{"id":48021,"date":"2019-09-24T12:22:48","date_gmt":"2019-09-24T17:22:48","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/support\/?p=48021"},"modified":"2021-11-04T16:26:40","modified_gmt":"2021-11-04T20:26:40","slug":"best-practices-for-using-checksums","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/","title":{"rendered":"Best Practices for Using Checksums"},"content":{"rendered":"<p><strong>In this article:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"#checksums\">Checksums<\/a><\/li><li><a href=\"#practices\">Best Practices<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"checksums\">Checksums<\/h2>\n\n\n\n<p>Defense in depth involves layers of security, and file management is a core part of it. If you offer or recommend downloadable content, it\u2019s important to understand the importance of verifying <a href=\"\/support\/security\/verify-checksums-ssh\/\">checksums on your Linux server<\/a>, <a href=\"\/support\/security\/create-checksum-locally\/\">PC, or Mac<\/a>. Whether you use a content managment system (CMS), framework, or static HTML, you must be proactive to mitigate the possibility of any malicious activity affecting end users\u2019 workstations. Providing <a href=\"https:\/\/www.inmotionhosting.com\/support\/security\/reasons-your-checksum-doesnt-match-the-original\/\">checksums<\/a> for end users to ensure their downloads are legitimate is one way to do this.<\/p>\n\n\n\n<p>Below we\u2019ll cover some <strong>best practices for implementing <\/strong><strong>checksums<\/strong>.<\/p>\n\n\n\n<p class=\"alert alert-info\"><strong>Want better server security?<\/strong> Our <a href=\"https:\/\/www.inmotionhosting.com\/vps-hosting\">VPS Hosting<\/a> has over a dozen security features between cPanel and WebHost Manager (WHM). Our <a href=\"https:\/\/www.inmotionhosting.com\/dedicated-servers\">Dedicated Hosting<\/a> plans offer a hardware firewall.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"practices\">Checksum Practices<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"external\">Store Checksums on an External Site<\/h3>\n\n\n\n<p>We often recommend storing verified backups on at least two other devices. Download your <a href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cpanel\/cpanel-backups\/\">cPanel backup<\/a> to a computer that\u2019s backed up regularly. Now, you have 3-4 backups including the server (and <a href=\"\/support\/edu\/cpanel\/setup-scheduled-cpanel-backups\/\">WHM backup<\/a> for VPS \/ Dedicated servers). This disaster recovery practice provides redundancy that protects you from most data corruption and intrusion issues.<\/p>\n\n\n\n<p>Similarly, its best to list checksums in an external location to protect users against malicious files. Otherwise, if your website is hacked, someone can change the file (and\/or destination to it) <strong>and<\/strong> the checksum with the same credentials to appear valid. Something similar happened to <a href=\"https:\/\/blog.linuxmint.com\/?p=2994\">Linux Mint a few years ago<\/a>. Their long list of download mirrors (externally hosted web servers) reduced the impact as users had multiple download options. A hacker isn\u2019t likely to be able to hack all available download mirrors.<\/p>\n\n\n\n<p><strong>Recommended:<\/strong> Host a checksum list on your website and another reputable platform such as <a href=\"https:\/\/about.gitlab.com\/\">Gitlab<\/a> and <a href=\"\/support\/website\/git\/using-your-github-account\/\">Github<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"multiple\">Multiple Checksums<\/h3>\n\n\n\n<p>After you identify multiple locations to show your checksums, make sure you include the strongest hash algorithms. <strong>SHA512<\/strong> is the strongest commonly supported SHA function as of 2019. It\u2019s preinstalled in many popular Linux installations. The lesser <strong>SHA384<\/strong> is popular with <a href=\"\/support\/security\/subresource-integrity-sri\/\">subresource integrity (SRI)<\/a>.<\/p>\n\n\n\n<p><strong>MD5<\/strong> and <strong>SHA1<\/strong> algorithms are fast but not recommended because they\u2019re weak and prone to hash collision. Users without command line access can be directed to websites suh as <a href=\"https:\/\/www.virustotal.com\/\">VirusTotal.com<\/a> and <a href=\"https:\/\/www.srihash.org\/\">SRIhash.org<\/a>.<\/p>\n\n\n\n<p><strong>Recommended:<\/strong> Provide checksums starting with the strongest hash \u2013 e.g. SHA512, SHA384, SHA256, MD5<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"instructions\">Instructions<\/h3>\n\n\n\n<p>Concise instructions can ease less technical users intimidated by the command line interface (CLI). Whether you instruct users to use a website or CLI, multiple checksums may discourage users from verifying their download. <\/p>\n\n\n\n<p>To mitigate this, provide clear steps with CLI commands a user can copy and paste with screenshots, how to compare their checksum to the original, and troubleshooting tips. If you recommend Virus Total or a similar tool, provide a quick GIF or video explaining how to navigate the website. <\/p>\n\n\n\n<p><strong>Recommended:<\/strong> Clear copy-and-paste steps, screenshots, troubleshooting tips if it does not match the expected checksum<\/p>\n\n\n\n<p>Here\u2019s an example from our <a href=\"\/support\/security\/verify-checksums-ssh\/\">Linux checksum guide<\/a>:<\/p>\n\n\n\n<a href=\"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png\" rel=\"lightbox-0 lightbox-0\"><img decoding=\"async\" alt=\"Screenshot of md5sum and sha1sum for wordpress-4.9.8.tar.gz file in SSH\" src=\"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png\" title=\"\" scale=\"0\" align=\"none\"><\/a>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"hardening\">Overall Hardening<\/h3>\n\n\n\n<p>As a general tip, research ways to improve security within your website, .htaccess file, <a href=\"\/support\/security\/server-security-best-practices\/\">server<\/a>, and <a href=\"\/support\/email\/strengthen-overall-email-authentication\/\">DNS<\/a><a href=\"\/support\/email\/strengthen-overall-email-authentication\/\"> records<\/a>. Many CMSs have security plugins. There\u2019s also online tools such as <a href=\"https:\/\/observatory.mozilla.org\/\">Mozilla Observatory<\/a> for .htaccess hardening.<\/p>\n\n\n\n<p><strong>Recommended:<\/strong> Follow best security practices for your CMS and server.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"policy\">Privacy Policy<\/h3>\n\n\n\n<p>Your site may be the first to teach a new user about hashing for file verification. It could create a positive impression on technical visitors. There\u2019s one major thing that can cement that impression and cover legal matters: a <strong>human-readable privacy policy<\/strong> that\u2019s easily accessible on every page. <\/p>\n\n\n\n<p>Also, all websites \u2013 not just e-commerce sites \u2013 can benefit from working towards <a href=\"https:\/\/www.inmotionhosting.com\/gdpr\">General Data Protection Regulation (GDPR) compliance<\/a>. It shows you care about user privacy and personally indentifiable information (PII) in case of an intrusion. Many popular CMSs added privacy features for easier compliance following its implementation in 2018 \u2013 <a href=\"\/support\/edu\/wordpress\/privacy-policy-page-wordpress\/\">WordPress<\/a><em>, <\/em><a href=\"\/support\/edu\/prestashop\/gdpr-prestashop-17\/\">PrestaShop 1.7<\/a><em>, <\/em><a href=\"\/support\/website\/analytics\/opt-out-notification-matomo-analytics\/\">MatomoAnalytics<\/a><em>, etc<\/em>.<\/p>\n\n\n\n<p><strong>Recommended:<\/strong> Work towards GDPR compliance to support user privacy<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"usage\">Realize That Some Won\u2019t Use it<\/h3>\n\n\n\n<p>Security and convenience many times clash, as if on a balancing scale, with convenience winning in the end. However, you should facilitate better security practices to the best of your ability. One\u2019s privacy and peace of mind are valuable with the current cyber threats. Do your part to help provide that.<\/p>\n\n\n\n<p><strong>Recommended:<\/strong> Remember, user error is the most vulnerable attack vector<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Security [is] everyone\u2019s job. Technology cannot negate user error.<\/p><cite><a href=\"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"6 Ways to Secure Your Web Activity from Your Computer (opens in a new tab)\">6 Ways to Secure Your Web Activity from Your Computer<\/a><\/cite><\/blockquote>\n\n\n\n<p>Learn more about improving security from our <a href=\"https:\/\/sucuri.net\/lp\/promo\/inmotion\/?clickid=xIhUOpS7QxyLT9tQy%3ASR0UvEUkBWzk0DhTDQUQ0\">partners at <\/a><a href=\"https:\/\/sucuri.net\/lp\/promo\/inmotion\/?clickid=xIhUOpS7QxyLT9tQy%3ASR0UvEUkBWzk0DhTDQUQ0\">Sucuri<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article: Checksums Best Practices Checksums Defense in depth involves layers of security, and file management is a core part of it. If you offer or recommend downloadable content, it\u2019s important to understand the importance of verifying checksums on your Linux server, PC, or Mac. Whether you use a content managment system (CMS), framework,<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/\"> Read More ><\/a><\/p>\n","protected":false},"author":57014,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4299],"tags":[],"class_list":["post-48021","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Best Practices for Using Checksums | InMotion Hosting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Practices for Using Checksums | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"In this article: Checksums Best Practices Checksums Defense in depth involves layers of security, and file management is a core part of it. If you offer or recommend downloadable content, it\u2019s important to understand the importance of verifying checksums on your Linux server, PC, or Mac. Whether you use a content managment system (CMS), framework, Read More &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Support Center\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-24T17:22:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-04T20:26:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png\" \/>\n<meta name=\"author\" content=\"InMotion Hosting Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/InMotionHosting\" \/>\n<meta name=\"twitter:site\" content=\"@InMotionHosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/\"},\"author\":{\"name\":\"InMotion Hosting Contributor\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\"},\"headline\":\"Best Practices for Using Checksums\",\"datePublished\":\"2019-09-24T17:22:48+00:00\",\"dateModified\":\"2021-11-04T20:26:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/\"},\"wordCount\":763,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/\",\"name\":\"Best Practices for Using Checksums | InMotion Hosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png\",\"datePublished\":\"2019-09-24T17:22:48+00:00\",\"dateModified\":\"2021-11-04T20:26:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#primaryimage\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png\",\"contentUrl\":\"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inmotionhosting.com\/support\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best Practices for Using Checksums\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"name\":\"InMotion Hosting Support Center\",\"description\":\"Web Hosting Support &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\",\"name\":\"InMotion Hosting\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"contentUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"width\":696,\"height\":696,\"caption\":\"InMotion Hosting\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/inmotionhosting\/\",\"https:\/\/x.com\/InMotionHosting\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\",\"name\":\"InMotion Hosting Contributor\",\"description\":\"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/inmotion-hosting\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting\"],\"url\":\"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Best Practices for Using Checksums | InMotion Hosting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/","og_locale":"en_US","og_type":"article","og_title":"Best Practices for Using Checksums | InMotion Hosting","og_description":"In this article: Checksums Best Practices Checksums Defense in depth involves layers of security, and file management is a core part of it. If you offer or recommend downloadable content, it\u2019s important to understand the importance of verifying checksums on your Linux server, PC, or Mac. Whether you use a content managment system (CMS), framework, Read More >","og_url":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/","og_site_name":"InMotion Hosting Support Center","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting\/","article_published_time":"2019-09-24T17:22:48+00:00","article_modified_time":"2021-11-04T20:26:40+00:00","og_image":[{"url":"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png","type":"","width":"","height":""}],"author":"InMotion Hosting Contributor","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/InMotionHosting","twitter_site":"@InMotionHosting","twitter_misc":{"Written by":"InMotion Hosting Contributor","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/"},"author":{"name":"InMotion Hosting Contributor","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644"},"headline":"Best Practices for Using Checksums","datePublished":"2019-09-24T17:22:48+00:00","dateModified":"2021-11-04T20:26:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/"},"wordCount":763,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/","url":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/","name":"Best Practices for Using Checksums | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png","datePublished":"2019-09-24T17:22:48+00:00","dateModified":"2021-11-04T20:26:40+00:00","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png","contentUrl":"https:\/\/www.inmotionhosting.com\/support\/images\/stories\/hashsums\/hashsum-1-ssh-md5sum-sha1sum-bigger.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/best-practices-for-using-checksums\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/support\/"},{"@type":"ListItem","position":2,"name":"Best Practices for Using Checksums"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/support\/#website","url":"https:\/\/www.inmotionhosting.com\/support\/","name":"InMotion Hosting Support Center","description":"Web Hosting Support &amp; Tutorials","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/support\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/support\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","width":696,"height":696,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting\/","https:\/\/x.com\/InMotionHosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644","name":"InMotion Hosting Contributor","description":"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!","sameAs":["https:\/\/www.linkedin.com\/company\/inmotion-hosting\/","https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting"],"url":"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":4299,"name":"Security","slug":"security","link":"https:\/\/www.inmotionhosting.com\/support\/security\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/48021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/users\/57014"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/comments?post=48021"}],"version-history":[{"count":11,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/48021\/revisions"}],"predecessor-version":[{"id":91102,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/48021\/revisions\/91102"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/media?parent=48021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/categories?post=48021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/tags?post=48021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}