How to Hash a File in Linux and Verify it For Security

Here’s how to “hash” a file and compare it with what the sender of the file provides. This allows you to make sure that what you’re receiving is indeed what was sent. While MD5 has been shown to be insecure, we can use SHA256 instead.