Tag

checksum

1 views collected around this technical thread.

Code Mala Tang
Code Mala Tang
Apr 12, 2025 · Fundamentals

Master the Luhn Algorithm: Definition, Examples, and TypeScript Implementation

Learn what the Luhn (mod‑10) algorithm is, its real‑world applications such as credit‑card and IMEI validation, step‑by‑step calculation examples, and see practical TypeScript and JavaScript implementations that you can integrate into your web projects.

JavaScriptLuhnTypeScript
0 likes · 6 min read
Master the Luhn Algorithm: Definition, Examples, and TypeScript Implementation
Raymond Ops
Raymond Ops
Mar 15, 2025 · Operations

How to Verify File Integrity with MD5 and SHA‑512 Checksums on Linux

This guide explains the principles of MD5 and SHA‑512 checksums, demonstrates how to generate and compare them using md5sum and sha512sum commands, and shows practical steps to ensure files remain unchanged during transfer or storage on Linux systems.

LinuxMD5SHA-512
0 likes · 7 min read
How to Verify File Integrity with MD5 and SHA‑512 Checksums on Linux
Raymond Ops
Raymond Ops
Jan 20, 2025 · Operations

How to Verify File Integrity with md5sum: Commands, Options, and Scripts

This guide explains how to use the Linux md5sum command to generate checksums, compare files, store checksum data, and employ verification options like -c, --quiet, and --status for reliable file integrity checks in scripts and system operations.

Linuxchecksumfile integrity
0 likes · 4 min read
How to Verify File Integrity with md5sum: Commands, Options, and Scripts
vivo Internet Technology
vivo Internet Technology
Jul 3, 2024 · Databases

End-to-End Data Consistency Verification for MySQL in DTS

The Vivo Internet Storage R&D team's article describes an end‑to‑end MySQL data‑consistency verification tool for DTS that uses fixed‑size chunking and CRC32/MD5 fingerprint aggregation to quickly compare source and target tables, pinpoint mismatched rows, and enable automated or manual correction while minimizing impact on replication.

CRC32ChunkingDTS
0 likes · 13 min read
End-to-End Data Consistency Verification for MySQL in DTS
Big Data Technology Architecture
Big Data Technology Architecture
Mar 15, 2023 · Big Data

Ensuring Secure Write Paths in Hadoop S3A: Experiments, Benchmarks, and Best Practices

This article analyses the security of Hadoop S3A write paths in data lakes, explains fast upload mechanisms, demonstrates disk‑IO and network‑error simulations, compares checksum algorithms, and presents Alibaba Cloud EMR JindoSDK best‑practice results with performance and reliability evaluations.

Big DataHadoopS3A
0 likes · 24 min read
Ensuring Secure Write Paths in Hadoop S3A: Experiments, Benchmarks, and Best Practices
Zhuanzhuan Tech
Zhuanzhuan Tech
Dec 9, 2022 · Databases

Implementing a MySQL Data Consistency Check Tool Based on pt-table-checksum

This article describes the design, implementation, and usage of a custom MySQL data consistency checking tool that extends pt-table-checksum, handling composite primary keys, network throttling, scheduled execution, and detailed logging for both successful and failed verification scenarios.

MySQLautomationchecksum
0 likes · 21 min read
Implementing a MySQL Data Consistency Check Tool Based on pt-table-checksum
Refining Core Development Skills
Refining Core Development Skills
Jun 6, 2022 · Fundamentals

Why Large File Downloads Still Need Integrity Verification Despite TCP Reliability

Although TCP provides reliable transmission, its guarantees have limits—such as incomplete CRC checks, process crashes before data reaches the transport layer, possible ISP tampering, and kernel‑level ACKs that don’t ensure user‑space receipt—so large downloads must still be validated for full integrity.

LinuxTCPchecksum
0 likes · 4 min read
Why Large File Downloads Still Need Integrity Verification Despite TCP Reliability
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 25, 2022 · Databases

Custom MySQL Data Consistency Check Tool: Design, Implementation, and Usage

This article introduces a custom MySQL data consistency verification tool inspired by pt-table-checksum, explains the challenges of handling complex primary keys, details the implementation logic with shell scripts and SQL, and provides installation, configuration, and usage instructions including parallelism, network monitoring, and scheduling.

Database ToolsMySQLautomation
0 likes · 23 min read
Custom MySQL Data Consistency Check Tool: Design, Implementation, and Usage
Laravel Tech Community
Laravel Tech Community
Jun 22, 2021 · Backend Development

PHP Function for Validating Chinese ID Card Numbers

This article explains the structure of Chinese citizen ID numbers and provides a PHP function that validates both 15‑digit and 18‑digit IDs by checking format, birthdate correctness, and computing the checksum according to ISO 7064, accompanied by example usage.

PHPValidationbackend
0 likes · 4 min read
PHP Function for Validating Chinese ID Card Numbers
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 29, 2020 · Databases

Using pt-table-checksum to Verify MySQL Master‑Slave Data Consistency

This article explains how to use Percona Toolkit's pt-table-checksum tool to detect and verify data consistency between MySQL master and replica servers, covering its principles, suitable scenarios, safety mechanisms, and step‑by‑step commands for setup, data generation, and checksum execution.

DatabaseMySQLPercona Toolkit
0 likes · 16 min read
Using pt-table-checksum to Verify MySQL Master‑Slave Data Consistency
Python Programming Learning Circle
Python Programming Learning Circle
Dec 14, 2019 · Fundamentals

Generate Valid Chinese ID Numbers with Python: Step-by-Step Guide

This tutorial explains the structure of Chinese citizen ID numbers, details the ISO 7064 checksum calculation, and provides Python code to generate random valid IDs and verify existing ones, covering area codes, birth dates, sequence and gender digits.

ID numberalgorithmchecksum
0 likes · 5 min read
Generate Valid Chinese ID Numbers with Python: Step-by-Step Guide
Tongcheng Travel Technology Center
Tongcheng Travel Technology Center
Aug 14, 2018 · Big Data

Understanding HDFS Read and Write Mechanisms

This article explains how HDFS handles file reading and writing, detailing the roles of DFSClient, block selection, hedged reads, packet construction, checksum handling, and the interaction with NameNode and DataNode pipelines to ensure reliability and performance.

Big DataDFSClientHDFS
0 likes · 7 min read
Understanding HDFS Read and Write Mechanisms