SoFunction
Updated on 2025-04-21

Methods to verify MD5 values ​​in Windows and Linux systems

1. Windows system verification MD5

Method 1: Use the built-in tool CertUtil

  1. Open a command prompt or PowerShell

    • according toWin + R, entercmdorpowershell, press Enter.
  2. Execute the MD5 verification command

certutil -hashfile <File path> MD5

Example:

certutil -hashfile D:\Downloads\ MD5
    • Output result: The generated MD5 hash will be displayed under the words "MD5 hash".

Method 2: Use third-party tools

  • MD5Checker(Graphic Interface Tool)

    1. Download and installMD5Checker
    2. Drag and drop files to the software interface, automatically calculate and support batch verification.
  • 7-Zip(Integrated hashing function)

    1. Right-click on the file →7-Zip → CRC SHA → MD5

2. Linux system verification MD5

Method 1: Use terminal commandsmd5sum

  • Open the terminal

    • shortcut keyCtrl + Alt + TOr start through the application menu.
  • Execute the command

md5sum <File path>

Example:

md5sum /home/user/Downloads/
    • Output result: The first column is the MD5 value, and the second column is the file name.
  • Direct comparison of hash values

echo "<MD5 hash> <file path>" | md5sum -c

Example:

echo "d41d8cd98f00b204e9800998ecf8427e  " | md5sum -c
  • Success tip:show: OK

Method 2: Graphic Interface Tools

  • GtkHash

    Install:sudo apt install gtkhash(Debian/Ubuntu)

    Open the software → Select file → Click "Hash" to generate MD5.

3. Things to note

  1. MD5's security
    There is a collision loophole in MD5.Not suitable for high-security scenarios(such as password storage). SHA-256 is recommended for sensitive scenarios (command:sha256sumorCertUtil -hashfile SHA256)。

  2. File path processing

    • When the path contains spaces or special characters, wrap it in English quotations (such as"file ")。
    • Can be passed in LinuxcdThe command enters the file directory to simplify the path.
  3. Comparison of verification results
    Ensure that the hash values ​​of comparison are exactly consistent (including upper and lower case). Available through online tools (e.g.MD5 Online) Auxiliary verification.

With the above methods, you can quickly verify file integrity and ensure the security and reliability of data transfers or stored procedures.

This is the article about how to verify MD5 values ​​under Windows and Linux systems. For more related content on Windows Linux verification of MD5 values, please search for my previous articles or continue browsing the related articles below. I hope everyone will support me in the future!