Software Listing: Haval

KRyLack File Checksum Tool is advanced freeware utility to generate a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. A Hash (Checksum) is a sort of digital fingerprint, uniquely identifying each file. These are common hashes that are used to verify the integrity and authenticity of files. The software allows you to verify the Hash to ensure the file integrity is correct with the matching file or create new checksum for your important data. Many download sites list the MD5 hash along with the download link. Application is portable and does not require any installation..

  • Platform: Win2000, Win7 x32, Win7 x64, Windows 8, Windows Server, WinOther, WinVista, WinVista x64
  • SALVADOR
  • License: Shareware
  • Price: 24.95
  • Rating

SALVADOR - the program for cryptographic protection of the information. Includes 13 algorithms of enciphering (Blowfish, Twofish, GOST, AES (Rijndeal), RC2, RC4, RC5, CAST, etc.), 21 algorithm of formation of the electronic-digital signature (MD, SHA, GOST, Tiger, Haval, etc.) and 3 algorithms of compression (LZ-77, LZ-78, LZW). The highest level of reliability. Tens years of job of all computers of a planet will be necessary for decoding the information for hackers! The opportunity to choose algorithm suitable for on a parity speed-reliability (all characteristics of algorithms are presented in the program) is given to the User.

  • Publisher: EA Security
  • Date: 31-05-2006
  • Size: 1460 KB
  • Platform: Win2000, Windows Server, WinOther

Fsum Frontend is a free and easy-to-use tool that allows to compute message digests, checksums and HMACs for files and text strings. It supports drag-and-drop and you can handle multiple files at once. The checksum generated can be used to verify the integrity of the files. It supports 96 algorithms: alder8, adler16, adler32, ap hash, bdkr, cksum, cksum mpeg2, crc8, crc16, crc16 ccitt, crc16 ibm, crc16 x25, crc16 xmodem, crc16 zmodem, crc24, crc32, crc32 bzip2, crc32 jamcrc, crc32 mpeg2, crc64, crc64 ecma, djb hash, dha256, edonley/emule, elf32, fletcher8, fletcher16, fletcher32, fnv0-32, fnv0-64, fnv1-32, fnv1-64, fnv1a-32, fnv1a-64, fork256, ghash3, ghash5, gost, has160, haval (128, 160, 192, 224, 256 bits) (3, 4, 5 passes), jhash, js hash, md2, md4, md5, panama, pjw32, ripemd128, ripemd160, ripemd256, ripemd320, rs hash, sdbm,...

  • Platform: Win2000, WinOther
  • 96Crypt
  • License: Shareware
  • Price: $27.00
  • Rating

EnCrypt/DeCrypt files & FOLDERS from several Sources-Disks-Folders at same time 96Crypt features several worldwide trusted EnCryption algorithms such as: 3DES, Blowfish, MARS, RijnDael-AES, SERPENT, Twofish.A selection of the STRONGEST available HASHers is used to process your password: HAVAL, MD5, RMD, SHA-1, SHA256, SHA384, SHA512, TIGER.The password used for EnCryption/DeCryption is calculated based on a text that you type or a file that you select. After several rounds of HASHing / SALTing the entered or selected password, the result key will be used for EnCryption/DeCryption.A New Mouse-Right-click plug-in provides fast and simple access to all the 96Crypt's functions like EnCryption, DeCryption, CRC & HASH checking.

  • Platform: WinOther

Alligator Data Guard is a tool for protecting your confidential information, using AES algorithm with 256-bit key and Haval 256-bit Hash Message Authentication Code (HMAC) to simultaneously verify the data integrity and the authenticity for better security. You can encrypt all your data (file, folder, disk). It is also possible to combine folders and disks into one crypto-file. The encryption process is faster than other encryption software, because it has been written in assembler language and is optimized for better performance. The application supports unique Hardware ID, so now you can keep your data safe, accessible only on your computer, you can also integrate Alligator Data Guard with your favorite application to protect the data.

  • Platform: WinOther
  • DPASHA
  • License: Freeware
  • Price: 0.00
  • Rating

DPASHA created a single HASH. MD2, MD4, MD5 120bits, RIPEMD128 128bits, RIPEMD160 160bits, CRC32 32bits,CRC16 16bits, ARC-CRC 16bits, SHA1 160bits, SHA-256 256 bits, SHA-384 384 bits, SHA-512 512 bits, HAVAL128 128bits, HAVAL160 160bits, HAVAL192 192bits, HAVAL224 224bits, HAVAL256 256bits, Tiger128 128bits, Tiger160 160bits, Tiger192 192bits, GOST R 34.11-94, Sapphire, Panama, Whirlpool, Whirlpool 1, Square, Snefru 128 Bit, Snefru 256 Bit, RIPE MD 256 bit, RIPE MD 320 bit. Freeware version.You can test files for manipulations. Easy to use, supports Drag & Drop. All hashes are standard with all other hash programs and hashes.

  • Publisher: Paehl
  • Date: 14-08-2012
  • Size: 59 KB
  • Platform: WinOther

Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others..

  • Platform: Linux, Mac OS X, WinOther

CalcChecksum is a tool for calculating MD5, MD4, CRC32, SHA1 (SHA160), SHA256, RIPE-MD-160, TIGER, HAVAL (128, 160, 192, 224, 256 with 3, 4 or 5 passes) on files, text-strings or hash-lists generated by md5sum or sha1sum..

  • Platform: Linux, Unix
  • GtkHash
  • License: Freeware
  • Price: 0.00
  • Rating

A GTK+ utility for computing message digests or checksums. Currently supported hash functions include MD5, MD6, SHA1, SHA256, SHA512, RIPEMD, HAVAL, TIGER and WHIRLPOOL..

  • Platform: Linux, Unix
  • JSummer
  • License: Freeware
  • Price: 0.00
  • Rating

JSummer is a tool to compute and check MD5, MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160, WHIRLPOOL, TIGER, HAVAL message digest consisting of a Console-Version and GUI. Implemented in Java..

  • Platform: Linux, WinOther

The KRyLack File Checksum Tool was developed to be a small application that can generate a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. A Hash (Checksum) is a sort of digital fingerprint, uniquely identifying each file.

These are common hashes that are used to verify the integrity and authenticity of files. The software allows you to verify the Hash to ensure the file integrity is correct with the matching file or create new checksum for your important data.


.

  • Platform: WinOther

JSummer is a platformindependent, open source tool to compute and check MD5, MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160, WHIRLPOOL, TIGER, HAVAL message digest. The Program consists of a Console-Version (CLI) and a nice GUI using SWT. Implemented in Java. This native version is running without a JRE! License: GPL (see http://www.gnu.org/copyleft/gpl.html).

  • Platform: Java, Linux, Linux GPL, Linux Open Source, Win2000, Windows Server, WinOther

JSummer is a platformindependent, open source tool to compute and check MD5, MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160, WHIRLPOOL, TIGER, HAVAL message digest. The Program consists of a Console-Version (CLI) and a nice GUI using SWT. Implemented in Java. License: GPL (see http://www.gnu.org/copyleft/gpl.html).

  • Platform: Java, Linux, Linux Open Source, Win2000, WinOther, WinServer

Program to calculate and verify checksums of files downloaded from the internet. Supports major checksum types: CRC32, MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, HAVAL 256, TIGER 192. Portable version - no installer, just one file. Has simple, intuitive interface with fireworks. File Checksum Verifier (FCV) supports drag and drop function and can create checksum verification file (program.exe.md5, movie.avi.sha512) and is highly customizable: can save window position, support keyboard shortcuts and makes use of Windows clipboard - copy/paste checksum from/to clipboard and can also auto-paste checksum and automatically compare them, might stay on top on other windows, can be rolled-up to mini bar, show checksum in upper or lowercase and optionally can be integrated with Windows Explorer context menu.

  • Platform: WinOther, WinVista

The Hyper Hasher Suite will fulfill all your file hashing needs. The Hyper Hasher program allows you to calculate 26 different hash/checksum and HMAC values for any file on your system, while the HashFile utility adds support for MD5 & SFV file creation and verification. These tools feature advanced options including a unique customizable interface, configuration saving, optional windows shell integration, Pentium 4 optimizations for speed, and much more! Hyper Hasher Features Include: ::Hash Functions: MD2, MD4, MD5, SHA-1, SHA-256, SHA-384, SHA-512, HAVAL, Tiger, Panama, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, Whirlpool, FCS-16, FCS-32, GHash-32-3, GHash-32-5, GOST, Size32-Hash, eMule-eDonkey ::Checksums: CRC16, CRC16-CCITT, CRC32, Adler32 ::HMAC: SHA1, SHA256, SHA384, SHA512, MD4, MD5, Tiger, HAVAL,...

  • Platform: Win2000, Windows Server, WinOther

Xceed Encryption Library is an ActiveX component that allows Windows applications to encrypt and decrypt data using the latest industry standard strong encryption algorithms. It supports traditional secret-key encryption as well as public-key encryption, and can encrypt/decrypt memory buffers, strings, blobs, streaming data or files.For traditional strong encryption, the library supports the newly adopted AES (US Advanced Encryption Standard) secret-key encryption algorithm (Rijndael), which uses 128, 192 or 256-bit keys. It also supports the Twofish encryption algorithm, a runner-up for AES. For public-key encryption, it offers the RSA algorithm unlimited key bit-sizes.

  • Platform: Win2000, WinOther

ASP/Encrypt is a server side COM component that allows web developers to strong encrypting and decrypting of text and files. Supports the latest industry-standard strong encryption and hashing algorithms including: Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160, etc..

  • Platform: Win2000, Windows Server, WinOther

APP/Encrypt is a COM+/MTS component that allows application developers to strong encrypting and decrypting of text and files. Supports the latest industry-standard strong encryption and hashing algorithms including: Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160, etc..

  • Platform: Win2000, Windows Server, WinOther

This is an ASP component for use with the IIS Server. It allows you to hash, cipher and make checksum on strings and on files. It supports 22 types of hash, 5 checksums and 37 different ciphers. With this component you can make strong security pages, sign page or messages, made the programs to exchange key, making public and private keys, you have all the standards to cipher and hash to do it..

  • Platform: Asp, Scripts

The .NET Encryption Library was chosen by the readers of Visual Studio Magazine as a winner for Security and Copy Protection. The .NET Encryption Library is powerful, easy to use and affordable. Hide business sensitive information with confidence such as credit cards, social security numbers, and passwords. Supports Rijndael (AES), DES, TripleDES, RC2, Blowfish, Twofish, Whirlpool, MD2, MD4, MD5, SHA1, SHA2, HAVAL, GOST, Ripend320, FCS16, FCS32, CRC32, Adler32, X509, UUencode, Base64, GZip, and Deflate. Download a free trial today..

  • Platform: Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64

Page: 1 | 2 | Freeware

New Reviews


Wise Disk Cleaner

Everybody computer is full of temporary and unnecessary files! Even if you don’t know they are there, they are! Wise Disk Cleaner helps to rid your system of these useless files that are just sitting around taking up your disk space. ...


Windows Movie Maker

Windows movie maker, expressed as windows live movie maker in the latest updates, is a piece of video and picture editing software for windows (as the name of the software no doubt suggests) designed to be simple, easy to use while still keeping as ...


Bank Robber

Bank robber (the bank robber) is essentially a trial game or a demo for the full version of the bank robber, which costs $4.99, and is a third person stealth and strategy game. In the bank robber you play as a criminal having recently being released ...


AM Browser

AM browser is a freeware browser from 2009, which markets itself allowing you to surf the web in a more comfortable, less confusing way. Once you install and open AM browser, the first thing you will notice is how out dated the look of it is. Most ...


My Paint

Do you own an android phone? Do you find It annoying how there is no visual note storing app (or indeed, any app for storing notes or writing important things down at all)? My paint is a handy downloadable app for the android operating system that ...


Kryptelite

Kryptelite is an application that can help you quickly and simply encrypt your files. File encryption can be very important, as its an effective way to help prevent unauthorized access to your files and their contents, and acts as a layer of ...


Brainteaser Cubes

Brain teaser cubes is a freeware first person action puzzle game, which is fully 3d, and has a fairly unique concept, most comparable to the console game portal, minus the portal elements (leaving just the cube based puzzles). The game is fairly ...


Funny Photo Maker

It happens a lot of times that you capture a photograph, it is good enough but you still want to play with it and improve it. There are lots of programs available for photo editing and some might say that you should use Adobe’s Photoshop. Yes, ...


Wise Registry Cleaner

Wise Registry Cleaner is a free registry cleaner, that is in fact more than just a registry cleaner. Its main purpose is to indeed clean your computer registry, but it also acts as a general system tune up tool, as well as a registry defragmenter, ...



New Downloads

Atom Quotations &
Invoices

Invoicing Software for small
and medium business Atom is a
very easy, simple and user
friendly invoice software. It
helps ...

SecureFX for Linux

A highly configurable secure
file transfer client for SFTP,
FTP/TLS, SCP and FTP with
advanced features like site
...

Bytescout BarCode Generator
SDK

Generate barcodes from .NET
with Bytescout BarCode
Generator SDK which provides 4
types of controls to generate,
display, ...

Tuxera NTFS for Mac

This software allows you to
write NTFS files from a Mac
computer. By default, Mac
operating systems provide
read-only ...

VM Performance Analyzer

Vyapin Virtualization
Management Suite enables you
to manage your Hyper-V based
virtual machines from a
central desktop ...

WinX DVD Ripper for Mac

WinX DVD Ripper for Mac is the
fastest Mac DVD ripper that
can convert copy protected
DVD/ISO on Mac OS X to MP4
H264 MOV ...

Bytescout BarCode Generator

BarCode Generator is able to
generate and export barcode to
image (PNG, JPG, TIFF).
Types: Codabar, Code 39, GS1,
Code ...

PPPro

Utility which allows you to
extract the e-mail addresses
of the pages pros french.
After having done your
selection this ...

DEVELOPED SECTION for
AutoCAD

An add-on for AUTOCAD
2002-2018 or BricsCAD V15-V17,
which determines the unfolded
section of one set of 3DSOLID,
3DMESH ...



Related Searches

Hash Haval Tutorial