Documentation

The Documentation will be put on the web in stages.

File comparisons

Menu Level

Why Needed

Sub Menu

Description

1 Compare Files
Sub
Over time files on computers get dispersed and changed.  It is useful to be able to:
  • determine file sizes
  • if files are different
  • What the differences are in two files
1 Two Files                                         
2 Two Files Byte Differences 10K to 1000k max       
3 One File with Many                                
4 File with Compressed File                         
5 Partial Files                                     
-No NetWork Encrypted File Compare-                 
----------------Single Password-----------------    
6 Decrypt                                           
7 Split Decrypt                                     
----------------Two Passwords-----------------      
8 Decrypt                                           
9 Split Decrypt                                     

2 Compare Directories Sub
Over time files on computers get dispersed and changed.  It is useful to be able to:
  • determine file sizes
  • if files are different
  • What the differences are in two directories
  • DVDs corrupt over time.  It is useful to be able to check DVD integrity with a log file
  • Discs can get corrupted.  A log file can check if contents are intact or have corrupted.
  • A hiccup in a computor program can corrupt memory which then can corrupt files on disc.
  • Trojans and root kits can corrupt files so it is useful to check if files have not changed



1 Directories                      
2 Differences                      
3 Multiple File && Directories     
4 DVDcheck Directories             
5 Compare Log File and Directory   

3 Compare File with Log Contents Sub There is a need to check an encrypted or non encrypted file sent to a person over email.  A log file can enable the checking of the encrypted or non encrypted file without needing to read the contents of the encrypted or non encrypted file.  Hard discs can alter contents of a file for a variety of reasons.
1 SHA1 File                                    
2 Double SHA1 File                             
---------------Single Password-----------------
3 SHA1 File                                    
4 Double SHA1 File                             
---------------Double Password-----------------
5 SHA1 File                                    
6 Double SHA1 File                             

4 Compare SHA Datafile in all top directories Sub



Compare Multiple (Log and Directory)
Sub

1 SHA1        
2 Double SHA1 

Compare Log contents with Multiple Files
Sub

1 SHA1        
2 Double SHA1 

Duplicates
Sub

1 Single Directory                                   
2 Directories                                        
3 Multiple Drives                                    
4 Duplicate Erase Directory                          
---------------Duplicate Info File------
5 Duplicates                                         
6 Duplicate Erase Directory                          
7 About Duplicates                                   
                                                                                 
1)    SHA0 signature taken on all files.                                       
2)    Files are matched by signature and filesize.  This is faster than matching
    contents.                                                                
3)    All matched Files are then checked for matching contents.                
                                                                                 
If filesize, signature and contents match then the file is considered a duplicate.

Examine Memory Usage
Sub



History and System Change Check
Sub

-----File Changes in Directory--------
SHA1 && Double SHA1
File History
                            

Matching File Names
Sub

1 Names Only (Fast)        
2 Names No Extension (Fast)
3 Names with SHA1 (Slow))  

Name Lengths Sub
1 Files 63         
2 Directories 63   
3 Paths 250        
--- Variable ----------
4 Files            
5 Directories      
6 Paths            

Obtain SHA Sub

----------------File--------------
1 SHA1    
4 Double SHA1
---------Confirm Email Receipt----
3 SHA1
4 Double SHA1
----------------fips 180 (SHA-1)--
5 Fips 180 (SHA-1)
6 Check Files for Spec
----------------CONVERT-----------
7 Convert ANSI Signature to Hex
----------------ABOUT-------------
8 SHA1
9 fips 180 (SHA-1)

Verify SHA Sub
----------------File--------------
1 SHA1    
4 Double SHA1
---------Confirm Email Receipt----
3 SHA1
4 Double SHA1
----------------fips 180 (SHA-1)--
5 Fips 180 (SHA-1)
6 Check Files for Spec
----------------CONVERT-----------
7 Convert ANSI Signature to Hex
----------------ABOUT-------------
8 SHA1
9 fips 180 (SHA-1)