AUTHENTiC The Checksum Calculator 1.0.1 freeware

... files. The current version supports 15 different hashing algorithms. You can validate files with: MD5, SHA1, Adler-32, Blake2b, Blake2s, CRC32, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384 and SHA3-512. ...

Author WhiteLynx Development
Released 2019-09-27
Filesize 6.78 MB
Downloads 109
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows 2000, Windows 2003, Windows Server 2000, Windows Server 2003, Windows Server 2008, Windows Server 2008r2, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Editi
Installation Install and Uninstall
Keywords checksum, hash, hashing, file, hashes, authenticate, validate, authenticity
Users' rating
(23 rating)
AUTHENTiC The Checksum CalculatorEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows 2000, Windows 2003, Windows Server 2000, Windows Server 2003, Windows Server 2008, Windows Server 2008r2, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Editi
AUTHENTiC The Checksum Calculator - algorithms Freeware Download Notice

AUTHENTiC The Checksum Calculator Free Download - we do not host any AUTHENTiC The Checksum Calculator torrent files or links of AUTHENTiC The Checksum Calculator on rapidshare.com, depositfiles.com, megaupload.com etc. All AUTHENTiC The Checksum Calculator download links are direct AUTHENTiC The Checksum Calculator download from publisher site or their selected mirrors.

AUTHENTiC The Checksum Calculator freeware - The Latest User Reviews
AUTHENTiC The Checksum Calculator freeware - The Latest Versions History
1.0.1 Sep 27, 2019 New Release First Public Release

Most popular Encryption Tools freeware downloads

Speedcrypt

1.5 freeware download

Speedcrypt provides its users with protection against Dictionary Attacks, Guessing Attacks or Brute Force Attacks, and Rainbow Table Attacks. These types of attacks cannot be prevented ...

fHash

3.11.7.0 freeware download

... core, fHash supports a wide array of hashing algorithms, including MD5, SHA-1, SHA-256, and more, ensuring compatibility ... with powerful functionality. Its support for multiple hashing algorithms, efficient performance, and user-friendly interface make it a ...

File Encryption

2.1 freeware download

... user's private data by using a military grade algorithms for encrypting files. File Encryption is released under the GNU General Public License and it is ...

OpenVPN

2.6.13 I001 freeware download

... speed, thanks to its support for various encryption algorithms and compression techniques. This ensures that users can enjoy a seamless and fast internet experience while ...

Hard Drive Eraser

2.0 freeware download

... not be recovered. Hard Drive Eraser uses powerful algorithms with multiple passes to assure permanent data removal. Hard Drive Eraser does not contain adware, it ...

Cryptnos

1.3.3 freeware download

... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, RIPEMD-160, Whirlpool (2003 ...

S.S.E. File Encryptor for PC

15.0.6 freeware download

... application window. Files are encrypted using strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit ...

Paranoia File & Text Encryption

15.0.8 freeware download

... unwanted readers. Everything is encrypted using strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit. Fully compatible with ...

ABC CHAOS

2.75 freeware download

ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For ...

VeraCrypt

1.26.15 freeware download

... At its core, VeraCrypt offers advanced encryption algorithms, including AES, Serpent, and Twofish, either individually or ... data. The software enhances the security of the algorithms used for system and partition encryption, making it ...