Related Keywords
algorithm downloadsalgorithm 2 downloads
algorithm development downloads
algorithm optimization downloads
algorithm x64 downloads
md5 algorithm downloads
aes encryption algorithm downloads
optimization algorithm downloads
using aes algorithm downloads
sha 1 algorithm downloads
secure hash algorithm downloads
genetic algorithm downloads
compression algorithm downloads
genetic algorithm optimizatio downloads
reliable algorithm and all downloads
google algorithm downloads
image algorithm downloads
comparison algorithm downloads
encryption algorithm downloads
checksum algorithm downloads
Top Software Keywords
decrypt downloadsencryption downloads
aes downloads
encryption software downloads
safe downloads
file encryption downloads
decryption downloads
privacy downloads
data encryption downloads
secure downloads
password downloads
folder lock downloads
files downloads
security downloads
recovery downloads
protection downloads
encrypt downloads
file downloads
email downloads
protect downloads
folder downloads
crack downloads
hide downloads
folders downloads
blowfish downloads
lock downloads
lock folder downloads
recover downloads
rijndael downloads
des downloads
Vista Download
Vista downloadVista antivirus download
Vista wallpaper download
Vista wallpapers download
Vista themes download
Vista pack download
Vista ultimate download
Vista home download
Vista basic download
Vista business download
Vista x64 download
Vista transformation download
Vista transformation pack download
Vista boot download
Vista dvd download
Vista sidebar download
Vista aero download
Vista product key download
Top Downloads
Top Rated
Navigation: Home
\ Security & Privacy
\ Encryption Tools \ Toms Hash Explorer
Toms Hash Explorer1.2 by Tom Andreas Mannerud |
![]() |
Software Description:
... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...
type: Freeware
Download Toms Hash Explorercategories: CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE Add to Download Basket Report virus or spyware |
![]() [ Zoom screenshot ] |
|
Software Info | |
Best Vista Download periodically updates pricing and software information of Toms Hash Explorer full version from the publisher,
but some information may be out-of-date. You should confirm all information. Software piracy is theft, using crack, warez passwords, patches, serial numbers, registration codes, key generator, keymaker or keygen for Toms Hash Explorer license key is illegal and prevent future development of Toms Hash Explorer. Download links are directly from our mirrors or publisher's website, Toms Hash Explorer torrent files or shared files from rapidshare, yousendit or megaupload are not allowed! |
|
Released: | August 20, 2016 |
Filesize: | 17.44 MB |
Language: | English |
Platform: | Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64 |
Requirements: | Microsoft .NET Framework 4.5.2 |
Install | Install and Uninstall |
Add Your Review or Windows Vista Compatibility Report |
Toms Hash Explorer- Releases History |
Software: | Toms Hash Explorer 1.2 |
Date Released: | Aug 20, 2016 |
Status: | Minor Update |
Release Notes: | File Integrity Verification/Batch Verification |
Software: | Toms Hash Explorer 1.1 |
Date Released: | Apr 29, 2016 |
Status: | New Release |
Release Notes: | Themes/Skin Support, Drag and Drop, and File Entropy Computation using Shannon's Entropy Algorithm. |
Most popular algorithm in Encryption Tools downloads for Vista |
Hash Codes x64 1.62.780.7200 download by Marek Sienczak
... SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. Features: Hash data from keyboard, file ... SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER and Whirlpool algorithm Copy hash codes to the clipboard or save ...
type: Open Source
View Details
Download
categories: x64 hash data, x64 encrypt data, x64 data encryption, x64 hash, x64 encrypt, x64 encryption |
![]() |
Sealpath 1.0.5 download by Sealpath Technologies
... control. SealPath uses a symmetric key with AES algorithm of encryption to ensure that your documents are under control. This symmetric key is obtained through a private RSA key that ...
type: Trialware ($7.00)
View Details
Download
categories: document protection, protect document, change permission, permission, restrict, restriction |
![]() |
Best Encryption Expert 12.03 download by DoGoodSoft
... encrypted files in a time with internationally mature algorithms. Each encrypted file in this folder can be ... into an encrypted file with very strong encryption algorithm. Portable Encryption packs and encrypts a folder into ...
type: Shareware ($39.95)
View Details
Download
categories: folder encryption, file encryption, encryptor, decrypt, encryption software, disk protection, data destruction, disguise folders, folder protection, hide folder, Best Encryption Expert |
![]() |
AxCrypt 2.1.1494 download by AxCrypt AB
... for Windows Vista or later using the AES algorithm with 256-bit or 128-bit keys. It combines strong symmetric encryption with compression and double-click editing/viewing. Encrypted files have a '.AXX' extension ...
type: Freeware
View Details
Download
categories: file, encryption, free, aes, shell extension, windows, encrypt, multiple backup, api, server, script, open source, gnu, gpl |
![]() |
Advanced Encryption Package 2008 Professional 4.8.7 download by InterCrypto Ltd
... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...
type: Shareware ($49.95)
View Details
Download
categories: encrypt, encryptor, password, protect, blowfish, extracted, ecnrypted, shred, blowfish.zip, unzip, pkzip, winzip, blowfish, twofish, rijndael, cast, mars, serpent, tea, desx, gost, rc2 |
![]() |
Advanced Encryption Package 2008 Professional 4.8.7 download by InterCrypto Ltd
... your private files. Program includes 17(!) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, ... SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography. One key is kept ...
type: Shareware ($49.95)
View Details
Download
categories: encrypt, encryptor, password, protect, blowfish, extracted, ecnrypted, shred, blowfish.zip, unzip, pkzip, winzip, blowfish, twofish, rijndael, cast, mars, serpent, tea, desx, gost, rc2 |
![]() ![]() ![]() ![]() ![]() ![]() |
XorIt 1.9 download by Sinner Computing
... from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of ...
View Details
Download
|
![]() |
CryptIt 1.4 download by ACAPsoft
... from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of ...
type: Shareware ($8.00)
View Details
Download
categories: Encrypt, File, assembly, security, Sinner, vernam, one-time pad, XOR |
![]() |
Digital Security Suite 2011 download by SafeIT Security
... file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so ... Infosec Standard 5, Baseline & Enhanced Peter Gutmann's algorithm U.S.Department of Defense Sanitizing (DOD 5220.22-M) Bruce Schneier's ...
type: Commercial ($49.95)
View Details
Download
categories: Delete, Destroy, Format, Delete, Erase, Remove, Sanitizing, Sanitize, Shred, Shredder, Shredding |
![]() |
PenProtect 1.45 download by EasyLine
... using your Password and a special technique (AES algorithm 256 bit key). PenProtect requires no installation: it is a single file located in the home folder of your Flash Drive. ...
type: Demo ($19.00)
View Details
Download
categories: flash drive, USB, password, flash memory, pen drive, crypt, encrypt, decrypt, software, key, file, folder, AES, AES 256, security, cryptography, secure, stick, device, lock, guard flash drive, guard pen drive, penprotect |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |