Toms Hash Explorer 1.2

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
License Freeware
Price FREE
Released 2016-08-20
Downloads 140
Filesize 17.44 MB
Requirements Microsoft .NET Framework 4.5.2
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(9 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer algorithm - Download Notice

Using Toms Hash Explorer Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer full download from publisher site or their selected mirrors.
Avoid: algorithm oem software, old version, warez, serial, torrent, Toms Hash Explorer keygen, crack.
Consider: Toms Hash Explorer full version, algorithm full download, premium download, licensed copy.

Toms Hash Explorer algorithm - The Latest User Reviews

Most popular Encryption Tools downloads

Video DRM Protection

10.30 download

... With 256-bit AES encryption and advanced video encoding algorithm, more secure and reliable! Anti Screen Recorder: Automatically identify various known and unknown screen recorder software and prevent it from running. ...

GiliSoft Private Disk

11.5.23 download

... Encryption: Files are encrypted with a powerful 256-bit algorithm, which is a standard for secure data encryption, rendering the encrypted files inaccessible without the correct password. 2. Password Protect Your ...

USBCrypt

10.9.5 download

... encryption. USBCrypt uses the industry standard AES encryption algorithm to protect your files, the strongest protection available. Unlike other encryption programs, USBCrypt is closely integrated with the Windows shell. ...

File Privacy

0.2 download

... (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...

Crypditor

1.21 download

... data with somebody else with a high-secure encryption algorithm (AES). No other software needed: application and documents are in one. No installation required! ...

Best Folder Encryptor

16.97 download

... files and folder with superfast, strong and faultless algorithms. You can choose from five encryption methods when ... a folder in a time with internationally mature algorithm. Each encrypted file in this folder can be ...

Encrypting Safe

1.1 download

... from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source ... Smart Phone Behind: Using Symmetric key Algorithm for Encrypting and Decrypting note Features: - ...

Appnimi SHA256 Decrypter

3.8.6 download

... Above all it is FREE. The Secure Hash Algorithm is one of a number of cryptographic hash ... for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit hash. Hash ...