Michel: Actually, hash is the proper term. Checksums are much simpler, and are used only for checking against accidental modifications, whereas cryptographic hash functions are used to protect against malicious tampering. See http://en.wikipedia.org/wiki/Checksum.<br><br>Ian: I imagine most user-agents would just warn the user, but still allow the file to be opened.<br><p>
<hr size=1>Want to start your own business? Learn how on <a href="http://us.rd.yahoo.com/evt=41244/*http://smallbusiness.yahoo.com/r-index">Yahoo! Small Business.</a>