Windows partitions: a guide with the best tips

There are investigative ambitions in Microsoft operating systems, but only since Windows 8.1: unlike its predecessors (until Windows 8.0), the operating system uses PowerShell to generate hash values. These are checksums that you can think of as fingerprints. Each file has a specific symbol encoded for the character – depending on the hashing algorithm used. If one bit changes in a file, it has a completely different checksum value. This can be used to verify the authenticity and integrity of the file and therefore its security. You can also check this using the web service VirusTotal suspicious files for malicious code; The time-consuming download is no longer necessary. Below you’ll find an introduction to the basics of checksums and hashing. Next, we will introduce you to third-party tricks and tools that calculate the hash (more conveniently than Windows itself). This is also about VirusTotal: you usually upload files to be scanned for malicious code to the multivirus scanner’s cloud service, thanks to the hash you provide yourself. This is at least possible for files already scanned by VirusTotal.

Article at a glance:

What are the hash values? What do you want from them?

Hash values ​​are strings of characters that are produced when the hash algorithm is implemented. You can create such checksums based on files or scripts. These codes are useful if you want to determine whether a download was successful: Some download portals provide hashes for files that can be downloaded. By using the same hashing technology as the portal operator from which you obtained the file, you can be sure the latter is properly saved for you; The hashes must be identical. If there is an error in the download, the values ​​are different from each other. This also applies if the hypothetical case occurs that the attacker has tampered with the download data stream.

If you want to check your own files (not available for download), hashing is a good solution: parse the file twice with a time offset. If you haven’t edited it, the second hash should be the same as the first. To facilitate control, it is advisable to save the first value in a TXT text document. Common hash actions are MD5, SHA1, CRC32, SHA-256, SHA-512, and SHA-384.

See also  Apple will set up a new computer. And it will be mighty

Create hash values ​​- how?

As we mentioned at the beginning, you can create hash values ​​using Windows PowerShell. This has been installed since Windows 7, but it doesn’t yet have the correct cmdlet to create hashes here and with Windows 8. It works with Windows 8.1 and Windows 10 from version 1507 (released July 2015). Alternatively, you can create hashes of your files using additional software – which is a good option, especially if you have a large number of items to analyze. However, checking file blocks in this way is the exception, there are also cloud services that you can upload files to and then output checksums. One such example is VirusTotal.
HTML5 service is also available in a. After selecting a file, you will receive values ​​according to SHA-1, SHA-256, SHA-384, and SHA-512 via drag and drop. If you check the box before adding a file, an MD5 entry will be added. You can even check sensitive files there: because the service also works offline; Invoke the page and insert a file, this works regardless of the current web connection (which you can check by going through Windows-R and ncpa.cpl Temporarily disconnect the LAN/WLAN adapter).
The text calculation in the cloud is based on the Internet connection, so it is more important do you get the MD5 checksum? By the way: type a text like abc123 txt file and run it Previous web service To, the MD5 hash value is identical to the value of In the second associated service When simply entering text from abc123, the result is: e99a18c428cb38d5f260853678922e03. Renaming the files does not change the hash value, which those interested can check with another “upload”. Depending on the software or web browser tool used for the hash, you may see uppercase letters instead of lowercase letters, but the strings are identical.

Little is known about the Windows function (cmdlet), but it is useful, for segmentation.

Windows: Create hashes with built-in tools

If you only want to hash every once in a while, you don’t need an additional tool. If at least Windows 8.1 is installed, start PowerShell with Windows-R and the command Powershell. It is not necessary to call the on-board resources with admin rights. In the factory, PowerShell creates SHA-256 hashes with the command (cmdlet); An MD5 variant is enabled for each parameter. We explain the details in the article “Simple PowerShell Commands: 31 Tips for Windows”.
Windows 7/8/10: Read and Create Hash Values ​​- Start Scanning for Viruses

Windows since version 8.1 counts file fingerprints – by default SHA256 variables.

Create and analyze hashes (via context menu)

If you want to hash a file via its context menu, File FileMenu Tools. It is a suite that you can also use to transfer, copy, delete files, encrypt, copy tracks and more with it. After installation, click on a file to be checked with the right mouse button, move the mouse cursor to the “File List Tools” and click on the entry “Calculate and check checksum”. In the new window, use the drop-down list to choose between “MD5”, “SHA1”, “SHA256”, “SHA384”, “SHA512” and “CRC32”. If you confirm with the “Start” button, you will see the corresponding checksum in the lower area (to the right of “Calculated”).

Windows 7/8/10: Read and Create Hash Values ​​- Start Scanning for Viruses

FileMenuTools takes fingerprints, alias checksums, of files via its context menu.

Portable and slim tool: MD5 scan

subordinate MD5 check It does not require any installation and is specialized in creating MD5 checksums. It shows by default, if you wish you can switch to “SHA1”, “SHA256” or “SHA512” in the dropdown.

Windows 7/8/10: Read and Create Hash Values ​​- Start Scanning for Viruses

MD5 Simple Check – at least in the basic functions – self-explanatory to use.

subordinate MD5 Hasher File It is based on .NET Framework, must be installed and accept one or more files via the Select Files button. Import also works by drag and drop. The tool calculates the MD5 checksum of the uploaded files without further clicking. If you import multiple files, use the “Compare with Clipboard” context menu function to check if the Windows cache hash value is the same as the value of the file you right-clicked.

Windows 7/8/10: Read and Create Hash Values ​​- Start Scanning for Viruses

MD5 File Checker does what the name suggests: perform MD5 calculations.

HashTab (displays hash in file properties in new tab)

Hashen mit VirusTotal

See also  Small Tablet, High Performance: Does Apple Introduce the iPad mini Pro?

Start a virus scan with a checksum

Usually, in VirusTotal, you select a file to upload. Alternatively, you can submit a file’s checksum to the service, which is then compared to built-in virus scanners. Click “researchIn the field “URL, IP address, domain, or file hash”, enter a hash value from the clipboard using Ctrl-V. Confirm with the “Search” button.
Windows 7/8/10: Read and create hash values ​​- and start scanning for viruses with VirusTotal, semi-recursive virus checks can be run - based on hashes rather than files.

With VirusTotal, semi-repetitive virus scans can be performed – based on hashes rather than files.

It is faster to create hashes with small files than with larger files. For example, we need Windows PowerShell in

get-filehash “D:ISOsServer 2016 x64.ISO

38 seconds to think of a SHA-256 verification code from a 6.5 GB ISO server for Windows (file saved on hard drive, Core i7-6700K processor). In contrast, a hash of the Samsung NVMe driver setup file (about 1.5MB) was generated in an instant. Especially if you use the hash tools to calculate checksums for entire folder items, you should be prepared to wait from a few seconds to several minutes, depending on the file size.

Operating System Information Checker: Windows 7 ISO Verifier

Windows 7/8/10: Read hash values, create them - and start scanning for viruses with Windows 7 ISO Verifier is no longer available for download.

Windows 7 ISO Verifier – Nostalgia for the Experts – is no longer available for download.

One last anecdote: Windows 7 appeared in 2009, and at that time “Windows 7 ISO VerifierLight of the world of downloads. Checker check the downloaded Windows 7 RTM ISO images in real time (NSEllis NSNS NSmanufacturing). An obnoxious commented: “Great idea: With an unauthorized program by Microsoft, I can check if an unauthorized download by Microsoft is clean. It really doesn’t get any safer than that.” The tool is no longer necessary today, but Windows 7 ISO is still sometimes of interest to nostalgic people who want to immerse themselves in the good old days. There are also benchmarking tools that use hash calculations to determine how well your computer is performing.

Frank Mccarthy

<p class="sign">"Certified gamer. Problem solver. Internet enthusiast. Twitter scholar. Infuriatingly humble alcohol geek. Tv guru."</p>

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top