Freeware Downloads for "Hash Algorithms Image Comparer"

FREE DiceLock Security JDigesterCheck GUI and JHashDigester .jar extension library. If in your process or software applications you have need for generating hash values for different type of information you can incorporate JHashDigester .jar extension library in your applications to generate the hash you need. Incorporate hash processors in your applications. JHashDiegester .jar extension library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms.

FREE DiceLock Security JDigesterCheck GUI and JHashDigester .jar extension library. If in your process or software applications you have need for generating hash values for different type of information you can incorporate JHashDigester .jar extension library in your applications to generate the hash you need. Incorporate hash processors in your applications. JHashDiegester .jar extension library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms.

FREE DiceLock Security iHashDigester C++ iOS 5 '.a' static library for iPhone, iPad and iPod. If in your process or software applications you have need for hash computation, you can incorporate iHashDigester static library in your applications to generate the hash you need. Incorporate hash algorithms in your applications. C++ '.a' static library contains classes implementing SHA 1, SHA 224, SHA 256, SHA 384, SHA 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms. iHashDigester 5.

  • Platform: iOS 4.x, Windows
  • Publisher: DiceLock Security
  • Date: 24-02-2012
  • Size: 185 KB

Hash and HMAC command line tool for many hash algorithms like sha1 sha224 sha256 sha384 sha512 md2 md4 md5 rmd128 rmd160 rmd256 rmd320 whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC support.

I Have The Power is a small, easy to use application specially designed to demonstrate the numerical enormity, in a human readable way, of large hash algorithms like MD5 (128 bits), SHA1 (160 bits), SHA256 (256 bits) and SHA512 (512 bits).

So, if you were looking for a tool to help you better understand hash algorithms, take I Have The Power for a spin and check out its capabilities for yourself.


.

  • Platform: WinOther
  • Publisher: Ted Smith
  • Date:

The MaaS360 Checksum Calculator is a free tool that gives administrators the ability to generate checksum values for individual files using popular hash algorithms. Supported algorithms include, but are not limited to, SHA-1 (Secure Hash Algorithm), CRC32 (Cyclic Redundancy Check), and MD5 (Message-Digest Algorithm 5). The Checksum Calculator tool can be used in conjunction with MaaS360's Software Distribution service to ensure that admin created packages are validated when being stored in MaaS360's cloud infrastructure.

General-purpose cryptographic application. Includes easy access (GUI frontend) to: public key algorithms, symmetric ciphers, hash algorithms, X.509 certificates, PKCS, smart cards (PKCS11) access and other utilities. Based on OpenSSL..

JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512..

This project provides a file synchronization tool, comparable to unison, with a fast and simple to use application interface written using the Fox toolkit. It can use hash algorithms as well as simple file existence checks for synchronizations..

S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI.It uses MD4 and MD5 hash algorithms..

  • sha
  • License: Freeware
  • Rating

sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too..

  • Platform: Linux, Unix
  • Publisher: saddi.com
  • Date: 14-05-2012
  • Size: 70 KB

The MaaS360 Checksum Calculator is a free tool that gives administrators the ability to generate checksum values for individual files using popular hash algorithms. Supported algorithms include, but are not limited to, SHA-1 (Secure Hash Algorithm), CRC32 (Cyclic Redundancy Check), and MD5 (Message-Digest Algorithm 5). The Checksum Calculator tool can be used in conjunction with MaaS360's Software Distribution service to ensure that admin created packages are validated when being stored in MaaS360's cloud infrastructure.

Hash Compare is the FREE File Hash comparison tool. It performs Hash based Integrity Comparison using any of the the popular hash algorthms such as MD5, SHA1 or SHA256. To make the task easier and quicker, it also supports the 'File Drag & Drop' feature. That means you can just drag & drop one or both files directly without wasting much time in selecting them. Hash based method is the standard way of verifying the integrity of files. Often it is used to check the Integrity of Download Files downloaded from the internet.

  • Platform: WinOther
  • Publisher: SecurityXploded
  • Date: 16-06-2012
  • Size: 2703 KB

Cubelox Hash is the new solution by Cubelox that gives you the capability to calculate the hash values of your files.

Hashvalue of a file is its signature. Specifically, a hash value is a signature of
the file's data that makes it unique.
There are many algorithms to calculate a hash value of a file

Features:

Cubelox Hash uses the most modern and secure hash algorithms:
MD5 (Message-Digest Algorithm 5)
SHA Algorithms (Designed by NSA):
1.

GPL hash functions with various ouput sizes..

Cryptnos will provide users with an application that will help you generate strong, pseudo-random passwords using cryptographic hashes. Cryptnos combines a unique &site token& such as a website domain name with a master password and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, seemingly random yet completely repeatable. Unlike similar products, however, it is exceedingly flexible. It is not a browser plugin, so it can be used with other applications outside the Web.

Jack the Ripper is an advanced hash generator/cracking tool. It supported 27 hash algorithms and two attack types: dictionary and bruteforce attack.
Jack the Ripper License - GNU General Public License (GPL).

FreeOTFE is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program.

Using this software, you can Create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored.

Features include:

- Source code freely available.
- Easy to use; full wizard included for creating new volumes.
- Data encrypted on your PC can be read/written on your PDA, and vice versa.
- Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems.

  • Platform: Windows
  • Publisher: Sarah Dean
  • Date:
  • Size: 1761 KB

HashCompare is the FREE file integrity comparison tool. It performs Hash based integrity comparison using any of the the popular hash algorthms such as MD5, SHA1 or SHA256. To make the task easier and quicker, it also supports the 'File Drag & Drop' feature. That means you can just drag & drop one or both files directly without wasting much time in selecting them. Hash based method is the standard way of verifying the integrity of files. Often it is used to check the integrity of files downloaded from the internet.

FreeOTFE is a free, open source software designed to provide you "on-the-fly" transparent disk encryption for PCs and PDAs.

Using this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.


Here are some key features of "Portable FreeOTFE":

* Source code freely available
* Easy to use; full wizard included for creating new volumes
* Data encrypted on your PC can be read/written on your PDA, and vice versa
* Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems
* Hash...

  • Platform: Windows
  • Publisher: Sarah Dean
  • Date:
  • Size: 2324 KB

Hash Algorithms Image Comparer: Freeware | All

New Reviews


Print Inspector

Whether you are using a printer connected to your local desktop computer or a print server sometimes you need to see whats going on in your printer by having a close look at the print jobs sent by the users. Print Inspector is such type software ...


Disk Genius

Disk Genius was formerly known as Partition Guru which is an all-in-one solution for disk partition management, data recovery and disk repairing. It can recover lost files from partition, backup and restore partition table, clone partition or clone ...


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


New Downloads

FTP Manager Lite

Free fast FTP client supports
secure transfers and multiple
connections. The file manager
like interface is intuitive to
...

Express Animate Animation
Free

Express Animate is free
animation software that gives
you the ability to animate
shapes, text and imported
images.

Easy Card Creator Free

The ideal choice for small to
medium sized organizations and
individuals looking for an
affordable photo ID card ...

PhotoStage Photo Slideshow
Software Free

PhotoStage Free Slideshow
Software lets you create a
slideshow from your digital
photos and videos on Windows
and apply ...

Vivaldi for MacOS

The Vivaldi browser lets you
be in control of how your
browser looks, feels and
works. It does not track you,
adapts to ...

Radmin VPN

Radmin VPN - is a free and
easy-to-use software product
to create virtual private
network (VPN). The program
allows users ...

Active@ ZDelete

Active@ ZDelete is a secure
delete utility. It helps you
to permanently delete files,
drives and folders. Active@
ZDelete ...

Billiards Pyramid

Moscow Billiards is a Piramyd
billiards simulator. The game
can be played either against a
computer or human opponents
...

Active Partition Manager

Active@ Partition Manager
helps you manage storage
devices and the logical drives
or partitions that they
contain. You ...

Free 1D Barcode Generator

The programe generates and
prints most popular linear and
postal barcode symbologies
including Codabar, Code11,
Code25 ...