Toms Hash Explorer 1.2

Toms Hash Explorer is a fast multi-threaded cryptographic hash calculation suite with an innovative Explorer-like user ... free Windows utility allows you to easily calculate cryptographic hash values for single files or entire folders to verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
License Freeware
Price FREE
Released 2016-08-20
Downloads 148
Filesize 17.44 MB
Requirements Microsoft .NET Framework 4.5.2
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(12 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer cryptographic - Download Notice

Using Toms Hash Explorer Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer full download from publisher site or their selected mirrors.
Avoid: cryptographic oem software, old version, warez, serial, torrent, Toms Hash Explorer keygen, crack.
Consider: Toms Hash Explorer full version, cryptographic full download, premium download, licensed copy.

Toms Hash Explorer cryptographic - The Latest User Reviews

Most popular Encryption Tools downloads

Abacre File Encryptor

1.0 download

With Abacre File Encryptor you may encrypt any files or folders by using 39 advanced encryption algorithms (CAST, Blowfish, Twofish, Rijndael and others). Files maybe encrypted into either one single file ...

5 award

Active CHAOS

5.0 download

Active CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt ...

ViewPoint

5.01 download

Everybody has a right to privacy and business secrets. You have a little secret. It is saved as a graphics file (illustration, photo, scanned document, etc.). You do not want anyone ...

5 award

EaseFilter Auto File Encryption

5.6.1.1 download

... processes to access the encrypted files. Supported strong cryptographic algorithm Rijndael is a high security algorithm which was chosen by the National Institute of Standards and Technology (NIST) as the ...

Age of Empires III

1.2.1 download

... use without compromising on security. It employs contemporary cryptographic techniques to ensure data confidentiality and integrity, making ... features of Age is its use of modern cryptographic primitives. It leverages the X25519 elliptic curve for ...

Kaspersky CoinVaultDecryptor

1.0.1.0 download

... a ransom for its release. By leveraging advanced cryptographic techniques, Kaspersky has developed a solution that can reverse the encryption process, restoring access to valuable data without any financial loss. ...

CHAOS Messenger

4.0 download

CHAOS Messenger is the utility program that creates active Chaos files for Windows. Active Chaos files are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt ...

ABC CHAOS

2.75 download

ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, ...

CryptoForge

5.5.0 download

... Gost. It also includes powerful compression to strengthen cryptographic security even more. The command-line interface allows quick integration into automated processes and scripts, and lets you perform tasks in both ...

DriveCrypt

5.1.0 download

DriveCrypt securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to worry about security. Any organization, from a small company to ...