News

v2.8.3 Removed from Downloads

v2.8.3 had a bug introduced that was not present in v2.8.2 or below and has been fixed in v.2.8.4. The bug related to the text hashing tab. Text was not being hashed correctly due to a change in the code that unknowingly had an adverse effect on the computed hash. Any user who used v2.8.3 to hash text values should re-run their computations using the new version and my apologies come with this. No other part of the program was affected. Due to the severity of this bug, I have removed v2.8.3 from the available downloads to avoid wider [...]

By |September 4th, 2017|News|0 Comments

Submit a Testimonial!

New Testimonials Section Added Dear user.... I'm pleased to say I get a lot of e-mails thanking me for QuickHash and I get the occasional donation too. In order to help others users read about YOUR experience of QuickHash, I'd very much appreciate you taking the time to write up your positive experiences for publication here. It's also an opportunity for you to get your own company name and website listed on this website. Submit a Testimonial HERE : http://34.225.163.28/testimonials-page/ Users who wish to see improvements or find fault can of course use the bug tracker. Testimonials are [...]

By |August 30th, 2017|News|0 Comments

Problem with “Expected Hash Value” in v2.8.3

A user has reported an issue with v2.8.3 (http://34.225.163.28/bugs/expected-hash-value-report-wrongly-on-single-file-hashing/) regarding a peculiarity with the "Expected Hash Value" field. This field was added a while ago, but another user requested that if the expected hash value is pasted after the file was hashed (whereas it was designed to be input before the file was hashed), the file had to be hashed again in order to compare it to the expected hash value that the user had pasted earlier. So, to fix that, a change was added in v2.8.3 such that if the value was pasted after the file had been hashed, [...]

By |August 28th, 2017|News|0 Comments

Base64 Decoding and Hashing Coming Soon

v2.8.3 has been in development for a few weeks and I was about to start thinking about getting it compiled and released, but then one user contacted me with quite a unique and good idea that I hadn't thought of before...Base64 decoding. As you may know, Base64 encoding can be used to convert files like PDF e-mail attachments and picture files into a form of non-binary data that is text based. Base64 is basically groups of 4 text characters that typically ends with an '=' or '==' character. Once decoded, the original file can be used as normal. So [...]

By |July 21st, 2017|News|0 Comments

QuickHash forms part of training at Cal Poly in California

From time to time, I like to see where QuickHash has hit the news and tech bloggers. I was delighted to find today (a few weeks after publication I admit) a great and inspiring article at Mustang News (http://mustangnews.net) titled 'How cybersecurity is becoming a hot topic at Cal Poly' written by Brendan Matsuyama. The link to the article is here for those who want to read it in full : http://mustangnews.net/cal-poly-cybersecurity-leader/ and it talks about how the California Cyber Training Complex (CCTC). Key stakeholders in the project include Cal Poly, the California Military Department, local and state law [...]

By |May 31st, 2017|News|0 Comments

Manny Fernandez over at Infosec Monkey blogs about QuickHash

I spotted this a little late, but  Manny Fernandez over at Infosec Monkey (http://www.infosecmonkey.com/2016/10/14/quickhash-multi-platform-hashing-tool/) blogged about QuickHash back in October 2016 with a very friendly and detailed description of QuickHash-GUI, and he also gives many reasons as to the scenarios that it can be useful. I only just found it after looking through some twitter posts about the tool! It's surprising how many people have tweeted about it actually :-) A useful read for any prospective user, and I thank the author for the write up.

By |April 11th, 2017|News|0 Comments

Michael Bartholow blogs about using QuickHash for encrypting email addresses for Google AdWords Customer Match

It always pleases me to read about QuickHash in the blogs and articles written by other tech folks. Michael Bartholow does so in his article titled "Encrypting Emails for Google AdWords Customer Match". He recalls the story most familiar to many of us...the big corporate licensed tools like Excel and so on failing to do what we can achieve ourselves through open-source development. His blog describes using QuickHash for generating hash values suitable for injestion by Google AdWords. It's a pleasure to get such high praise. Makes you feel like your work is paying off. Perhaps not financially, but [...]

By |April 4th, 2017|News|2 Comments

New video to showcase QuickHash-GUI

This evening I recorded a new video of QuickHash-GUI. The former video was a couple of years old now, and despite having quite a lot of views and comments, it showcased what was, in part, some redundant functionality that has since been improved or adjusted. The video is not designed as an authority on the program - merely to show users how they might use it and briefly explain some of the features more easily than reading it. However, the user manual is and always has been quite comprehensive and it details the programs features and strengths and is [...]

By |March 31st, 2017|News|0 Comments

The X-Ways Clips Online Learning Platform

In addition to being the developer of QuickHash, I am, and was before I started programming, an enormous supporter of the digital forensics and disk analysis tool, X-Ways Forensics (and of course it's originating program, Winhex). It is, in my view, the best forensic tool in the world. I've used it for years and several years I ago I made it somewhat of a personal mission to try and persuade others in the digital forensics realm that it is so much more capable as a "routine digital forensics tool", useful for so much more than just detailed hex analysis, [...]

By |March 24th, 2017|News|0 Comments

NSRL Hash Set Stripper

A quick utility I cobbled together may be of interest to any users who have involvement with the NSRL Hash Sets. The program is designed to take the original NSRL hash set as downloaded from the NIST website, and converts it to a single file containing just a column of hashes that you have asked for. The output file can then be injested directly into whatever tool or purpose you have a need for it. It saves a new output file that contains only the column of hashes you require, suitably formatted for immediate injestion into a digital forensic [...]

By |March 24th, 2017|News|0 Comments