MD5 & SHA Checksum Utility is a tool that allows you to generate CRC32, MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes of single or multiple files. You can also verify hashes with the matching file to ensure the file integrity is correct. You may click on the Browse button to select a file/folder to generate hashes. Alternatively, you may also drag and drop or do a right-click on any file/folder to generate hashes. The generated hashes can be copied to clipboard or saved as CSV/HTML/TXT file.
Other Windows Software of Developer «Raymond's Personal Software»:
Email & Text Hash Generator If you need to share sensitive data such as customer email address for third party advertisers to perform advertising such as custom/tailored audience targeting campaigns, third party email newsletter, email ad exchange, Email & Text Hash Generator is the
Autorun Protector Autorun Protector is a two way protection software that prevents your PC from infecting with autorun worms and also protecting your removable device from being infected from other sources. Hence, it decreases the spread of the worms. In addition, it also c
MD5 & SHA Checksum Utility MD5 & SHA Checksum Utility is a standalone freeware that can generate MD5, SHA-1, SHA-256 & SHA-512 hashes from a file. In addition, you can verify the hash to ensure the file integrity is correct with the matching file.What is new in this release:Version
Spools.dll.vbs Cleaner This program was developed to remove away the Spools.dll.vbs aka Attas aka Solow worm. Symptoms of this worm: can not access your drive by double clicking it, Internet Explorer title bar changed to Xplor Team.Requirements:Microsoft .NET Framework
Alertsec Xpress Alertsec Xpress offers Full Disk Encryption from Check Point (former Pointsec) as a fully managed service. We support Windows and Mac, and offer 24/7 helpdesk.
Alertsec Xpress is used in all organisations that have recognized the need to protect their
Crypt It for Windows 8 In Crypt It for Windows 8 enter your text message, give any numeric key and get your cipher text. Similarly if you have any encrypted message, and you know the key, you can decrypt the message.
Hash Codes Portable (32-bit) Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
Portable Password Manager With Portable Password Manager you can setup a master password and multiple different passwords for you web accounts that you do not need to remember as you need to login to your accounts on the web. You have the option to use the quick launcher to rapidly
Flash Password Protector Encrypt your flash's exe or swf files, protect distribution of flash files. The encrypted flash files can prevent cracking, prevent copying, prevent decompiler, prevent popular screen recording software, protect your action script. You can set playback pas
Kryptel Kryptel is an easy-to-use single-click solution making encryption of files and folders no more complex than copying or moving. On the other hand, Kryptel includes a number of advanced features like creating encrypted filesets or batch mode processing. By d
SecureCrypt Ultimate Edition With guaranteed protection using up to date encryption and decryption
technologies and a newly constructed user interaction system, SecureCrypt will offer you the safest, easiest and the best encryption alternative completely free of charge.
BizCrypto for SQL Server BizCrypto for SQL Server lets you secure the data, which is stored and transferred via your MS SQL Server Integration Services scripts.
When you need to transfer the data securely via SFTP, FTPS or AS2 protocol, you will find the appropriate connection
Windows 2000 NNTP Denial of Service Vulnerability Patch This update resolves a denial of service vulnerability in Windows 2000 computers running the Network News Transfer Protocol (NNTP) service. This denial of service vulnerability exists because the NNTP service in Windows 2000 contains a memory leak. If a ma
Predator A small encryption program for small files. This program has other helpful functions too. No registration required this version is already registered free for public use. No future registration needed either. Source code comes with program since it is not
Supported Operating Systems:
Windows 2003 |
Windows 7 |
Windows 8 |
Windows Server 2008 |
Windows Vista |
Windows XP |
Comments on MD5 & SHA Checksum Utility Pro:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10