Hash Codes 1.62.780.7200

Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm. ...

Author Marek Sienczak
License Open Source
Price FREE
Released 2011-12-02
Downloads 206
Filesize 430 kB
Requirements
Installation Instal And Uninstall
Keywords hash data, encrypt data, data encryption, hash, encrypt, encryption
Users' rating
(15 rating)
Hash CodesEncryption ToolsWindows XP, Windows Vista, Windows 7
Hash Codes data used to - Download Notice

Using Hash Codes Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Hash Codes on rapidshare.com, depositfiles.com, megaupload.com etc. All Hash Codes download links are direct Hash Codes full download from publisher site or their selected mirrors.
Avoid: data used to oem software, old version, warez, serial, torrent, Hash Codes keygen, crack.
Consider: Hash Codes full version, data used to full download, premium download, licensed copy.

Hash Codes data used to - The Latest User Reviews

Most popular Encryption Tools downloads

Download Hash Verifier

6.0 download

... Clipboard' etc Hash verification is a standard mechanism used to verify that downloaded file is original and ... SHA256 hash verification * Automatically detects input hash data as MD5 or SHA256 * Automatically validates & ...

Cryptnos

1.3.3 download

... name with a master password and runs this data through a cryptographic hash algorithm to produce a ... not a browser plugin, so it can be used with other applications outside the Web. Cryptnos ...

Lavasoft File Shredder 2009

7.7.0.2 download

... in a paper shredder to protect yourself against data and identity theft. The same is true for data on your PC. Information you erase by formatting ... on your computer and special software can be used to recreate it. Make sure the sensitive online ...

Computer Security

1.5 download

... Computer Security does that for you encrypting sensitive data, hiding it in innocent carriers, allowing safe transfer ... Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of ...

ViewPoint

5.01 download

... programs do not allow use of the concealed data as easily and safely, as you can with ... are not distorted. Any program that can be used to view pictures will show the carrier's content ...

5 award

USBCrypt

25.6.3 download

... a robust encryption solution designed to safeguard sensitive data on USB drives and other removable storage devices. ... seeking a reliable method to protect their portable data from unauthorized access. At its core, USBCrypt ...

Digi-Shield (PC)

1.6 download

... removable digital media. This application will secure important data using Rijndael, Twofish and Blowfish encryption algorithms. Once ... is stolen or accessed by someone else, the data will not be visible to unauthorized users. Keep ...

KakaSoft Folder Protection

7.0 download

... Encryption technology to encrypt your folders and valuable data in them. You are allowed to directly run ... it to your computer. It enables you prevent data from being deleted or modified with a single-click. ...

Speedcrypt

1.0 download

It is software to encrypt your data that implements some of the most powerful and ... as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a ...

GoodbyeDPI

0.2.2 download

... designed to combat Deep Packet Inspection (DPI) techniques used by ISPs and other entities to throttle, censor, ... and using other sophisticated techniques to ensure that data flows smoothly and without interference. This makes it ...