JDigesterCheck - Linux installer
jar extension library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms. JHashDigester 5.0.0.1 is able to share data with JDiceChecker 5.0.0.1 random number test and ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- FoneLab Data Retriever
- Informachine File Manager
- Migrate Access Database to...
- Disk Media Recovery Software
- Pocket PC Device Forensic Tool
- HTMeLd
- ChequeSystem Cheque...
- Flash Card Recovery Software
- Aiseesoft FoneLab iPhone...
- SSuite Office Premium HD+
- AnyMP4 Blu-ray Creator
- FAT Volume Data Recovery
- Restore Deleted Mac Files
- UltraFileSearch Std Portable
- MSMassEmailSenderPro
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Sha 1 Download
-
26Freeware
-
27JDigesterCheck - Windows installer
jar extension library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms. JHashDigester 5.0.0.1 is able to share data with JDiceChecker 5.0.0.1 random number test and ...Freeware -
28Chilkat Crypt ActiveX 4.4
It has symmetric encryption like AES, Blowfish, Twofish, RC2, ARC4, DES, 3DES, PBES1, PBES2 and hash algorithms like SHA-1, SHA256, SHA384, SHA512, MD2, MD4, MD5, HAVAL, RIPEMD128, RIPEMD160, RIPEMD256 and RIPEMD320. This tool also has public key encryption ...$149.00 -
29eMastering 3.0
Data Integrity – SHA-1 (Secure Hash Algorithm) is a highly sophisticated method of verifying data integrity. The eMastering Reference Player uses SHA-1 to ensure that all folders are transferred bit-for bit identical. An SHA-1 signature is ...Freeware -
30JChecksum 1.0
JChecksum is a free and open-source program that calculates MD2, MD5 and SHA checksums. Checksums or hash sums are values used to check data correctness. Although it has different names and uses (from cryptography to parity bit), the main principle is ...Freeware -
31Shanghai Hongqiao Airport(SHA) 1.4
Flight Tracker Premium Shanghai Hongqiao Airport (SHA) is the main domestic airport in Shanghai and the fourth largest airport in China. It is the located 13 kilometers west of the city. Terminal 2 is next to the railway station. The airport is a hub ...$0.99 -
32eXpress CheckSum Verifier 1.0.1
The supported algorithms include CRC32 (Cyclic Redundancy Code), MD5 (Message Digest number 5) and SHA-1 (Secure Hash Algorithm). The supported checksum files formats include SFV (Simple File Verification), MD5SUM and BSD-style, or "alternative" ...Freeware -
33digestIT 2004 3.1
Features * Integrates itself into Windows Explorer * Simple right-click interface * Multiple file support * Quickly verify a MD5 or SHA-1 hash * Save to file or copy to clipboard * Native support for 64-bit Windows (x64 Editions) The only issue of ... -
34VSCryptoHash 1.3.3.379
VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2.Freeware -
35Cryptnos 1.3.1
FEATURES Generates strong, pseudo-random yet repeatable OCtpassphrasesOCL using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, RIPEMD-160, Whirlpool (2003 revision), and Tiger (1995 ...Freeware -
36VSCryptoHash 64-bit 1.3.3.379
VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2.Freeware -
37Password Recovery for Trillian
Instead, an SHA-1 hash of this password is saved on the local system. Please use the official Trillian website to recover your Trillian Pro registration.$19.00 -
38TurboFTP Server 1.30.850
It supports FIPS 140-2 approved Triple DES, 256-bit AES, SHA-1, SHA-256 for encryption and crypto key exchange, and HMAC SHA-1 for message authentication. If you go for FTP, it supports secure FTP over explicit or implicit SSL/TLS. Otherwise, it can ...$95.00
Buy -
39HxD 1.7.7.0
) o RAW reading and writing of disks and drives o for Win9x, WinNT and higher * Instant opening regardless of file-size o Up to 8EB; opening and editing is very fast * Liberal but safe file sharing with other programs * Flexible and fast searching/replacing for several data types o Data types: text (including Unicode), hex-values, integers and floats o Search direction: Forward, Backwards, All (starting from the beginning) * File compare (simple) * View data in Ansi, DOS, EBCDIC and Macintosh character sets * Checksum-Generator: Checksum, CRCs, Custom CRC, SHA-1, SHA-512, MD5, .Freeware -
40APP S.E.O. WebMaster Tools Pro 1.0
- MD5/SHA-1 Hashing : MD5/SHA-1 Online Generator generates the hash of the string you input. - Unix Time Converter : This online tool converts Unix timestamp to human readable date/time. - Open Graph Properties Generator : The Open Graph protocol enables ...$2.12 -
41gShield Password Manager 1.2.4
The result is hashed 5000 times by SHA-1. Repetitive hashing makes a brute force attack more difficult. • Supports auto destruction of the data file after a predefined number of unsuccessful unlocks have been tried. CLEAN and SIMPLE: gShield is made ...$3.00 -
42Dupehunter Professional 7.0.0.3215
It calculates with different algorithms like CRC32, MD5 and SHA-1. Also binary comparisons are supported.$55.00 -
43febooti fileTweak Hash & CRC
Supported hash / CRC formats: CRC32, MD2, MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, WHIRLPOOL-1 and Tiger-192.Freeware -
44SoftFuse Password Generator Pro 2.7
Do you want to generate and manage strong unique passwords in a convenient, professional way? SoftFuse Password Generator Pro is a right choice and powerful enough tool for you, then. This professional password generator designed to produce strong unique ...$39.95
Buy -
45FSUM 2.51
It allows to create/verify popular file hashes/checksums: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD-160, PANAMA, TIGER, CRC-32, ADLER32, and the message digest used in eMule/eDonkey (ed2k) software. Its most common use is checking files for corruption ...Freeware -
46RSP Checksum OCX 2.6.0
This ActiveX OCX can compute very fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and SHA-256 , the code is optimized for new AMD and Intel processors running very fast in the win32 environment$50.00 -
47Directory Lister Pro 2.02
For each file it is also possible to obtain its CRC32, MD5, SHA-1 and Whirlpool hash sum so you can verify the file has not been modified. Hash sums are also available for folders. Extensive number of options allows you to completely customize the ...$29.00
Buy -
48Duplicate Cleaner Pro 3.0.3
More Features: * Fully Unicode compatible *Multi threaded scanning and deletion * Scan logging to file *Load and Save results * Load and save scan profiles (Your favorite settings for different tasks) * System folders and files protection * Match by Content (Byte-by-Byte, MD5 Hash, SHA-1 Hash, SHA-256 Hash ...$44.99
Buy -
49Video Codecs 2.0
Please note that all March Networks media clips contain a secure hash (SHA-1) to detect tampering. Any editing of a media clip will invalidate the authentication and may render the file unsuitable for court purposes. Video clip authentication is included ... -
50Karen's Hasher 2.3
Karen’s Hasher is able to compute MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 hashing values of a string of text or of disk files or a group of files. It also gives you the option to save Hash result to a disk file which you can later ...Freeware