Freeware Downloads for "Hash Algorithms Image Comparer"
- JDigesterCheck - Windows installer
- License: Freeware

FREE DiceLock Security JDigesterCheck GUI and JHashDigester .jar extension library. If in your process or software applications you have need for generating hash values for different type of information you can incorporate JHashDigester .jar extension library in your applications to generate the hash you need. Incorporate hash processors in your applications. JHashDiegester .jar extension library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms.
- Platform: Java, Windows
- Publisher: DiceLock Security
- Date: 14-12-2011
- Size: 398 KB
- JDigesterCheck - Mac OS X installer
- License: Freeware

FREE DiceLock Security JDigesterCheck GUI and JHashDigester .jar extension library. If in your process or software applications you have need for generating hash values for different type of information you can incorporate JHashDigester .jar extension library in your applications to generate the hash you need. Incorporate hash processors in your applications. JHashDiegester .jar extension library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms.
- Platform: Java, Mac
- Publisher: DiceLock Security
- Date: 29-12-2011
- Size: 280 KB
- iHashDigester
- License: Freeware

FREE DiceLock Security iHashDigester C++ iOS 5 '.a' static library for iPhone, iPad and iPod. If in your process or software applications you have need for hash computation, you can incorporate iHashDigester static library in your applications to generate the hash you need. Incorporate hash algorithms in your applications. C++ '.a' static library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms. iHashDigester 5.
- Platform: iOS 4.x, Windows
- Publisher: DiceLock Security
- Date: 24-02-2012
- Size: 185 KB
- Generic Hash and HMAC Program
- License: Freeware

Hash and HMAC command line tool for many hash algorithms like sha1 sha224 sha256 sha384 sha512 md2 md4 md5 rmd128 rmd160 rmd256 rmd320 whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC support.
- Platform: Linux, Unix
- Publisher: fehashmac.sourceforge.net
- Date: 11-06-2012
- Size: 4822 KB
- I Have The Power
- License: Freeware

I Have The Power is a small, easy to use application specially designed to demonstrate the numerical enormity, in a human readable way, of large hash algorithms like MD5 (128 bits), SHA1 (160 bits), SHA256 (256 bits) and SHA512 (512 bits).
So, if you were looking for a tool to help you better understand hash algorithms, take I Have The Power for a spin and check out its capabilities for yourself.
.
- Platform: WinOther
- Publisher: Ted Smith
- Date:
- MaaS360® Checksum Calculator
- License: Freeware

The MaaS360 Checksum Calculator is a free tool that gives administrators the ability to generate checksum values for individual files using popular hash algorithms. Supported algorithms include, but are not limited to, SHA-1 (Secure Hash Algorithm), CRC32 (Cyclic Redundancy Check), and MD5 (Message-Digest Algorithm 5). The Checksum Calculator tool can be used in conjunction with MaaS360's Software Distribution service to ensure that admin created packages are validated when being stored in MaaS360's cloud infrastructure.
- Platform: Windows
- Publisher: Fiberlink Communications
- Date: 15-10-2011
- Size: 296 KB
- CryptoStudio
- License: Freeware

General-purpose cryptographic application. Includes easy access (GUI frontend) to: public key algorithms, symmetric ciphers, hash algorithms, X.509 certificates, PKCS, smart cards (PKCS11) access and other utilities. Based on OpenSSL..
- Platform: WinOther
- Publisher: cryptostudio.sourceforge.net
- Date: 14-09-2012
- Size: 2361 KB
- JChecksum
- License: Freeware

JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512..
- Platform: Linux, Mac, Windows
- Publisher: jchecksum.sourceforge.net
- Date: 05-07-2012
- Size: 19 KB
- Ruby File Synchronizer
- License: Freeware

This project provides a file synchronization tool, comparable to unison, with a fast and simple to use application interface written using the Fox toolkit. It can use hash algorithms as well as simple file existence checks for synchronizations..
- Platform: Linux, Mac, Windows
- Publisher: rubyfilesync.sourceforge.net
- Date: 07-11-2012
- Size: 49 KB
- S/Key (One-Time password) Generator
- License: Freeware

S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI.It uses MD4 and MD5 hash algorithms..
- Platform: Linux, Mac, Windows
- Publisher: otp-java.sourceforge.net
- Date: 17-11-2012
- Size: 738 KB
- sha
- License: Freeware

sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too..
- Platform: Linux, Unix
- Publisher: saddi.com
- Date: 14-05-2012
- Size: 70 KB
- MaaS360dlT« Checksum Calculator
- License: Freeware

The MaaS360 Checksum Calculator is a free tool that gives administrators the ability to generate checksum values for individual files using popular hash algorithms. Supported algorithms include, but are not limited to, SHA-1 (Secure Hash Algorithm), CRC32 (Cyclic Redundancy Check), and MD5 (Message-Digest Algorithm 5). The Checksum Calculator tool can be used in conjunction with MaaS360's Software Distribution service to ensure that admin created packages are validated when being stored in MaaS360's cloud infrastructure.
- Platform: Windows
- Publisher: links.maas360.com
- Date:
- Size: 296 KB
- Hash Compare
- License: Freeware

Hash Compare is the FREE File Hash comparison tool. It performs Hash based Integrity Comparison using any of the the popular hash algorthms such as MD5, SHA1 or SHA256. To make the task easier and quicker, it also supports the 'File Drag & Drop' feature. That means you can just drag & drop one or both files directly without wasting much time in selecting them. Hash based method is the standard way of verifying the integrity of files. Often it is used to check the Integrity of Download Files downloaded from the internet.
- Platform: WinOther
- Publisher: SecurityXploded
- Date: 16-06-2012
- Size: 2703 KB
- Cubelox Hash
- License: Freeware

Cubelox Hash is the new solution by Cubelox that gives you the capability to calculate the hash values of your files.
Hashvalue of a file is its signature. Specifically, a hash value is a signature of
the file's data that makes it unique.
There are many algorithms to calculate a hash value of a file
Features:
Cubelox Hash uses the most modern and secure hash algorithms:
MD5 (Message-Digest Algorithm 5)
SHA Algorithms (Designed by NSA):
1.
- Platform: Windows
- Publisher: Cubelox Software
- Date:
- Size: 2058 KB
- Rotation Hash Algorithms
- License: Freeware

GPL hash functions with various ouput sizes..
- Platform: Linux, Mac, Windows
- Publisher: rha.sourceforge.net
- Date: 22-10-2012
- Size: 83 KB
- Cryptnos
- License: Freeware

Cryptnos will provide users with an application that will help you generate strong, pseudo-random passwords using cryptographic hashes. Cryptnos combines a unique &site token& such as a website domain name with a master password and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, seemingly random yet completely repeatable. Unlike similar products, however, it is exceedingly flexible. It is not a browser plugin, so it can be used with other applications outside the Web.
- Platform: WinOther
- Publisher: Jeffrey T. Darlington
- Date: 08-10-2012
- Size: 799 KB
- Jack the Ripper
- License: Freeware

Jack the Ripper is an advanced hash generator/cracking tool. It supported 27 hash algorithms and two attack types: dictionary and bruteforce attack.
Jack the Ripper License - GNU General Public License (GPL).
- Platform: WinOther
- Publisher: Jacktheripper
- Date:
- FreeOTFE Portable Edition
- License: Freeware

FreeOTFE is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program.
Using this software, you can Create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored.
Features include:
- Source code freely available.
- Easy to use; full wizard included for creating new volumes.
- Data encrypted on your PC can be read/written on your PDA, and vice versa.
- Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems.
- Platform: Windows
- Publisher: Sarah Dean
- Date:
- Size: 1761 KB
- HashCompare
- License: Freeware

HashCompare is the FREE file integrity comparison tool. It performs Hash based integrity comparison using any of the the popular hash algorthms such as MD5, SHA1 or SHA256. To make the task easier and quicker, it also supports the 'File Drag & Drop' feature. That means you can just drag & drop one or both files directly without wasting much time in selecting them. Hash based method is the standard way of verifying the integrity of files. Often it is used to check the integrity of files downloaded from the internet.
- Platform: Windows
- Publisher: rootkitanalytics.com
- Date:
- Size: 1587 KB
- Portable FreeOTFE
- License: Freeware

FreeOTFE is a free, open source software designed to provide you "on-the-fly" transparent disk encryption for PCs and PDAs.
Using this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.
Here are some key features of "Portable FreeOTFE":
* Source code freely available
* Easy to use; full wizard included for creating new volumes
* Data encrypted on your PC can be read/written on your PDA, and vice versa
* Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems
* Hash...
- Platform: Windows
- Publisher: Sarah Dean
- Date:
- Size: 2324 KB
Hash Algorithms Image Comparer: Freeware | All











