AUTHENTiC The Checksum Calculator 1.0.1 freeware

... files. The current version supports 15 different hashing algorithms. You can validate files with: MD5, SHA1, Adler-32, Blake2b, Blake2s, CRC32, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384 and SHA3-512. ...

Author WhiteLynx Development
Released 2019-09-27
Filesize 6.78 MB
Downloads 113
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows 2000, Windows 2003, Windows Server 2000, Windows Server 2003, Windows Server 2008, Windows Server 2008r2, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Editi
Installation Install and Uninstall
Keywords checksum, hash, hashing, file, hashes, authenticate, validate, authenticity
Users' rating
(23 rating)
AUTHENTiC The Checksum CalculatorEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows 2000, Windows 2003, Windows Server 2000, Windows Server 2003, Windows Server 2008, Windows Server 2008r2, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Editi
AUTHENTiC The Checksum Calculator - algorithm Freeware Download Notice

AUTHENTiC The Checksum Calculator Free Download - we do not host any AUTHENTiC The Checksum Calculator torrent files or links of AUTHENTiC The Checksum Calculator on rapidshare.com, depositfiles.com, megaupload.com etc. All AUTHENTiC The Checksum Calculator download links are direct AUTHENTiC The Checksum Calculator download from publisher site or their selected mirrors.

AUTHENTiC The Checksum Calculator freeware - The Latest User Reviews
AUTHENTiC The Checksum Calculator freeware - The Latest Versions History
1.0.1 Sep 27, 2019 New Release First Public Release

Most popular Encryption Tools freeware downloads

Free Text Encrypt

1.00 freeware download

... to protect your confidential data. The AES encryption algorithm secures the sensitive and unclassified information from illegal ... your message; - Secure AES 256 bit encryption algorithm; - Easily copy encrypted messages to the clipboard ...

DiskCryptor

1.1.846.118 freeware download

... disk partitions. o Choice to select an encryption algorithm (AES, Twofish, Serpent), including their combinations. * Full support for external storage devices. o Full ...

USB Flash Security

5.0.0 freeware download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 freeware award

Encrypting Safe

1.1 freeware download

... from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source ... Smart Phone Behind: Using Symmetric key Algorithm for Encrypting and Decrypting note Features: - ...

AxCrypt

2.1.1494 freeware download

... for Windows Vista or later using the AES algorithm with 256-bit or 128-bit keys. It combines strong symmetric encryption with compression and double-click editing/viewing. Encrypted ...

SilentEye

0.4.1 freeware download

... interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. Two main plug-ins family exists: ...

Hash Codes

1.62.780.7200 freeware download

... SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. Features: Hash data from keyboard, file ... SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER and Whirlpool algorithm Copy hash codes to the clipboard or save ...

Hash Codes x64

1.62.780.7200 freeware download

... SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. Features: Hash data from keyboard, file ... SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER and Whirlpool algorithm Copy hash codes to the clipboard or save ...

Paranoia Text Encryption for Mac

15.0.4 freeware download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish ... text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen ...

logIQKey

2.0 freeware download

... like any other file. It uses a non-reversible algorithm, this means that the password cannot be recovered, as opposed to office, pdf, zip and other ...

5 freeware award