Questions tagged [verification]
60 questions
198
votes
14 answers
How can I check the integrity of a video file (avi, mpeg, mp4...)?
This title could be somewhat misleading, so let me explain ...
I'm downloading a video file ... mpeg, avi - being one of the popular formats. Now, if I am downloading it, and the download breaks in the middle of the uhm ... download, then, for…
Rook
- 24,289
20
votes
8 answers
Verifying Time Machine backups
I'm preparing my system for a Snow Leopard upgrade, and I prepare for the worst case scenario: full reinstall and restore.
I would like to verify that my Time Machine backups are valid, and will restore correctly. My Time Machine backups go to a…
jtimberman
- 21,887
19
votes
1 answer
How to verify a download file using a .sig file and public key, in Windows 10?
I'm interested in installing the Electron Cash application from electroncash.org (Electron-Cash-2.9.4.exe) and the website indicates that to be sure of the integrity of the download, I should verify the authenticity of the file.
The site points me…
Highly Irregular
- 3,121
17
votes
3 answers
Is there a way to copy with verification or just verify copied data
I am a GIS specialist, part of this is to routinely copy vast quantities of data to disc - backup, archiving and delivery. Occasionally the files on the other disc do not match the source disc, in the order of for every 4TB copied there will be one…
Michael Stimson
- 293
11
votes
3 answers
“The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 23F3D4EA75716059”
I try to update Debian but I get the following error message:
% sudo aptitude update
Hit http://deb.debian.org/debian bullseye InRelease
Hit http://deb.debian.org/debian-security bullseye-security InRelease
Hit http://deb.debian.org/debian…
fauve
- 245
8
votes
4 answers
How to get apt-get source verification working?
Example (Using Debian Wheezy):
sudo apt-get source hello
Result:
Reading package lists... Done
Building dependency tree
Reading state information... Done
Need to get 705 kB of source archives.
Get:1 http://ftp.us.debian.org/debian/…
user28464
- 81
5
votes
1 answer
How to turn off verification after DVD burning on OS X?
I use the built in DVD burner from OS X. Whenever I burn a disk, it is verified after burning. Nice, but I am usually quicker in verifying myself with a bit more human, maybe more error prone process... Just takes too long!
Is there a way to turn…
raoulsson
- 457
5
votes
1 answer
What are the correct options to use to verify video files using ffmpeg.exe in Windows 7?
I have thousands of video files to check/verify if they have an error or a warning. A firm just digitized them over old tapes (VHS, Umatic ...) All these videos are in mp4 format and i want to check them automatically with a software. After a small…
xmux
- 259
5
votes
1 answer
recursive file/directory verification on linux
What would be a command structure or simple bash script to run to compare all files in one directory with all files in another directory, verifying their data are identical, or not, down to the bit? Needs to be recursive so it also verifies files in…
DaveO
- 193
5
votes
5 answers
GnuPG Command Line - Verifying KeePass Signature
I'm trying to verify the PGP Signature of the latest version of KeePass 2.14's setup file against this signature, but this is the output I receive:
C:\Program Files (x86)\GNU\GnuPG>gpg.exe --verify C:\Users\User\Desktop\KeePass-2.14-Setup.exe
gpg:…
Stisfa
- 173
5
votes
2 answers
Verify burned CD image
Is there a way to verify a CD image (.iso) after it has been burned (and either the CD burning software does not have a "verify" option, or it was not used at the time of burning)?
I tried ripping the CD using dd and comparing the md5sum of that…
Brian
- 1,125
- 9
- 19
5
votes
1 answer
SSH key verification for many hosts behind a single DNS name
(note: this seems similar to an existing question, but I believe there are some differences in the implementation details here)
The Problem
I've got a few hundred hosts behind a single DNS address. Each host has its own separate host key (and I…
Karu
- 4,922
4
votes
3 answers
Why does email allow sender impersonation?
Anyone who's used a bit of PHP to send an email knows that we can use whatever name we want as the sender of an email.
To the secretary of a specific business, I can send a message requesting very sensitive customer or company information that…
user317572
4
votes
2 answers
Is there any file check summing software which deals correctly with deep paths?
I have been looking for software which will checksum and verify/compare NTFS volumes with deep paths on Windows, and failing verification on every one I've tried. I've even tried writing my own python script and run into the same problems.
The…
Mark Booth
- 2,869
4
votes
1 answer
How can I download a cryptographically signed version the Java JDK from Oracle?
When going to Oracle's download site to download JDK for EE the download is over HTTP (not HTTPS) and the executable isn't signed. As far as I can tell, there are also no SHA1 hashes published so I have no way to verify that the code hasn't been…
user53352
- 41