Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
passwords:keepassx [2014/02/13 11:48] samthetechiepasswords:keepassx [2022/05/08 11:42] (current) – external edit 127.0.0.1
Line 1: Line 1:
 +FIXME evaluate and update the guide for their new code https://www.keepassx.org/dev + https://www.keepassx.org/news/2013/12/420
 +
 +Note: this guide is out of date due to: https://www.keepassx.org/bug-reports/ "KeePassX 0.4.3 is no longer maintained. For bug reports and feature requests related to the development version KeePassX 2 please visit http://www.keepassx.org/dev."
 +
 +Also checkout these notes / slides on Keepass2 (Deutsch):  {{:keepass.pdf|Passwortverwaltung}}
 Compiling from source is the most flexible way to get working KeePassX binaries for your system. It works on all supported platforms and with many processors in different configurations like Linux/PowerPC or BSD/i386 etc, even if there are no precompiled packages available for these combinations. Compiling from source is the most flexible way to get working KeePassX binaries for your system. It works on all supported platforms and with many processors in different configurations like Linux/PowerPC or BSD/i386 etc, even if there are no precompiled packages available for these combinations.
  
Line 10: Line 15:
  
 **Why generate a hash of the file?** **Why generate a hash of the file?**
 +
 If you want to check if the offered files are verified by the KeePassX authors (i.e. official and original files), you can hash the downloaded file using the hash computation utility of your choice and see if the SHA-1 hashes match. This is to ensure the integrity of the downloaded data and that you have not been given modified source code. If you want to check if the offered files are verified by the KeePassX authors (i.e. official and original files), you can hash the downloaded file using the hash computation utility of your choice and see if the SHA-1 hashes match. This is to ensure the integrity of the downloaded data and that you have not been given modified source code.