AUTHENTiC The Checksum Calculator 1.0.1 freeware

AUTHENTiC is a modern (and free) tool for checksum verification. Featuring a convenient GUI and a drag and drop interface, it is both powerful and user-friendly, quickly letting you verify the integrity of files. The current version supports 15 different hashing algorithms. You can validate files with: MD5, SHA1, Adler-32, Blake2b, Blake2s, CRC32, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384 and SHA3-512. ...

Author WhiteLynx Development
Released 2019-09-27
Filesize 6.78 MB
Downloads 127
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows 2000, Windows 2003, Windows Server 2000, Windows Server 2003, Windows Server 2008, Windows Server 2008r2, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Editi
Installation Install and Uninstall
Keywords checksum, hash, hashing, file, hashes, authenticate, validate, authenticity
Users' rating
(25 rating)
AUTHENTiC The Checksum CalculatorEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows 2000, Windows 2003, Windows Server 2000, Windows Server 2003, Windows Server 2008, Windows Server 2008r2, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Editi
AUTHENTiC The Checksum Calculator - only Freeware Download Notice

AUTHENTiC The Checksum Calculator Free Download - we do not host any AUTHENTiC The Checksum Calculator torrent files or links of AUTHENTiC The Checksum Calculator on rapidshare.com, depositfiles.com, megaupload.com etc. All AUTHENTiC The Checksum Calculator download links are direct AUTHENTiC The Checksum Calculator download from publisher site or their selected mirrors.

AUTHENTiC The Checksum Calculator freeware - The Latest User Reviews
AUTHENTiC The Checksum Calculator freeware - The Latest Versions History
1.0.1 Sep 27, 2019 New Release First Public Release

Most popular Encryption Tools freeware downloads

Calendar Lock PEA

1.8 freeware download

... in the cloud, but exist as plain text only in the memory (RAM). Calendar Lock PEA is ... Open Source. No installation or registration is required, only a Java Runtime Environment. Calendar Lock PEA uses ...

Salted Hash Generator

2.0 freeware download

... of Password & Salt as follows, * Password only * Password+Salt * Salt+Password Finally, you can save the generated hash list to HTML/XML/TEXT/CSV file. Salted ...

CRYPTO!

Build 9695 freeware download

... wanted to create a secret message that can only be understood only by the people you wanted to? Or have ... message from your friend intended to be understood only by you? Well, as school students we ...

FREE VPN PROXY by SEED4.ME WINDOWS

1.0.5 freeware download

... because these are torrent-friendly countries. After installation you only have to choose VPN country, it will take about 5 seconds. - Protect privacy, hide your ...

FinalCrypt

6.8.0 freeware download

FinalCrypt is a Java-based application that takes a different approach, encrypting your data using a large cipher file, making it pretty much impossible to crack without ...

Enigma CS

0.5.2.685 freeware download

... encoding script! WARNING 1: BETA BUILD! Preview release only for testing purpose; do not use it for any other purpose! WARNING 2: BETA BUILD! Encoded ...

File Encryption

2.1 freeware download

... encoded, non accessible form which can be opened only after entering a password. File Encryption prevents unauthorised access to user's private data by using a ...

Gpg4win

4.4.0 freeware download

... global community of developers. This collaborative approach not only ensures that the software remains up-to-date with the latest security standards but also fosters transparency and ...

SteganographX Plus

2.0 freeware download

... BMP's with 16, 24 or 32-bit color. The only way to extract the hidden text out from the image is by using SteganographX. Now you ...

5 freeware award

Cypherix LE Free Encryption Software

11.7.0.0 freeware download

... complete security for your data making sure that only you and nobody else can access your data. ... creates an encrypted volume that can be accessed only with a password. Once mounted, the volume behaves ...