Results For "hash"

   
Order by Related - New Release - Rate

 

Results in Title For hash

Color Hash

 Simple logic game. You do steps serially with the computer. For the least number of steps you should grasp more blocks. After you will choose color, the blocks of this color will adjoin your territory. The field has the sizes 54x45 of blocks, total 2430 blocks, therefore for a victory you should grasp more than 1215 blocks. ..

MD5 Hash

 Calculate the hashes of multiple files - MD5, CRC32, SHA-1, SHA-256, SHA-384, SHA-512. You can copy MD5 hashes to the clipboard or save to a text file from an easy to use interface. ..

Advanced Hash Calculator

 Calculate hash with this handy software. Just drag and drop files in this calculator and hash string for the files will be immideately displayed. Supported cryptographic hash calculation algorithms include CRC32, GOST hash, MD2, MD4,MD5, SHA-1, SHA2 ..

 

febooti fileTweak Hash & CRC 2.0

 Simple and easy to use file hash value calculator embedded into Windows properties pages and compatible with febooti fileTweak module integration. Supports CRC32, MD5, SHA-1 and other most common hash algorithms. ..

 

Results in Description For hash

 

HashCalc

 Fast calculator to compute hash, checksum, HMAC values for file, text and hex string. Supports MD2,MD4,MD5, SHA1,SHA2, RIPEMD160,PANAMA,TIGER, CRC32,ADLER32 algorithms and the hash used in eMule/eDonkey(eDonkey2000,ed2k). Good to check/compare files...

File Checksum Tool

 File Checksum Tool is a free utility that calculates MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. The software allows you to verify the Hash or create new checksum for your important data...

MD5 hasher

 Computes MD5 hash for any single file, can compare it with given. Integrates in Send To and shell on demand. Un-integrates on demand. Drag-and-drop supported. Automatically looks for corresponding md5 file with hash to compare, and vise-versa...

CommuniCrypt File Encryption Tools

 File encryption/decryption tools with strongest AES algorithms. Can generate the hash of the source file as password for symmetric encryption(64 digits password). Encryption strength AES Rijndael: 256 bit / Hash: SHA-256..

DiamondCS MD5

 This is our implementation of the famous MD5 algorithm, and presents an easy and highly secure way of verifying the integrity of files. Single-line text, multi-line text and file contents are all supported inputs. The resulting MD5 hash is displayed in a textbox for easy clipboard copying. Software is often accompanied by an MD5 'hash' (or 'checksum'). This serves as a unique identifier for the contents of the file - if the file contents change then so does the MD5 hash, making it easy to verify the integrity of files. A brief description of MD5: The algorithm takes as input a message of arbitrary length and produces as output a 128 bit (16 byte) "fingerprint" of the input (also known as a "message digest", "checksum" or "hash"). It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest. The MD5 algorithm was designed by Ron Rivest...

Ultra Crypto Component

 Easy and advanced encryption, decryption and hash ActiveX component for ASP or ASP.Net Support encryption and decryption of file, string, memory buffer Support calculation of hash on string, file or memory buffer Support digital signature..

Hyper Hasher 4.0.0 by Matt LaPlante- Software Download

  Hyper Hasher is a small utility that allows you to calculate hash/checksum values for any file on your system, or text string. It combines the cryptography libraries built into the Microsoft .NET framework with the expansive Crypto++ cryptography library and other hashing libraries from around the internet.Features:-Hash Functions: MD2, MD4, MD5, SHA-1, SHA-256, SHA-384, SHA-512, HAVAL, Tiger, Panama, RIPEMD-160, FCS-16, FCS-32, GHash-32-3, GHash-32-5, GOST, Size32-Hash, emule/edonkey-Checksums: CRC16, CRC16-CCITT, CRC32, Adler32-Windows Shell Integration (optional)-Configuration Saving -Automatically compare two files.-Dump results to file.-Pentium 4 optimization.-Processor priority control. ..

Encoder Wizard ActiveX

 Encoder Wizard is a collection of two ActiveX (ocx) controls, Encoder Wizard and Decoder Wizard. These two controls allow you to fully support the Base64, Quoted- Printable, UUEncode, yEnc, MD5,HMAC MD5, URL, SHA-1, and Binary 2 Hex encoding methods. You can Encode and Decode data quickly and intelligently. Base 64 is the Encoding Method usually used for Binary files in MIME messages. It is also used to encode data for special characters accross telnet connection to certain servers. Quoted-Printable is used to encode text for transmission accross certain mail servers. It is also commonly used in MIME messages. UUEncode is the data encoding mechanism used by Unix systems for encapsulating binary data so that it can transported safely accross network connections. yEnc is a recently created encoding method that is now used a lot in newsgroups since it is significantly more efficient for data storage than the UUEncode format. yEnc takes advantage of being able to use 8 bit encoding as opposed to the more restricted form of 7bit encoding used by UUEncode. MD5 is a message digest hash algorithm that is used for validation and verification of message integrity. It creates a highly unique 16 byte ( 128 bit ) digest from a set of data that is almost impossible to recreate without the same exact input data. HMAC MD5 is also supported. This allows for a "keyed" hash algorithm. The hash will only generate the same value when the data and key are the same. Great for integrity checks and secure hash generation. SHA-1 is another highly secure message digest algorithm used by the United States Government. It is now a publicly open algorithm which uses a 160 bit or 20 byte digest. The hash from any set of data less than 2^64 bytes in length provides a unique hash that is only creatable by the unique byte order...

File Encrypter

 Encrypts a given file using a password or a file used as a password. A hash is generated from the file or the password and then the file is encrypted with the generated hash...

HashTrie

 High efficient dynamic hash table with tree organization..

 

Results in Tags For hash

 

Advanced Hash Calculator

 Calculate hash with this handy software. Just drag and drop files in this calculator and hash string for the files will be immideately displayed. Supported cryptographic hash calculation algorithms include CRC32, GOST hash, MD2, MD4,MD5, SHA-1, SHA2..

DiamondCS MD5

 This is our implementation of the famous MD5 algorithm, and presents an easy and highly secure way of verifying the integrity of files. Single-line text, multi-line text and file contents are all supported inputs. The resulting MD5 hash is displayed in a textbox for easy clipboard copying. Software is often accompanied by an MD5 'hash' (or 'checksum'). This serves as a unique identifier for the contents of the file - if the file contents change then so does the MD5 hash, making it easy to verify the integrity of files. A brief description of MD5: The algorithm takes as input a message of arbitrary length and produces as output a 128 bit (16 byte) "fingerprint" of the input (also known as a "message digest", "checksum" or "hash"). It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest. The MD5 algorithm was designed by Ron Rivest...

MD5 Hash

 Calculate the hashes of multiple files - MD5, CRC32, SHA-1, SHA-256, SHA-384, SHA-512. You can copy MD5 hashes to the clipboard or save to a text file from an easy to use interface...

Iside

 Iside is a message digest, hash code computing tool. It can be used for file integrity checking. It also compares files and folders by computing their hash code (MD5,SHA1,CRC32,...)...

Ultra Crypto Component

 Easy and advanced encryption, decryption and hash ActiveX component for ASP or ASP.Net Support encryption and decryption of file, string, memory buffer Support calculation of hash on string, file or memory buffer Support digital signature..

MSCCrypto for Linux

 MSCCrypto includes collection of the best encryption and hashing algorithms: RSA, AES, Blowfish, Twofish, MD5, SHA1 and 32-bit CRC checksum. Includes PGP/OpenPGP compatible component..

MSCCrypto for Windows

 MSCCrypto includes collection of the best encryption and hashing algorithms: RSA, AES, Blowfish, Twofish, MD5, SHA1 and 32-bit CRC checksum. Includes PGP/OpenPGP compatible component..

SHA1 Password 1.0.292

 SHA-1 Password is a tool for security professionals, which allows recovering a password if you know its SHA-1 hash. The fast recovery engine can recover up to 32,000 passwords simultaneously...

PasswordZilla

 PasswordZilla is a powerful password and hash generator. It`s interface is simple, and easy to comprehend. It will be helpful for webmasters, system administrators and software developers...

HashTrie

 High efficient dynamic hash table with tree organization..

Related search : essage digestmd5 hash,hash sha,hash code,encryption andalgorithm likesupport encryptionmd5 shahash algorithmultra cryptocrypto component,ultra crypto componentsha sha256 sha384sha256 sha384 sha512memory buffer supporthash algorithm likeaes128 aes192
Order by Related - New Release - Rate

  hash password -   hash flv -   compare hash -   hash comparison -   hash plants -

 

 

 
Advertisement