|
||||||
|
||
|
Home > Sha software |
|
|
1. | CDCheck 3.1.11 (elpros.si) | ||
Besides that CDCheck supports creation and checking of MD5, CRC-32, SHA... hashes in SFV, MD5 and CRC file formats. This provides means to check backups for possible loss of information or verify file transfers where comparing is not possible (transfer over mail etc.). The program can be used with all local or removable media (CDs, DVDs, disk drives, floppy disks, ZIP drives, USB | |||
Updated: 2, 2006 | Rating: 1217 | Author: Mitja Perko | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
2. | RSP Checksum OCX 2.6.0 (rspsoftware.clic3.net) | ||
fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and SHA-256 , the code is optimized for new AMD and Intel processors running very fast in the win32 environment ActiveX OCX to compute very fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and | |||
Updated: 3, 2005 | Rating: 298 | Author: Ricardo Pereira | Size: 366 kb | Shareware Go to category: Development > Active X Similar programs | |||
3. | axsStrongBox 2.1 (morello.co.uk) | ||
axsStrongBox is a COM component which provides strong, secure data encryption (public and private key). It can be easily integrated into Visual Basic, Visual C++, Delphi and VBScript applications. StrongBox uses industry standard, public domain algorithms - choose between Rijndael (AES), Twofish | |||
Updated: 9, 2005 | Rating: 116 | Author: Tom Duncan | Size: 473 kb | Demo Go to category: Development > Active X Similar programs | |||
4. | cryptlib 3.0 (download.componentspot.com) | ||
are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various hashed message authentication code algorithms: · HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
5. | HIME: Huge Integer Math and Encryption 1.04 (users.skynet.be) | ||
ArcFour (RC4) secret key encryption and digital signatures using the SHA-1, SHA-256 or MD5 Secure Hash Algorithm in your programs. HIME also contains functions for huge prime number generation, cryptographically secure random number generation (a.o. Blum-Blum-Shub and RSA), Diffie-Hellman key exchange algorithm and huge integer number mathematical operations. These | |||
Updated: 9, 2005 | Rating: 949 | Author: E. Van Esch | Size: 747 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
6. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file encryption services, Crypt | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
7. | OpenSSL 0.9.7c (download.componentspot.com) | ||
included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital signature schemes to digitally sign documents. The Open SSL library uses some but not all of these algorithms. To compile for the Win32 platform, Perl or compiling under Cygwin is required. Some of the encryption routines/algorithms are covered by patents. Open SSL | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
8. | Art HTML Listing 3.27 (zzee.com) | ||
text and CSV formats. Supports HTML titles, icons, media types, MD5, SHA, ID3 tags, Image info and | |||
Updated: 2, 2006 | Rating: 0 | Author: Paul Slavic | Size: 2353 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
9. | Neo Napster 3.6 (neonapster.com) | ||
such as multi-host download swarming, SuperNode compatibility, SHA-1 hashing, download resuming, IRC integrated chat, firewall compatibility, and much more. Advanced features such as search filtering, bandwidth, and CPU limiting controls reside in an intuitive, easy-to-use interface. NeoNapster is free software, and does NOT display banner ads in the program. New features | |||
Updated: 9, 2005 | Rating: 86 | Author: Neo Napster | Size: 2365 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
10. | AxCrypt 1.6.2.3 (axcrypt.sourceforge.net) | ||
with a few mouse clicks. Cryptographic primitives are AES-128 and | |||
Updated: 2, 2006 | Rating: 337 | Author: Svante Seleborg | Size: 1034 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
11. | EDXOR 1.64 (members.ozemail.com.au) | ||
EDXOR is a versatile, convenient and optimal text editor and file processor that far surpasses the capabilities of other Notepad-like applications. It offers innovative clipboard handling, cryptographic options and logic text conversions, great for education, fun, or privacy. EDXOR is small, self-contained | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 35 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
12. | NCrypt TX 1.8 (littlelite.net) | ||
to verify message integrity. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With NCrypt TX you can convert your text messages into a sequence of encrypted hexadecimal or Base64 characters. NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 | |||
Updated: 2, 2006 | Rating: 0 | Author: Alessio Saltarin | Size: 511 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
13. | SecureWord 1.5 (secureword.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
14. | Signit 1.0 (softcomplete.com) | ||
self-checking signature (exe-file) for folder contents. Based on SHA-1. Allows receive list of modified and removed files. Create small (~40Kb) self-checking signature (exe-file) for folder contents. Based on SHA-1. Allows receive list of modified and removed | |||
Updated: 9, 2005 | Rating: 0 | Size: 127 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | Tray Safe 4.3 (traysafe.com) | ||
most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
16. | Winalysis 3.1 (winalysis.com) | ||
Monitor for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
17. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system, Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
of the encryption algorithms offered. The library uses the modern SHA-2 and HAVAL hashing algorithms so that passphrases can be converted to exactly the amount of bits required for an encryption key and with better mathematical properties than older hashing algorithms such as MD5. Like all Xceed | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
19. | NCrypt TX 1.6 (ncrypt.altervista.org) | ||
tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal characters. Automatically converts a weak password into a strong one. NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 419 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | SecureWord 1.5 (cezeo.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
21. | Tray Safe 4.3 (fgroupsoft.com) | ||
most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
22. | RageWork 2.4 (softrage.com) | ||
RAR, 7Z, ACE, ARJ, CAB, CPIO, RPM, Z! *Security files such as MD5, SHA, CRC32, CRC16, SFV! *Previews picture with Zooming. Support most popular formats and fast convert to format BMP, JPG, GIF, PNG, TGA! Requirements: To run RageWork You need the Java Runtime Environment (JRE), version 1.4.2 or newer. RageWork is a cross-platform file manager. It includes a Virtual Folders, FTP, FTPS | |||
Updated: 2, 2006 | Rating: 1068 | Author: The Rage | Size: 16739 kb | Shareware Similar programs | |||
23. | Aloaha PDF Suite 2.1.264 (aloaha.com) | ||
Your PDF Files are just one click away! Aloaha PDF Suite is the perfect tool to create your PDF Documents. One click is enough! Just print your document to any of your printers and Aloaha will convert the print job to a PDF Document, which you can save, digitally sign, email, fax or publish to an exchange Aloaha PDF Suite is the perfect tool to create/edit your PDF Documents. One click is enough! Just print your document to any of your printers and Aloaha will convert the print job to a PDF Document | |||
Updated: 3, 2006 | Rating: 435 | Author: Aloaha Software | Size: 8789 kb | Commercial Go to category: System Utilities > Printer Similar programs | |||
|
Home > Sha software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|