|
||||||
|
||
|
Home > Md5 software |
|
|
11. | Winalysis 3.1 (winalysis.com) | ||
Monitor for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
12. | Tray Safe 4.3 (fgroupsoft.com) | ||
secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe password | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
13. | Frigate3 3.33 (Frigate3.com) | ||
If you are still using the biggest programming mistake ever made - an ill-thought solution called Windows Explorer, you are wasting your time of your valuable. There are much better file manager alternatives that are easier to use and offer more options. Take Frigate 3, for example. This is a two-pane file | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Buzaev | Size: 9643 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
14. | AcuteFinder 1.3 (hugmot.is) | ||
uses by default CRC32, a 32-bit checksum, but you can choose to use MD5 hash (128-bit) as a final step in file comparison, for even more accuracy. Option to search in ZIP-files also. The list of duplicate files can be sorted, printed, exported and acted upon. Fast and easy way to clean up your disks! Includes tools to calculate checksum for any file, and find empty files or | |||
Updated: 2, 2006 | Rating: 149 | Author: Ingolfur Tryggvason | Size: 2504 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
15. | AccuSplit 3.7.1 (members.cox.net) | ||
incorporates an advanced cryptographic algorithm that computes an MD5 Message Digest for both the original and reconstructed files. An MD5 Message Digest match between these files indicates with absolute certainty that no data was lost during the file split and reconstruction process | |||
Updated: 2, 2006 | Rating: 604 | Author: Joseph Flynn | Size: 230 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
16. | Art HTML Listing 3.27 (zzee.com) | ||
information extraction, digital photo EXIF information extraction, MD5 and SHA1 hashes, file names, size, date/times and more. The software has 15 ready made templates, including: Javascript dropdown menu, Expanding / collapsing tree, Sortable listing table, Website map / tree, Framed Table of Contents, Download list with MD5 hashes and download times, PDA directory listing | |||
Updated: 2, 2006 | Rating: 0 | Author: Paul Slavic | Size: 2353 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
17. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it comes to data manipulation. Blob is our object that can read files, string | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
18. | PatchFactory 3.3 (patchfactory.com) | ||
a familiar wizard-style runtime interface, use of key files and MD5 checks to ensure accuracy, international language support, silent install / uninstall with no user interaction required, smart automatic version check to determine the installed version, support for passworded and encrypted installs, automatic Rollback at patch applying to guarantee that the end-user's system is | |||
Updated: 2, 2006 | Rating: 0 | Author: AgenSoft Inc. | Size: 3387 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
19. | Cryptocx v6 6.1.3 (easybyte.com) | ||
Cryptocx is an encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
20. | Turbo WinMD5 0.42 (paehl.de) | ||
WinMD5 uses MD5 technology to check each file and notifies you of any potentially bad, corrupt, incorrect size or missing files to save you hours of downloading only to find you have 1 file missing or the last file has a checksum error. The CRC value comparison is done by using a standard SFV/MD5 file. If a SFV file is not available, you can produce a new one with calculated | |||
Updated: 9, 2005 | Rating: 0 | Author: Dirk Paehl | Size: 68 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Md5 software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|