FileArmour Security Utility-File Integrity Checker (1) - PowerPoint PPT Presentation

About This Presentation
Title:

FileArmour Security Utility-File Integrity Checker (1)

Description:

Now prevent unauthorized access with FileArmour Security Utility’s file encryption software and save your files and documents. – PowerPoint PPT presentation

Number of Views:11

less

Transcript and Presenter's Notes

Title: FileArmour Security Utility-File Integrity Checker (1)


1
FILEARMOUR INTEGRITY CHECKER
www.filearmour.com
Tamper proof your files and documents and prevent
unauthorized access with FileArmour Security
Utilitys file encryption software
2
What is File Armour?
  • FileArmour is a free file encryption software
    developed by Anubrata Ghosh to encrypt and
    decrypt files.
  • Encryption and decryption can be done using
    proven, time-tested, NSA (National Security
    Agency) approved cryptographic algorithms like
    AES, Triple DES, RC2 and DES.
  • This utility also contains a file integrity
    checker to help you to validate and protect file
    integrity.
  • This tool also contains a simple folder lock
    feature to help you lock your folders containing
    confidential data.

3
Usage OF File Integrity Checker
  • FileArmour also contains an useful file integrity
    checker tool. To understand why you require a
    file integrity checker, consider the following
    scenarios.
  • When you download a file from Internet, how can
    you verify that your downloaded file has not been
    tampered with or replaced with a malicious
    software?
  • Similarly, when you send a file on an unsecured
    channel, how can the recipient verify that the
    file has not been corrupted in transit. This is
    where a file integrity checker comes into play.

4
How Does a File Integrity Checker Work?
  • Now that we have understood what is hashing, let
    us see how does a file integrity checker work.
    Many sites that offer software downloads (for
    e.g. http//apache.org/) publish the hash value
    associated with the file being downloaded. After
    you have downloaded the file, you run it through
    a file integrity checker that performs a hash on
    the contents of the file. If the output produced
    by the hash function exactly matches the hash
    value published on the website, you can conclude
    that the file has not been altered during
    download.
  • Hash Algorithms Implemented by FileArmour File
    Integrity Checker Tool
  • The following hash algorithms are implemented by
    FileArmour file integrity checker Naming a few
  • MD5
  • RIPMED-160
  • SHA-1

5
Contact Us
E-902, Platinum City, HMT Road, Off Tumkur Road,
near CMTI Bangalore Karnataka 560022 India
918861469401
developer_at_filearmour.com
http//www.filearmour.com/
Write a Comment
User Comments (0)
About PowerShow.com