Bonchev Information Technologies and Systems
Software for organizations and people.
Act On File 2012 - The Authenticator Module - The Hash Files Functionality Hi guest
Sign up - Login
Act On File Home Modules Download Awards Community Service  
Attributor Authenticator Comparator Compressor Cryptor Eraser Locator Protector Quantifier Act On File TV  
Sign Files Hash Files Verify Signatures  

Hash Files - Create Hash Codes of Files and Data.

Act On File Windows Compatibility Seals

This section discusses the Hash Files functionality of the Authenticator module.
The hashing of a file is a procedure which generates a very large number with a fixed length from the content of the file. Thus, the hash of a file is a kind of a file signature. However, the file cannot be restored from the hash. Additionally, hashes are not unique, i.e. two or more different files may have the same hash. Hashes are optimized to be duplicated as rarely as possible, and usually it is uncommon to encounter hash duplications in a particular universe of discourse. There are several different algorithms usually used to create hashes.

Hashes are often used as simple non-personalized signatures of data. For example, many download sites list a hash code next to all download files produced from the respective download file. Thus, users are able to hash the file after they downloaded it and confirm (with a high degree of certainty) that the file was downloaded without errors if the listed and produced hash match. Hashes are also used for producing digital signatures and have multiple other applications.
Capture: Hash Files
Hash Files

Operation

To hash files you need to select the files and folders in the selected items control of the Hash Files functionality. Adding folders to the selection controls makes Act On File hash all files contained in the selected folders. If there are any shortcuts in the selected folders, they will be followed or ignored according the selection in the Shortcuts combo-box. After the items to be hashed are selected you need to adjust the algorithm controls and the destination of the hashes. When ready, click OK to start the process of hashing. When the newly created hashes are stored as files, they are named using the name of the hashed file as follows: "[hashed filename].[hashed extension].hash".

Controls

  
Selection Controls
Hash Files Selection Controls
These controls are used to select and display the files and folders for the operation. In addition to the Add Files, Add Folders and Remove buttons, you can use the standard clipboard, drag and drop, and keyboard operations.
ShortcutsSelect the behavior of the functionality in respect to any shortcuts that might be present in the selected folders.
TargetAny shortcut located in selected folder will be dereferenced and its target file or folder will be treated as if it were selected.
IgnoreAny shortcut located in selected folder will be ignored.
Operation Controls
Hash Files Operation Controls
These controls are used to control the operation of the module and thus directly affect results.
Hash typeSelect the algorithm to be used to create the hash.
SHA, U.S. DSA Secure Hash AlgorithmThis algorithm generates a 160-bit hash value.
MD2, Message DigestThis algorithm generates a 128-bit hash value.
MD4, Message DigestThis algorithm generates a 128-bit hash value.
MD5, Message DigestThis algorithm generates a 128-bit hash value.
Byte OrderThe hash can be stored in its Standard or its Reversed byte order. The Byte Order is important when comparing hashes. Be cautious as different platforms may produce reversed hash codes. For example, a hash generated on an a native Intel platform may read, for example, "1234", whilst on a network-standard platform it may read "4321".
StandardProduce hashes in their standard byte order.
ReverseProduce hashes in their reverse byte order.
Destination Controls
Hash Files Destination Controls
These controls are used to direct the location at which the the module will save the hashes.
DestinationSelect the output type and location.
Show as TextEach file and its Standard and Reverse hash are displayed in a window and can be visually compared or otherwise used.
Common PlaceAll produced hashes are stored in the target folder and are named "[hashes filename].[hashes extension].hash". Caution is required as hashes with matching names may overwrite each other.
Original LocationThe hashes are deposited in the same folder in which the hashed file resides and are named "[hashed filename].[hashed extension].hash".
Reflecting TreeThe directory structure of the selected files and folders will be replicated under the selected target destination folder. Each produced hash is named "[hashed filename].[hashed extension].hash" and is deposited in the newly created folder respective to the hashed file containing folder.
at folderSelect folder to be used for the "Common Place" and "Reflecting Tree" options.
Window Controls
Hash Files Window Controls
These controls have generic meanings.
On TopSets and clears the Always On Top flag on the window. This checkbox adds or removes the window from the group of Top-most windows.
OKCommits to work and creates the required hashes.
CancelCloses the window without doing any work. The last selected properties are stored.
Community Content
(To enter your comments you must be signed in. Log in or create FREE account.)
MemberComments
Be the first to comment.
Products
The ELIAS Project
Fine Art App
Information Presenter
Act On File
Audio Control
Photo Window
Information Presenter
Homepage
for Museums and Art galleries
for Schools and Universities
for Resorts, Hotels and Cruises
for Parks of any kind
for Corporations
for any business
Learning
Encryption and Authentication
Safe Online Communication
Website Testimonials
Learn how to store private keys
Make The Most From Your Files
Convenient Volume Control
Photo Window - an Awesome Gift
Support
My Account
FAQ - Forum
 
Community
Blog
Email this page
Newsletter
Bonchev IT
About
Contact
Download
Public Authentication Key
Public Encryption Key

Sitemap
Disclaimer
Privacy
Antispam
© Copyright 2024 Bonchev Information Technologies. All Rights Reserved.
Machine translation:
Search: 


Email this page
To:
use semicolon to separate emails eg: joe@abc.com; lea@abc.com
Subject:
Message:
a link to this page will be automatically added to your message
From:
Please type the anti-bot text below.
Type text:
Thank you for subscribing to the MBBSoftware newsletter.
Enter your email address:
Please type the anti-bot text below.
Type text: