Tag

file integrity

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Mar 15, 2025 · Operations

How to Verify File Integrity with MD5 and SHA‑512 Checksums on Linux

This guide explains the principles of MD5 and SHA‑512 checksums, demonstrates how to generate and compare them using md5sum and sha512sum commands, and shows practical steps to ensure files remain unchanged during transfer or storage on Linux systems.

LinuxMD5SHA-512
0 likes · 7 min read
How to Verify File Integrity with MD5 and SHA‑512 Checksums on Linux
Raymond Ops
Raymond Ops
Jan 20, 2025 · Operations

How to Verify File Integrity with md5sum: Commands, Options, and Scripts

This guide explains how to use the Linux md5sum command to generate checksums, compare files, store checksum data, and employ verification options like -c, --quiet, and --status for reliable file integrity checks in scripts and system operations.

Linuxchecksumfile integrity
0 likes · 4 min read
How to Verify File Integrity with md5sum: Commands, Options, and Scripts
Refining Core Development Skills
Refining Core Development Skills
Jun 6, 2022 · Fundamentals

Why Large File Downloads Still Need Integrity Verification Despite TCP Reliability

Although TCP provides reliable transmission, its guarantees have limits—such as incomplete CRC checks, process crashes before data reaches the transport layer, possible ISP tampering, and kernel‑level ACKs that don’t ensure user‑space receipt—so large downloads must still be validated for full integrity.

LinuxTCPchecksum
0 likes · 4 min read
Why Large File Downloads Still Need Integrity Verification Despite TCP Reliability
vivo Internet Technology
vivo Internet Technology
Mar 17, 2021 · Backend Development

Implementation and Principles of HTTP Range (Breakpoint) File Download in Java

The article explains how Vivo’s platform implements a fault‑tolerant HTTP Range (breakpoint) download in Java—detecting server support, choosing single‑or multi‑threaded segmented downloads, using RandomAccessFile and retry logic, verifying integrity with ETag/MD5, and issuing alerts, while noting when the added complexity is justified.

Breakpoint DownloadHTTP RangeJava
0 likes · 23 min read
Implementation and Principles of HTTP Range (Breakpoint) File Download in Java