Software Listing: Sha Sum
- JSummer native
- License: Freeware
- Price: 0.00

JSummer is a platformindependent, open source tool to compute and check MD5, MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160, WHIRLPOOL, TIGER, HAVAL message digest. The Program consists of a Console-Version (CLI) and a nice GUI using SWT. Implemented in Java. This native version is running without a JRE! License: GPL (see http://www.gnu.org/copyleft/gpl.html).
- Publisher: Downloads
- Date:
- Size: 6963 KB
- Platform: Java, Linux, Linux GPL, Linux Open Source, Win2000, Windows Server, WinOther
- JSummer java
- License: Shareware

JSummer is a platformindependent, open source tool to compute and check MD5, MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160, WHIRLPOOL, TIGER, HAVAL message digest. The Program consists of a Console-Version (CLI) and a nice GUI using SWT. Implemented in Java. License: GPL (see http://www.gnu.org/copyleft/gpl.html).
- Publisher: Downloads
- Date:
- Size: 2662 KB
- Platform: Java, Linux, Linux Open Source, Win2000, WinOther, WinServer
- SHA-1 Password
- License: Demo
- Price: 45

SHA-1 Password is a password recovery tool for security professionals, which can be used to recover a password if its SHA-1 hash is known. SHA-1 is an industry standard hash algorithm that is used in many applications to store passwords. SHA-1 Password features fast, highly optimized recovery engine that can recover multiple hashes at once: up to 32,000 hashes in the Pro version. The number of hashes being recovered simultaneously does not have significant performance impact. The recovery engine is fully configurable, so you can adjust the recovery options as needed. Since there is no known way to reverse the SHA-1 algorithm, SHA-1 Password provides a number of tools to recover the password: Brute Force Attack, Dictionary Attack, Hybrid Dictionary Attack, Smart Force Attack.
- Publisher: LastBit Software
- Date: 15-08-2006
- Size: 508 KB
- Platform: Win2000, Windows Server, WinOther
- SQL: Sum, Average, Max, Min, Count, Detail
- License: Shareware

This example shows how to perform a variety of statistics on your data using simple SQL such as Sum, Average, Max, Min, and Count. It uses stock trading performance of EPOS as an example..
- Publisher: codeave.com
- Date: 09-05-2011
- Platform: Asp, Scripts
- Java File Integrity Checking - ChkSum
- License: Freeware
- Price: 0.00

A similar to Tripwire, file system integrity checking tool but develop in java and cross platform. This tools checking and source control using check sum algorithm like MD5, SHA and CRC..
- Publisher: javaintegrity.sourceforge.net
- Date: 16-05-2012
- Size: 22 KB
- Platform: Linux, Mac OS X, WinOther
- PyQSum
- License: Freeware
- Price: 0.00

PyQSum: Yet another [md5|sha[1|224|256|384|512]]sum. written in Python/Qt.
- Publisher: pyqsum.sourceforge.net
- Date: 11-09-2012
- Size: 11 KB
- Platform: Linux, Mac OS X, WinOther
- Methods for calculating precise logarithm of a sum and subtraction
- License: Shareware

Disclosed are methods to compute the precise value of the logarithm of a sum and the logarithm of a subtraction. A number of practical problems can result in having too big or small values in intermediate values of a calculation. Then one tries to take logarithm of these values and operate on logarithms instead. In the case: log (p * q) = log p + log q is very easy to compute, but the problem is then to compute (or approximate) the value of log (a + b) from the value of log a and log b. Let us assume that log a and log b are known, and that we want to approximate log (a + b). Most basic solution would be calculating sum_log = log(exp(a_log) + exp(b_log), where a_log = log a and b_log = log b and therefore sum_log = log(a + b).
- Publisher: Roland Pihlakas
- Date: 13-05-2013
- Size: 102 KB
- Platform: Matlab, Scripts
- Maximum Subsequence Sum Timer
- License: Shareware

The Maximum Subsequence Sum Timer software was developed as an easy-to-use instrument that can time various solutions to the maximum subsequence sum problem.
Maximum Subsequence Sum Timer was created using the Java programming language and can run on platforms such as Windows, Mac OS X, and Linux.
.
- Publisher: Rod Howell
- Date:
- Platform: WinOther
- SHA-1 Hash Checker
- License: Shareware

SHA-1 Hash Checker is a handy and reliable utility designed to check the integrity of your passwords via hash checks.
Usage is simple: enter the password in the plain text field, load the hash list file and press the 'Search' button. When the application has finished comparing the hashes, it displays a message that your password is safe or an alert if it's not.
SHA-1 Hash Checker can also run as a command line utility.
.
- Publisher: Assaf Stone
- Date:
- Platform: WinOther
- Advanced Hash Calculator
- License: Shareware
- Price: 19.95

Advanced File Calculator is a cryptographic data hash calculation software for files. Simply drag and drop files in this calculator and hash string for the files will be displayed on the fly. Supported cryptographic hash function algorithms include CRC32 control sum, GOST hash, MD2, MD4, MD5, SHA-1, HA2 (256), SHA2 (384), SHA2 (512). You may copy separate hash string corresponding to the file contents data or export them in to text file for future use. This software is capable of up to 1000 concurent hash calculations. Webmasters can also benefot from this utility to calculate and place MD5 hash strings values on their website to verify the integrity of the download data.
- Publisher: filesland.com
- Date:
- Size: 542 KB
- Platform: Win2000, Win7 x64, Windows 7, WinOther, WinVista
- Killer Sudoku or Sum Sudoku
- License: Freeware
- Price: 0.00

Play the japanese puzzle game killer sudoku / sum sudku in your windows computers. This freeware game Includes 30 free killer sudoku puzzles. Killer sudoku puzzles are more challenging than normal sudoku puzzles. Its a blend of kakuro and sudoku. Sudoku for people who can count. The puzzles are free from yoogi games..
- Publisher: syndicate.yoogi.com
- Date:
- Size: 1208 KB
- Platform: WinOther
- NCrypt TX
- License: Shareware
- Price: 15.00

NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal characters. Automatically converts a weak password into a strong one..
- Publisher: LittleLite Software
- Date: 26-09-2003
- Size: 419 KB
- Platform: Win2000, WinOther
- QuickHash Library
- License: Shareware
- Price: 149.95

A fast, highly optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums and HMACs for files, memory blocks, strings, blobs, streaming data. It is quick, flexible, easy to use. It supports 3 interfaces: QuickHash API (the API can be used as is, or it can be used to create wrappers for languages that can use DLL or LIB), C++ Interface (C++ wrapper classes to QuickHash API), and QuickHash Type Library (includes all declarations for accessing the functionality from programming languages that can reference a .
- Publisher: SlavaSoft Inc.
- Date: 30-06-2003
- Size: 660 KB
- Platform: Win2000, Windows Server, WinOther
- FSUM
- License: Freeware
- Price: 0.00

Free command line utility for file multi-checksum generation and verification. It allows to create/verify popular file hashes/checksums: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD-160, PANAMA, TIGER, CRC-32, ADLER32, and the message digest used in eMule/eDonkey (ed2k) software. Its most common use is checking files for corruption (data integrity checking). A hash/checksum calculation might be performed on data before transferring (downloading/uploading) it from one location to another. Making the same calculation after the transfer (download/upload) and comparing the former and latter results, you can check if the received data is corrupted or not.
- Publisher: SlavaSoft Inc.
- Date: 06-07-2004
- Size: 80 KB
- Platform: Win2000, Windows Server, WinOther
- HIME: Huge Integer Math and Encryption
- License: Shareware
- Price: 24.95

HIME stands for Huge Integer Math and Encryption library. It is a collection of functions for Windows programmers that allows to implement RSA public key encryption, AES (Rijndael) and ArcFour (RC4) secret key encryption and digital signatures using the SHA-1, SHA-256 or MD5 Secure Hash Algorithm in your programs. HIME also contains functions for huge prime number generation, cryptographically secure random number generation (a.o. Blum-Blum-Shub and RSA), Diffie-Hellman key exchange algorithm and huge integer number mathematical operations. These mathematical functions can serve as building blocks for implementing other public key encryption schemes.
- Publisher: DevOTechS
- Date: 24-06-2004
- Size: 513 KB
- Platform: Win2000, WinOther
- Cross Sums - Number Crossword
- License: Freeware
- Price: 0.00

The number crossword game, where you fill the crossword grid with numbers based on addition logic. Anyone who can add two numbers can play. In a language crosswords, often you are frustrated with a clue, the answer of which God only Knows. Unlike crossword, the Cross-Sum puzzles are always solveable by anyone who can add two numbers. Cross-Sum is a nice mixture of sudoku (the japanese number puzzle game) and the Crossword (popular puzzle of western world). The game is compact, and easily understandable. You are provided with 30 puzzles of varying sizes and difficulty levels. The game is a freeware, and if you like the game you can download more puzzle sets for free from Yoogi Games.
- Publisher: Yoogi Puzzle Syndicate
- Date: 03-07-2005
- Size: 1307 KB
- Platform: Win2000, Windows Server, WinOther
- Encoder Wizard ActiveX
- License: Shareware
- Price: 199

Encoder Wizard is a collection of two ActiveX (ocx) controls, Encoder Wizard and Decoder Wizard. These two controls allow you to fully support the Base64, Quoted- Printable, UUEncode, yEnc, MD5,HMAC MD5, URL, SHA-1, and Binary 2 Hex encoding methods. You can Encode and Decode data quickly and intelligently. Base 64 is the Encoding Method usually used for Binary files in MIME messages. It is also used to encode data for special characters accross telnet connection to certain servers. Quoted-Printable is used to encode text for transmission accross certain mail servers. It is also commonly used in MIME messages.
- Publisher: Seekford Solutions, inc
- Date: 01-07-2005
- Size: 5140 KB
- Platform: Win2000, Windows Server, WinOther
- CommuniCrypt QuickHasher
- License: Freeware
- Price: 0.00

With CommuniCrypt QuickHasher you can create a Hash value of a file or verify the authenticity of a file with an existing hash value. QuickHasher uses the modern SHA-2 Hash with 256 bit. The outdated MD5 is not supported. Requires VB6 runtime!.
- Publisher: CommuniCrypt Software
- Date: 07-12-2005
- Size: 918 KB
- Platform: Win2000, Windows Server, WinOther
- Excel Add, Subtract, Multiply, Divide All Cells Software
- License: Shareware
- Price: 19.82

Quickly apply standard math operation to a group of selected cells in MS Excel. The program is very easy to use -- addition, subtraction, multiplication or division of a number (percentage, fixed value, sum, etc.) to any cells in your workbook..
- Publisher: Sobolsoft
- Date: 24-08-2006
- Size: 347 KB
- Platform: Win2000, Windows Server, WinOther
- Hash
- License: Freeware
- Price: 0.00

Forensic examiners often need to quickly obtain the hash values for potential evidence files for reports or to verify their results. Pinpoint Hash was created to allow users to quickly obtain the hash values for CRC-32, MD5, SHA-1 and SHA-256 hash values for any file and quickly copy the results to the clipboard for easy transport to any other application. Hash integrates into the Windows "Send to" menu for easy access from Windows Explorer. It's quick. It's simple. It's free. Enjoy..
- Publisher: Pinpoint Labs
- Date: 01-01-2007
- Size: 4296 KB
- Platform: Win2000, WinOther

















