|
||||||
|
||
|
Home > Md5 software |
|
|
41. | Xceed Encryption Library 1.1 (xceedsoft.com) | ||
better mathematical properties than older hashing algorithms such as MD5. Like all Xceed components, this library is designed to be flexible yet extremely easy to use. In fact, it only takes one line of code to encrypt or decrypt memory or files. A single line of code can even be used to chain | |||
Updated: 9, 2005 | Rating: 0 | Author: Charles Duncan | Size: 24430 kb | Commercial Go to category: Development > Active X Similar programs | |||
42. | wodCrypt 1.2.7.0 (weonlydo.com) | ||
decryption, RSA DSA for making and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it comes to data manipulation. Blob is our object that can read files, string | |||
Updated: 2, 2006 | Rating: 82 | Author: Kresimir Petric | Size: 1189 kb | Shareware Go to category: Development > Other Similar programs | |||
43. | PatchFactory 3.3 (patchfactory.com) | ||
a familiar wizard-style runtime interface, use of key files and MD5 checks to ensure accuracy, international language support, silent install / uninstall with no user interaction required, smart automatic version check to determine the installed version, support for passworded and encrypted installs, automatic Rollback at patch applying to guarantee that the end-user's system is | |||
Updated: 2, 2006 | Rating: 0 | Author: AgenSoft Inc. | Size: 3387 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
44. | Flystrike Spam Interrogator 1.6 (softwarepromoting.com) | ||
can trace the origin of messages; and ban them according to both MD5 Signature and URL pointers. The banning of these elements allows Flystrike to perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4950 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
45. | Flystrike Spam Interrogator 2.4.0.63 (downloads.flystrike.com) | ||
can trace the origin of messages; and ban them according to both MD5 Signature and URL pointers. The banning of these elements allows Flystrike to perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
46. | NCrypt TX 1.6 (ncrypt.altervista.org) | ||
tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal characters. Automatically converts a weak password into a strong one. NCrypt TX is a text based cryptographic tool with hashing | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 419 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Tray Safe 4.3 (fgroupsoft.com) | ||
secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based mail, like Yahoo or Gmail), Windows OS, and passwords for third-party applications (tools and utilities that require passwords). Importantly, Tray Safe password | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
48. | Turbo WinMD5 0.38 (free.pages.at) | ||
WinMD5 uses MD5 technology to check each file and notifies you of any potentially bad, corrupt, incorrect size or missing files to save you hours of downloading only to find you have 1 file missing or the last file has a checksum error. The CRC value comparison is done by using a standard SFV/MD5 file. If a SFV file is not available, you can produce a new one with calculated | |||
Updated: 9, 2005 | Rating: 0 | Author: Dirk Paehl | Size: 68 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
49. | Iside 1.8 (littlelite.net) | ||
compares files and folders by computing their hash code (MD5,SHA1,CRC32,...). Right click on a file, select Copy and by right clicking on another file you will discover if the two files are equal. Includes file comparison, hash generating tool plus a complete folder comparison tool. The hash function is the fingerprint of file: it allows to determine if two files are different even | |||
Updated: 2, 2006 | Rating: 16 | Author: LittleLite Software | Size: 1044 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
50. | RageWork 2.4 (softrage.com) | ||
RAR, 7Z, ACE, ARJ, CAB, CPIO, RPM, Z! *Security files such as MD5, SHA, CRC32, CRC16, SFV! *Previews picture with Zooming. Support most popular formats and fast convert to format BMP, JPG, GIF, PNG, TGA! Requirements: To run RageWork You need the Java Runtime Environment (JRE), version 1.4.2 or newer. RageWork is a cross-platform file manager. It includes a Virtual Folders, FTP | |||
Updated: 2, 2006 | Rating: 1068 | Author: The Rage | Size: 16739 kb | Shareware Similar programs | |||
|
Home > Md5 software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|