Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


Binary to executable

Posted on 2004-10-28
Medium Priority
Last Modified: 2010-04-17
I've been looking to download a few network administration tools, but it seems that most are in open source binary form.   What do I need to do to convert or compile these into executable format?  Also several of these also have a signature file.  What do I need to do to incorporate the signature files into the porgram?
Question by:srejja
LVL 45

Expert Comment

ID: 12441402
>open source binary form.  
What does that mean !!!! ... What was the extension of the file you downloaded? How did you go about installing it?

>What do I need to do to convert or compile these into executable format?  
I can tell that once I know what you downloaded what from where in what format and what have you done so far

>Also several of these also have a signature file.  What do I need to do to incorporate the signature files into the porgram?
Signatures are used for verifying that the downloaded file is indeed authentic and not a fake ... They are not used for incorporting into the installed programs :-)

LVL 61

Accepted Solution

Julian Hansen earned 2000 total points
ID: 12444916
Most open source programs are provided as a gzipped tarball ... or a plain zip archive

if the extension is .tgz then there are a couple of things you need to do to access the files inside the binary archive.

1. first you need to unzip the archive. Most of these will have been zipped with gzip so you will need to get a copy of this (Winzip will open these files and gzip comes standard on linux boxes).

So let us say you have the archive


One way of doing this (on a linux box say) would be to do as follows


gunzip A_Really_cool_piece_of_Software_v1.03.tgz

This should produce the file


A tar is just a single file containing one or many files one after the other.


tar -xvf A_Really_cool_piece_of_Software_v1.03.tar

Now you have your source that you must compile to get the executable.

Winzip will also open TGZ files and the tar's contained therein.

As sunnycoder says the signature is simply a hash the developers put on the download page so that when you download the file you can verify that it is exactly the same file that was put there. The hash is usually an MD5 signature - you would need some additional software to verify the authenticity of the archive - but it is not necessary to use the code.



Featured Post

[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do responsible coders do? They don't take detrimental shortcuts. They do take reasonable security precautions, create important automation, implement sufficient logging, fix things they break, and care about users.
This article will show how Aten was able to supply easy management and control for Artear's video walls and wide range display configurations of their newsroom.
Introduction to Processes
Screencast - Getting to Know the Pipeline

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question