Toms Hash Explorer 1.2

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
License Freeware
Price FREE
Released 2016-08-20
Downloads 140
Filesize 17.44 MB
Requirements Microsoft .NET Framework 4.5.2
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(9 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer algorithm 2 - Download Notice

Using Toms Hash Explorer Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer full download from publisher site or their selected mirrors.
Avoid: algorithm 2 oem software, old version, warez, serial, torrent, Toms Hash Explorer keygen, crack.
Consider: Toms Hash Explorer full version, algorithm 2 full download, premium download, licensed copy.

Toms Hash Explorer algorithm 2 - The Latest User Reviews

Most popular Encryption Tools downloads

Video DRM Protection

10.30 download

... With 256-bit AES encryption and advanced video encoding algorithm, more secure and reliable! Anti Screen Recorder: Automatically identify various known and unknown screen recorder software and prevent it from running. ...

GiliSoft Private Disk

11.5.23 download

... Encryption: Files are encrypted with a powerful 256-bit algorithm, which is a standard for secure data encryption, rendering the encrypted files inaccessible without the correct password. 2. Password Protect Your ...

Appnimi SHA256 Decrypter

3.8.6 download

... Above all it is FREE. The Secure Hash Algorithm is one of a number of cryptographic hash ... for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit hash. Hash ...

Best Encryption Expert

12.03 download

... encrypted files in a time with internationally mature algorithms. Each encrypted file in this folder can be ... into an encrypted file with very strong encryption algorithm. Portable Encryption packs and encrypts a folder into ...

File Privacy

0.2 download

... (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...

XorIt

1.9 download

... from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of ...

5 award

Abacre File Encryptor

1.0 download

... files or folders by using 39 advanced encryption algorithms (CAST, Blowfish, Twofish, Rijndael and others). Files maybe encrypted into either one single file either individually. It's also possible to compress ...

5 award

abylon SHAREDDRIVE

23.60.1 download

... The encryption and decryption with the e.g. AES algorithm is done for each file operation automatically in the background. The file-based structure allow the simultaneous access of several users and ...