{"id":2193,"date":"2024-10-15T12:30:00","date_gmt":"2024-10-15T17:30:00","guid":{"rendered":"https:\/\/linuxhostsupport.com\/blog\/?p=2193"},"modified":"2024-10-01T06:57:45","modified_gmt":"2024-10-01T11:57:45","slug":"verify-file-checksums","status":"publish","type":"post","link":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/","title":{"rendered":"How to generate and verify file checksums on Linux?"},"content":{"rendered":"\n<div id=\"linux-3527575770\" class=\"linux-before-1st-paragraph linux-entity-placement\" style=\"margin-top: 15px;margin-bottom: 15px;\"><a href=\"https:\/\/www.rosehosting.com\/managed-vps-hosting\/?mtm_campaign=blogs&#038;mtm_source=lhs&#038;mtm_medium=blog&#038;mtm_content=managed-vps&#038;mtm_cid=1339&#038;mtm_placement=inline\" aria-label=\"Untitled\"><img src=\"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2020\/12\/1340090_NVMeGoogleAds_728x90_041322.jpg\" alt=\"\"  srcset=\"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2020\/12\/1340090_NVMeGoogleAds_728x90_041322.jpg 728w, https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2020\/12\/1340090_NVMeGoogleAds_728x90_041322-300x37.jpg 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" width=\"728\" height=\"90\"  style=\"display: inline-block;\" \/><\/a><\/div><p>We verify file checksums to ensure the file&#8217;s integrity, confirming no corruption or intentional modification has occurred. Anyone working with software distributions and versions, managing backups, or other files where data integrity is essential can use checksums to verify that they have the correct file.<\/p>\n\n\n\n<p>A checksum is a value derived from a file&#8217;s content through a mathematical algorithm. It serves as the file&#8217;s fingerprint. Even the slightest change in the file&#8217;s content will give a completely different checksum, making checksums useful for detecting corruption or unauthorized modifications.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">Common Checksum Algorithms<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>MD5:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Produces a 128-bit hash value, typically displayed as a 32-character hexadecimal number. The MD5 checksum algorithm is fast but has known vulnerabilities, making it less ideal for security-critical applications.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>SHA-1:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Generates a 160-bit hash value, usually represented as a 40-character hexadecimal number. While more secure than MD5, SHA-1 is weak against modern cryptographic attacks.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>SHA-256:<\/strong>\n<ul class=\"wp-block-list\">\n<li>It belongs to the SHA-2 family and creates a 256-bit hash value, shown as a 64-character hexadecimal number. It offers a higher level of security and is commonly used today.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>SHA-384<\/strong> and <strong>SHA-512:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Part of the SHA-2 family, they create 384-bit and 512-bit hash values, respectively, offering a higher level of security.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Generating Checksums<\/h2>\n\n\n\n<p><strong>MD5<\/strong><\/p>\n\n\n\n<p>To generate a checksum of a file using the MD5 algorithm, you can use the command md5sum.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>md5sum &lt;filename&gt;<\/code><\/pre>\n\n\n\n<p>For example, you can create a checksum of a txt or iso file using the command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ md5sum newfile.txt<\/code><\/pre>\n\n\n\n<p>And you should receive a similar output.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>8a4da784d5a4a40240070647e24ae3c8 newfile.txt<\/code><\/pre>\n\n\n\n<p>Now, if you try to modify the txt file and generate the checksum again.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ echo \"adding new text\" &gt;&gt; newfile.txt\n\n$ md5sum newfile.txt\n\n01d7b5d407a95eaa8ffeae996d9a9420 newfile.txt<\/code><\/pre>\n\n\n\n<p>You will notice that the checksum has changed.<\/p>\n\n\n\n<p><strong>SHA1<\/strong><\/p>\n\n\n\n<p>For generating <strong>SHA1 <\/strong>checksum, you can use the command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sha1sum filename<\/code><\/pre>\n\n\n\n<p>For example, you want the check the SHA-1 checksum of an file, you can do.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sha1sum somefile\nc1f907c98e8dd422f4ad269afbd95cd773c90533 somefile<\/code><\/pre>\n\n\n\n<p><strong>SHA256, SHA384, SHA256:<\/strong><\/p>\n\n\n\n<p>The checksum algorithms from the SHA-2 family can be used with the commands sha256sum, sha384sum, and sha215sum.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sha256sum newfile.txt \n20facfd89cc24ad86c0c867187c31460bfe05d5c6ed36cae7763da7eeed57d11  newfile.txt\n\n$ sha384sum newfile.txt \n3ab82cd318aa52c021a023d49ff6e654de21b7818b83223d5164013672a5ce3a4a5284f6833c4be132a6959927462cd8  newfile.txt\n\n$ sha512sum newfile.txt \na114226d1cc3163ecfa6979a0556a65ec9161a7ebb2e5942aa447aa0d1097daa975586f134006e8dc4b51e21c50885c01b2fd43ac4e8278e72e1fe2597613c5e  newfile.txt<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Verifying Checksums<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Manual Verification<\/li>\n<\/ul>\n\n\n\n<p>To manually verify a checksum, generate the checksum of the file you want to verify using one of the commands above.<br>Then, compare this checksum with the known correct checksum value.<\/p>\n\n\n\n<p>The most commonly used checksum algorithm today is SHA-256. If you are downloading a Linux distribution, you will always find the checksums on their website to make sure that the ISO image you downloaded is not corrupted or tampered with.<\/p>\n\n\n\n<p>You can copy the generated checksum of the iso image you downloaded and use the CTRL-F find tool on your browser. Then, you can paste the generated checksum to check if the checksums match instead of comparing each checksum character.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2024\/09\/firefox_SrDJTNrhmb-1024x324.jpg\" alt=\"\" class=\"wp-image-49209\"\/><\/figure>\n\n\n\n<div style=\"height:54px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using Checksum Files<\/li>\n<\/ul>\n\n\n\n<p>If you have a file containing checksums (e.g., checksums.sha256), you can verify your files using:<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sha256sum -c checksums.sha256<\/code><\/pre>\n\n\n\n<p>The checksum file should list each checksum and the corresponding file. The -c flag will check each file and report if its checksum matches the recorded value.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ md5sum -c checksums.md5<\/code><\/pre>\n\n\n\n<p>In this command, -c tells md5sum to read checksums from a file and check the integrity of the files listed in it. Ensure that the checksum file follows the format checksum filename.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Checksums are a fundamental tool for ensuring file integrity. Using commands like md5sum, sha1sum, and sha256sum, you can efficiently generate and verify file checksums on Linux. More robust algorithms such as <strong>SHA-256<\/strong>, <strong>SHA-384<\/strong>, or <strong>SHA-512<\/strong> will help you avoid any security concerns about data integrity compared to weaker checksum algorithms.<\/p>\n\n\n\n<p>If you need help verifying file checksums, feel free to contact our <a href=\"https:\/\/linuxhostsupport.com\/per-incident-support.html\" target=\"_blank\" rel=\"noreferrer noopener\">server support<\/a>. We&#8217;ll be happy to help.<\/p><div id=\"linux-1771417136\" class=\"linux-after-8th-paragraph linux-entity-placement\" style=\"margin-top: 15px;margin-bottom: 15px;\"><a href=\"https:\/\/www.rosehosting.com\/managed-vps-hosting\/?mtm_campaign=blogs&#038;mtm_source=lhs&#038;mtm_medium=blog&#038;mtm_content=managed-vps&#038;mtm_cid=1340&#038;mtm_placement=inline\" aria-label=\"Untitled\"><img src=\"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2020\/12\/1340095_VPSGoogleAds_728x90_042622.jpg\" alt=\"\"  srcset=\"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2020\/12\/1340095_VPSGoogleAds_728x90_042622.jpg 728w, https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2020\/12\/1340095_VPSGoogleAds_728x90_042622-300x37.jpg 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" width=\"728\" height=\"90\"  style=\"display: inline-block;\" \/><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>We verify file checksums to ensure the file&#8217;s integrity, confirming no corruption or intentional modification has occurred. Anyone working with software distributions and versions, managing backups, or other files where data integrity is essential can use checksums to verify that they have the correct file. A checksum is a value derived from a file&#8217;s content [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2199,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[228],"tags":[291,45,290],"class_list":["post-2193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","tag-checksums","tag-linux","tag-verify-file"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Verify file Checksums on Linux | LinuxHostSupport<\/title>\n<meta name=\"description\" content=\"We use checksums to check the integrity of the file. Learn how to verify file checksums on Linux with our step-by-step guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Verify file Checksums on Linux | LinuxHostSupport\" \/>\n<meta property=\"og:description\" content=\"We use checksums to check the integrity of the file. Learn how to verify file checksums on Linux with our step-by-step guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/\" \/>\n<meta property=\"og:site_name\" content=\"LinuxHostSupport\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/linuxhostsupport\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-15T17:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2024\/10\/how-to-generate-and-verify-file-checksums-on-linux.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"742\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lnxhostsupport\" \/>\n<meta name=\"twitter:site\" content=\"@lnxhostsupport\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/#\\\/schema\\\/person\\\/53a9571ea078cdf350137a1e97423cfb\"},\"headline\":\"How to generate and verify file checksums on Linux?\",\"datePublished\":\"2024-10-15T17:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/\"},\"wordCount\":595,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/how-to-generate-and-verify-file-checksums-on-linux.webp\",\"keywords\":[\"checksums\",\"linux\",\"verify file\"],\"articleSection\":[\"Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/\",\"url\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/\",\"name\":\"Verify file Checksums on Linux | LinuxHostSupport\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/how-to-generate-and-verify-file-checksums-on-linux.webp\",\"datePublished\":\"2024-10-15T17:30:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/#\\\/schema\\\/person\\\/53a9571ea078cdf350137a1e97423cfb\"},\"description\":\"We use checksums to check the integrity of the file. Learn how to verify file checksums on Linux with our step-by-step guide.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/#primaryimage\",\"url\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/how-to-generate-and-verify-file-checksums-on-linux.webp\",\"contentUrl\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/how-to-generate-and-verify-file-checksums-on-linux.webp\",\"width\":742,\"height\":410,\"caption\":\"How to Generate and Verify File Checksums on Linux\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/verify-file-checksums\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to generate and verify file checksums on Linux?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/\",\"name\":\"LinuxHostSupport\",\"description\":\"Linux Tutorials and Guides\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/#\\\/schema\\\/person\\\/53a9571ea078cdf350137a1e97423cfb\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ed83c63a34114218f977e1f913be03906d17c7d9c800788fcac345f5edaf6cfa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ed83c63a34114218f977e1f913be03906d17c7d9c800788fcac345f5edaf6cfa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ed83c63a34114218f977e1f913be03906d17c7d9c800788fcac345f5edaf6cfa?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/linuxhostsupport.com\\\/blog\\\/author\\\/r0s3admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Verify file Checksums on Linux | LinuxHostSupport","description":"We use checksums to check the integrity of the file. Learn how to verify file checksums on Linux with our step-by-step guide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/","og_locale":"en_US","og_type":"article","og_title":"Verify file Checksums on Linux | LinuxHostSupport","og_description":"We use checksums to check the integrity of the file. Learn how to verify file checksums on Linux with our step-by-step guide.","og_url":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/","og_site_name":"LinuxHostSupport","article_publisher":"https:\/\/www.facebook.com\/linuxhostsupport","article_published_time":"2024-10-15T17:30:00+00:00","og_image":[{"width":742,"height":410,"url":"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2024\/10\/how-to-generate-and-verify-file-checksums-on-linux.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@lnxhostsupport","twitter_site":"@lnxhostsupport","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/#article","isPartOf":{"@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/"},"author":{"name":"admin","@id":"https:\/\/linuxhostsupport.com\/blog\/#\/schema\/person\/53a9571ea078cdf350137a1e97423cfb"},"headline":"How to generate and verify file checksums on Linux?","datePublished":"2024-10-15T17:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/"},"wordCount":595,"commentCount":0,"image":{"@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/#primaryimage"},"thumbnailUrl":"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2024\/10\/how-to-generate-and-verify-file-checksums-on-linux.webp","keywords":["checksums","linux","verify file"],"articleSection":["Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/","url":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/","name":"Verify file Checksums on Linux | LinuxHostSupport","isPartOf":{"@id":"https:\/\/linuxhostsupport.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/#primaryimage"},"image":{"@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/#primaryimage"},"thumbnailUrl":"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2024\/10\/how-to-generate-and-verify-file-checksums-on-linux.webp","datePublished":"2024-10-15T17:30:00+00:00","author":{"@id":"https:\/\/linuxhostsupport.com\/blog\/#\/schema\/person\/53a9571ea078cdf350137a1e97423cfb"},"description":"We use checksums to check the integrity of the file. Learn how to verify file checksums on Linux with our step-by-step guide.","breadcrumb":{"@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/#primaryimage","url":"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2024\/10\/how-to-generate-and-verify-file-checksums-on-linux.webp","contentUrl":"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2024\/10\/how-to-generate-and-verify-file-checksums-on-linux.webp","width":742,"height":410,"caption":"How to Generate and Verify File Checksums on Linux"},{"@type":"BreadcrumbList","@id":"https:\/\/linuxhostsupport.com\/blog\/verify-file-checksums\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/linuxhostsupport.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to generate and verify file checksums on Linux?"}]},{"@type":"WebSite","@id":"https:\/\/linuxhostsupport.com\/blog\/#website","url":"https:\/\/linuxhostsupport.com\/blog\/","name":"LinuxHostSupport","description":"Linux Tutorials and Guides","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/linuxhostsupport.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/linuxhostsupport.com\/blog\/#\/schema\/person\/53a9571ea078cdf350137a1e97423cfb","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ed83c63a34114218f977e1f913be03906d17c7d9c800788fcac345f5edaf6cfa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ed83c63a34114218f977e1f913be03906d17c7d9c800788fcac345f5edaf6cfa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ed83c63a34114218f977e1f913be03906d17c7d9c800788fcac345f5edaf6cfa?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/linuxhostsupport.com\/blog\/author\/r0s3admin\/"}]}},"_links":{"self":[{"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/posts\/2193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/comments?post=2193"}],"version-history":[{"count":4,"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/posts\/2193\/revisions"}],"predecessor-version":[{"id":2198,"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/posts\/2193\/revisions\/2198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/media\/2199"}],"wp:attachment":[{"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/media?parent=2193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/categories?post=2193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/linuxhostsupport.com\/blog\/wp-json\/wp\/v2\/tags?post=2193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}