Checksums in Computer software Distribution: When application is dispersed by using down load, MD5 checksums are often supplied to confirm the downloaded file matches the initial file and has not been tampered with. On the other hand, as a consequence of MD5’s collision vulnerabilities, safer hash functions like SHA-256 are being used in place of