File Hashes
A checksum can be used to create a fingerprint for a file. This page uses a secure connection, and it provides fingerprints for certain executable files that are available on our web site. By making fingerprints yourself and comparing them with our's, we can be verified as the publisher of the file.
On recent versions of Windows, a file's fingerprint can be obtained by using a command of the following form:
The output should include a string of numbers and letters. This is the fingerprint. It is produced using the SHA-256 hash algorithm. Next, look for the fingerprint in the list below. If it's in the list, it means that your copy of the file is the same as the copy on our server.
Note: If a match is not found, there's a very good chance that we are now hosting a newer version of the file.