Make Logs - Transfer log

When practising the tutorials it is worth using a Ramdisk.  For further details of a ramdisk go here.


For further details of SHA1 log files and Double SHA1 files go here.

I have files on my computer system which carry legal significance.  I am working on a project which has patent applications and may have to prove in a court of law that the files I have deposited portraying my work have been carried out by me.  Files can be stored in file depositories which carry date stamps.  When legal disagreements occur can I show that they are mine.  A log file of hashes stored in a bank vault can match file in a file depository.


What do hashes represent?  A hash is taken of a file.  If the file gets altered there is a very high probability (near certainty) that the hash of the file will change.  Thus a hash can check with a high probability whether a file is different to the file that is expected.

Hard disks are not infallible.  They can partially fail causing the modification of what is on the hard disk.  An operating system or program on the operating system may have a software glitch due to a power supply spike which in turn may modify a file.  There are all sorts of programs on the internet which will deliberately and sneakily modify files without the computer user knowing this is happening.  Some of these programs will modify the file and link the file details to another part of the disk with false file particulars so that the user looking at these particulars are unaware that anything has changed.  A log file which compares contents with a hash value will indicate if a change has taken place if it has.

The "transfer Log" function will make a log file of the contents of a directory and its sub directories and place it in another directory.  It has the ability to list and compare the log file placed in another directory with files in the directory.  This is very useful when you want a log file of the contents of a CDROM, or of a hard disk, or of a USB stick that must not be altered in any way.

Log files created using the "Transfer Log" function can be checked against the directory at a later date by the "Compare log File and Directory" functions.  It is important to note that the SHA1 and Double SHA1 given here are the SHA1 and Double SHA1 for the created log files.  The log files are for non Unicode named files. 

For further details of SHA1 log files and Double SHA1 files go here.

For the tutorial we need to create test files.  Instructions for creating test files are found here.

Test files have been created in zip file where "a.txt" has NOT been modified if the user does not want to create them.

Test files have been created in zip file where "a.txt" has BEEN modified if the user does not want to create them

The transfer log gives a choice of using Transfer SHA1 or Transfer Double SHA1

Transfer SHA1

  1. Create " create SHA Check Files (19,929,168 Bytes)" using the "Install - New Create Files , Directories for Program Checking"
  2. Run another program instance
  3. Follow instructions to create test files given here.
  4. Close Program Instance
  • Test files have been created in zip file where "a.txt" has NOT been modified if the user does not want to create them.
  • Test files have been created in zip file where "a.txt" has BEEN modified if the user does not want to create them

 



  • By Mouse
  1. Click on "Make Logs"
  2. Click on "Transfer Log"
  • By Keyboard

  1. Type "ALT+M"
  2. Type "1"


  1. Click on "Get Directory SHA1 Signature" button (E)
  2. Select Directory "check" created by other instance of program
  3. Type "Alt+1"
  4. Type "Alt+3"
    1. Directory that you create a log file folder of is in (A)


  1. Click on "Directory for Back Up Folder SHA1 Signature" button (F)
  2. Create Directory "bu"
  3. Select Directory "bu"
  4. Type "Alt+1"
  5. Type "Alt+3"
    1. Directory for Back up folder is in (B)


  1. Type "test" in (N)
  2. Click on "Create back Up folder" button (O)
    1. name of folder to created in folder "bu" is created in (Q)
    2. name of Log file to be created is in (R)


  1. Click on "Create Log in Folder" button (X)
    1. Using details that are in (T) and (U) Folder  "test2018-08-12-19-37-59" is created in folder "bu"
    2. Log file "" is created in folder "bu\test2018-08-12-19-37-59" with name "kb2018-08-12-19-37-59.1log"
    3. The SHA1 of file "kb2018-08-12-19-37-59.1log" is taken and displayed
      1. This can be stored as a check that the log file has not been altered at later time


  1. Click on "1st SHA1" button (o)
  2. Open notepad and paste from clipboard

  1. Click on "Signature on ClipBoard" button (W)


  1. Paste contents of clipboard into (A)


  1. Type any message one chooses
  • Can Click on "Paste Edit Box Contents to ClipBoard" button (N)
  • Can Click "Print" (M) to print contents of (A)
This was originally designed to confirm the authenticity of files sent on the internet.  Important in matters of legal contracts.  Files sent on the internet could be transcribed documents of recordings made in court.
  1. Click on "Cancel button"
    1. returns to previous display
  2. Click on "1st SHA1" button
  3. Click on "Check Signature" button (Y)


(A) This will clear entry in (B)
(B) Entry for SHA1 hash
(C) Number of Characters in (B)
(D) SHA1 hash of log file with a split every four characters
(E) Number of characters in (D)
(F) Will split SHA1 hashes in (B) and (D) every four characters with "-"
(G) Will remove "-" every four characters if present
(H) Will place SHA1 to clipboard
(I) The directory that the files reside in that the log file is taken of.
(J) Clears the clipboard
(K) Cancel returns to previous display
(b) to (k) signature values 4 characters in each editbox

  1. Paste from clipboard in (B)
    1. SHA1 hash is displayed in (B)



  1. Click on "Remove 4 character Split" button
    1. "-" character is removed in (D)
    2. Character strings in (B) and (D) match

  1. Click on "Cancel" button (J) to return to previous display
    1. Returns to previous Display

  1. Click on "Cancel" button (m) to return to opening screen


Transfer Double SHA1
  • If not created create test files
  1. Create SHA Check Files (19,929,168 Bytes)" using the "Install - New Create Files , Directories for Program Checking"
  2. Run another program instance
  3. Follow instructions to create test files given here.
  4. Close Program Instance
  • Test files have been created in zip file where "a.txt" has NOT been modified if the user does not want to create them.
  • Test files have been created in zip file where "a.txt" has BEEN modified if the user does not want to create them

 

  • By Mouse
  1. Click on "Make Logs"
  2. Click on "Transfer Log"
  •   By Keyboard
  1. Type "ALT+M"
  2. Type "1"
 


  1. Click on "Directory Double Log or Signature" in list (n)
  2. Click on "Get Directory SHA1 Signature" button (E)
  3. Select Directory "check" created by other instance of program
  4. Type "Alt+1"
  5. Type "Alt+3"
    1. Directory that you create a log file folder of is in (A)


  1. Click on "Directory for Back Up Folder SHA1 Signature" button (F)
  2. Create Directory "bu"
  3. Select Directory "bu"
  4. Type "Alt+1"
  5. Type "Alt+3"
    1. Directory for Back up folder is in (B)


  1. Type "test" in (N)
  2. Click on "Create back Up folder" button (O)
    1. name of folder to created in folder "bu" is created in (Q)
    2. name of Log file to be created is in (R)
  3. Click on "Directory Double Log or Signature" in list (n)


  1. Click on "Create Log in Folder" button (X)
    1. Using details that are in (T) and (U) Folder "test2018-08-14-17-28-05" is created in folder "bu"
    2. Log file "" is created in folder "bu\test2018-08-12-19-37-59" with name "kb2018-08-14-17-28-05.d1log"
    3. The SHA1 of file "kb2018-08-12-19-37-59.1log" is taken and displayed
      1. This can be stored as a check that the log file has not been altered at later time


  1. Click on "1st SHA1" button (o)
  2. Open notepad and paste from clipboard
  3. Click on "2rd SHA1" button (p) then paste into notepad from clipboard

  1. Select contents of notepad and copy onto clipboard
  2. Close notepad
  3. Click on "Signature on ClipBoard" button (W)


  1. Paste contents of clipboard into (A)


  1. Type any message one chooses
  • Can Click on "Paste Edit Box Contents to ClipBoard" button (N)
  • Can Click "Print" (M) to print contents of (A)
This was originally designed to confirm the authenticity of files sent on the internet.  Important in matters of legal contracts
  1. Click on "Cancel" button
    1. returns to previous display

  1. Select contents of notepad and copy onto clipboard
  2. Click on "Check Signature" button (Y)


(A) This will clear entry in (B)
(B) Entry for SHA1 hash
(C) Number of Characters in (B)
(D) SHA1 hash of log file with a split every four characters
(E) Number of characters in (D)
(F) Will split SHA1 hashes in (B) and (D) every four characters with "-"
(G) Will remove "-" every four characters if present
(H) Will place SHA1 to clipboard
(I) The directory that the files reside in that the log file is taken of.
(J) Clears the clipboard
(K) Cancel returns to previous display
A) This will clear entry in (N)
(M) Will place SHA1 in (N) to clipboard
(N) Entry for Scond SHA1 hash
(O) Number of Characters in (NB)
(P) SHA1 hash of log file with a split every four characters
(Q) Number of characters in (P)
(b) to (k) signature values 4 characters in each editbox


  1. Select first line contents of notepad and copy onto clipboard
  2. Paste into (B)
  3. Select second line contents of notepad and copy onto clipboard
  4. Paste into(N)


  1. Click on "Remove 4 character Split" button (G)
    1. "-" character is removed in (D) and (N)
    2. Character strings in (B) and (D) match
    3. Character strings in (M) and (P) match


  1. Click on "Cancel" button (K) to return to previous display


  1. Click on "Cancel" button (mK) to return to opening screen
  2. Close notepad.