{"id":29598,"date":"2019-02-08T13:12:08","date_gmt":"2019-02-08T19:12:08","guid":{"rendered":"https:\/\/www.rosehosting.com\/blog\/?p=29598"},"modified":"2025-09-17T08:36:19","modified_gmt":"2025-09-17T13:36:19","slug":"how-to-check-the-file-integrity-of-a-downloaded-package-in-linux","status":"publish","type":"post","link":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/","title":{"rendered":"How to Check the File Integrity of a Downloaded Package in Linux"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><p><img decoding=\"async\" class=\"alignnone size-full wp-image-29610\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux.jpg\" alt=\"Check File Integrity of Downloaded Package in Linux\" width=\"742\" height=\"372\" srcset=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux.jpg 742w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux-150x75.jpg 150w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux-300x150.jpg 300w\" sizes=\"(max-width: 742px) 100vw, 742px\" \/><\/p>\n<p>Part of using a Linux-based operating system is using the package manager of your Linux distribution to download and install new software. On CentOS\/RHEL-based distributions, for example, the EPEL repositories provide you with almost everything you need. And often when a pre-installed repository is unavailable, you can manually add it, and the files will be downloaded securely after verifying it with a key.<\/p>\n<p>However, sometimes you have no choice but to download the packages directly over the Internet. One example is the operating systems themselves. If you want to download a new distribution, you&#8217;ll have to get it from a website.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69ee2b0814548\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69ee2b0814548\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#Verifying-File-Integrity-with-Hashes\" >Verifying File Integrity with Hashes<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#Generating-and-Comparing-Hashes\" >Generating and Comparing Hashes<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#Other-Checksum-Algorithms\" >Other Checksum Algorithms<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Verifying-File-Integrity-with-Hashes\"><\/span>Verifying File Integrity with Hashes<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>But how do we know that the files we download are indeed the files that the creator made? What if someone maliciously accessed the servers and placed their own file in there instead? We might end up downloading and then using a file that might be deeply compromised!<\/p>\n<p>Sometimes files are distributed widely through 3rd party sites, such as SourceForge. We need a way to verify that the file we&#8217;re downloading hasn&#8217;t been tampered with and re-packaged. This is where hashes come in.<\/p>\n<p>A &#8220;hash&#8221; is a special mathematical operation we perform on a file that generates a string of characters that is unique to that file. These are also referred to as &#8220;checksums&#8221;. While it is not perfectly unique, the chance of it repeating is low enough for it to be an acceptable form of security. A good hashing algorithm will ensure that even <i>small<\/i> variations in the input file will generate <i>huge<\/i> differences in the output hash. Thanks to this, it is practically impossible to tamper with a file in any way and have the hash be similar. For students exploring cryptography or computer science concepts, working with a <a href=\"https:\/\/brighterly.com\/\" target=\"_blank\" rel=\"noopener\">math tutor<\/a> can be an excellent way to build the foundational math skills needed to fully understand how hashing algorithms function.<\/p>\n<p>If the hashes of two files have been generated by a good algorithm, and they match, you can be almost certain that the two files are the same. Because of this, all good software providers also display their hashes next to the files they offer for download. Like this:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-29606\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_1.jpg\" alt=\"\" width=\"770\" height=\"440\" srcset=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_1.jpg 770w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_1-150x86.jpg 150w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_1-300x171.jpg 300w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_1-768x439.jpg 768w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/><\/p>\n<p>Now let&#8217;s see how to verify the hash.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Generating-and-Comparing-Hashes\"><\/span>Generating and Comparing Hashes<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This website offers twp hashing algorithms &#8211; SHA256, and SHA512. SHA256 is good enough for our purposes. When you click on the &#8220;SHA256&#8221; link, you get this:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-29602\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_2.png\" alt=\"\" width=\"1270\" height=\"331\" srcset=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_2.png 1270w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_2-150x39.png 150w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_2-300x78.png 300w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_2-768x200.png 768w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_2-1024x267.png 1024w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/SHA_Hashes_2-1080x281.png 1080w\" sizes=\"(max-width: 1270px) 100vw, 1270px\" \/><\/p>\n<p>The 64 characters you see here make up the SHA256 hash for the file we want to download. To verify it, we first download the file itself via wget as shown here:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-29605\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/File_Downloaded_3.jpg\" alt=\"\" width=\"791\" height=\"467\" srcset=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/File_Downloaded_3.jpg 791w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/File_Downloaded_3-150x89.jpg 150w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/File_Downloaded_3-300x177.jpg 300w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/File_Downloaded_3-768x453.jpg 768w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><\/p>\n<p>And then we use the following command in our terminal to generate the SHA256 hash:<\/p>\n<pre>sha256sum <b>[filename]<\/b><\/pre>\n<p>Replace <b>[filename]<\/b> with the name of the file you just downloaded. It will generate a string of 64 characters, like this:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-29607\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Print_SHA256_4.jpg\" alt=\"\" width=\"782\" height=\"476\" srcset=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Print_SHA256_4.jpg 782w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Print_SHA256_4-150x91.jpg 150w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Print_SHA256_4-300x183.jpg 300w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Print_SHA256_4-768x467.jpg 768w\" sizes=\"(max-width: 782px) 100vw, 782px\" \/><\/p>\n<p>Now all we need to do is compare the string of characters it generates with the one provided by the website in the second screenshot.<\/p>\n<p>To make it easier to read with some formatting, here&#8217;s a command to make everything uppercase and split the hash into groups of 8 characters:<\/p>\n<pre>sha256sum <b>[filename]<\/b> | awk '{print toupper($1)}' | fold -w8<\/pre>\n<p>And we get an output like this:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-29608\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Easier_Readability_5.jpg\" alt=\"\" width=\"1516\" height=\"543\" srcset=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Easier_Readability_5.jpg 1516w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Easier_Readability_5-150x54.jpg 150w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Easier_Readability_5-300x107.jpg 300w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Easier_Readability_5-768x275.jpg 768w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Easier_Readability_5-1024x367.jpg 1024w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/Easier_Readability_5-1080x387.jpg 1080w\" sizes=\"(max-width: 1516px) 100vw, 1516px\" \/><\/p>\n<p>With this command, it is much easier to compare as opposed to a long string of 64 characters.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Other-Checksum-Algorithms\"><\/span>Other Checksum Algorithms<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Different websites will have different hashing algorithms for you to compare. In the example above, we looked at SHA256. Here are the commands for the others:<\/p>\n<p>SHA256 &#8211; sha256sum (used above)<br \/>\nSHA512 &#8211; sha512sum<br \/>\nMD5 &#8211; md5sum<\/p>\n<p>If you need to calculate the hash for another algorithm, just replace &#8220;sha256sum&#8221; in the examples above with the command you need. Keep in mind, however, that the MD5 hash has been insecure for some time now. You can use something called a &#8216;salt&#8217; to further improve the security of an SHA hash &#8211; however, it is not impossible to get past, so it is discouraged for protecting passwords and personal data.<\/p>\n<p>If you are able to successfully compare the hashes of the downloaded file to the one that&#8217;s displayed on the website, you can be sure that the file you downloaded is the one that the creator intended for you to have.<\/p>\n<hr \/>\n<p>Of course, you don\u2019t have to <strong>check the\u00a0file integrity of software you download<\/strong>\u00a0if you have a <a href=\"https:\/\/www.rosehosting.com\/vps-hosting.html\">Linux VPS<\/a> with us. You can simply ask our support team to install whichever software you need onto your VPS for you. They are available 24\/7 and will be able to help you with the installation.<\/p>\n<p><span style=\"color: #ff0000;\"><strong>PS<\/strong><\/span>. If you enjoyed reading this blog post on how to check the file integrity of downloaded packages in Linux, feel free to share it on social networks using the shortcuts below, or simply leave a comment in the comment section. Thanks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Part of using a Linux-based operating system is using the package manager of your Linux distribution to download and install &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"How to Check the File Integrity of a Downloaded Package in Linux\" class=\"read-more button\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#more-29598\" aria-label=\"Read more about How to Check the File Integrity of a Downloaded Package in Linux\">Read More<\/a><\/p>\n","protected":false},"author":4,"featured_media":29610,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1703,13],"tags":[],"class_list":["post-29598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tutorials","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Check the File Integrity of a Downloaded Package in Linux | RoseHosting<\/title>\n<meta name=\"description\" content=\"Learn how to check the file integrity of downloaded packages to ensure your Linux system remains secure and reliable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Check the File Integrity of a Downloaded Package in Linux\" \/>\n<meta property=\"og:description\" content=\"How to Check the File Integrity of a Downloaded Package in Linux | RoseHosting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"RoseHosting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RoseHosting\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/rosehosting.helpdesk\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-08T19:12:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T13:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"742\" \/>\n\t<meta property=\"og:image:height\" content=\"372\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:site\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/\"},\"author\":{\"name\":\"Jeff Wilson\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#\\\/schema\\\/person\\\/7ce77a842fa6a9a7f8efa186f2353713\"},\"headline\":\"How to Check the File Integrity of a Downloaded Package in Linux\",\"datePublished\":\"2019-02-08T19:12:08+00:00\",\"dateModified\":\"2025-09-17T13:36:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/\"},\"wordCount\":817,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/check-file-integrity-linux.jpg\",\"articleSection\":[\"Security\",\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/\",\"name\":\"How to Check the File Integrity of a Downloaded Package in Linux | RoseHosting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/check-file-integrity-linux.jpg\",\"datePublished\":\"2019-02-08T19:12:08+00:00\",\"dateModified\":\"2025-09-17T13:36:19+00:00\",\"description\":\"Learn how to check the file integrity of downloaded packages to ensure your Linux system remains secure and reliable.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/check-file-integrity-linux.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/check-file-integrity-linux.jpg\",\"width\":742,\"height\":372,\"caption\":\"Check File Integrity of Downloaded Package in Linux\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Check the File Integrity of a Downloaded Package in Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/\",\"name\":\"RoseHosting.com\",\"description\":\"Premium Linux Tutorials Since 2001\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#organization\",\"name\":\"RoseHosting\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/android-chrome-192x192-1.png\",\"contentUrl\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/android-chrome-192x192-1.png\",\"width\":192,\"height\":192,\"caption\":\"RoseHosting\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RoseHosting\",\"https:\\\/\\\/x.com\\\/rosehosting\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/rosehosting\\\/\"],\"description\":\"RoseHosting is a leading Linux hosting provider, serving thousands of clients world-wide since 2001.\",\"email\":\"info@rosehosting.com\",\"telephone\":\"(314) 275-0414\",\"legalName\":\"Rose Web Services LLC\",\"foundingDate\":\"2001-04-02\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#\\\/schema\\\/person\\\/7ce77a842fa6a9a7f8efa186f2353713\",\"name\":\"Jeff Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"caption\":\"Jeff Wilson\"},\"description\":\"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.\",\"sameAs\":[\"https:\\\/\\\/www.rosehosting.com\",\"https:\\\/\\\/www.facebook.com\\\/rosehosting.helpdesk\"],\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/author\\\/jwilson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Check the File Integrity of a Downloaded Package in Linux | RoseHosting","description":"Learn how to check the file integrity of downloaded packages to ensure your Linux system remains secure and reliable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/","og_locale":"en_US","og_type":"article","og_title":"How to Check the File Integrity of a Downloaded Package in Linux","og_description":"How to Check the File Integrity of a Downloaded Package in Linux | RoseHosting","og_url":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/","og_site_name":"RoseHosting","article_publisher":"https:\/\/www.facebook.com\/RoseHosting","article_author":"https:\/\/www.facebook.com\/rosehosting.helpdesk","article_published_time":"2019-02-08T19:12:08+00:00","article_modified_time":"2025-09-17T13:36:19+00:00","og_image":[{"width":742,"height":372,"url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux.jpg","type":"image\/jpeg"}],"author":"Jeff Wilson","twitter_card":"summary_large_image","twitter_creator":"@rosehosting","twitter_site":"@rosehosting","twitter_misc":{"Written by":"Jeff Wilson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#article","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/"},"author":{"name":"Jeff Wilson","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713"},"headline":"How to Check the File Integrity of a Downloaded Package in Linux","datePublished":"2019-02-08T19:12:08+00:00","dateModified":"2025-09-17T13:36:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/"},"wordCount":817,"commentCount":0,"publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux.jpg","articleSection":["Security","Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/","url":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/","name":"How to Check the File Integrity of a Downloaded Package in Linux | RoseHosting","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux.jpg","datePublished":"2019-02-08T19:12:08+00:00","dateModified":"2025-09-17T13:36:19+00:00","description":"Learn how to check the file integrity of downloaded packages to ensure your Linux system remains secure and reliable.","breadcrumb":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#primaryimage","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux.jpg","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/01\/check-file-integrity-linux.jpg","width":742,"height":372,"caption":"Check File Integrity of Downloaded Package in Linux"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-check-the-file-integrity-of-a-downloaded-package-in-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rosehosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Check the File Integrity of a Downloaded Package in Linux"}]},{"@type":"WebSite","@id":"https:\/\/www.rosehosting.com\/blog\/#website","url":"https:\/\/www.rosehosting.com\/blog\/","name":"RoseHosting.com","description":"Premium Linux Tutorials Since 2001","publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rosehosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rosehosting.com\/blog\/#organization","name":"RoseHosting","url":"https:\/\/www.rosehosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","width":192,"height":192,"caption":"RoseHosting"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RoseHosting","https:\/\/x.com\/rosehosting","https:\/\/www.linkedin.com\/in\/rosehosting\/"],"description":"RoseHosting is a leading Linux hosting provider, serving thousands of clients world-wide since 2001.","email":"info@rosehosting.com","telephone":"(314) 275-0414","legalName":"Rose Web Services LLC","foundingDate":"2001-04-02","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713","name":"Jeff Wilson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","caption":"Jeff Wilson"},"description":"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.","sameAs":["https:\/\/www.rosehosting.com","https:\/\/www.facebook.com\/rosehosting.helpdesk"],"url":"https:\/\/www.rosehosting.com\/blog\/author\/jwilson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/29598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/comments?post=29598"}],"version-history":[{"count":4,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/29598\/revisions"}],"predecessor-version":[{"id":51150,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/29598\/revisions\/51150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media\/29610"}],"wp:attachment":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media?parent=29598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/categories?post=29598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/tags?post=29598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}