<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hash Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/hash/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Fri, 29 Jul 2022 03:51:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>How to check the integrity of files with the hash.</title>
		<link>https://www.osradar.com/how-to-check-the-integrity-of-files-with-the-hash/</link>
					<comments>https://www.osradar.com/how-to-check-the-integrity-of-files-with-the-hash/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Fri, 19 Aug 2022 21:50:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[hash]]></category>
		<category><![CDATA[md5]]></category>
		<category><![CDATA[sha]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=36846</guid>

					<description><![CDATA[<p>How is it possible to easily know if the file I am receiving is legitimate? Is it possible to know if it has been corrupted while downloading it from the Internet? Yes, it is possible through its hash. Indeed, it works as an identification code of the data we are working with. If a certain [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-check-the-integrity-of-files-with-the-hash/">How to check the integrity of files with the hash.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>How is it possible to easily know if the file I am receiving is legitimate? Is it possible to know if it has been corrupted while downloading it from the Internet? Yes, it is possible through its hash. Indeed, it works as an identification code of the data we are working with. If a certain source data is altered, this alphanumeric output code is completely altered. Below, we show you everything you need to know. In addition to the recommended tools to generate hashes when you need them. In the following lines, we will describe how to check the integrity of files with the hash. </p>



<h2>What is a hash, and what is it for?</h2>



<p>A hash is a cryptographic <a href="https://www.osradar.com/password-hashing-mysql-mariadb/" target="_blank" rel="noreferrer noopener">function</a> that works only in one direction. That is, it is a mathematical algorithm that transforms any input block of data into a new series of output characters with a fixed or variable length. Therefore, a hash function is the result of a function that is responsible for converting one value into another. A significant detail is that hashes generally provide a fixed-length output. However, there are hash algorithms that are specifically designed to <em>protect</em> passwords. Consequently, in this case, the length of the output is variable.</p>



<p>One of the main purposes of such a hash function is to be able to check whether a file has been modified or not. The hash fingerprint of each file is unique. The hash actually generates a kind of code that serves as an identification of the data in question. In addition, with the hash of a given file, the original file cannot be recovered. For this reason, a good security practice is to store password hashes in databases. This way, no one can obtain the information in plain text. However, to crack this hash, what is done is to try thousands of combinations. It then proceeds to compare whether the hashes are the same. </p>



<h2>Some uses of hashing</h2>



<p>Hashes have many uses, such as the following:</p>



<ul><li><strong>Check the integrity of a file:</strong> The first thing to do is to hash a file. Then we copy it to another computer or anywhere else. Then, if you hash this copied file again, you should get the same result as the original hash function. As soon as a bit  of changes in a file, the output of the hash we have used is entirely different. For this reason, hashing is essential in secure encryption protocols such as HTTPS or FTPES. In fact, it verifies that the data has not undergone any change in the communication. Hashes are also widely used in the world of computer forensics. In fact, they allow the chain of custody of a hard disk or a disk image to be properly performed, and to ensure that none of the content has been modified.</li><li><strong>Store passwords securely:</strong> Simply hash a password. Then we store the result of this hash function in a database. Consequently, if an attacker accesses this database, he will not be able to recover the password. We must remember that hash functions only go one way. Therefore, it is not possible to &#8220;reverse&#8221; a hash function. Consequently, if a cybercriminal wants to crack the password, he will have to do a brute force and dictionary attack. So that he can compare the hash of each tested password with the password he got in the leak.</li></ul>



<p>As you can see, hash functions are significant in the world of computer and network security. In fact, it allows you to check the integrity of transmitted data, not just data stored on a hard disk or SSD. Next, we will show you how to check the integrity of a file using different hashing algorithms.</p>



<h2>SHA algorithms</h2>



<p>SHA stands for Secure Hash Algorithm. It was developed by NIST, the National Institute for Standards and Technology. It is one of the most popular standardized algorithms today. One of the advantages is that at the slightest change in data integrity, the hash changes completely. SHA2-256, for example, is a standard that is being used nationally in the United States. Moreover, it is currently considered secure. It is called SHA2-256 because the hash it generates is 256 bits long.</p>



<p>Not only can you count on SHA2-256 hashes and other standards to check the integrity of files. The one we mentioned also has application in popular authentication and encryption protocols: SSL, TLS, IPSec, SSH and PGP. On the other hand, this algorithm is used to hash passwords, and store the hash and not the password in clear text. Especially on Linux and other operating systems, as well as in applications that store passwords in a database. The popular cryptocurrency Bitcoin uses this algorithm to verify every transaction in its network.</p>



<h2>Tools to generate hashes online</h2>



<p>Now that we have a clearer picture of what a hash is and what it is for, you can try some of the tools that generate hashes. This is the primary thing to do to check the integrity of the data you want. This way, you can easily check the integrity of the data you are working with.</p>



<ul><li><strong><a href="https://emn178.github.io/online-tools/crc16_checksum.html" target="_blank" rel="noreferrer noopener">File Checksum:</a> </strong>It is a simple web tool that allows the generation of hashes. You only need to drag the file from the location where it is, to the website. Or, you can click on the box where it says, <em>Drop File Here</em> and upload the file. Not only can you generate hashes in SHA2-256, but also with other hash functions that exist. Specifically, 29 hash algorithms for both File and Plain Text Hashes. An important advantage is that you don&#8217;t need to register, just log in, and you can use it.</li><li><strong><a href="https://md5file.com/calculator" target="_blank" rel="noreferrer noopener">HTML5 File Hash Online Calculator: </a></strong>This is another website that does not require prior registration to generate file hashes. The algorithms it supports are MD5, SHA-1, SHA-256, SHA-384 and SHA-512. It also has an algorithm that is described as the fastest implementation of SHA algorithms (WebCryptoAPI). In fact, it is applicable for files weighing less than 512 GB.</li><li><a href="https://defuse.ca/checksums.htm" target="_blank" rel="noreferrer noopener"><strong>Defuse Online Text &amp; File Checksum Calculator:</strong> </a>Another tool you can find on the Internet to generate hashes. It supports ASCII or UNICODE text. Regarding files, it has no format limitations, but it does have size limitations (5 MB). One of its advantages is that neither the data nor the generated hashes are stored on the site&#8217;s server.</li></ul>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="730" src="https://www.osradar.com/wp-content/uploads/2022/07/sha-1024x730.png" alt="" class="wp-image-36847" srcset="https://www.osradar.com/wp-content/uploads/2022/07/sha-1024x730.png 1024w, https://www.osradar.com/wp-content/uploads/2022/07/sha-300x214.png 300w, https://www.osradar.com/wp-content/uploads/2022/07/sha-768x548.png 768w, https://www.osradar.com/wp-content/uploads/2022/07/sha-696x496.png 696w, https://www.osradar.com/wp-content/uploads/2022/07/sha-1068x762.png 1068w, https://www.osradar.com/wp-content/uploads/2022/07/sha.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2>Programs to generate hashes (free)</h2>



<p>There are not only web solutions for this purpose, but also executable programs that are usually effortless to use. In addition to the fact that downloading and installation is free of charge:</p>



<ul><li><a href="https://www.nirsoft.net/utils/hash_my_files.html" target="_blank" rel="noreferrer noopener"><strong>HashMyFiles:</strong> </a>It is a portable program that allows the generation of hashes in massive form. That is, you can select more than one file at a time so that it can generate hashes for each one. It supports SHA (all variants) and CRC32 algorithms. It is possible to create access to HashMyFiles in the context menu. Consequently, every time you select files or even folders, you can count on this program to import them into it and create hashes. It is compatible with Windows from version 2000 onwards.</li><li><a href="https://www.quickhash-gui.org/downloads/"><strong>QuickHash:</strong></a> It is a multiplatform open-source program (available for Windows, Mac, and Linux). It is also characterized as one of the most complete solutions. Although it only supports popular algorithms such as MD5 and SHA2-256, it has particularities such as generating hash to an entire folder. It also allows you to compare two files, directories and even an entire storage disk. In case you need to hash the entire contents of a document, line by line, this application can do it.</li></ul>



<figure class="wp-block-image size-full"><img loading="lazy" width="1025" height="765" src="https://www.osradar.com/wp-content/uploads/2022/07/sha2.png" alt="" class="wp-image-36848" srcset="https://www.osradar.com/wp-content/uploads/2022/07/sha2.png 1025w, https://www.osradar.com/wp-content/uploads/2022/07/sha2-300x224.png 300w, https://www.osradar.com/wp-content/uploads/2022/07/sha2-768x573.png 768w, https://www.osradar.com/wp-content/uploads/2022/07/sha2-696x519.png 696w, https://www.osradar.com/wp-content/uploads/2022/07/sha2-265x198.png 265w" sizes="(max-width: 1025px) 100vw, 1025px" /></figure>



<h2>Other programs</h2>



<ul><li><strong><a href="https://www.softpedia.com/get/System/File-Management/MultiHasher.shtml" target="_blank" rel="noreferrer noopener">MultiHasher:</a> </strong>This is another super compact and easy to use tool. It specializes in generating hashes massively, by folders and subfolders. It can even indicate the path of what we want to generate. Furthermore, it supports all known algorithms.</li><li><strong><a href="https://www.softpedia.com/get/Security/Security-Related/MD5-and-SHA-1-Checksum-Utility.shtml" target="_blank" rel="noreferrer noopener">MD5 &amp; SHA Checksum Utility:</a> </strong>It is a free software that generates SHA-512, SHA-1, MD5, SHA-256 hash types from a given file. It also verifies the integrity of the file. For hash verification, or to generate a hash, you must select the desired file. Then select one of these two hashes, SHA-1 or MD5. Subsequently, you must click verify or copy to verify the integrity of the file or generate the hash.</li></ul>



<figure class="wp-block-image size-full"><img loading="lazy" width="706" height="349" src="https://www.osradar.com/wp-content/uploads/2022/07/sha3.png" alt="" class="wp-image-36849" srcset="https://www.osradar.com/wp-content/uploads/2022/07/sha3.png 706w, https://www.osradar.com/wp-content/uploads/2022/07/sha3-300x148.png 300w, https://www.osradar.com/wp-content/uploads/2022/07/sha3-696x344.png 696w" sizes="(max-width: 706px) 100vw, 706px" /></figure>



<p>Very well, in this way we have seen How to check the integrity of files with the hash. Bye!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-check-the-integrity-of-files-with-the-hash/">How to check the integrity of files with the hash.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-check-the-integrity-of-files-with-the-hash/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Password hashing on Mysql / MariaDB</title>
		<link>https://www.osradar.com/password-hashing-mysql-mariadb/</link>
					<comments>https://www.osradar.com/password-hashing-mysql-mariadb/#respond</comments>
		
		<dc:creator><![CDATA[angeloma]]></dc:creator>
		<pubDate>Tue, 20 Nov 2018 02:38:50 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Databases]]></category>
		<category><![CDATA[hash]]></category>
		<category><![CDATA[hashing]]></category>
		<category><![CDATA[mariadb]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[password]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=7445</guid>

					<description><![CDATA[<p>Data security is essential to maintain system stability. Many system administrators know the importance of passwords in computer systems. Therefore, today I will tell you about the password hashing in MySQL and MariaDB. MySQL and MariaDB are two popular database managers among application developers. Above all, because they are free, open source and because they [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/password-hashing-mysql-mariadb/">Password hashing on Mysql / MariaDB</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Data security is essential to maintain system stability. Many system administrators know the importance of passwords in computer systems. Therefore, today I will tell you about the password hashing in MySQL and MariaDB.</p>
<p><a href="https://www.mysql.com/">MySQL</a> and <a href="http://mariadb.org/">MariaDB</a> are two popular database managers among application developers. Above all, because they are free, open source and because they are very but very robust and reliable. All this is added to the fact that they are well documented and have the support of the community.</p>
<p><figure id="attachment_7450" aria-describedby="caption-attachment-7450" style="width: 1200px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7450" src="https://www.osradar.com/wp-content/uploads/2018/11/5-14.png" alt="Mysql" width="1200" height="1200" srcset="https://www.osradar.com/wp-content/uploads/2018/11/5-14.png 1200w, https://www.osradar.com/wp-content/uploads/2018/11/5-14-150x150.png 150w, https://www.osradar.com/wp-content/uploads/2018/11/5-14-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/5-14-768x768.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/5-14-1024x1024.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/5-14-696x696.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/5-14-1068x1068.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/5-14-420x420.png 420w" sizes="(max-width: 1200px) 100vw, 1200px" /><figcaption id="caption-attachment-7450" class="wp-caption-text">Mysql</figcaption></figure></p>
<p>Being two database managers, with clear objectives and good security measures, we find methods and ways to encrypt passwords or any string. that we need to protect even more.</p>
<h1>What is Password Hashing?</h1>
<p>First of all, you need to know what password hashing is. Password hashing is a way of encrypting a string so that not even the administrator of the system can know its value. It is especially useful for passwords.</p>
<p>This process is very important, but it is quite simple, they are simply functions that allow you to do it.</p>
<h1>Some functions to do Password Hashing</h1>
<p>MySQL and MariaDB have several functions that help us do a proper and hassle-free hashing. However, each of them behaves differently. Let&#8217;s see.</p>
<h3>AES_ENCRYPT FUNCTION</h3>
<p>Allow encryption of data using the official <a href="https://en.wikipedia.org/wiki/Advanced_Encryption_Standard">AES</a> (Advanced Encryption Standard) algorithm. It is very secure. Encoding with a 128-bit key length is used, but you can extend it up to 256 bits by modifying the source. However, 128-bit length is enough for many cases.</p>
<p>This function requires two parameters, the first is the String and the second is key_str.</p>
<p>For example:</p>
<pre class="fixed">INSERT INTO table_name VALUES (AES_ENCRYPT('example',SHA2('password',512)));</pre>
<p>This is the output.</p>
<h3>MD5 FUNCTION</h3>
<p>This function calculates an MD5 128-bit checksum for the string.</p>
<p>The value is returned as a string of 32 hexadecimal digits, or NULL if the argument was NULL.</p>
<pre class="">SELECT MD5 ('EXAMPLE);</pre>
<p><figure id="attachment_7446" aria-describedby="caption-attachment-7446" style="width: 428px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7446" src="https://www.osradar.com/wp-content/uploads/2018/11/1-15.png" alt="Using MD5 function" width="428" height="200" srcset="https://www.osradar.com/wp-content/uploads/2018/11/1-15.png 428w, https://www.osradar.com/wp-content/uploads/2018/11/1-15-300x140.png 300w" sizes="(max-width: 428px) 100vw, 428px" /><figcaption id="caption-attachment-7446" class="wp-caption-text">Using MD5 function</figcaption></figure></p>
<p>As you can see, the function calculates a value for the phrase or string and is useful for encrypting certain data.</p>
<h3>PASSWORD FUNCTION</h3>
<p>This is the most used function in MySQL or MariaDB to encrypt Strings. It&#8217;s really simple and we could almost say that it&#8217;s used by default, although obviously, it&#8217;s not. However, the PASSWORD() function is used for hashing passwords for use in authentication by the MariaDB server.</p>
<p>The return value is 41-bytes in length, and the first character is always &#8216;*&#8217;.</p>
<pre class="">SELECT PASSWORD ('password');</pre>
<p><figure id="attachment_7447" aria-describedby="caption-attachment-7447" style="width: 464px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7447" src="https://www.osradar.com/wp-content/uploads/2018/11/2-15.png" alt="PASSWORD FUNCTION" width="464" height="210" srcset="https://www.osradar.com/wp-content/uploads/2018/11/2-15.png 464w, https://www.osradar.com/wp-content/uploads/2018/11/2-15-300x136.png 300w" sizes="(max-width: 464px) 100vw, 464px" /><figcaption id="caption-attachment-7447" class="wp-caption-text">PASSWORD FUNCTION</figcaption></figure></p>
<h3>SHA2 FUNCTION</h3>
<p>Calculates the SHA-2 family of hash functions (SHA-224, SHA-256, SHA-384, and SHA-512). This function requires two arguments, firstly, the text to be encrypted and secondly the length of the hash (224, 256, 384, 512).</p>
<p>The SHA2 function works only if MySQL has been configured with SSL support.</p>
<pre class="fixed">SELECT SHA2('Angelo',224);
SELECT SHA2('Angelo',256);
SELECT SHA2('Angelo',384);
SELECT SHA2('Angelo',512);</pre>
<p><figure id="attachment_7448" aria-describedby="caption-attachment-7448" style="width: 607px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7448" src="https://www.osradar.com/wp-content/uploads/2018/11/3-14.png" alt="3.- Using SHA2 function" width="607" height="168" srcset="https://www.osradar.com/wp-content/uploads/2018/11/3-14.png 607w, https://www.osradar.com/wp-content/uploads/2018/11/3-14-300x83.png 300w" sizes="(max-width: 607px) 100vw, 607px" /><figcaption id="caption-attachment-7448" class="wp-caption-text">3.- Using SHA2 function</figcaption></figure></p>
<p><figure id="attachment_7449" aria-describedby="caption-attachment-7449" style="width: 1215px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7449" src="https://www.osradar.com/wp-content/uploads/2018/11/4-15.png" alt="4.- Other example using SHA2 function" width="1215" height="153" srcset="https://www.osradar.com/wp-content/uploads/2018/11/4-15.png 1215w, https://www.osradar.com/wp-content/uploads/2018/11/4-15-300x38.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/4-15-768x97.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/4-15-1024x129.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/4-15-696x88.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/4-15-1068x134.png 1068w" sizes="(max-width: 1215px) 100vw, 1215px" /><figcaption id="caption-attachment-7449" class="wp-caption-text">4.- Other example using the SHA2 function</figcaption></figure></p>
<p>This is the function more secure. It is recommended for production servers.</p>
<h1>Conclusion</h1>
<p>As you can see it&#8217;s easy to protect passwords even more. All that&#8217;s left is for you to use these tools properly.</p>
<p>If you don know how to install MySQL or MariaDB, you can read <a href="https://www.osradar.com/install-mysql-8-0-on-fedora-29-28-centos-rhel-7-6-6-10/" target="_blank" rel="noopener">this</a> article.</p>
<p>Please share this article on your social networks.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/password-hashing-mysql-mariadb/">Password hashing on Mysql / MariaDB</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/password-hashing-mysql-mariadb/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
