All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: photography and

Thank you for buying via links and ads on this site,
which earn me advertising fees or commissions.
As an Amazon Associate I earn from qualifying purchases.

Other World Computing...
B&H Photo...
As an Amazon Associate I earn from qualifying purchases.
Upgrade the memory of your 2020 iMac up to 128GB
Today’s Deal Zone Items... Handpicked deals...
$4499 $2999
SAVE $1500

$799 $429
SAVE $370

$149 $99
SAVE $50

$2198 $1798
SAVE $400

$80 $28
SAVE $52

$3498 $2998
SAVE $500

$2999 $1699
SAVE $1300

$2397 $2197
SAVE $200

$1697 $1297
SAVE $400

$2998 $2898
SAVE $100

$2198 $1798
SAVE $400

$190 $161
SAVE $28

$580 $450
SAVE $130

$2997 $2697
SAVE $300

$1799 $1599
SAVE $200

$2198 $1998
SAVE $200

OWC Black Friday

Best Deals of the Year!

Promo code BFCM2021 good thru Nov 30
Check for new deals daily!

Reader Question on diglloydTools IntegrityChecker: “verify terabytes of content back and forth between the cloud and other local RAID drives I have”.

IntegrityChecker Java (part of diglloydTools) runs on any platform with a JVM.

See also Data Integrity Over Time, and with OS Changes and Data Loss Prevented: IntegrityChecker Saves my Bacon by Detecting Corrupted Files after a Clone and Detecting Corruption / Validating Data Integrity Over Time and Across Drives and Backup/Restore.

Sobe S writes:

Here is what I am trying to do and I want to make sure your program can offer that.

I use Transmit 5 to download and upload lots of content sometimes terabytes of content back and forth between the cloud and other local RAID drives I have.

What I am looking for is a program I can run that can verify the quality of that transfer. I want to make sure my transfers have good data and be able to verify the files are not corrupt once stored somewhere. Can your program provide that?

MPG: IntegrityChecker verifies bit-for-bit data integrity anywhere—originals, copies or backups or clones—and on any operating system and file system, on read/write or read-only media. It’s a simple two-step process:

  1. icj update the desired folder(s) or volume(s) in order to create the hash files used for verification.
  2. icj verify the data (originals, backups or clones, copies, etc).

A single command can verify a specific folder or folders or an entire volume or folder hierarchy. Excepting quite slower computers, the speed of verification depends mainly how fast the data can be read.

Buy diglloydTools with IntegrityChecker Java

Additional features include the ability to instantly find duplicate files, quickly see status including missing files or folders, lighting-fast folder comparison based on hashes, and more.


The enabling requirements to do this are:

  • The folder(s) to be verified must accessible through a file system, e.g., a mounted volume on macOS, a drive letter ("D:" or similar on Windows), a mounted file system on Linux/UNIX.
  • The folders to be verified must have hash information available. That means either a per-folder hash file or a hash hierarchy file. These hash files are created in the original folders using icj update, which does the initial hashing and then creates the hash files.

Addressing the question above

The uploaded data must be accessible on a mounted file system as per requirements above.

  1. icj update the folder(s) involved on the local RAID volumes.
  2. Sync or upload the data. The syncing obviously must include the .icj and/or .icjh hash files.
  3. Verify the uploaded files using icj verify.

Some users feel ill-

More posts on IntegrityChecker. | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__