Developer Workflow

Verify a file checksum with SHA-256

Learn how to compare SHA-256 checksums before trusting a downloaded file, release archive, backup, or shared installer.

Problem

A file can be corrupted during download, replaced by a mirror, or copied incorrectly. A checksum gives you a compact fingerprint, but it only helps if you calculate it from the exact file and compare every character carefully.

When to use this

  • A release page lists a SHA-256 hash for a zip, tarball, or installer.
  • A backup file was transferred between machines and needs a quick integrity check.
  • A support ticket includes a checksum and you need to confirm whether your local file matches.

Steps

  1. Step 1

    Get the trusted checksum

    Copy the SHA-256 value from the release page, vendor documentation, or trusted message before calculating your local hash.

  2. Step 2

    Generate the local hash

    Open the hash generator, choose SHA-256, and calculate the hash from the text or file data you want to verify.

  3. Step 3

    Compare the full value

    Compare the complete hexadecimal string, not just the first or last few characters. A single different character means the content does not match.

  4. Step 4

    Investigate mismatches

    If the hashes differ, download the file again from the original source and avoid running or trusting the mismatched copy.

Example

Check a release archive hash

Input

simplewebutils-release-2026-05-15.zip

Output

SHA-256: 7f83b1657ff1fc53b92dc18148a1d65dfa135b0f5adfb8f75a7f4d1f6f41d9a3

Common mistakes

Comparing different algorithms

An MD5 or SHA-1 hash will never match a SHA-256 value. Make sure the algorithm in the tool matches the algorithm listed by the source.

Trusting a checksum from the same unsafe source

A checksum is strongest when it comes from a trusted release page or signed announcement, not from the same unverified mirror as the file.

FAQ

Is SHA-256 better than MD5 for file verification?

Yes. SHA-256 is generally preferred for integrity checks because MD5 is collision-prone and should not be used for security-sensitive verification.

Does a matching checksum prove a file is safe?

It proves the file matches the checked content. It does not prove the publisher is trustworthy or that the original file is free of malware.

Why does the same file sometimes produce a different hash?

Any byte difference changes the hash. Line endings, archive metadata, re-compression, or editing the file will produce a different checksum.