Toms Hash Explorer 1.2 freeware

... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
Released 2016-08-20
Filesize 17.44 MB
Downloads 370
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(21 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer - algorithm 2 Freeware Download Notice

Toms Hash Explorer Free Download - we do not host any Toms Hash Explorer torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer download from publisher site or their selected mirrors.

Toms Hash Explorer freeware - The Latest User Reviews
Toms Hash Explorer freeware - The Latest Versions History
1.2 Aug 20, 2016 Minor Update File Integrity Verification/Batch Verification
1.1 Apr 29, 2016 New Release Themes/Skin Support, Drag and Drop, and File Entropy Computation using Shannon's Entropy Algorithm.

Most popular Encryption Tools freeware downloads

AxCrypt

2.1.1494 freeware download

... for Windows Vista or later using the AES algorithm with 256-bit or 128-bit keys. It combines strong symmetric encryption with compression and double-click editing/viewing. Encrypted ...

SteadyCrypt

2.4 freeware download

... usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to widely used TrueCrypt, but users who wont like to ...

SteadyCrypt x64

2.4 freeware download

... usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to widely used TrueCrypt, but users who wont like to ...

SteadyCrypt for Mac OS X

2.4 freeware download

... usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to widely used TrueCrypt, but users who wont like to ...

InfoLock

6.2 freeware download

... files, as this is necessary for the superior-security algorithm. Key Features: --Ultra lightweight: no installation, no ... --Simple and straitforward to use. --Very secure unique algorithm. --Encrypted code consists of 1 line of text ...

Hash Codes

1.62.780.7200 freeware download

... SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. Features: Hash data from keyboard, file ... SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER and Whirlpool algorithm Copy hash codes to the clipboard or save ...

Idea crypting module for BestCrypt

7.20 freeware download

... newer. The module performs encryption using well-known IDEA algorithm. Works in Bestcrypt Environment in any Windows system.The IDEA driver is installed simply enough - you ...

logIQKey

2.0 freeware download

... like any other file. It uses a non-reversible algorithm, this means that the password cannot be recovered, as opposed to office, pdf, zip and other ...

5 freeware award

USB Flash Security

5.0.0 freeware download

... recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted automatically ... recognized by speedy and cipher strength of encryption algorithm has been adopted. ...

5 freeware award

DiskCryptor

1.1.846.118 freeware download

... disk partitions. o Choice to select an encryption algorithm (AES, Twofish, Serpent), including their combinations. * Full support for external storage devices. o Full ...