Hash Files - Create Hash Codes of Files and Data.

Act On File Windows Compatibility Seals

This section discusses the Hash Files functionality of the Authenticator module.
The hashing of a file is a procedure which generates a very large number with a fixed length from the content of the file. Thus, the hash of a file is a kind of a file signature. However, the file cannot be restored from the hash. Additionally, hashes are not unique, i.e. two or more different files may have the same hash. Hashes are optimized to be duplicated as rarely as possible, and usually it is uncommon to encounter hash duplications in a particular universe of discourse. There are several different algorithms usually used to create hashes.

Hashes are often used as simple non-personalized signatures of data. For example, many download sites list a hash code next to all download files produced from the respective download file. Thus, users are able to hash the file after they downloaded it and confirm (with a high degree of certainty) that the file was downloaded without errors if the listed and produced hash match. Hashes are also used for producing digital signatures and have multiple other applications.
Capture: Hash Files
Hash Files

Operation

To hash files you need to select the files and folders in the selected items control of the Hash Files functionality. Adding folders to the selection controls makes Act On File hash all files contained in the selected folders. If there are any shortcuts in the selected folders, they will be followed or ignored according the selection in the Shortcuts combo-box. After the items to be hashed are selected you need to adjust the algorithm controls and the destination of the hashes. When ready, click OK to start the process of hashing. When the newly created hashes are stored as files, they are named using the name of the hashed file as follows: "[hashed filename].[hashed extension].hash".

Controls

  
Selection Controls
Hash Files Selection Controls
These controls are used to select and display the files and folders for the operation. In addition to the Add Files, Add Folders and Remove buttons, you can use the standard clipboard, drag and drop, and keyboard operations.
ShortcutsSelect the behavior of the functionality in respect to any shortcuts that might be present in the selected folders.
TargetAny shortcut located in selected folder will be dereferenced and its target file or folder will be treated as if it were selected.
IgnoreAny shortcut located in selected folder will be ignored.
Operation Controls
Hash Files Operation Controls
These controls are used to control the operation of the module and thus directly affect results.
Hash typeSelect the algorithm to be used to create the hash.
SHA, U.S. DSA Secure Hash AlgorithmThis algorithm generates a 160-bit hash value.
MD2, Message DigestThis algorithm generates a 128-bit hash value.
MD4, Message DigestThis algorithm generates a 128-bit hash value.
MD5, Message DigestThis algorithm generates a 128-bit hash value.
Byte OrderThe hash can be stored in its Standard or its Reversed byte order. The Byte Order is important when comparing hashes. Be cautious as different platforms may produce reversed hash codes. For example, a hash generated on an a native Intel platform may read, for example, "1234", whilst on a network-standard platform it may read "4321".
StandardProduce hashes in their standard byte order.
ReverseProduce hashes in their reverse byte order.
Destination Controls
Hash Files Destination Controls
These controls are used to direct the location at which the the module will save the hashes.
DestinationSelect the output type and location.
Show as TextEach file and its Standard and Reverse hash are displayed in a window and can be visually compared or otherwise used.
Common PlaceAll produced hashes are stored in the target folder and are named "[hashes filename].[hashes extension].hash". Caution is required as hashes with matching names may overwrite each other.
Original LocationThe hashes are deposited in the same folder in which the hashed file resides and are named "[hashed filename].[hashed extension].hash".
Reflecting TreeThe directory structure of the selected files and folders will be replicated under the selected target destination folder. Each produced hash is named "[hashed filename].[hashed extension].hash" and is deposited in the newly created folder respective to the hashed file containing folder.
at folderSelect folder to be used for the "Common Place" and "Reflecting Tree" options.
Window Controls
Hash Files Window Controls
These controls have generic meanings.
On TopSets and clears the Always On Top flag on the window. This checkbox adds or removes the window from the group of Top-most windows.
OKCommits to work and creates the required hashes.
CancelCloses the window without doing any work. The last selected properties are stored.