Verify the Integrity of your Software Download V5.0 Build 009 - With IT Libraries

Windows Install SecurITree-setup.exe 80,541,144 bytes
UNIX/Linux Install securitree.deb 71,496,660 bytes
Mac OS X Install 76,471,046 bytes

The integrity of Amenaza's SecurITree program can be confirmed in three ways. The first method uses the SHA-1 algorithm specified by NIST in FIPS 180-1 to compute a cryptographic hash or message digest of downloaded files.

SHA-1 Checksums:

Windows Install SecurITree-setup.exe f98cf6d39938e7c5fe250c95e937617ee5c80d75
UNIX/Linux Install securitree.deb bfd8916a09cc987cbd6770a7fc525411cdb3ae68
Mac OS X Install f8186e2fc9dc269efed359dfa373e7343c474dde

Programs to compute and verify SHA-1 hashes are widely available. This makes it convenient for verifying that tampering of files has not occurred.

SHA-256 Checksums:

Windows Install SecurITree-setup.exe b528a5ef51bca6976504d2337caf55df845b51109ee5a185adc9c3193c89c311
UNIX/Linux Install securitree.deb 43f9a909e94d879e6e1c8caf98a389eba61193bdc4f0121c80c09f22f8916b6f
Mac OS X Install 51701f209117435bb01bf6f31424317cc075fe0a3478d09325363a96f7b6b09d

These methods are not a 100% guarantee of integrity. If Amenaza's web server has been compromised it is possible that the intruder may have introduced viruses, worms, Trojan Horses or other malware into the downloadable files and then posted matching SHA-1 message digests on the website! The next integrity verification mechanism described below is a stronger guarantee of file integrity and should be used if SecurITree will be used in a sensitive environment or if there is any suspicion that the downloaded code has been compromised.

The downloadable files have been digitally signed using Pretty Good Privacy (PGP) software and/or GNU Privacy Guard. This software is available commercially from or as freeware from

PGP Signature Files:

Windows Install SecurITree-setup.exe SecurITree-setup.exe.asc
UNIX/Linux Install securitree.deb securitree.deb.asc
Mac OS X Install

The public half of the Amenaza Software signing key pair can be obtained from the PGP keyserver ( using the PGP Key Management utility. Search for "Amenaza Technologies Limited Software Signing Key" or "". Note that this site cannot be queried using the LDAP utility built into most browsers.

Since the private half of the Amenaza Software signing key pair used to sign the files is not stored on the Amenaza web server it is NOT possible for an intruder to create a valid signature file even if they compromise the web server. It is, however, possible that the PGP key server may have had the Amenaza Software signing key replaced by a rogue key.

If you are operating in a sensitive environment we recommend that you contact Amenaza Technologies at 1-888-949-9797 (1-403-263-7737) to verify the signing key fingerprint in an 'Out of Band' manner.

Amenaza Software Signing Key Fingerprint:

AE31 1695 86F5 BF87 0384 5314 D4F9 ABC2 D654 5B79


robust company backward Montana
necklace visitor slingshot liberty
acme Jupiter dwelling belowground
steamship Waterloo rhythm repellent
stockman equation erase inertia