|
||||||
|
||
|
Home > Md5 software |
|
|
21. | Turbo WinMD5 0.38 (free.pages.at) | ||
WinMD5 uses MD5 technology to check each file and notifies you of any potentially bad, corrupt, incorrect size or missing files to save you hours of downloading only to find you have 1 file missing or the last file has a checksum error. The CRC value comparison is done by using a standard SFV/MD5 file. If a SFV file is not available, you can produce a new one with calculated | |||
Updated: 9, 2005 | Rating: 0 | Author: Dirk Paehl | Size: 68 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
22. | NCrypt TX 1.6 (ncrypt.altervista.org) | ||
tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal characters. Automatically converts a weak password into a strong one. NCrypt TX is a text based cryptographic tool with hashing | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 419 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | Flystrike Spam Interrogator 1.6 (softwarepromoting.com) | ||
can trace the origin of messages; and ban them according to both MD5 Signature and URL pointers. The banning of these elements allows Flystrike to perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4950 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
24. | Flystrike Spam Interrogator 2.4.0.63 (downloads.flystrike.com) | ||
can trace the origin of messages; and ban them according to both MD5 Signature and URL pointers. The banning of these elements allows Flystrike to perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
25. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
better mathematical properties than older hashing algorithms such as MD5. Like all Xceed components, this library is designed to be flexible yet extremely easy to use. In fact, it only takes one line of code to encrypt or decrypt memory or files. A single line of code can even be used to chain | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
26. | Window Security Toolkit 5.0 (dmisoftware.com) | ||
system, Internet Explorer and more. Also Includes SHA1 160 bit and MD5 File Encryption plus Ultra Desktop Lock. An excellent program if you don't want others to be messing up with your system. Get over 51 Advanced Security Settings for Windows with this power tool ! Window Security Toolkit helps you make windows totally secured by Providing access restrictions on the control panel | |||
Updated: 9, 2005 | Rating: 0 | Author: Dr.Salman Zafar | Size: 1710 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
27. | WinHex 11.26 (winhex.com) | ||
undo mechanism * Drive imaging & drive cloning * 128-bit encryption, MD5, 256-bit digests, CRC32, checksums * Import of all clipboard formats * Conversion formats: Binary, Hex ASCII, Intel-Hex, and Motorola-S * Printing * Deleting files irreversibly (e.g. such with confidential contents) * Instant | |||
Updated: 9, 2005 | Rating: 2950 | Author: Stefan Fleischmann | Size: 727 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
28. | Iside 1.3 (littlelite.altervista.org) | ||
compares files and folders by computing their hash code (MD5,SHA1,CRC32,...). Right click on a file, select Copy and by right clicking on another file you will discover if the two files are equal. Includes file comparison, hash generating tool plus a complete folder comparison tool. The hash function is the fingerprint of file. It allows to determine if two files are different even | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 628 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
29. | FastSum 1.9 (fastsum.com) | ||
cryptographic algorithm, as a matter of fact FastSum is a Windows MD5 Checker. You do not have to be afraid of these unintelligible words, all you have to know is – how to run FastSum. You can rectify the errors occurring while data transfer. For example: Network transfers, CD-R and DVD burning | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Zinov | Size: 424 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
30. | Advanced CheckSum Verifier 1.5.0 (irnis.net) | ||
SFV and MD5 checksum utility for Windows 95/98/Me/NT/2000/XP/2003. The handy and fast utility for protecting the integrity of files by using the CRC32 or MD5 checksum calculation algorithms. It will allow you to verify the accuracy of your data after you burn a CD or transfer a files over a network. Adding an little checksum file to your data files will allow in | |||
Updated: 9, 2005 | Rating: 530 | Author: Irnis Haliullin | Size: 348 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Md5 software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|