Toms Hash Explorer 1.2

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
License Freeware
Price FREE
Released 2016-08-20
Downloads 140
Filesize 17.44 MB
Requirements Microsoft .NET Framework 4.5.2
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(9 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer algorithm - Download Notice

Using Toms Hash Explorer Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer full download from publisher site or their selected mirrors.
Avoid: algorithm oem software, old version, warez, serial, torrent, Toms Hash Explorer keygen, crack.
Consider: Toms Hash Explorer full version, algorithm full download, premium download, licensed copy.

Toms Hash Explorer algorithm - The Latest User Reviews

Most popular Encryption Tools downloads

File Privacy

0.2 download

... (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data ...

Any File Encryptor

3.4.29 download

... Advanced Encryption Standard (AES), a highly secure encryption algorithm used globally, including for top-secret government documents. This ensures a high level of security for your encrypted files. Support for Multiple ...

GiliSoft Private Disk

11.5.26 download

... Encryption: Files are encrypted with a powerful 256-bit algorithm, which is a standard for secure data encryption, rendering the encrypted files inaccessible without the correct password. 2. Password Protect Your ...

abylon SHAREDDRIVE

23.60.1 download

... The encryption and decryption with the e.g. AES algorithm is done for each file operation automatically in the background. The file-based structure allow the simultaneous access of several users and ...

abylon BASIC

23.60.1 download

The protection of your sensitive data is often disregarded. But the encrypting of diaries, pictures or other secret documents with the AES- or Blowfish-Algorithm is relatively simple. With the help of ...

Best Folder Encryptor

16.97 download

... files and folder with superfast, strong and faultless algorithms. You can choose from five encryption methods when ... a folder in a time with internationally mature algorithm. Each encrypted file in this folder can be ...

InfoLock

6.2 download

... files, as this is necessary for the superior-security algorithm. Key Features: --Ultra lightweight: no installation, no ... --Simple and straitforward to use. --Very secure unique algorithm. --Encrypted code consists of 1 line of text ...

Free Text Encrypt

1.00 download

... to protect your confidential data. The AES encryption algorithm secures the sensitive and unclassified information from illegal ... your message; - Secure AES 256 bit encryption algorithm; - Easily copy encrypted messages to the clipboard ...

Appnimi MD2 Decrypter

1.0 download

... Above all it is FREE. The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.[2] The algorithm is optimized for 8-bit computers. MD2 is specified

Advanced Encryption Package 2008 Professional

4.8.7 download

... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...