(Source: Ghacks Technology News) Hashes are used for a variety of operations, for instance by security software to identify malicious files, for encryption, and also to identify files in general.