<< Lemme see if I understand this. Basically you run a file through the md5 algorithm, and out comes a string of letters, numbers, whatever. Anyone who recieves that file can then run it through the md5 algorithm on their end, and if the output == the output on the other end, the file is still in tact.
Cool. >>
Yeah, for all practical purposes, you can assume the file is intact. Of course there is always the small chance that there were mutations to the file that just happened to generate another file that has the same MD5 output, but chances of this are very, very low.