Readers of Visual Studio Magazine named the .NET Encryption Library a winner in the Security and Copy Protection category. Encrypt sensitive information such as passwords, credit cards and social security numbers. Supports Rijndael (AES), DES, TripleDES, RC2, Blowfish, Twofish, Whirlpool, MD2, MD4, MD5, SHA1, SHA2, HAVAL, GOST, Ripend320, FCS16, FCS32, CRC32, Adler32, X509, UUencode, Base64, GZip, and Deflate.
Advanced File Calculator is a cryptographic data hash calculation software. Simply drag and drop files in this calculator and hash string for the files will be immideately displayed. Supported cryptographic hash calculation algorithms include CRC32, GOST hash, MD2, MD4, MD5, SHA-1, HA2 (256), SHA2 (384), SHA2 (512). You may copy the hash string for a single file or export the full list of hash strings in a text file.
Compute and save MD5, SHA1, SHA2, RIPEMD hashes and CRC16/32 checksums for multiple files! Calculate hashes and checksums for the whole file or just specified bytes. Insert hashes into files in text or binary form. Generate file list with hashes in specified format and save it to a file. Rename files and include hashes in file name.
What to do if you are running out of free space on your hard drive? Primitive Duplicate Finder offers you one of the simplest ways to solve his problem - find and delete file duplicates. Just specify the drive or the folder and Primitive Duplicate Finder will create the list of all file duplicates and copies. The program can search for duplicates by their names, sizes or contents (using the CRC32 checksum).
Rename multiple files according to the rules and pattern you specify using powerful editor with syntax highlighting. Modify original file name by removing or copying its parts, replacing text, changing letter case, or using Regular Expressions. Include dynamic elements in file names: file properties (dates, size); hashes (MD5, SHA1, SHA2, CRC); MP3 ID3 and JPG EXIF tags; random characters; current date and time; parent folder name; etc.
Replace, insert, delete, copy, move, reverse, and otherwise modify bytes and bits in multiple files. Search and replace supports wildcard bytes and match selection. Perform bitwise operations on specified bytes with bitmasks and operators like NOT, AND, OR, XOR. Reverse order of specified bytes and bits. Compute MD5, SHA1, SHA2, RIPEMD hashes and CRC checksums for whole files or specified bytes. Convert files to/from bin-hex and Base-64 formats.