Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Advertising
Display: short descriptions | full descriptions
  • SHA-1 Password is a password recovery tool that can recover a password if you know its SHA-1 hash. SHA-1 Password features highly configurable and fast recovery engine that can process up to 32,000 hashes simultaneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are supported. The support for the distributed recovery technology allows you to utilize the power of multiple computers.
  • PasswordZilla is a powerful password and hash generator for any your projects. It's interface is simple, and easy to comprehend. PasswordZilla allows you to easily generate and store passwords, hash and data in a different formats. It will be helpful for webmasters, system administrators, software developers. PasswordZilla support next hash: MD5, MD4, MD2, CRC32, SAH128, SAH256, SAH384, SAH512, GostHash. Also, it has helpful Hash Calculator and advanced Template Editor. You'll love it, try now!
  • This is a programmable multiple-precision hex calculator with many utilities. With Hpmbcalc, you can easily perform a lot of big number math and encryption operations, such as: square root, modular inverse; hash, CRC, and check sum make; shift register configuration evaluation and simulationl; pseudo-random number generation; primality test; hex, dec, oct, bin conversions; etc.
  • Bearshare MP3 is a feature loaded, secure and smart P2P application designed to download your favorite music, movies, games and documents much easier than other of its kind. One of the things that make Bearshare MP3 a far-reaching software is its ability to swarm between networks. This is achieved by taking the starting hash and then rewriting it for every network you connected to thus enabling downloads from Gnutella, G2 and ED2K simultaneously, something that other multi-network P2P programs failed to do. You'll have no problem to figure out how to search, check our network status, and customize the interface using various skins. You'll find that search results come really fast. To prove its rich functionality Bearshare MP3 provides a handy built-in media player for common audio and video files. Quite conveniently, you don't need to use your browser with Bearshare MP3. The program searches the BitTorrent network similarly to the way it searches peers on the eDonkey and Gnutella networks. ...
  • MD5 Password is a password recovery tool that can recover a password if you know its MD5 hash. MD5 Password features highly configurable and fast recovery engine that can process up to 32,000 hashes simultaneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are supported. The support for the distributed recovery technology allows you to utilize the power of multiple computers.
  • The program for cryptographic protection of the information. Includes 13 algorithms of enciphering (Blowfish, Twofish, GOST, AES (Rijndael), RC2, RC4, RC5, CAST, etc.), 21 algorithm of the elecronic-digital signature (MD, SHA, GOST, Tiger, Haval, etc.) and 3 algorithms of compression (LZ-77, LZ-78, LZW). The highest level of reliability.The interface is optimized for fast and convenient daily use (for enciphering-decoding enough 2-3 clicks mouse)
  • Simple utility to create checksum files based on the MD5 hash routine. Recursively scans a selected folder and creates the checkfile data which can then be loaded in for testing to determine if the files have changed at all. Great for putting in the root folder of a CD-ROM to make sure the disc isn't defective when it is burned or mass produced.
  • CryptoTools is a multi-language suite of encryption components and libraries. CryptoTools provides DES and TripleDES encryption, as well as Base64 encoding and MD5 hashing capabilities. CryptoTools supports the following major languages C (win32), C++, ActiveX/COM, .Net and Java. Components for all languages are available in one single package.
  • With CommuniCrypt QuickHasher you can create a Hash value of a file or verify the authenticity of a file with an existing hash value. QuickHasher uses the modern SHA-2 Hash with 256 bit. The outdated MD5 is not supported. Requires VB6 runtime!
  • File encryption/decryption tools with strongest AES algorithm. Can generate the hash of the source file as password for symmetric encryption(64 digits password). Encryption strength AES Rijndael: 256 bit / Hash: SHA-256
  • This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has hashing capabilities to verify message integrity. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With NCrypt TX you can convert your text messages into a sequence of encrypted hexadecimal or Base64 characters.
  • Iside compares files and folders by computing their hash code (MD5,SHA1,CRC32,...). Right click on a file, select Copy and by right clicking on another file you will discover if the two files are equal. Includes file comparison, hash generating tool plus a complete folder comparison tool. The hash function is the fingerprint of file. It allows to determine if two files are different even if their size is the same. Ideal tool for configuration managers, programmers, deployers. Useful also to compare photos, music and movies downloaded from Internet: can compute the hash code of an entire CDROM. It can also be used for file integrity checking.
  • APP/Encrypt is a COM+/MTS component that allows application developers to strong encrypting and decrypting of text and files. Supports the latest industry-standard strong encryption and hashing algorithms including: Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160, etc.
  • ASP/Encrypt is a server side COM component that allows web developers to strong encrypting and decrypting of text and files. Supports the latest industry-standard strong encryption and hashing algorithms including: Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160, etc.
  • You need it! is a very useful comprehensive Business and Utility software suite which you can hard find elsewhere.It consists of 15 modules: AutoStart, AutoShut, MeasureMe, PadPlus, Find in Files, Files/Directories Compare, Add/Remove Line Numbers, Remove Blank Lines, C/C++ Source code Formatter, CRC32 File, CRC32 String, MD5 Digital Signature, MD5 Hash Generator, Registry Map, Skins. Why You need it? Whether you are a businessman or a student, and whether you are a common clerk or a housewife, You need it! is the 'comprehensive solution to most of your requirements' for almost your every need. Here are some key features and highlights about You need it. 10 Reasons Why You need it Is Right For You! 1. Best Value For Your Money 2. Beautiful skinnable interface 3. MeasureMe can save you much time and improve your productivity, one word: help you earn more $:-) 4. Find anything, anything 5. Compare anything, anything 6. Free Upgrade for 3 years? for 5 years? NO! 7. More precise result and ...
  • MSCCrypto is an Active Server component. It is a collection of the best encryption and hashing algorithms: RSA public key algorithm AES symmetric block algorithm Blowfish symmetric block algorithm Cast5 symmetric block algorithm TripleDES symmetric block algorithm Twofish symmetric block algorithm MD5 hash SHA1 hash Ripemd hash 32-bit CRC checksum algorithm 24-bit CRC checksum algorithm PGP - compatible module
  • Art HTML Listing creates filtered, sorted, fully customizable directory indexes, listings, menus and site maps in HTML, DHTML, XML, text and CSV formats. Supports HTML titles, icons, media types, MD5 and SHA1 hashes, file names, size, date/times and more. It has 15 ready made templates, including: Javascript dropdown menu, Expanding / collapsing tree, Sortable listing table, Website map / tree, Framed Table of Contents, Download list with MD5 hashes and download times, PDA directory listing, Recursive table folder listing, XML, CSV, text folder listing. Each template can be customized and you can create own templates. The program has full featured file filter, various sorting options and flexible recursion options. Command line mode for external automation.
  • Tray Safe is Net's manager to forgot password problems. In addition to a variety of encryption and hashing algorithms available, it features a unique hardware ID.It means, if someone hacks your PC or makes a copy of your hard-drive, they won't be able to access or crack the program because it works only with your PC and none other.In addition, Tray Safe is so convenient to use that you will be undoubtedly surprised by its work.FREE download!
  • A fast, highly optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums and HMACs for files, memory blocks, strings, blobs, streaming data. It is quick, flexible, easy to use. It supports 3 interfaces: QuickHash API (the API can be used as is, or it can be used to create wrappers for languages that can use DLL or LIB), C++ Interface (C++ wrapper classes to QuickHash API), and QuickHash Type Library (includes all declarations for accessing the functionality from programming languages that can reference a .TLB, such as VB 5.0, VB 6.0, VBA, etc). It allows static/dynamic linking. It has no external dependencies such as MFC DLLs, COM/DCOM or other component. The help file has C, C++ and Visual Basic examples showing how to add hash, checksum and HMAC calculations to Windows applications quickly and easily.
  • Free calculator to compute multiple hashes, checksums and HMACs for files, text and hex strings. It allows to calculate hash (message digest), checksum and HMAC values based on the most popular algorithms: MD2, MD4, MD5, SHA1, SHA2 (SHA256, SHA384, SHA512), RIPEMD160, PANAMA, TIGER, CRC32, ADLER32, and the hash used in eDonkey (eDonkey2000,ed2k) and eMule tools. It supports 3 input data formats: file, text string and hexadecimal string. It is a very fast, easy to use and to install application. It works with large size files, supports file drag-and-drop functionality. HashCalc generates hash, check sum, and HMAC for files of any type which makes it a valuable utility to test for corruption your FTP and other download/upload transfers. With this tool you can quickly compare music, audio, sound, video, film, game, image, icon, document and other files, verify CD and hard drive files, perform checking of your .mp3, .mpeg, .mpg, .avi, .vcd, .iso, .zip, .gif, .jpg, .doc and other downloads.
  • Free command line utility for file multi-checksum generation and verification. It allows to create/verify popular file hashes/checksums: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD-160, PANAMA, TIGER, CRC-32, ADLER32, and the message digest used in eMule/eDonkey (ed2k) software. Its most common use is checking files for corruption (data integrity checking). A hash/checksum calculation might be performed on data before transferring (downloading/uploading) it from one location to another. Making the same calculation after the transfer (download/upload) and comparing the former and latter results, you can check if the received data is corrupted or not. FSUM notifies about any bad, incorrect, missing file. It is a very fast, easy to use tool. Allows to recurse directories. Works with large size files. Supports .MD5 and .SFV file formats (automatically recognizes the format when verifying). Compatible with md5sum, MD5Summer, Easy MD5 Creator, SFV Checker/Verifier, WinSFV, Win CRC32.
  • Password Manager TraySafe allows you to forget security problems. In addition to a variety of encryption and hashing algorithms, it features a unique hardware ID. It means, if someone hacks your PC or makes a copy of your hard-drive, they won't be able to crack the program because it works only with your PC and no other. TraySafe is so convenient to use that you will be undoubtedly surprised by its work. Full-featured 21-days free trial download is available.
  • Utility for protecting the integrity and verifying the accuracy of data files using checksum (message digest, hash) calculation algorithms like CRC32, MD5, SHA-1 and more. Its will allow to easily and quickly verify integrity of files downloaded from Internet, transferred over a network and/or burned onto CD/DVD. Uses the XML-based and Unicode-enabled checksum file format and also supports the SFV, MD5SUM and other checksum files formats.
Advertising

Page 4 of 4
1 2 3 4


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware