Toms Hash Explorer 1.2 freeware

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
Released 2016-08-20
Filesize 17.44 MB
Downloads 345
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(19 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer - algorithm Freeware Download Notice

Toms Hash Explorer Free Download - we do not host any Toms Hash Explorer torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer download from publisher site or their selected mirrors.

Toms Hash Explorer freeware - The Latest User Reviews
Toms Hash Explorer freeware - The Latest Versions History
1.2 Aug 20, 2016 Minor Update File Integrity Verification/Batch Verification
1.1 Apr 29, 2016 New Release Themes/Skin Support, Drag and Drop, and File Entropy Computation using Shannon's Entropy Algorithm.

Most popular Encryption Tools freeware downloads

SilentEye

0.4.1 freeware download

... interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. Two main plug-ins family exists: ...

DiskCryptor

1.1.846.118 freeware download

... disk partitions. o Choice to select an encryption algorithm (AES, Twofish, Serpent), including their combinations. * Full support for external storage devices. o Full ...

BestCrypt Traveller

1.06 freeware download

... BestCrypt Traveller supports containers encrypted by any Encryption Algorithm and any Key Generator available in BestCrypt. ...

Cryptnos

1.3.3 freeware download

... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, ... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, ...

Paranoia Text Encryption for PC

15.0.4 freeware download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish ... text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen ...

EaseFilter Auto File Encryption

5.1.8.1 freeware download

... to access the encrypted files. Supported strong cryptographic algorithm Rijndael is a high security algorithm which was chosen by the National Institute of ... encrypt or decrypt the data with AES encryption algorithm. Atuo file encryption protects data 'at rest', meaning ...

Paranoia Text Encryption for Mac

15.0.4 freeware download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish ... text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen ...

Confidential Free Edition

1.0 freeware download

... visible image. Confidential uses the AES-256 bits encryption algorithm as well as other security measures. Moreover, the presence of the hidden data is undetectable. Confidential ...

Idea crypting module for BestCrypt

7.20 freeware download

... newer. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.The IDEA driver is installed simply enough - you ...

logIQKey

2.0 freeware download

... like any other file. It uses a non-reversible algorithm, this means that the password cannot be recovered, as opposed to office, pdf, zip and other ...

5 freeware award