|
||||||
|
||
|
Home > Sha software |
|
|
1. | CDCheck 3.1.11 (elpros.si) | ||
Besides that CDCheck supports creation and checking of MD5, CRC-32, SHA... hashes in SFV, MD5 and CRC file formats. This provides means to check backups for possible loss of information or verify file transfers where comparing is not possible (transfer over mail etc.). The program can be used with all local or removable media (CDs, DVDs, disk drives, floppy disks, ZIP drives, USB | |||
Updated: 2, 2006 | Rating: 1217 | Author: Mitja Perko | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
2. | SecureWord 1.5 (secureword.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
3. | SecureWord 1.5 (cezeo.com) | ||
code. We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
4. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel, display settings, network, passwords, users, dos, games, internet, memory, printers, desktop, system, Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | HIME: Huge Integer Math and Encryption 1.04 (users.skynet.be) | ||
ArcFour (RC4) secret key encryption and digital signatures using the SHA-1, SHA-256 or MD5 Secure Hash Algorithm in your programs. HIME also contains functions for huge prime number generation, cryptographically secure random number generation (a.o. Blum-Blum-Shub and RSA), Diffie-Hellman key exchange algorithm and huge integer number mathematical operations. These | |||
Updated: 9, 2005 | Rating: 949 | Author: E. Van Esch | Size: 747 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
6. | Lucigenic Crypt 4.4 (lucigenic.com) | ||
algorithms. The component also implements the Secure Hash Algorithm (SHA-1) and the Base64 encoding algorithm. ECB, CBC, CFB and OFB cipher modes are implemented. One step methods are provided to compress and encrypt files and strings. Self decrypting archives can be created for files and strings in a single step. Aside from providing core string and file encryption services, Crypt | |||
Updated: 3, 2005 | Rating: 0 | Size: 1800 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Sha software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|