Solved

Need to digitally sign files... which way to go?

Posted on 2006-06-27
5
291 Views
Last Modified: 2010-04-11
This is the situation:

I need to upload files of various extensions to our FTP server. Then I need to digitally sign them in some fashion,
and the customer who downloads them, distributes them through their organization. Now when the person who's
supposed to install this gets the file, they should have a method of checking that nothing in that archive was changed.
Which application should I use for this purpose? Preferably, I'd like to go with a freeware tool, I don't think PGP
is free anymore.

0
Comment
Question by:Sebastian_Strauss
5 Comments
 
LVL 1

Accepted Solution

by:
char1iecha1k earned 63 total points
ID: 16997186
there are various hash utilities which compute a "unique" string based on the file, if you compute this hash before you send it and send it along with the file, the person at the other end can do the same and make sure they match

I use http://wxchecksums.sourceforge.net/

it does both MD5 and SFV
0
 
LVL 51

Assisted Solution

by:ahoffmann
ahoffmann earned 62 total points
ID: 17004345
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 17160962
Btw. pgp is still *free* after 30 days trial of the commecial version, all special stuff is deactivated and the tool can be used for it's free functions.

PGP Desktop Professional 9.0 Trial Software is an improved version of the legacy PGP Freeware (Desktop 8.x and below) product. With PGP Desktop Professional 9.0 Trial Software, all product functionality is available for 30 days. After 30 days, PGP Desktop Professional 9.0 Trial Software reverts to the functionality available in what used to be called PGP Freeware. At the end of the trial period, any local disks that have been encrypted using PGP Whole Disk Encryption, will automatically decrypt.

Still above are good suggestions...

Tolomir
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question