Once you get it you can try digitizing the DVD to an ISO and comparing the MD5/SHA-1 hashes with the official checksums:
http://www.howtogeek.com/howto/11003/how-to-create-a-windows-iso-from-a-disc-using-imgburn/ http://www.nirsoft.net/utils/hash_my_files.html
Yup, the links at qbittorrent.org are their official ones.
They do provide their SHA-1 checksums that you can verify against if you're worried about download sources. (e.g. use something like HashMyFiles to generate a SHA-1 checksum of whatever you downloaded, then compare to qB's own checksum on the download page)
> and someone said to not to because there's no way to know for sure if the ISO is untouched or not.
This is incorrect. Just calculate the checksum of the .iso file (MD5/SHA1) & compare it to MS's official checksums listed at MSDN & you will know for sure if the .iso is a legit untouched. Easy to use something like HashMyFiles to do this.
> Also, why is it important to download MTK and KMS from the original source or something?
The original source won't be fake or have viruses/adware embedded. Fake activators/cracks are often spread on fake sites so that is something to watch out for. But again, you technically can run a checksum on those files too & compare them to the ones listed at the original source (the MDL forums in this case).
> There is KMS and MTK available on my private tracker that has hundreds of seeders
It's most likely OK, members at the private tracker would have already reported it as a virus if it was fake. But again, easy to double-check the checksum.
The legit version is at the MDL forums. They also list the executable's MD5/SHA-1 hashes, so if you download from somewhere else just check the file's hash & make sure it's the same as what's listed in the MDL forums. (you could use something like this if you're not sure how to generate a file's hash)
Wherever you download it from just make sure the MD5/SHA-1 hashes match those listed in the MDL page. If the hashes match then you know it is legit.
(you can use something like HashMyFiles if you're not sure how to get a file checksum)
Not clear what you're asking here.. if the torrents have different hashes & different sizes then clearly they are not identical. If you want to verify just download both & generate checksum hashes against both torrents' files (e.g. using HashMyFiles or similar)... but I can tell you if the file sizes are different then the checksums you generate will be different too, hence the torrents are not identical.
Alternatively, if you were really asking more along the lines of wanting someone to do mediainfo comparisons for both torrent videos & giving you a detailed breakdown of differences then this is probably the wrong sub. Check out the general piracy subs for that: /r/DigitalPiracy, /r/Piracy (or just do them yourself using mediainfo).
Not directly answering your question, but i try to explain you a convenient way to verify specific files on your own:
I also proposed you this way, because this tool will be handy if you want to manually verify an update. On the lenovo update website you will find a checksum next to every download. Just copy one of the available checksum in your clipboard, open HashMyFiles and the file will become green if the hash matches the expectation from your clipboard.
Personally i use this always when i am verifying a manually downloaded file (in case of an available checksum). And i use the "Send to Virus Total" functionality whenever a file seems to be riskier than normal or a potential false positive of my virus scanner.
Nope, just verify one of them, that's enough. There are a few ways of do this in Windows, using tools such as Hash my files or using Power Shell
That's a good question. I'm also looking for such tool.
I have HashCheck and HashMyFiles installed, but I don't have a workflow to use them massively. I just use them to manually compare the hash of a downloaded file to the value on its webpage. They can also check an already existing .md5 file.
There is also SnapRaid which is something like a directory-level, file-based software raid. You can use it for file verification, undelete, undo last change, etc. It can also find duplicate files based on hash. It is really interesting and can be useful is some scenarios, but needs manual actions or scripting and scheduling.
I can only ask you to test the game with the original BIN + CUE and compare it to redump hashes: File: Resident Evil USA.bin MD5.: 2b591b7a746d751062b1acf0d622204b SHA1: dddb34b5928925d8025e5a5bad9d200a0e4f09b7 source: http://redump.org/disc/122/ you can do it with NirSoft HashMyFiles (freeware) http://www.nirsoft.net/utils/hash_my_files.html cheers!
Sorry I was asleep (I know the wrong time but I was really tired).
Ok so Hashsums are basically identifying points of a file. SHA-256 SHA-512 MD5 are different methods of providing a unique string of digits to a file so that it's authenticity can be confirmed.
Two completely identical files (as in you yourself have copy pasted then through Ctrl+C/V) will have the same hashsums. A file downloaded from the same source will always have the same hashsum.
How to check hashsums? You install free software like 7zip that extracts files likes WinRar but also can check hashsums by right clicking the file and selecting the "CRC SHA..." option in the context menu. Then you'll have the option to calculate a particular hashsum or all of them (4-5 methods)
This is a bit better. Try Hash my files http://www.nirsoft.net/utils/hash_my_files.html.
Or simply for md5 try WinMD5 http://www.winmd5.com/
Hashsums are for when you don't trust a stranger on the Internet like me and want to confirm if i haven't tampered with the file/added some sort of virus/malware.
Like the PainteR dev has provided hashsums for his application. You can look if I'm lying about my copy of his application by checking the hashsums to see if they match or not.
Also in State_Secretary's post, he provided hashsums SHA-256 for xforce keygen 2018. You can download my 2018 version and check the hashsums and see that they both match hence you can know that him and i both have the same copy of xForce keygen in its original form without anyone tampering with it.
Alright.
Download this file from any of the links given in PM: en_windows_7_ultimate_with_sp1_x64_dvd_u_677332.iso
After download completes, calculate the SHA-1 hash of downloaded file using any program (example hashmyfiles).
The hash should be: 36AE90DEFBAD9D9539E649B193AE573B77A71C83
Is the hash correct?
If you're wondering why Ultimate edition, that's because after removing "ei.cfg" file in sources folder of iso, all editions are exactly same
Unless someone else with a more experienced background with encryption comes through to comment/correct me, that once any file is encrypted and pass-protected, the hash will change and can't be fagged by amazon... you can test out yourself to see how the various hashes change with winrar or 7zip when just archiving with and without encryption/password. Would be a fair question to check/ask on /r/datahoarder too.
Just a copy of a very small sized file of any type into a new folder and try it to compare the different hash/checksum outputs with 7zip/winrar...
These are 2 hash/checksum freeware utilities I use on windows :
http://www.nirsoft.net/utils/hash_my_files.html
http://www.krylack.com/file-checksum-tool/
virustotal online scanner
Well, some sites provide a hash code with their files (though sadly this gets rarer these days it seems to me). Eg. the detailed download info from LibreOffice contains all kinds of hashes for verification. Once you've downloaded your file you can create a hash using some software (because windows is retarded and does not ship with this by default), for instance NirSoft's HashMyFiles and compare that to the values provided by the site.
Though one must add, that generally speaking files should not get corrupted during download these days because it all goes through TCP and TCP has verification per package.
No idea. I doubt you'd get exactly the same image even if you went through the trouble of slipstreaming all the updates into it. (assuming nothing else was changed in whatever custom image you're comparing to)
There are plenty of tools to check file hashes, e.g. HashMyFiles, etc., so I guess you can always try.
Seems a lot safer/easier to just download a untouched MS Win 7 .iso & then install the updates + run activation tool, IMO.
Yes, you'd need to log into the MDL forums to download it from there.
Otherwise you could try downloading from somewhere else (torrents maybe?), just double-check that whatever you download has the same MD5/SHA-1 hashes that are listed in the MDL page. (you can use something like this if you're not sure how to calculate file hashes)
Run a hash check on it & compare to the real MS isos. If the hash sums match then they're legit.
e.g. something like this can calculate hash sums: http://www.nirsoft.net/utils/hash_my_files.html
Not sure which MS iso you have, if it's official it should be listed at the MS MSDN page. They should also be listed at other sites (not sure offhand which other ones).
EDIT: This is if we're talking about untouched MS Windows isos... if you downloaded something else, no idea how you'd validate besides trying to install it & see how it goes.
Yes, I meant "without playing it".
If you google "utility to calculate a hash" you'll get a list of online and offline tools that'll do that.
One that will show is Nirsoft's Hashmyfiles. Nirsoft has a huge collection of useful utilities, all clean. Unfortunately they often get flagged by anti-virus programs as "hacker tools". Even Google flagged the site as "This site may harm your computer", which is BS.
Edit: You may be able to get the hash for a file from the place you downloaded it. For instance, many download sites will show a file's hash, including one very popular source of torrents.
I'm not expert on hash's but I believe you'd have to use a program that used the same method to be able to get the same value.
Also, terms you may see related to this are checksum, MD5, SHA-1. These are used as alternative names for a hash or a method of calculating a hash, i.e. "calculate the MD5 checksum" means use MD5 as the method for calculating the hash.
Depends on whether you download the APK on your PC or Android device first. For PC you can try HashMyFiles. For Android try MD5 Checker. Just point the program to the APK files and calculate the MD5 sum. Once done compare the hash to those posted on the DroidSheep download page.
BTW I just checked the MD5 hash myself and the APK from that site has a different MD5 hash. That doesn't necessarily mean it's bad, just that it was compiled by someone else. If you are worried about getting an infected APK or something, you can try just compiling it yourself. Alternatively you can try the APK from this XDA thread. It's not an official APK from the developer but maybe you can trust an XDA member.
Link me: MD5 Checker
Hashmyfiles by Nirsoft. Has context menu integration, right click to hash any file. Gives MD5, Sha1, CRC32, Sha256, and Sha384 and can do multiple files at once.