Easily check and verify files and apps haven’t been compromised using MD5 and SHA checksum with this simple command-line utility.
For further actions, you may consider blocking this person and/or reporting abuse
Easily check and verify files and apps haven’t been compromised using MD5 and SHA checksum with this simple command-line utility.
For further actions, you may consider blocking this person and/or reporting abuse
Carrie -
Carrie -
Carrie -
Carrie -
Top comments (1)
Hi there, we encourage authors to share their entire posts here on DEV, rather than mostly pointing to an external link. Doing so helps ensure that readers don’t have to jump around to too many different pages, and it helps focus the conversation right here in the comments section.
If you choose to do so, you also have the option to add a canonical URL directly to your post.