AcuteFinder 3.0

... a lot of disk space. Uses CRC32 and MD5 to find identical files, with an option to search in ZIP-files also. List of duplicate files can be sorted, printed, exported and acted upon. Fast and easy way to clean up your disks. Built-in file viewer for images and text. Free trial-key on request. ...

Author Hugmot ehf
License Free To Try
Price $14.00
Released 2009-02-01
Downloads 573
Filesize 3.50 MB
Requirements 64 MB RAM, 5 MB disk space
Installation Install and Uninstall
Keywords duplicate, duplicate files, find duplicate files, file, junk files, duplicate file remover, remove, removal, delete, deleting, files, hard disk, disk, cleanup, disk management, drive, recover space, acutefinder, network administration, dupfiles, identical
Users' rating
(30 rating)
AcuteFinderFile & Disk ManagementWindows 2000, Windows XP, Windows 2003, Windows Vista, Windows Vista x64, Windows Vista x6
AcuteFinder md5 hash - Download Notice

Using AcuteFinder Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of AcuteFinder on rapidshare.com, depositfiles.com, megaupload.com etc. All AcuteFinder download links are direct AcuteFinder full download from publisher site or their selected mirrors.
Avoid: md5 hash oem software, old version, warez, serial, torrent, AcuteFinder keygen, crack.
Consider: AcuteFinder full version, md5 hash full download, premium download, licensed copy.

AcuteFinder md5 hash - The Latest User Reviews

Most popular File & Disk Management downloads

File Checksum Tool

1.41 download

... Tool is advanced freeware utility to generate a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. A Hash (Checksum) is a sort of digital fingerprint, uniquely identifying each file. These are common hashes that are used to verify the integrity and ...

Lovely Tiny Console GS

1.8.0 download

... Bar. LTC GS is able to crypt and hash files. For crypting following algorithms are used - ... cipher LTCC, that can whistand statistical analysis. For hashing following algorithms are used - MD5, CRC and ...

Directory Lister

2.48 download

... it is also possible to obtain its CRC32, MD5, SHA-1, SHA-256, SHA-512 Whirlpool hash sum so you can verify the file has not been modified. Hash sums are also available for folders. Extensive number ...

File Joiner - 64bit Portable

2.4.1 download

... all files to first file -MD5 and CRC32 hash calculation for output file -loading files from folder and recursive loading from sub-folders -option to associate extension .001 in windows explorer, ...

File Checksum Utility

2.1.0.0 download

... to generate MD (Message Digest) and SHA (Secure Hash Algorithm) hashes from a single file or files in a ... or TEXT file. The main supported algorithms include MD5 (Message Digest number 5), SHA-1 (Secure Hash Algorithm ...

IgorWare Hasher (64bit)

1.7.3 download

IgorWare Hasher is a free and portable SHA-1, MD5 and CRC32 hash generator for files and text. It can be ...

Hash Tool

1.1 download

A freeware utility to calculate the hash of multiple files. This is a 128-bit number ... application helps you quickly and easily list the hashes of your files. FEATURES: MD5, SHA-1, ...

Free MD5 SHA1 Verifier

1.41 download

Free MD5 SHA1 Verifier is a freeware tool designed to ... and verify checksums (hash) of downloaded files. Supports MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512. Key Features: ... for any file. Verify file checksum. Supports most hashing algorithm: MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512. ...

Free File Utilities

1.1.2.1 download

... get file size; You also can get file MD5 hash, or get file block data MD5 hash, get file Sha1 hash, or get file block data Sha1 hash; You also can do file compare, or folder ...

File Checksum Calculator

1.2 download

A standalone utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard against malicious ... of authentication. Two of the most common cryptographic hash functions are the Secure Hash Algorithm (SHA) and ...