Hashing Basics
Hashes map data to fixed-length fingerprints. SHA-256 is widely used; MD5 is weak for security.
Use cases
- Verify file integrity
- Compare duplicates
Tool
Hash Generator computes hashes in the browser.
Summary
Use SHA-256 for new projects.