This has to do with a checksum, which is used to confirm the file. From Wordnik.com. [VideoHelp.com Forum] Reference
Lastly I send a checksum which is a simple xor of all the data bytes to make sure the data got received without being corrupted. From Wordnik.com. [Usabilidoido [ feed completo ]] Reference
Conclusion: Can you still trust SHA-1 as checksum?. From Wordnik.com. [HBO: poisoning BT downloads] Reference
IPv4 provides only header integrity achieved with a checksum. From Wordnik.com. [IPv6 and its Future prospect in developing countries] Reference
If the checksum DOES NOT match, consider these possible reasons. From Wordnik.com. [CA-94:05 CERT Advisory MD5 Checksums] Reference
The Ethernet controller computes a checksum of the entire packet. From Wordnik.com. [The KA9Q Internet Software Package by Bdale Garbee] Reference
The checksum information for the file available from ftp. uu.net is. From Wordnik.com. [CA-91:10a CERT Advisory REVISION NOTICE: New Patch for SunOS /usr/lib/lpd] Reference
If you find that the checksum is different, please contact the vendor. From Wordnik.com. [CA-94:09 CERT Advisory /bin/login Vulnerability] Reference
You may want to add the correct checksum to your copy of the database. From Wordnik.com. [CA-94:05 CERT Advisory MD5 Checksums] Reference
Just a quick and easy way for those not used to checking the checksum. From Wordnik.com. [Windows 7 ISO Verifier Ensures Your Downloads Are Legit | Lifehacker Australia] Reference
Digitallysick: I don't think anyone has suggested using just a checksum. From Wordnik.com. [Windows 7 ISO Verifier Ensures Your Downloads Are Legit | Lifehacker Australia] Reference
We also wish to thank SUN Microsystems for supplying checksum information. From Wordnik.com. [CA-94:05 CERT Advisory MD5 Checksums] Reference
The string ends with a checksum; everything in between is an account number. From Wordnik.com. [dustbury.com » Carded away] Reference
RAID 5 is striped with checksum with gives fair performance and protection, and. From Wordnik.com. [Review: Infrant ReadyNAS — Meandering Passage] Reference
There is no checksum against this without tossing out the notion of secret ballots. From Wordnik.com. [Broad Concerns About Internet Voting - The Caucus Blog - NYTimes.com] Reference
It still has source and destination port numbers, and a checksum, but that's about it. From Wordnik.com. [The Hiss Case: Another Exchange!] Reference
If you find that the checksum is different please contact Sun or the CERT/CC for verification. From Wordnik.com. [CA-91:21 CERT Advisory SunOS NFS Jumbo and fsirand Patches] Reference
Be certain to verify the checksum information to confirm that you have retrieved a valid copy. From Wordnik.com. [CA-94:08 CERT Advisory ftpd Vulnerabilities] Reference
If you find that the checksum is different, please contact Sun or the CERT/CC for verification. From Wordnik.com. [CA-92:13 CERT Advisory SunOS NIS Vulnerability] Reference
For example, credit card numbers often include a form of checksum that catches reversed numbers. From Wordnik.com. [The Volokh Conspiracy » Clive Crook (at The Atlantic) on “ClimateGate”] Reference
If you find that the checksum is different please contact Sun Microsystems or CERT for verification. From Wordnik.com. [CA-93:03 CERT Advisory SunOS File/Directory Permissions] Reference
Is there anywhere that shows the MD5 checksum for the official .iso releases both 32-bit and 64-bit?. From Wordnik.com. [Pirate Windows 7 RC Used To Build Botnet | Lifehacker Australia] Reference
The size and checksum information in this Advisory have been updated to reflect the new online patch. From Wordnik.com. [CA-93:02a CERT Advisory REVISION NOTICE: New Patch for NeXT NetInfo "_writers" Vulnerabilities] Reference
Is there anywhere that shows the MD5 checksum for the official. iso releases (both 32-bit and 64-bit)?. From Wordnik.com. [Pirate Windows 7 RC Used To Build Botnet | Lifehacker Australia] Reference
Sep. 18, 1995 Intro. and Appendix B - Added note about checking with vendors for current checksum values. From Wordnik.com. [CA-94:05 CERT Advisory MD5 Checksums] Reference
Also, if the spam are pretty similar in content, you can use some type of checksum signature to filter on. From Wordnik.com. [MBH Responses to Barton Letters « Climate Audit] Reference
Once unpacked, each shell archive contains additional checksum information in the file "patchfilename. text". From Wordnik.com. [CA-93:01 CERT Advisory Revised Hewlett-Packard NIS ypbind Vulnerability] Reference
If we represent the Ethernet header with "E", and the Ethernet checksum with "C", your file now looks like this. From Wordnik.com. [The KA9Q Internet Software Package by Bdale Garbee] Reference
In plain English this says that the command checksum returns a string which is the checksum result (RString "checksum". From Wordnik.com. [Fedora People] Reference
So make sure if you do download the ISO that you run the MD5 checksum to make sure there were no errors in the downloaded file. From Wordnik.com. [Update: Ubuntu Adventure — Meandering Passage] Reference
Had he been looking at a computer monitor, he would have just seen that the checksum for the data packet he was looking at didn't match. From Wordnik.com. [State Of War]
Effectively, it's just a human-readable checksum, a safety feature so that a human can spot more easily a mistakenly looked-up identity. From Wordnik.com. [Snell-Pym » Identity] Reference
When the other end receives the packet, it recomputes the checksum, and throws the packet away if the answer disagrees with the original. From Wordnik.com. [The Hiss Case: Another Exchange!] Reference
Program to calculate and verify file checksums using major checksum algorithms: MD4, MD5. From Wordnik.com. [20 Newest Free Software Downloads - Freeware Files.com] Reference
LearnThatWord and the Open Dictionary of English are programs by LearnThat Foundation, a 501(c)3 nonprofit.
Questions? Feedback? We want to hear from you!
Email us
or click here for instant support.
Copyright © 2005 and after - LearnThat Foundation. Patents pending.

