Checksum Aide 1.0.1.0 freeware

A desktop utility used to generate up to 11 different hash codes (aka., checksum codes). This includes MD5, SHA1, SHA-256, SHA-512 and more. ...

Author Red Regent Software
Released 2018-11-02
Filesize 479 kB
Downloads 128
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords checksum, hash, sha1, md5, crc32b, sha-224, sha-384, sha-256, sha-512, sha-3-224, sha-3-256, sha-3-384, sha-3-512
Users' rating
(6 rating)
Checksum AideFile & Disk ManagementWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Checksum Aide - hash utility Freeware Download Notice

Checksum Aide Free Download - we do not host any Checksum Aide torrent files or links of Checksum Aide on rapidshare.com, depositfiles.com, megaupload.com etc. All Checksum Aide download links are direct Checksum Aide download from publisher site or their selected mirrors.

Checksum Aide freeware - The Latest User Reviews
Checksum Aide freeware - The Latest Versions History
1.0.1.0 Nov 2, 2018 Major Update Product Update (Bug fix)
1. Updated System Requirements to require IE7 or greater. This is needed to support the on-line help system.
2. Fixed bug where files that contained an embedded comma in the name were not being handled correctly.
1.0.0.0 Oct 5, 2018 New Release New Release

Most popular File & Disk Management freeware downloads

RHash

1.4.6 freeware download

RHash is a console utility for calculation and verification magnet links and a wide range of hash sums like CRC32, CRC32C, MD4, MD5, SHA1, SHA256, ... HAS-160, BLAKE2s/BLAKE2b, EDON-R 256/512, Whirlpool and Snefru algorithms. Hash sums are used to ensure and verify integrity ...

File Checksum Tool

1.41 freeware download

KRyLack File Checksum Tool is advanced freeware utility to generate a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. A Hash (Checksum) is a ...

File Checksum Utility

2.1.0.0 freeware download

File Checksum Utility software allows to generate MD (Message Digest) and SHA (Secure Hash Algorithm) hashes from a single file or files in a ... include MD5 (Message Digest number 5), SHA-1 (Secure Hash Algorithm level 1), SHA-256, SHA-512 and RIPEMD. File ...

MultiHasher

2.8.2 freeware download

MultiHasher is a lightweight utility designed to help you easily calculate the hash for any file. It currently supports five hash algorithms. FEATURES: ยท Calculate one or ...

5 freeware award

FileList

4.1.1 freeware download

FileList is a command line utility providing a list of files of the given ... of MS Office documents - MD5 checksum (file hash value) - SHA256 checksum (file hash value) - ...

Fsum Frontend

1.5.5.1 freeware download

... It supports 96 algorithms: alder8, adler16, adler32, ap hash, bdkr, cksum, cksum mpeg2, crc8, crc16, crc16 ccitt, ... crc32 jamcrc, crc32 mpeg2, crc64, crc64 ecma, djb hash, dha256, edonley/emule, elf32, fletcher8, fletcher16, fletcher32, fnv0-32, fnv0-64, ...

Portable HashTools

4.8.2 freeware download

Portable HashTools by Binary Fortress Software is a robust and versatile utility designed for users who need a reliable solution for calculating and verifying file hashes. This lightweight application stands out for its portability, ...

HashTools

4.8.2 freeware download

HashTools, developed by Binary Fortress Software, is a robust and user-friendly utility designed to streamline the process of calculating and verifying file hashes. This lightweight yet powerful tool is an essential ...

PeaUtils

1.2 freeware download

... Swiss-Army-knife tool for computing checksum values (CRC32, CRC64), hash algorithms (MD5, SHA1, SHA256, SHA3-356), compare two files byte-to-byte, view hexadecimal preview of a file, split ...

File Checksum Calculator

1.2 freeware download

A standalone utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly used to guard against malicious ... of authentication. Two of the most common cryptographic hash functions are the Secure Hash Algorithm (SHA) and ...