How to Create Checksums with GtkHash Updated on May 31, 2022 by InMotion Hosting Contributor 2 Minutes, 36 Seconds to Read GtkHash is a small desktop application that creates multiple types of checksums on Linux and Windows at once. GtkHash can also hash multiple files at once or text strings. This makes hashing faster for users on Windows, macOS, and Linux who do not use the command line interface often. Remember to follow best practices for using checksums and how to troubleshoot reasons your checksum doesn’t match the original. Download GtkHash from your Linux package manager or Github.com. Below we cover settings and how to hash a single file, file list, and text string. How to Create a Checksum Without GtkHash When it comes to creating checksums you do not have to have GtkHash installed. For many users, using SSH for creating checksums is an option they already have installed in their local workstation. You can also create checksums on the command with fully managed VPS hosting (and there are hosting packages that have SSH as well). Preferences GtkHash opens to show the single file section. The default hash functions are MD5, SHA1, SHA256, and CRC32. You can change the used hash functions and digest format in the top navigation bar > Edit > Preferences. GtkHash has over a dozen hashing algorithms Hash a File Click the folder icon beside File:Open a file to hashAdd an expected checksum beside Check: if availableSelect HMAC Key and add one if necessarySelect Hash Simply choose a file and click Hash Hash a File List To hash multiple files, select View > File List from the top navigation menuSelect + AddOpen files you want to hashOnce you’ve added all files, select HashScroll right to see other hashes Easily hash multiple files at once in GtkHash Hash a Text String To hash text, select View > Text from the top navigation menuType text and the checksum will change in real timeAdd an expected checksum or HMAC Key if needed Text checksums are updated instantly in GtkHash Saving Hashes To save visible hash results, select File > Save As from the top navigation menuSpecify a file name and Save The text will resemble this format: # MD519c68ed164b4d31b36c5d80c3ecee0b0 test-1.txt# SHA256fb57e94e58b0323798b5f9b75f9a394f54a7047c3733db6d5548e2de116c3ebb test-1.txt# SHA384573c6d01e2fcdd9280eee7bca12e665912dea5a1afb731dc6e59737136821dbf108f11f802abf1a3bf7b6b0771f8d48b test-1.txt# SHA5127af8387fb92c8b511565d66cff8316914540bb5ab391d237b309e52d41e20365838ff70b57b993eb6a5e227bd38e3b977214c8353bdd41897786411e8ebf844c test-1.txt# SHA3-512137c370cdb53a1a04b11fe0fb09c8076b0049d204f31ab321bbdae276d444a9180f545028aace7f4b84818e57d29d4d6e9f601c3431bd725f3aa44d5cece63ad test-1.txt Are you looking for other ways to improve your privacy online? Check out these related technical articles and blogs for better cybersecurity. DNSSEC with Managed VPS / Dedicated HostingDNS-over-HTTPS and Encrypted SNI in Firefox6 Ways to Secure Your Web Activity5 Free Ways to Learn LinuxPrivacy Policies and Regulations Share this Article InMotion Hosting Contributor Content Writer InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals! More Articles by InMotion Hosting Related Articles How To Open a Port in UFW Resetting the cPanel Password in WHM How to Change your root Password in WHM How to Stop and Disable Firewalld Content Security Policy (CSP) Headers – Complete Reference Guide Why You Need To Keep Your Website’s PHP Version Up-to-Date Learning About Mod_security and Disabling Mod_security Close Open Ports for PCI Compliance How to Pass PCI Compliance Scans DDoS Protection Using Corero