File Checksum Calculator 1.2 freeware

A standalone utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard against malicious changes to protected data in a wide variety of software, Internet, and security applications, including digital signatures and other forms of authentication. ...

Author VOVSOFT
Released 2018-12-28
Filesize 2.22 MB
Downloads 144
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords md5, sha1, sha256, checksum, verify
Users' rating
(15 rating)
File Checksum CalculatorFile & Disk ManagementWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
File Checksum Calculator - hash data Freeware Download Notice

File Checksum Calculator Free Download - we do not host any File Checksum Calculator torrent files or links of File Checksum Calculator on rapidshare.com, depositfiles.com, megaupload.com etc. All File Checksum Calculator download links are direct File Checksum Calculator download from publisher site or their selected mirrors.

File Checksum Calculator freeware - The Latest User Reviews
File Checksum Calculator freeware - The Latest Versions History
1.2 Dec 28, 2018 Major Update Implemented multi-threaded calculation, faster now.
1.1 Sep 12, 2018 Major Update Drag and drop supported. Improved UI.
1.0 Aug 16, 2018 Major Update Fixed bugs.

Most popular File & Disk Management freeware downloads

Arpoon Checksum

1.6 freeware download

... computes checksums of files. A checksum (message digest, hash value) is a kind of fingerprint that enables ... Link to files can be resolved (optional) * Hash values can be displayed as hexadecimal or as ...

DuMP3 for Linux GTK PPC

0.3.2 freeware download

... fingerprint based on the image, audio or text data for each file and then comparing the fingerprints. ... Calculated fingerprints can be stored in a MySQL database so that they do not have to be ...

Ext2 Installable File System

1.11a freeware download

... (Please read the FAQ section, too.) * Supports hash indexed (htree) directories (utilizes the so-called dir_index feature of Ext3). * Full plug-n-play functionality. When a ...

File Checksum Tool

1.41 freeware download

... a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. A Hash (Checksum) is a sort of digital fingerprint, uniquely identifying each file. These are common hashes that are used to verify the integrity and ...

Portable HashTools

4.8.2 freeware download

Portable HashTools by Binary Fortress Software is a robust and ... a reliable solution for calculating and verifying file hashes. This lightweight application stands out for its portability, ...

HashTools

4.8.2 freeware download

HashTools, developed by Binary Fortress Software, is a robust ... streamline the process of calculating and verifying file hashes. This lightweight yet powerful tool is an essential ...

Whirlpool File Checker 64-bit

0.1 freeware download

This file integrity checker uses Alternate Data Streams to store the hashes of your files. So, it only works on ... files (to another NTFS volume) without losing the hashes, and without needing to do anything else. ...

PeaUtils

1.2 freeware download

... Swiss-Army-knife tool for computing checksum values (CRC32, CRC64), hash algorithms (MD5, SHA1, SHA256, SHA3-356), compare two files ... split files / join spanned volumes, perform secure data deletion - either files and folders and free ...

Whirlpool File Checker

0.5 freeware download

This file integrity checker uses Alternate Data Streams to store the hashes of your files. So, it only works on ... files (to another NTFS volume) without losing the hashes, and without needing to do anything else. The ...

File Checksum Calculator

1.2 freeware download

A standalone utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard against malicious changes to protected data in a wide variety of software, Internet, and ...