Toms Hash Explorer 1.2 freeware

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
Released 2016-08-20
Filesize 17.44 MB
Downloads 329
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(16 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer - algorithms Freeware Download Notice

Toms Hash Explorer Free Download - we do not host any Toms Hash Explorer torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer download from publisher site or their selected mirrors.

Toms Hash Explorer freeware - The Latest User Reviews
Toms Hash Explorer freeware - The Latest Versions History
1.2 Aug 20, 2016 Minor Update File Integrity Verification/Batch Verification
1.1 Apr 29, 2016 New Release Themes/Skin Support, Drag and Drop, and File Entropy Computation using Shannon's Entropy Algorithm.

Most popular Encryption Tools freeware downloads

Speedcrypt

1.5 freeware download

Speedcrypt provides its users with protection against Dictionary Attacks, Guessing Attacks or Brute Force Attacks, and Rainbow Table Attacks. These types of attacks cannot be prevented ...

OpenVPN

2.6.13 I001 freeware download

... speed, thanks to its support for various encryption algorithms and compression techniques. This ensures that users can enjoy a seamless and fast internet experience while ...

S.S.E. File Encryptor for PC

15.0.6 freeware download

... application window. Files are encrypted using strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit ...

fHash

3.11.5.0 freeware download

... core, fHash supports a wide array of hashing algorithms, including MD5, SHA-1, SHA-256, and more, ensuring compatibility ... with powerful functionality. Its support for multiple hashing algorithms, efficient performance, and user-friendly interface make it a ...

Cryptnos

1.3.3 freeware download

... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, RIPEMD-160, Whirlpool (2003 ...

TrueCrypt

7.2 freeware download

... (steganography) and hidden operating system. * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. ...

Crypto Anywhere

1.1 freeware download

... Crypto Anywhere implements trusted, industry standard, strong encryption algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random number generator. ...

HTML Encrypter

2.0 Alpha freeware download

... in the open source language, Java. The following algorithms are used to encrypt and decrypt the HTML ... MARC 4 - Escape/Unescape Functions The algorithms are written in JavaScript. In addition to the ...

Paranoia Text Encryption for Mac

15.0.4 freeware download

... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit ...

S.S.E. File Encryptor for Mac

15.0.6 freeware download

... application window. Files are encrypted using strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit ...