AUTHENTiC The Checksum Calculator 1.0.1 freeware

... files. The current version supports 15 different hashing algorithms. You can validate files with: MD5, SHA1, Adler-32, Blake2b, Blake2s, CRC32, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384 and SHA3-512. ...

Author WhiteLynx Development
Released 2019-09-27
Filesize 6.78 MB
Downloads 99
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows 2000, Windows 2003, Windows Server 2000, Windows Server 2003, Windows Server 2008, Windows Server 2008r2, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Editi
Installation Install and Uninstall
Keywords checksum, hash, hashing, file, hashes, authenticate, validate, authenticity
Users' rating
(22 rating)
AUTHENTiC The Checksum CalculatorEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows 2000, Windows 2003, Windows Server 2000, Windows Server 2003, Windows Server 2008, Windows Server 2008r2, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Editi
AUTHENTiC The Checksum Calculator - algorithm 2 Freeware Download Notice

AUTHENTiC The Checksum Calculator Free Download - we do not host any AUTHENTiC The Checksum Calculator torrent files or links of AUTHENTiC The Checksum Calculator on rapidshare.com, depositfiles.com, megaupload.com etc. All AUTHENTiC The Checksum Calculator download links are direct AUTHENTiC The Checksum Calculator download from publisher site or their selected mirrors.

AUTHENTiC The Checksum Calculator freeware - The Latest User Reviews
AUTHENTiC The Checksum Calculator freeware - The Latest Versions History
1.0.1 Sep 27, 2019 New Release First Public Release

Most popular Encryption Tools freeware downloads

Guardian Of Data

3.006 freeware download

... it's a breeze. With AES encryption (Rijndael Encryption Algorithm) you protect any type of document, so that it can only be read after entering the ...

SilentEye

0.4.1 freeware download

... interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. Two main plug-ins family exists: ...

Cryptnos

1.3.3 freeware download

... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, ... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, ...

Hash Codes

1.62.780.7200 freeware download

... SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. Features: Hash data from keyboard, file ... SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER and Whirlpool algorithm Copy hash codes to the clipboard or save ...

EaseFilter Auto File Encryption

5.1.8.1 freeware download

... to access the encrypted files. Supported strong cryptographic algorithm Rijndael is a high security algorithm which was chosen by the National Institute of ... encrypt or decrypt the data with AES encryption algorithm. Atuo file encryption protects data 'at rest', meaning ...

BestCrypt Traveller

1.06 freeware download

... BestCrypt Traveller supports containers encrypted by any Encryption Algorithm and any Key Generator available in BestCrypt. ...

Paranoia Text Encryption for Mac

15.0.4 freeware download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish ... text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen ...

USB Flash Security

5.0.0 freeware download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 freeware award

Encrypting Safe

1.1 freeware download

... from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source ... Smart Phone Behind: Using Symmetric key Algorithm for Encrypting and Decrypting note Features: - ...

SteadyCrypt

2.4 freeware download

... usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to widely used TrueCrypt, but users who wont like to ...