638
edits
m (It's misleading to not indicate that these checksums are SHA-256, not SHA-1) |
mNo edit summary |
||
Line 53: | Line 53: | ||
==Verifying if the file has been changed== | ==Verifying if the file has been changed== | ||
Another method, though not as simple, involves looking at the [https://en.wikipedia.org/wiki/SHA-1 SHA-1 hash], which is a unique string of characters that tells whether a file is unaltered | Another method, though not as simple, involves looking at the [https://en.wikipedia.org/wiki/SHA-1 SHA-1 hash], which is a unique string of characters that tells whether a file is unaltered. The first string of characters below is the one associated with the legitimate app. The second is one that is known to have been used by a DroidJack version. Both are SHA-256 checksums. | ||
<code>8bf2b0865bef06906cd854492dece202482c04ce9c5e881e02d2b6235661ab67</code> - Legitimate app. | <code>8bf2b0865bef06906cd854492dece202482c04ce9c5e881e02d2b6235661ab67</code> - Legitimate app. |
edits