Toms Hash Explorer 1.2 freeware

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
Released 2016-08-20
Filesize 17.44 MB
Downloads 325
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(12 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer - algorithm 2 Freeware Download Notice

Toms Hash Explorer Free Download - we do not host any Toms Hash Explorer torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer download from publisher site or their selected mirrors.

Toms Hash Explorer freeware - The Latest User Reviews
Toms Hash Explorer freeware - The Latest Versions History
1.2 Aug 20, 2016 Minor Update File Integrity Verification/Batch Verification
1.1 Apr 29, 2016 New Release Themes/Skin Support, Drag and Drop, and File Entropy Computation using Shannon's Entropy Algorithm.

Most popular Encryption Tools freeware downloads

Guardian Of Data

3.005 freeware download

... it's a breeze. With AES encryption (Rijndael Encryption Algorithm) you protect any type of document, so that it can only be read after entering the ...

USB Flash Security

5.0.0 freeware download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 freeware award

logIQKey

2.0 freeware download

... like any other file. It uses a non-reversible algorithm, this means that the password cannot be recovered, as opposed to office, pdf, zip and other ...

5 freeware award

DiskCryptor

1.1.846.118 freeware download

... disk partitions. o Choice to select an encryption algorithm (AES, Twofish, Serpent), including their combinations. * Full support for external storage devices. o Full ...

AxCrypt

2.1.1494 freeware download

... for Windows Vista or later using the AES algorithm with 256-bit or 128-bit keys. It combines strong symmetric encryption with compression and double-click editing/viewing. Encrypted ...

Toms Hash Explorer

1.2 freeware download

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, ... + Calculate Hash Values using industry standard hashing algorithms + Calculate File Entropy using Shannon's Entropy algorithm ...

Paranoia Text Encryption for Mac

15.0.4 freeware download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish ... text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen ...

BestCrypt Traveller

1.06 freeware download

... BestCrypt Traveller supports containers encrypted by any Encryption Algorithm and any Key Generator available in BestCrypt. ...

Cryptnos

1.3.3 freeware download

... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, ... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, ...

Teslacrypt Decryption Tool

1.0 freeware download

... 0.x - Encrypts files using an AES-256 CBC algorithm AlphaCrypt 0.x - Encrypts files using AES-256 and encrypts the key with EC TeslaCrypt 2.x - ...