It took them a while to defeat it for a small PDF file, so, for ISOs, there's no known risk right now Or we can download all ISOs, check SHA1 and then create, for example, SHA256 checksums
each kind of hash is more ore less only a simple bit-shifting. regardless of whether CRC-32, ADLER-32, MD5, SHA1, SHA256 or whatever. - the diffrence is only the size of the 'shifting-buffer' (CRC-32 = 4byte) - Simplified - each Hash has the problem of n '00' bytes at the end of the file (thats why you get CRC32 = FFFFFFFF for iso's with AutoCRC that are overdumped ) the problems can (more ore less) only be solved (reduced) if you have 2 different hashes (eg CRC32 + SHA1). only use eg SHA256 is useless (same problem). feel free to generate a CRC32 for all files on MSDN (have fun)
Did anyone else notice that you can't view hashes in MSDN without a login anymore? Am I missing something and is it still possible?
Even logged in, you can't see any hashes, as it redirects you to the Visual Studio Portal where subscriptions have been migrated Only subscribers can view files available with their subscription.
Microsoft decided to do this. To merge all subscriptions to Visual Studio, and also I believe to reduce "piracy" and "illegal" downloads
They can't prevent piracy. No pirate will shell out the cash. They'll run unverified and potentially infected stuff. MS is doing the world a disservice.
hello, i have read your 9 posted messages 6 Giveaway/Contest and other beg postings -> welcome to the Simsons Family please read my sign if nobody give you a link, please don't wonder why
The wildcards in the script don't seem to working for me. The only way the script wanted to work for me was to edit the script and put in the exact URL and even after that I wasn't able to get past the landing page to actually check the hashes and filenames.
I am using an addon like that (Tampermonkey in Chrome) and yes, after I log in, I get to landing page. However, if I click on anything or try to search it's just a blank white page.