to that of a file from another source. In this tutorial, I will show you how to generate a number of checksum algorithms natively within Windows.

Before I begin, here's what I'm referring to In terms of verifying the Integrity of a file. I've navigated to the official MySQL website, and next to each download button, there's an MD5 checksum as Illustrated below.

Downloading from the official website Is considered a trusted source, however when doing the same from another website, you never know for sure whether the file Is what It claims to be. To be absolutely certain, you'd generate (In this case) an MD5 checksum of the file you've downloaded, and compare the result with that from the official website. If they match, all Is well. If not, then the file has been altered In some way.

There are a few checksums used- the commonalities being MD5, SHA1 and SHA256. I will be demonstrating how to generate all these against a particular file, by using a couple of Windows built-In utilities named PowerShell and Certutil. So without further delay, let's rip Into this tutorial.

Step One:
Firstly, I shall use PowerShell. To access It, open the Run menu, enter powershell and hit OK.

Step Two:
PowerShell will now open, so type Get-Filehash but do not hit the Enter key as yet. Drag the file that you wish to check Into PowerShell. For the purpose of this guide, I'm using a file named Charny Screenshot.exe as shown below

Step Three:
You will now see your file, Inclusive of It's directory. Make sure there's a space between the Get-Filehash command and the file path, otherwise this will not work. When you're ready, hit Enter.

Step Four:
By default, PowerShell generates a SHA256 hash. This can be clearly seen as arrowed.

Step Five:
To generate another hash algorithm, simply enter -Algorithm right at the end, and specify the checksum. For Instance, I want to generate an MD5 checksum, so I've entered -Algorithm MD5, and hit Enter. As you can see, the result has been returned.

Step Six:
I've done the exact same with the SHA1 algorithm, as demonstrated below.

Step Seven:
Now let's generate a couple, by using Certutil. This Is actually accessed via the Command Prompt, so open the Run menu, enter cmd and hit OK.

Step Eight:
Now type certutil -hashfile, and drag your file Into the Command Prompt, much the same as you did In Step Two above with PowerShell. Your entry should look similar to mine.

Step Nine:
Upon hitting the Enter key on your keyboard, by default, Certutil generates a SHA1 hash as arrowed below.

Step Ten:
To generate another type of hash algorithm, simply enter It at the end. In my case, I want to generate an MD5 hash algorithm, so I've typed MD5.

Last Step:
After hitting the Enter key, as you can see, the MD5 hash of the file, has been successfully generated.

Final Thoughts:
It doesn't get any easier than this, does It? I could've shown you how to generate a given file hash by typing the entire directory of the file In question, but simply dragging It Into the utility (PowerShell and/or Certutil), serves the exact same purpose.

There are many third-party tools, such as Hash Generator that do the job with ease, but why use an external software when the same result can be achieved natively within Windows? So the next time you download a file from an unknown source, be sure to generate It's hash via any of the above methodologies, and compare the result with the official website (or It's related entity).


Popular posts from this blog

How To Use Sandboxie In Windows 10

When navigating online and downloading & executing applications, clicking on links, visiting websites that you're not familiar with and so forth, your computer Is vulnerable to being Infected with a virus. The last thing you need, Is to have your sensitive files compromised or hit with a nasty piece of malware. To prevent this, In this tutorial, I will show you how to safely perform all the above and more, by using a software named Sandboxie.

How To Create A Virtual Machine Using VMware

A virtual machine, often abbreviated as a VM, Is a software program containing an operating system that's Installed on the physical machine (PC), and operates In It's own Isolated environment. Every task performed In the VM, remains there, without affecting the main computer. Every user should have a virtual machine up and running, so In this tutorial, I will demonstrate a detailed guide on how to create & Install a virtual machine on your computer, namely VMware Workstation.

Create A Bootable USB Flash Drive

If you have a Bootable ISO Image file of the Windows operating system, obviously the Intention Is to burn It to disc and boot from your PC thereafter. However, optical drives are slowly being phased out In manufacturing & shipping of new computers, so what do you do from here? The alternative Is to create a bootable USB flash drive, and I will show you exactly how It's done. The process Is quite simple, yet a lot of users fail to grasp the concept.