{"id":31146,"date":"2024-09-02T16:31:31","date_gmt":"2024-09-02T13:31:31","guid":{"rendered":"https:\/\/trueconf.com/blog\/?p=31146"},"modified":"2025-11-25T12:43:15","modified_gmt":"2025-11-25T09:43:15","slug":"how-to-verify-the-authenticity-of-trueconf-client-application","status":"publish","type":"post","link":"https:\/\/trueconf.com/blog\/knowledge-base\/how-to-verify-the-authenticity-of-trueconf-client-application","title":{"rendered":"How to verify the authenticity of TrueConf client application"},"content":{"rendered":"<p class=\"primary-medium-text ui-mb-sm-1\">Since the time when software was first created, cyber criminals  have been using methods of substituting applications or infecting them with viruses. This can be done for different purposes (unauthorized access, information theft, etc.). TrueConf client applications are widely popular among users (especially on Windows) and there is a risk that their integrity may be compromised. <\/p>\n<div class=\"accent-note accent-note--line accent-note--special ui-mb-sm-1 ui-mt-xs-3\">\n<p class=\"primary-medium-text\">We recommend downloading TrueConf applications only from the <a href=\"https:\/\/trueconf.com\/downloads\/\" target=\"_blank\" rel=\"noopener\">official website<\/a>!<\/p>\n<\/div>\n<p class=\"primary-medium-text ui-mb-sm-1\">So, in a number of cases, one has to check the authenticity of TrueConf for Windows application before installing it, for example, one may consider these situations:<\/p>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--disc\">Someone forwards the installer to an administrator or user by email or in a third-party messenger.<\/li>\n<li class=\"ui-list__item ui-list__item--disc\">Someone provides a link to the web page where the application can be downloaded, but this page raises suspicions.<\/li>\n<\/ul>\n<p class=\"primary-medium-text ui-mb-sm-1\">In all cases, when you did not personally download the application from the official TrueConf website, we recommend verifying it before installing on your PC. The authenticity can be checked only for the installer files in the <b>.exe<\/b> format. <\/p>\n<p>The installer file can be verified by using the method in which the integrity is checked with the help of the checksum. This technique is based on the MD5 encryption algorithm. To check the current .exe file of TrueConf for Windows, take these steps:<\/p>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--num\">Open the Windows command line (terminal). For example, you can press <b>Win + R<\/b>, type <b>cmd<\/b> and click <strong>OK<\/strong>.<br \/>\n<a href=\"https:\/\/trueconf.com\/blog\/wp-content\/uploads\/2024\/08\/cmd-en.png\" data-rel=\"lightbox-gallery-x3c1z6wr\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/trueconf.com\/blog\/wp-content\/uploads\/2024\/08\/cmd-en.png\" alt=\"\" width=\"397\" height=\"204\" class=\"aligncenter size-full wp-image-31149\" loading=\"lazy\" title=\"\" srcset=\"https:\/\/trueconf.com/blog\/wp-content\/uploads\/2024\/08\/cmd-en.png 397w, https:\/\/trueconf.com/blog\/wp-content\/uploads\/2024\/08\/cmd-en-393x202.png 393w\" sizes=\"auto, (max-width: 397px) 100vw, 397px\" \/><\/a>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Run the command:\n<pre class=\"lang:default decode:true \" >certutil -hashfile [installer-path] MD5<\/pre>\n<p>where <code>[installer-path]<\/code> is the full path to the installer e.g., <code>D:\\Downloads\\trueconf_client_x64.exe<\/code>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">In the second line, the application will display the checksum:\n<pre class=\"lang:default decode:true \" >C:\\Users\\admin&gt;certutil -hashfile D:\\Downloads\\trueconf_client_x64.exe MD5\r\nMD5 hash of D:\\Downloads\\trueconf_client_x64.exe:\r\nb4b79b717bd73bc5ab8c4e8866ea6e80\r\nCertUtil: -hashfile command completed successfully.<\/pre>\n<p>In this example, the MD5 checksum is as follows:<br \/>\n<code>b4b79b717bd73bc5ab8c4e8866ea6e80<\/code>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Go to the official TrueConf page where the application for Windows can be found <a href=\"https:\/\/trueconf.com\/downloads\/windows.html\" target=\"_blank\" rel=\"noopener\">https:\/\/trueconf.com\/downloads\/windows.html<\/a>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Click on the link <strong>Verify the checksum<\/strong> which is under the download button and select the version of the installer (x32 or x64).<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Compare the value with the one received at step 3. If they are the same, everything is fine and you have the official TrueConf for Windows installer.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Since the time when software was first created, cyber criminals have been using methods of substituting applications or infecting them with viruses. This can be done for different purposes (unauthorized access, information theft, etc.). TrueConf client applications are widely popular among users (especially on Windows) and there is a risk that their integrity may be [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[260],"tags":[188,186],"class_list":["post-31146","post","type-post","status-publish","format-standard","hentry","category-knowledge-base","tag-trueconf-solutions","tag-administration","wpautop"],"_links":{"self":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/31146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/comments?post=31146"}],"version-history":[{"count":5,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/31146\/revisions"}],"predecessor-version":[{"id":40747,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/31146\/revisions\/40747"}],"wp:attachment":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/media?parent=31146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/categories?post=31146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/tags?post=31146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}