Verify the File Integrity of Backups
While it is essential to create regular data backups to avoid data loss due to file corruption or theft, there are other precautions that administrators and users should take to ensure the integrity of their backups.
Depending on where and how backups are stored, backups can become corrupt over time which would render them useless for exactly the reason they have been created in first place.
It can for instance happen that backups become unreadable if they are stored on optical discs.One option that you have is to verify the integrity of backups regularly so that you can be certain that files can be restored if the need arises.
File Check MD5 is a small portable software for Windows that has been designed for that specific purpose. It can be used to compute MD5 hashes of all files in a specific root folder including files in all subfolders. All MD5 hashes will be stored in a text file in the root folder.
The Check Files option can then be used to check files in the backup storage location. It uses the original MD5 hash text file for comparison and reports back to you any issues that may occur.
One interesting option of the software program is to test md5 hashes that have been previously generated if the text file is located in the same folder as the executable. It would then only be a matter of adding the File Check MD5 software and the text file with the MD5 hashes to the root of the backup to automatically verify the file integrity. This is great for optical discs for example as you can add all means of verification to the root of the disc.
The only thing that is missing is the ability to select a different storage location for the MD5 hashes. This would make it possible to run the software on read only devices as well.
Update: The author has retired the program and created ExactFile instead which serves a similar purpose. It is an advanced version of the application. Among the features that it adds are options to select a different output path for the verification file, switch to another hashing algorithm, or run a benchmark.
It can furthermore be used to test single files using more than ten different hashing algorithms.Advertisement