Checksums in Software package Distribution: When software package is dispersed by using down load, MD5 checksums in many cases are furnished to confirm the downloaded file matches the initial file and it has not been tampered with. On the other hand, resulting from MD5’s collision vulnerabilities, safer hash functions like SHA-256 are being used