|
||||||
|
||
|
Home > Sha software |
|
|
1. | CDCheck 3.1.11 (elpros.si) | ||
Besides that CDCheck supports creation and checking of MD5, CRC-32, SHA... hashes in SFV, MD5 and CRC file formats. This provides means to check backups for possible loss of information or verify file transfers where comparing is not possible (transfer over mail etc.). The program can be used with all local or removable media (CDs, DVDs, disk drives, floppy disks, ZIP drives, USB | |||
Updated: 2, 2006 | Rating: 1217 | Author: Mitja Perko | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
2. | RSP Checksum OCX 2.6.0 (rspsoftware.clic3.net) | ||
fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and SHA-256 , the code is optimized for new AMD and Intel processors running very fast in the win32 environment ActiveX OCX to compute very fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and | |||
Updated: 3, 2005 | Rating: 298 | Author: Ricardo Pereira | Size: 366 kb | Shareware Go to category: Development > Active X Similar programs | |||
3. | HIME: Huge Integer Math and Encryption 1.04 (users.skynet.be) | ||
ArcFour (RC4) secret key encryption and digital signatures using the SHA-1, SHA-256 or MD5 Secure Hash Algorithm in your programs. HIME also contains functions for huge prime number generation, cryptographically secure random number generation (a.o. Blum-Blum-Shub and RSA), Diffie-Hellman key exchange algorithm and huge integer number mathematical operations. These | |||
Updated: 9, 2005 | Rating: 949 | Author: E. Van Esch | Size: 747 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
4. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file encryption services, Crypt | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
5. | Art HTML Listing 3.27 (zzee.com) | ||
text and CSV formats. Supports HTML titles, icons, media types, MD5, SHA, ID3 tags, Image info and | |||
Updated: 2, 2006 | Rating: 0 | Author: Paul Slavic | Size: 2353 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
6. | NCrypt TX 1.8 (littlelite.net) | ||
to verify message integrity. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With NCrypt TX you can convert your text messages into a sequence of encrypted hexadecimal or Base64 characters. NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 | |||
Updated: 2, 2006 | Rating: 0 | Author: Alessio Saltarin | Size: 511 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | SecureWord 1.5 (secureword.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
8. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system, Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | NCrypt TX 1.6 (ncrypt.altervista.org) | ||
tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal characters. Automatically converts a weak password into a strong one. NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 419 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | SecureWord 1.5 (cezeo.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Sha software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|