We provide Cryptographic Hashes for the individual installation files as a way for you to confirm the integrity of the files you download.
The md5sum algorithm takes a file as input and produces as output a message digest of the input, which is a highly unique fingerprint.
To confirm file integrity, use the md5sum utility on your computer to calculate your own hash for files downloaded from the PREDATOR web site.
If your calculated hash matches the MD5 Hash we provide below, you are assured that the file was downloaded intact.
|Version 126.96.36.1992||Installation file||MD5 Hash|