DupTerminator 1.0.4

... delete, move, and rename duplicate file by comparing MD5 hash. The supported features are sort groups by column, select files in a specific folder, in a folder in the groups that have all folders from the selected group, by date, by name length, by specified name, rename files, moving files, delete to recycle bin, load or save the list of duplicates, and change program font, font and color of list duplicates. ...

Author Dmitry Borisov
License Open Source
Price FREE
Released 2013-07-16
Downloads 119
Filesize 256 kB
Requirements
Installation Instal And Uninstall
Keywords file, manage, delete, compare, search, MD5, hash
Users' rating
(1 rating)
DupTerminatorFile & Disk ManagementWindows 2000, Windows 2003, Windows XP, Windows Vista, Windows 7
DupTerminator compare md5 - Download Notice

Using DupTerminator Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of DupTerminator on rapidshare.com, depositfiles.com, megaupload.com etc. All DupTerminator download links are direct DupTerminator full download from publisher site or their selected mirrors.
Avoid: compare md5 oem software, old version, warez, serial, torrent, DupTerminator keygen, crack.
Consider: DupTerminator full version, compare md5 full download, premium download, licensed copy.

DupTerminator compare md5 - The Latest User Reviews

Most popular File & Disk Management downloads

MD5 File Hasher

1.3 download

With MD5 File Hasher any file can be checked for changes, damage or manipulation. The speedy calculation of MD5 check sums of files or directories is efficient ... & dropping them into the program. The calculated MD5 checksums are displayed immediately. In addition, scheduled tasks ...

CHK File Recovery

5.52 download

... checksums act as digital fingerprints, allowing users to compare and verify files with precision. The software supports a wide array of hash algorithms, including MD5, SHA-1, SHA-256, and more, catering to diverse security ...

DataNumen File Splitter

1.2 download

... files into one large file. 3. Support to compare two files byte by byte, to check whether ... to each other. 4. Support to calculate the MD5 check sum of a file. 5. Support all ...

PeaUtils

1.2 download

... (CRC32, CRC64), hash algorithms (MD5, SHA1, SHA256, SHA3-356), compare two files byte-to-byte, view hexadecimal preview of a file, split files / join spanned volumes, perform secure data deletion - either ...

FreeCommander

2009.02 download

... tool * Wipe files * Create and verify MD5 checksums * File splitting * File properties and context menu * Calculation of folder size * Folder comparison / synchronization * ...

FileBot for Mac OS X

5.1.3 download

... UTF-8 encoded srt Easily create and verify sfv, md5 and sha1 files Aware of checksums that are ... in the filename common in anime releases Directly compare two or more directory trees Auto-lookup of any ...

HashOnClick

3.1.9.0 download

... for a wide range of hash algorithms, including MD5, SHA-1, SHA-256, and CRC32. This versatility ensures that ... Another key feature is the ability to compare hash values directly within the software. Users can ...

FastSum Standard Edition

1.6 download

... is based on a well-known and time-proven cryptographic MD5 checksum algorithm that makes the calculations and verifications very fast. Process thousends of files and see how it works, this utility ...

Portable HashTools

4.8.2 download

... supports a comprehensive range of hashing algorithms, including MD5, SHA-1, SHA-256, SHA-384, and SHA-512, ensuring compatibility with ... requirements. This versatility allows users to generate and compare checksums with ease, providing a critical layer of ...

HashTools

4.8.2 download

... their hashes using a variety of algorithms, including MD5, SHA-1, SHA-256, SHA-384, SHA-512, and CRC32. This range of options ensures compatibility with a wide array of security and verification needs, ...