joeware - never stop exploring... :)

Information about joeware mixed with wild and crazy opinions...

MD-5 and SHA-1 Digests now available for joeware utilities

by @ 12:12 pm on 11/16/2012. Filed under tech

I have been asked a few times recently for MD-5 and/or SHA-1 digests for the various utilities. I put some perl code together last night to generate that information and I have added it to the versions.txt file that is on the website. I will likely slowly add it to the actual individual tool pages as well. I have also "compiled" the script with ActiveState’s wonderful PerlApp Utility from the Perl Dev Kit and uploaded that to the website as well so you can use it if you don’t currently have a tool for generating the digests.

It looks like:

F:\joewaretools>joewaredigest *.exe

joewaredigest V01.00.00pl  joe@joeware.net  November 2012

AccExp.exe      743215e8b481c4d83cb19d844f9c9574        eb5f827483002389dae0bb3b16f7387c1bf66b8d
AdFind.exe      ff3dad91b266fee1ea107a2c9964349a        4acc9ddf7f23109216ca22801ac75c8fabb97019
AdMod.exe       c64665b4d245dab287317e28b7f6ecd5        15ff3b3be83a1fd5582cb17a8edeaa9d1aebde3e
AdQueueLoop.exe 9db4f587fe9255025660686061e77a0a        5076ee44ad9c9cb074ba31333af0997b35b9ad43
ATSN.exe        430b0d6dc378b112d6669e1dd2c50440        a1b88b10541ef2a73bd0c08411c314898b9f5303
Auth.exe        3758b8df84e839c870be1923f790bb99        a6d1a2a560c74f39145a81be4918890af028b7ff
changepw.exe    e7f36e96a2eb587dc13e170f4d2ecfed        078f89368ff6e1d1e20536b817ec4391131468b5
ClientTest.exe  37dcbd53a07a1058cdbac6c995f2c587        72f92b61c180b4f97033c8846a17ebd727589c8c
CPAU.exe        7100f979b8516b8c1ae6ff858435626e        c6a596b10bc8fd05f8a13859fef8b2cf7a9360e7
DNSSrvRec.exe   2d36802ffe70e3328e62dd3094123af2        a25663bf9db368247aba79ef381830943932f1da
ELDLLExInstall.exe      bd1c5fb5af14289fafaf4e994545dd81        207b7dc29090057396958feaec02c7d989b7ffd1
ELDLLInstall.exe        271d3fa6fc9a4e2981c268abee02af35        faf19566c4954d796f284d990bf99509bf05d1a2
ExchMbx.exe     2f373a9c206f5a2794cfc693f604d9fe        8d07815581f07b2262a6ba2a213ba7eceff81c4e
Expire.exe      3bfa82b554c5803dc809f343999642c1        7c0300da0049dc756e2ea91754c201d02510261a
FindExpAcc.exe  d1b13d81b20e0fd6158b145f2fdd4213        b30b449f256edc82f4f489622f2507333966eb9d
FindNBT.exe     3b8d3657b36aec0fb7a0bebc4d88f0c2        a6139dc3a7f6d09e59a77c40977f2ea1f1e327de
FindPDC.exe     410279342c05c78673bcf67952993734        dec101ba2ed776db7e6b5827770af0c65a34da59
GCChk.exe       5d3049643055c3328a34faecba001339        826ee4a1a09811196f286395de502b4cb1612cc0
GetUserInfo.exe 541f3288a001970902b4fccf72ba2343        213f06ed5ac9e688816b4bbe73bf507994949964
joewaredigest.exe       9dce93eb13bdebd0deedec2c1c4e48f2        5480c03010b85dd56f7050f5765c412fb0c70d00
LG.exe  d94bc7bc2417e60a734e9dba03bb01c9        534dd71b75b1af65c967b4b6f526b78859a52bfd
MachinePwd.exe  c5080d587849d58960b893cdb59e0024        b606b266dad0b5db08182a446595dc7c50297ce2
MemberOf.exe    c846cbbce2e994e7446ebda947a15e45        70028baf4655875e0968161a5061d658dc645cda
NetSess.exe     f310584eb1538cb78ca8c225038b2e54        965013bf24513f9c312db9483f87d3c87e1b77ba
OldCmp.exe      e1848235d8b33b654347a8126c9819ff        98e374fb09273209fa3517d39ef60e62b3a011e5
PSOMgr.exe      6a937c91f9cc3bee30973f4b458b622d        5a9d449f5a95909a7afd84dabf031e54a5058cf3
QLogoff.exe     b8e7fe3cbb62434738c22646eeba60aa        d524d0ee81d104d337049ea6c40e1f685a80e097
Quiet.exe       935809d393a2bf9f0e886a41ff5b98be        1ed3fc1669115b309624480e88c924b7b67e73bb
SecData.exe     b8529e94362019eff4235e1b2d2f6514        542925dd6d05abb8d74413578ebd85908316ca9d
SecTok.exe      99f7e80c898c22a3fbe533290b041eef        a63aa49372a3ca599421a77b34e65a7095d260bc
SeInteractiveLogonRight.exe     d1ca0d6e932634546e9e1438ce13d345        910ddd53163c4c1c769fc52994a4a16d0290e7d3
ShrFlgs.exe     7586ff1e497938cad331f195f2ee6229        155aff9ebd025dc701006e7ecef6427dd8da73ef
SidToName.exe   0e696ea81217a1ff8776e9312056a703        bdfc8f240a9e44a4c8a52da6a8bdff3b1c427ae5
SNU.exe f366bc2e029979f331f1bedabd2d45ce        57b1d31667a6823581f1e777b52d8dc9915cf228
svcutil.exe     35a880716fd517f7d2b727857c48cda6        96a97e4ae44dd16a5b30e6506a0d37d0413cc8da
Unjoin.exe      bd5137615c5f947be510c8b1d210d529        36cd5bf149e468a85a398b697bd8e8c7fa981c08
Unlock.exe      a0537949f105fa16e367d535b272c9bc        bc76333a5f6b10b162fa34b9ddf6a46fd65f1a88
UserDump.exe    a14ac214dd83ecf75c5032ba1098c416        d263cd402c4d203c17aa0274c9082ddbac1240b3
UserName.exe    dc31f02293a3914bfb813d6664165392        9a4483ae37170eec25b83d157c806438a1b51d2d
W2KLockDesktop.exe      6ac3acb478d4c39cafa25610708e12bd        72108f7602363064adc32c7e6f7b0d63bb958db8
WriteProt.exe   1410134ff602b0ea3719fbc52a02cfcd        253504025a3335bae43e14c9edea23b57b96b0cf

Command Completed.

 

Please see http://www.joeware.net/freetools/digest.htm for more information. 🙂

 

   joe

Rating 4.33 out of 5

Comments are closed.

[joeware – never stop exploring… :) is proudly powered by WordPress.]