Toms Hash Explorer 1.2 freeware

... to easily calculate cryptographic hash values for single files or entire folders to verify file integrity. Supports ... most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
Released 2016-08-20
Filesize 17.44 MB
Downloads 322
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(12 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer - drag and drop files Freeware Download Notice

Toms Hash Explorer Free Download - we do not host any Toms Hash Explorer torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer download from publisher site or their selected mirrors.

Toms Hash Explorer freeware - The Latest User Reviews
Toms Hash Explorer freeware - The Latest Versions History
1.2 Aug 20, 2016 Minor Update File Integrity Verification/Batch Verification
1.1 Apr 29, 2016 New Release Themes/Skin Support, Drag and Drop, and File Entropy Computation using Shannon's Entropy Algorithm.

Most popular Encryption Tools freeware downloads

fHash

3.11.0.0 freeware download

... to meet the needs of both casual users and IT professionals. This software stands out for its simplicity and efficiency, providing a straightforward interface that allows users ...

TrueCrypt

7.2 freeware download

... maintain an on-the-fly-encrypted volume (data storage device). Files can be copied to and from a mounted TrueCrypt volume just like they ... to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on-the-fly (in ...

VSCryptoHash

2.5.3.509 freeware download

VSCryptoHash is cryptographic hash calculation software. Simply drag and drop files (or type the text) in this calculator and hash string for the files (or for entered ...

SteadyCrypt

2.4 freeware download

... open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable ...

SteadyCrypt for Mac OS X

2.4 freeware download

... open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable ...

Download Hash Verifier

6.0 freeware download

... downloaded file. It makes file hash verification easier and quicker with its smart features such as 'Auto Hash Detection', 'Drag & Drop File', 'Instant copy from Clipboard' etc Hash verification ...

CrypPic

0.38 freeware download

CrypPic was developed as an accessible and easy-to-use piece of software that allows users to edit, manipulate and encrypt images. CrypPic is a software built ...

Toms Hash Explorer

1.2 freeware download

... to easily calculate cryptographic hash values for single files or entire folders to verify file integrity. Supports ... most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. Key Features ...

CryptArchiver

3.1.0.0 freeware download

The popular award-winning choice for password-protecting files, folders and drives on all versions of Windows, including Windows Vista! It's really easy to hide, encrypt and password protect data with CryptArchiver. All you do ...

Portable TrueCrypt

7.1a freeware download

... maintain an on-the-fly-encrypted volume (data storage device). Files can be copied to and from a mounted TrueCrypt volume just like they ... to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on-the-fly (in ...