ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: « Previous 1 2 3 Next » Displayed: 26 - 50 of 51
Sort by:  relevance | title | downloads | rating | date
Whirlpool File Checker
Whirlpool File Checker 0.5   
... checker uses Alternate Data Streams to store the hashes of your files. So, it only works on ... files (to another NTFS volume) without losing the hashes, and without needing to do anything else. The ...
Freeware

Directory Lister
Directory Lister 2.48   
Directory Lister allows you to create, save, print, send via e-mail or store to database listings of files from selected directories on hard disks, CD-ROMs, DVD-ROMs, floppys, USB storages and network ...
Shareware | $29.00

wodCrypt
wodCrypt 2.2.5   
... and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it ...
Shareware | $139.00

Hyperball
Hyperball 1.0.0.1   
... VirusTotal infrastructure, the application can analyze files, MD5 hashes and URLs. The PE information module analyzes the application’s file headers to extract key information about the file compiler and packer. ...
Freeware

ExpPrint
ExpPrint 6.6.6.0   
... can be listed: * Owner * Version * Hashes using CRC32, MD5, and SHA-1 algorithms. * Tags/metadata for: Audio, Music, Pictures, Videos, and Office documents. For example: Title, Author, Duration, ...
Shareware | $12.00

Folder List Print Software
Folder List Print Software 1.0.1   
... editor, including preview CRC32, MD5, SHA1, and SHA-256 hashes Writes results to a text file or the clipboard How To Easily Export Folder Lists and File Structure to File Folder ...
Demo | $3.00

Hash Generator

Hash Generator 8.0   
... automates the generation of 15+ different type of hashes or checksums. It support most of the popular hashes including MD5 family, SHA family, BASE64, CRC32, ROT13, ... drag files onto the tool for hash generation. Hashes or checksums are mainly used for file integrity ...
Freeware

FireFTP screenshot
FireFTP 2.0.32   
... supports directory comparisons and synchronization, time-stamp syncing, file hashes, and auto-reconnect. After 13 years and 25 ... accounts · Remote Editing · File Hashing: Generate hashes of files (MD5, various SHA's) · Drag & ...
Freeware

MultiHasher
MultiHasher 2.8.2   
... FEATURES: · Calculate one or more hashes for a single file at once · Supported hash algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512 · Hash calculation can be canceled ...
Freeware

DC++
DC++ 0.881   
... files per your organization scheme * Tiger Tree Hashes (TTH) used for file integrity * Search across all (or selected) connected hubs by file type, size, name or hash * ...
Open Source

Anti-Spam SMTP Proxy Server
Anti-Spam SMTP Proxy Server 2.6.5 21218   
... and signing V2 - DB support for all hashes / level based open plugin support V2 - transparent proxy support / BATV check and signing V2 - Plugins: archive, full ...
Open Source

WinHasher
WinHasher 1.6.2.67   
... OpenSSL includes several command-line components for generating cryptographic hashes and there are number of graphical user interface ... does not include any built-in utilities for cryptographic hashes, and installing and using OpenSSL on Windows is ...
Open Source

.FilePropsMan
.FilePropsMan 1.04   
... etc. And File Hash Information tab contains common hashes that are used to verify and authenticity of files: CRC-32, MD5 and SHA1 file hashes. ...
Freeware

Hash Console
Hash Console 1.5   
... quickly generate more than 15 different type of hashes. It can generate hash for any given file or simple text. Hashes or checksums are used for multiple purposes including ...
Freeware

SoftFuse Password Generator Free
SoftFuse Password Generator Free 2.5   
... program designed to generate random passwords and passwords' hashes in a second. Using this free password generator, you can easily create complex random passwords up to 128-character length. While generating ...
Freeware

HashDigest
HashDigest 2.0   
... GENERATION. For selected files users can create both hashes in a single pass. SAVE/EXPORT HASH VALUES (TRIAL and PRO+ only). After calculating the hash values users can save the results ...
Trialware | $30.00

ReadCheck
ReadCheck 2.4   
Read Check is a free multipurpose data analyzer. It scans whole files to determine if there are any read errors. In addition, Read Check can compare files content for finding any ...
Freeware

FS-Inspect
FS-Inspect 1.7   
... in the settings. To optimize the duplicate search, hashes are stored in a database. If a directory is inspected many a time, there is no need to compute the performance-expensive ...
Freeware

Intelligent Backup
Intelligent Backup 1.0.4   
... backup success or errors Backup verification using MD5 hashes Import existing backup projects Filter filetypes and much more... ...
Shareware | $25.00

DoublePics
DoublePics 3.07   
... that the research is not only based on hashes, but on the excellent DoublePics image pattern processor. ...
Freeware

Appnimi SHA384 Decrypter
Appnimi SHA384 Decrypter 1.0   
Appnimi SHA384 Decrypter helps in decrypting any SHA384 hash. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true SHA384 Decrypter available ...
Freeware

Ninite
Ninite   
... each publisher's official site verify digital signatures or hashes before running anything work best if you turn off any web filters or firewalls save you a lot of time! ...
Freeware

X-DCPlusPlus
X-DCPlusPlus 0.831 [rev12]   
... bookmark-like favorite hubs and users · Tiger Tree Hashes (TTH) used for file integrity · Search across all (or selected) connected hub by type, size, or name · Resume of ...
Open Source

FTPGetter Standard
FTPGetter Standard 5.97.0.215   
... backups are possible. The program can calculate MD5 hashes for files and compare their time stamps. This allows you to transfer only new or updated files. After transferring your files, ...
Shareware | $55.00

Tresorit
Tresorit 3.5.2475.1420   
... by HMAC message authentication codes applied on SHA-512 hashes. Encrypted files are uploaded to the cloud using TLS-protected channels. Everything can be ‘tresored’ Tresorit secures your files and ...
Freeware
Results Page: « Previous 1 2 3 Next » Displayed: 26 - 50 of 51
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags