SHA-1 and MD5 are popular used cryptographic hash functions, they are usually used to verify the integrity of files and folders, sometimes it’s also used for generating passwords. However, most MD5 / SHA-1 checksum generators provide a bad user experience. … Continue reading →