WinHasher for Windows Free Download

Communication Software  Database Management Software  Games  Digital Photo Software  Disk & File Software  Educational & Science Software  Wireless Networking Software  Video Software  Internet Software  Graphic Design Software  Business & Office Software  Video Players  System Utilities  CAD Software  Developer Tools  Networking Software  Audio Software  3D Modeling Software  Privacy Software & Access control  Database Software  Security Software 
Search by Category
Audio Software
Business & Office Software
CD & DVD Software
Communication Software
Desktop Enhancements
Developer Tools
Digital Photo Software
Disk & File Software
Educational & Science Software
Entertainment & Hobby Software
Graphic Design Software
Home & Family Software
Internet Software
iTunes & iPod Software
Networking Software
Productivity Software
Security Software
System Utilities
Travel & Navigation Software
Video Software
Web Development Software


Version: 1.0.3
Platforms: Windows

Categories: Security Software
Upload Date: 24 Sep 15
Developer: Morgud
Distribution Type: Freeware
Downloads: 0
File Size: 334 Kb
Free Download WinHasher 

Rating: 0.0/5 (Total votes: 0)

WinHasher is an easy-to-use, small stand-alone program that verifies a file has not been altered or tampered with since being signed by the author or publisher. Supported hash functions include CRC32, GOST, MD5, RIPEMD family, SHA family (SHA1), Tiger, and Whirlpool. In addition, WinHasher can verify or create MD5, HASH, and SHA256 hash files, allowing quick and easy verification of many files at once. Note WinHasher requires the Microsoft .NET Framework (version 2.0 or later). Version may include unspecified updates, enhancements, or bug fixes.


Windows Me/2000/XP/2003 Server, Microsoft .NET Framework (version 2.0 or later)

Like it? Share with your friends!   

Other Windows Software of Developer «Morgud»:

Morgud's Erasure SuiteMorgud's Erasure Suite
Morgud's Erasure Suite (MES) is a collection of utility programs designed to completely and irreversibly destroy, eliminate, and shred any trace of previous data on your hard drive. MES provides four methods of deletion: U.S. Department of Defense complian

» show all

Similar Applications:

Super CodeSuper Code
With the development of information technology, the current Internet environment becomes more complex. Trojan software grows fast and hacker attacks more frequently; as a result, the security of both corporate and personal information has been threatened.
DoAIR is a plug-in for DoSWF and FlashOptimizer. It applies an easy way to encrypt and optimize Adobe AIR application and Android apk application which developed by ActionScript3.0. DoAIR run DoSWF or FlashOptimizer through command line interface.
PDFKey ProPDFKey Pro
PDFKey Pro is a tool to recover your PDF files even if passwords are lost. It can remove printing and copy or pasting restrictions without requiring the forgotten password. It can also protect your PDF files from unauthorized viewing or restricts their usa
Cryper - the file encryption software. You want to encrypt confidential files? Then Cryper is the software of your choice. There are many programs out there, which will do the job, freeware, open source and paid solutions, but none of them fits al
Sookasa transparently protects files across the Dropbox cloud and linked mobile devices, while preserving the native Dropbox user experience on Windows, Mac, iOS and Android. Sookasa creates a secure folder (called Sookasa) inside Dropbox and will automat
Hide'N'Send is the program for steganographic information hiding, by encrypting and placing the hidden file inside the JPEG picture. Hide'N'Send program uses modern steganographic algorithms - F5 and LSB, and also their options with matrix coding. T
Random Number GeneratorRandom Number Generator
Random Number Generator will let you quickly generate thousands random numbers in seconds. You can choose from a wide array of options: integers vs. floating-point numbers, lower and upper limits, decimal places count, digits to use, negative numbers proba
Web Site ZapperWeb Site Zapper
Web Site Zapper closes Web browsers that are displaying undesirable Web sites. It can be used either for popup control, or to control Internet access. It can also control when people can access the Internet. Create lists of good and bad Web sites, either m
TrueActive MonitorTrueActive Monitor
TrueActive Monitor (TAM) records every activity on the computer. Formerly WinWhatWhere, TAM records keystrokes, chat, IM, e-mail, screen shots, Web cam activity, URL s, clipboard, and file activity. TAM works on standalone AOR networked computers. The data
Encrypting files is easy, but is it convenient enough for everyday use? If you have a collection of digital photos, storing them in an encrypted archive surely cuts down on unauthorized access. But, this way of storing the pictures restricts legitimate acc

Supported Operating Systems:
Windows 2000 |  Windows Me |  Windows XP | 

Comments on :

Comments not found



Enter text from image below:

Turn on images!


Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10

© Pantich 2016 all rights reserved