Verify the Integrity of your Software Download V5.1 Build 018 - With IT Libraries

Windows Install SecurITree-setup.exe 91,156,856 bytes
UNIX/Linux Install securitree.deb 80,028,940 bytes
Mac OS X Install 86,925,109 bytes

The integrity of Amenaza's SecurITree program can be confirmed in three ways. The first method uses the SHA-1 algorithm specified by NIST in FIPS 180-1 to compute a cryptographic hash or message digest of downloaded files.

SHA-1 Checksums:

Windows Install SecurITree-setup.exe b3f93b679f5353b7d014a151db823b244f7e2ec7
UNIX/Linux Install securitree.deb 1dd1cd3cb36dc8dbbf62a19f5dfd1c24ef9b4ca1
Mac OS X Install 0a58f7d211127ed7848f50a16c3758764eeeca15

Programs to compute and verify SHA-1 hashes are widely available. This makes it convenient for verifying that tampering of files has not occurred.

SHA-256 Checksums:

Windows Install SecurITree-setup.exe 39dbf7246da4ee4e22db8beed0f02153f811a4ac27cf4648522d15826c5ad694
UNIX/Linux Install securitree.deb 043e32f5ac4f2a263e548329db868b76aecc8fc294ba8748459f17627005dbc6
Mac OS X Install 3317cd1c148a507281aa616939db80913ba4db8a9439266f3e72c77f8a84cd52

These methods are not a 100% guarantee of integrity. If Amenaza's web server has been compromised it is possible that the intruder may have introduced viruses, worms, Trojan Horses or other malware into the downloadable files and then posted matching SHA-1 message digests on the website! The next integrity verification mechanism described below is a stronger guarantee of file integrity and should be used if SecurITree will be used in a sensitive environment or if there is any suspicion that the downloaded code has been compromised.

The downloadable files have been digitally signed using Pretty Good Privacy (PGP) software and/or GNU Privacy Guard. This software is available commercially from or as freeware from

PGP Signature Files:

Windows Install SecurITree-setup.exe SecurITree-setup.exe.asc
UNIX/Linux Install securitree.deb securitree.deb.asc
Mac OS X Install

The public half of the Amenaza Software signing key pair can be obtained from the PGP keyserver ( using the PGP Key Management utility. Search for "Amenaza Technologies Limited Software Signing Key" or "". Note that this site cannot be queried using the LDAP utility built into most browsers.

Since the private half of the Amenaza Software signing key pair used to sign the files is not stored on the Amenaza web server it is NOT possible for an intruder to create a valid signature file even if they compromise the web server. It is, however, possible that the PGP key server may have had the Amenaza Software signing key replaced by a rogue key.

If you are operating in a sensitive environment we recommend that you contact Amenaza Technologies at 1-888-949-9797 (1-403-263-7737) to verify the signing key fingerprint in an 'Out of Band' manner.

Amenaza Software Signing Key Fingerprint:

AE31 1695 86F5 BF87 0384 5314 D4F9 ABC2 D654 5B79


robust company backward Montana
necklace visitor slingshot liberty
acme Jupiter dwelling belowground
steamship Waterloo rhythm repellent
stockman equation erase inertia