Arpoon Checksum 1.6

... compute checksums of files. A checksum (message digest, hash value) is a kind of fingerprint that permit to identify a file or document uniquely. This can be used to authenticate files or to follow changes on your documents. Computed checksums: MD5, CRC32, Adler, SHA1, MD4, MD2, RIPE 160, SHA256, ELF ...

Author Arpoon - Loïs Bégué
License Freeware
Price FREE
Released 2007-08-05
Downloads 429
Filesize 482 kB
Requirements
Installation No Install Support
Keywords MD5, CRC32, Adler, SHA1, MD4, MD2, RIPE 160, SHA256, ELF, Message-Digest, Checksum, compute, File, Fingerprint, Identification, Authentication
Users' rating
(10 rating)
Arpoon ChecksumFile & Disk ManagementWindows 2000, Windows XP, Windows 2003, Windows Vista, Windows Vista x64, Windows Vista x6
Arpoon Checksum hash data - Download Notice

Using Arpoon Checksum Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Arpoon Checksum on rapidshare.com, depositfiles.com, megaupload.com etc. All Arpoon Checksum download links are direct Arpoon Checksum full download from publisher site or their selected mirrors.
Avoid: hash data oem software, old version, warez, serial, torrent, Arpoon Checksum keygen, crack.
Consider: Arpoon Checksum full version, hash data full download, premium download, licensed copy.

Arpoon Checksum hash data - The Latest User Reviews

Most popular File & Disk Management downloads

HashOnClick

3.1.9.0 download

HashOnClick, developed by 2BrightSparks, is a streamlined and efficient ... context menu, allowing users to generate and verify hash values with just a couple of clicks. One of the standout features of HashOnClick is its support for a wide range of ...

File Checksum Tool

1.41 download

... a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. A Hash (Checksum) is a sort of digital fingerprint, uniquely identifying each file. These are common hashes that are used to verify the integrity and ...

Windows and Office Genuine ISO Verifier

11.20.45.24 download

... around its ability to cross-reference the ISO file's hash value with a comprehensive database of official Microsoft hash values. This database is meticulously maintained and regularly updated to include ... vulnerabilities. Additionally, it does not collect any personal data, ensuring user privacy is maintained. In conclusion, ...

Synalyze It! Pro

1.23 download

... or text (only in this Pro version) * Data view for common variable types (only in this ... * Printing * Histogram view * Checksum / hash value panel (only in this Pro version) * ...

DuMP3 for Linux GTK PPC

0.3.2 download

... fingerprint based on the image, audio or text data for each file and then comparing the fingerprints. ... Calculated fingerprints can be stored in a MySQL database so that they do not have to be ...

FastSum Standard Edition

1.6 download

Take control of your data with FastSum. Fingerprint your important files now and check the integrity after a network transfer or a CD burning simply by taking the fingerprints again ...

Ext2 Installable File System

1.11a download

... (Please read the FAQ section, too.) * Supports hash indexed (htree) directories (utilizes the so-called dir_index feature of Ext3). * Full plug-n-play functionality. When a drive is removed, the corresponding ...

Whirlpool File Checker 64-bit

0.1 download

This file integrity checker uses Alternate Data Streams to store the hashes of your files. So, it only works on ... files (to another NTFS volume) without losing the hashes, and without needing to do anything else. ...

File Checksum Calculator

1.2 download

A standalone utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard against malicious changes to protected data in a wide variety of software, Internet, and ...

ExplorerGenie

3.1.0 download

... work with alternative-data-streams, create symbolic-links and calculate file hashes. The path can be copied in different formats, e.g. to send it in an e-mail. The applications will be opened at ...