File Checksum Calculator 1.2 freeware

A standalone utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard against malicious changes to protected data in a wide variety of software, Internet, and security applications, including digital signatures and other forms of authentication. ...

Author VOVSOFT
Released 2018-12-28
Filesize 2.22 MB
Downloads 126
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords md5, sha1, sha256, checksum, verify
Users' rating
(7 rating)
File Checksum CalculatorFile & Disk ManagementWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
File Checksum Calculator - cryptographic Freeware Download Notice

File Checksum Calculator Free Download - we do not host any File Checksum Calculator torrent files or links of File Checksum Calculator on rapidshare.com, depositfiles.com, megaupload.com etc. All File Checksum Calculator download links are direct File Checksum Calculator download from publisher site or their selected mirrors.

File Checksum Calculator freeware - The Latest User Reviews
File Checksum Calculator freeware - The Latest Versions History
1.2 Dec 28, 2018 Major Update Implemented multi-threaded calculation, faster now.
1.1 Sep 12, 2018 Major Update Drag and drop supported. Improved UI.
1.0 Aug 16, 2018 Major Update Fixed bugs.

Most popular File & Disk Management freeware downloads

HashTools

4.8.2 freeware download

... needs, from simple checksum comparisons to more complex cryptographic requirements. One of HashTools' standout features is its ability to handle multiple files simultaneously, significantly ...

File Checksum Calculator

1.2 freeware download

A standalone utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard against ... forms of authentication. Two of the most common cryptographic hash functions are the Secure Hash Algorithm (SHA) ...