hash information downloads

Japplis Toolbox

5.9 download

... hexadecimal and to date. It gives you text information such as character count, word count, line count, hash code, MD5 or SHA. You can get Java ...

INSERT

1.3.9b download

... PDFs (xpdf), so that people can access our information material on the CD :-) Add more tools for disaster recovery and network analysis. The full version of the Ultimate ...

STAR My Productivity Tools for Mac

MPT1978 download

... file helper, semi-transparent rulers, URL verification utility, MD5 hash calculator, address book... it provides the bare necessities ... are available instantly while you are working. More information about all apps including screenshots and free trial ...

Microsoft Safety Scanner x64

1.413.543.0 download

... report is sent to Microsoft that contains basic information about the Malware or about the error. The reports sent to Microsoft include technical information about MSS, Malware found, and your computer, such ...

eMule Plus

1.2e download

... multipacket encoding support [eklmn/Aw3] FEATURE: search by file, hash, country and client software in source lists on ... compilation {Vladimir (SV)} [Aw3] CHANGE: more detailed debug information about received bad packets [Aw3] CHANGE: increased max ...

Tixati Portable

3.32 download

... noteworthy feature is Tixati's support for DHT (Distributed Hash Table) and PEX (Peer Exchange), which enhances the ... allowing users to communicate with peers and share information directly within the client. In conclusion, Tixati ...

FileList

4.1.1 download

... spreadsheet or database. The list contains the following information: - file name - file size - file ... last access date - date of creation Additional information can be queried: - author of MS Office ...

Windows and Office Genuine ISO Verifier

11.20.45.24 download

... around its ability to cross-reference the ISO file's hash value with a comprehensive database of official Microsoft hash values. This database is meticulously maintained and regularly ... primary verification capabilities, the software also offers detailed information about the ISO file, including its version, edition, ...

PFrank

2.33 download

... eliminating whitespace sequences. inserting file properties, inserting tag information and meta-data from Music files (e.g. MP3, Ogg ... files is supported via a plugin, inserting tag information and meta-data from Video files (e.g. MPEG, AVI, ...

TinyUmbrella

9.3.4 download

... combines them with your ECID and generates a hash that ONLY APPLE can generate. iTunes packages up this valuable information and sends it to your device. Your device checks the information and verifies the signature (making sure it really ...

TinyUmbrella for Mac

9.3.4 download

... combines them with your ECID and generates a hash that ONLY APPLE can generate. iTunes packages up this valuable information and sends it to your device. Your device checks the information and verifies the signature (making sure it really ...

Snapshotter Pro

2.0.0 download

... many methods: Entered ID with each URL, MD5 Hash of the full URL, Server name of the ... on snapshots. · Automatically imports your directory links information. · Import all directory links or modified within ...

NMP Server

1.27.1 download

... of algorithms, including round-robin, least connections, and IP hash. These algorithms ensure efficient distribution of incoming traffic ... ensures that data is transmitted securely, safeguarding sensitive information from potential breaches. Nginx's open-source nature has ...

MarshallSoft Visual Basic AES Library

6.0 download

... such as banks to protect their customer's sensitive information. Some of the features of AES4VB are: - ... ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. - ...

MarshallSoft FoxPro AES Library

6.0 download

... such as banks to protect their customer's sensitive information. Some of the features of AES4FP are: - ... ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. - ...

MarshallSoft dBase AES Library

5.0 download

... such as banks to protect their customer's sensitive information. Some of the features of AES4DB are: - ... ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. - ...

MarshallSoft XBase++ AES Library

5.0 download

... such as banks to protect their customer's sensitive information. Some of the features of AES4XB are: - ... ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. - ...

MarshallSoft Delphi AES Library

6.0 download

... such as banks to protect their customer's sensitive information. Some of the features of AES4VB are: - ... ECB (Electronic Cookbook) mode. - Supports SHA-256 cryptographic hash algorithm. - Does random byte data generation. - ...

Shoretel Account Viewer

1.0 download

... to retrieve any communicator software.The full set of information that the current version returns to you based ... Date and Time Shoretel Communicator RAW MD5 Password Hash Allow SoftPhone Allow Video Calls Contact Center Integration ...

Common JDK 1.8+ Utility classes

3.1 download

... box EIO : Encapsulated I/O FNV1a64 : 64-bit hash function FontFactory : choose and cache optimal fonts ... AWT/application HybridJ : Hybrid SWING/application ImageInfo : get information about png, jpg, gif, webp image ImageViewer : ...

Koinonein Torrent Editor

1.0.0.3 download

... of a string identifier you are entering the hash of the the other torrent or torrents that ... Torrent Editor you just enter in the new information you would like to appear in the .torrent ...

VeryUtils PDF Digital Signature Tool

2.7 download

... and/or OCSP. * Setting certification level. * Setting hash algorithm. * PDF encryption and setting rights. * ... do much more. VeryUtils Digital signatures provide identifying information beyond your ink signature or your PDF Sign ...

iAntiSpy

1.7 download

... before a lookup occurs over the network. Your information is safe, iAntiSpy does not actually know which ... request itself is transformed using a one-way cryptographic hash function before processing. The only place the actual ...

Speedcrypt

1.0 download

... most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle ... preserving the privacy and security of the encrypted information. When Speedcrypt is running, sensitive data, namely the ...