Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews

  • Encrypt my Folder   (Raino)

    It's old and never updated since they released it. You can use it only 20 times before purchasing, and the website for...

  • Wall Street Raider   (Ludvig)

    Interface was complicated to use, some popular stock symbols I entered shows 'Company not available'. Very confusing game.

  • BootRacer   (Iiro)

    I use it to see if my pc booting normally or taking long time. So far it helps me great.

  • Weeny Free Audio Cutter   (Tekle )

    Very easy to use, just select the start time and end time of a audio file and it will cut it conveniently. Great app.

  • Phone-lost/stolen Alerter   (Albert)

    My tecno H5 phone was stolen this morning and I wanted to block it with this program but it won't work.

  • AirMyPC   (Jack)

    Finally Perfect solution to view my documents that are saved on my Windows PC on my big TV screen using the AppleTV.

  • Snappy Bird   (Ravn)

    I love playing it on my phone. Very addictive.

  • WinMend File Copy   (Robin)

    Usable software, accessing it is a bit time consuming. Please add hotkey support if you could.

  • Keyboard & Mouse Locker   (Elias)

    Working fine as it should, very easy to use it.

  • Free Slideshow Maker   (Hron)

    It has also installed some kind of toolbar to show ads.

Reduced Sha

From Title
1.  sha-1 Password - Utilities
... sha-1 Password is a password recovery tool for security professionals, which can be used to recover a password if its sha-1 hash is known. sha-1 is an industry standard hash algorithm that is used in many applications to store passwords. sha-1 Password features fast, highly optimized recovery engine that can recover multiple hashes at once: up to 32,000 hashes in the Pro version. The number of hashes being recovered simultaneously does not have significant performance impact. The recovery engine ...

2.  Ash's MD5/sha-1 Checker - Utilities/Mac Utilities
... A graphical tool for creating and checking MD5 and sha-1 checksums. Comes with a convenient batch mode. Works also from the command-line. Written in Java/Swing as a comfortable tool for your file checks. ...
3.  reduced Permissions - Utilities/Security & Encryption
... Allows you to run Internet Explorer in a reduced permissions sandbox. It removes the administrator, and power user groups from IE. ...

Reduced Sha

From Short Description
1.  Hash Tool - Utilities/File & Disk Management
... Freeware tool to calculate MD5, sha-1, sha-256, sha-384, sha-512 or CRC-32 hashes of single or multiple files. Fast and easy to use. Useful for checking downloads or generating hashes for your own files. Verify internet downloads and find corrupt files. Files can be dragged or sent from Windows Explorer, and the list can saved or copied to the clipboard. ...
2.  File Checksum Tool - Utilities/File & Disk Management
... KRyLack File Checksum Tool is a free utility that can generate a MD5, sha-1, HAVAL, MD2, sha-256, sha-384, sha-512 hash from a file. A Hash (Checksum) is a sort of digital fingerprint, uniquely identifying each file. These are common hashes that are used to verify the integrity and authenticity of files. The software allows you to verify the Hash to ensure the file integrity is correct with the matching file or create new checksum for your important data. Many download sites list the MD5 hash ...
3.  JSummer native - Utilities/File & Disk Management
... JSummer is a tool to compute and check MD5, sha-160 and sha-256 message digest. Console-Version and GUI. Implemented in Java - but runs without a java-vm! ...
4.  JSummer java - Utilities/File & Disk Management
... JSummer is a tool to compute and check MD5, sha-160 and sha-256 message digest. Console-Version and GUI. Implemented in Java. ...
5.  inCrypto - Security/Encryption Tools
... inCrypto is a multi-purpose encryption and encoding tool that supports AES, Base64, MD5, CRC32, sha-1 and sha-256. inCrpyto supports Windows XP, Windows Vista and Windows 7.Requires: Microsoft .NET Framework 3.5.What?s New in version 0.2: - Added CRC32 support and new ‘About’ tab. ...

6.  Md5deep - Programming/Other
... md5deep is a set of programs to compute MD5, sha-1, sha-256, Tiger, or Whirlpool message digests on an arbitrary number of files. md5deep is similar to the md5sum program found in the GNU Coreutils package, but has the following additional features: Recursive operation - md5deep is able to recursive examine an entire directory tree. That is, compute the MD5 for every file in a directory and for every file in every subdirectory. Comparison mode - md5deep can accept a list of known hashes and ...
7.  RSP Checksum - Programming/ActiveX Components
... This ActiveX OCX can compute very fast the checksum of strings or files using Adler32 , CRC32 , MD5 , sha-1 and sha-256 , the code is optimized for new AMD and Intel processors running very fast in the win32 environment ...
8.  RSP Checksum OCX - Programming/Other
... This ActiveX OCX can compute very fast the checksum of strings or files using Adler32 , CRC32 , MD5 , sha-1 and sha-256 , the code is optimized for new AMD and Intel processors running very fast in the win32 environment ...
9.  QuickHash Library - Programming
... A fast, highly optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, sha-1, sha-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums and HMACs for files, memory blocks, strings, blobs, streaming data. It is quick, flexible, easy to use. It supports 3 interfaces: QuickHash API (the API can be used as is, or it can be used to create wrappers for languages that can use DLL ...
10.  HashOnClick - Utilities/File & Disk Management
... A simple Windows Explorer extension that tells you the MD5, sha-1, or CRC32 hash value of a file. These hash values can be used to check if two or more files are exactly the same. Integrated with Windows Explorer so you just need to right-click on the files. There are many reasons why you may want to know the hash value of a file. Many web sites for example list the MD5 value of a file so that when you download it you can check if its corrupted. ...

Reduced Sha

From Long Description
1.  Hash Codes - Security/Encryption Tools
... Hash Codes is a simple and easy to use application designed to enable users to hash data from keyboard, file or CD/DVD. This tool supports: Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, sha-0, sha-1, sha-1-IME, sha-224, sha-256, sha-384, sha-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. ...
2.  HS File Hasher - Utilities/Mac Utilities
... A file hasher written in java 1.6 capable of generating MD5, CRC32, sha-1, sha-256, sha-384 and sha-512 checksums of any file as well as comparing generated checksums. Requires Java Runtime Environment 1.6 <br>Calculate MD5, CRC32, sha-1, sha-256, sha-384 and sha-512 checksums.<br>Compare MD5, CRC32, sha-1, sha-256, sha-384 and sha-512 checksums.<br>Drag Files onto executable for fast checksum calculation.<br>Portable, Only requires Java Runt ...
3.  CTN Hashing Extended Stored Procedure - Utilities/Other Utilities
... CTNHashProc is a Microsoft SQLServer 2000 Extended Stored Procedure that returns the hash of a given string. Currently the supported hash functions are sha (SHA1), SHA2 (sha-256, sha-384, sha-512), MD5, RIPEMD-160, Tiger. ...
4.  DivHasher - Security/Encryption Tools
... Hashing and checksum operations for text or files. Algorithms for calculations: MD2, MD4, MD5, SHA1, sha-224, sha-256, sha-384, sha-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, WHIRLPOOL, Tiger, Adler32, CRC32 and Panama. Fast and easy. ...
5.  GuardAxon - Security
... GuardAxon is a free program that is used to encrypt and decrypt files e.g. for safe transmission or transportation on removable media. The program uses the following encryption algorithms: BlowFish, Twofish, DES, 3DES, AES-128, AES-192, AES-256. Selecting files to protection is very simple because GuardAxon uses the classic file manager. The program can generate reports in PDF format at the end of the encryption / decryption. GuardAxon also allows you to calculate and verify the checksum of ...
6.  febooti fileTweak Hash & CRC - Utilities/File & Disk Management
... febooti fileTweak Hash & CRC is a freeware hash / CRC calculator. Compute hash fingerprint / CRC checksum from any provided file. Supported hash / CRC formats: CRC32, MD2, MD4, MD5, sha-1, sha-224, sha-256, sha-384, sha-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, WHIRLPOOL-1 and Tiger-192. ...
7.  VisualHash - Utilities/Security & Encryption
... VisualHash is a hashsum calculator with a graphical user interface. Supported algorithms: Adler-32, Cksum-32, CRC-16, CRC-16-CCITT, CRC-16-XModem, CRC-32, CRC-32-MPEG2, CRC-64, ELF-32, FCS-16, FNV-32, FNV-64, GOST, MD2, MD4, MD5, PJW-32, SDBM-32, sha-1, sha-256, sha-384, sha-512, Sum-32 and XUM-32 and many more. ...
8.  Code Keeper - Programming/Other
... Code Keeper helps develpers keep track of the registration codes that they put in their programs. In addition, it gives the developer two MD5 hashes and three sha hashes that can be used inside their programs to represent the code. The first MD5 Hash is a direct MD5 Hash of the entered registration code. The second is a hash of the first hash. This will help a developer keep from having their registration codes from getting into the databases that have been created that hold MD5 hashes. The ...
9.  SumHashes - Utilities/Other Utilities
... A file hash generator. Generates MD5, sha-1, sha-256 and sha-512 hashes for the selected file. Can choose any combination of the 4 hashes. Simple, Small and fast. Works great on ISO's and any other files. I might add in ability to compare hashes to ...
10.  DigesterCheck - Programming/Components & Libraries
... FREE DiceLock Security DigesterCheck GUI and DLL Library.If in your process or software applications you have need for generating hash values foir different type of information you can incorporate HashDigester library in your applications to generate the hash you need. Incorporate hash processors in your applications. The C++ library contains classes implementing sha 1, sha 224, sha 256, sha 384, sha 512, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320 hash algorithms.HashDigester is able ...

Reduced Sha

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2012 ShareMe Last Update: Saturday, September 20, 2014 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.