It searches duplicate images, photos, mp3 files.
It can generate a block for each computer file that is examined.
Program that allows you to check archived data.
It can calculate and verify checksums (hash) of downloaded files.
Cryptographic hash functions have many information security applications.