Verifying a file’s SHA-256 hash is a simple yet powerful way to ensure its integrity and authenticity. Whether you're downloading software or transferring sensitive data, this quick check can help you confirm that nothing has been tampered with.
What Is SHA-256?
SHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic function that generates a unique 256-bit (32-byte) hash value for any input—like a file. Think of it as a digital fingerprint: even the tiniest change in the file will produce a completely different hash. This makes SHA-256 ideal for verifying that a file hasn’t been altered or corrupted.
How to Check SHA-256 in Windows
You can use either Command Prompt or PowerShell to calculate the SHA-256 hash of a file. Here’s how to do it:
Using Command Prompt
Open Command Prompt from the Start menu or search bar.
Navigate to the folder containing your file using the cd command. Example:
cd "C:\Users\Username\Desktop"
Run the following command:
certutil -hashfile yourfile.exe SHA256
Replace yourfile.exe with the actual filename.
Using PowerShell
Open PowerShell from the Start menu or search bar.
Navigate to the folder containing your file:
cd "C:\Users\Username\Desktop"
Run this command:
Get-FileHash yourfile.exe -Algorithm SHA256
Again, replace yourfile.exe with your file’s name.
Why It Matters
Once you get the hash value, compare it with the expected SHA-256 provided by the source (e.g., the software vendor). If they match, your file is intact. If not, it may have been corrupted or tampered with.
Verifying hashes might seem technical, but it’s a quick and essential habit for safer computing. Stay secure — your files deserve it.