the fingerprints free software


Search results for tag «the fingerprints»:

WinMD5 2.07 WinMD5 2.07
… ed if your download completed correctly. Are the copies on my machine exactly the same as the ones on the server? MD5 is the name of a "hashing" algorithm which will answer this question. MD5 hashes are fingerprints of files. You can compare the fingerprints of two files to see if the files… 

DupeNuker 2.0.1 DupeNuker 2.0.1
…  method is ideal for removing spam from files that you download from newsgroups. Even after you throw away the files, DupeNuker keeps their fingerprints in its database, and if you download them again, it will identify them and delete them.… 

Desktop Login 1.0.1 Desktop Login 1.0.1
… logging using either password or fingerprint, logging using both fingerprint and password. High security: no chance of someone forgetting or telling someone else their password. Easy to use: there is no need to change the target application or writ… 

Floke Integrity 0.01 Floke Integrity 0.01
… rprints" are stored and checked against, when you fear that your files have been subject to tampering or changes from hardware/software malfunction. New in this release is increased user friendliness, with the use of Wizards and an overall face-lift.… 

DuMP3 0.2.14 DuMP3 0.2.14
… DuMP3 (derived from Duplicate MP3) is an application written in Java that was designed to find any duplicates or similar files. DuMP3 finds files by calculating a fingerprint based on the image, audio or text data for each file and then comparing the fingerprints. DuMP3 does not compare filen… 

File-Reg 1.0.23 File-Reg 1.0.23
… erty’ at a certain moment in time. In many cases, and in most countries, you automatically acquire Copyright when you create your work. But how can you prove it existed at that moment? Register at File-Reg.com- and we can provide that proof!… 

FingerPoint 1.4 FingerPoint 1.4
… se. Improved fingerprint display, shows fingerprint features with directions. Possibility to load TIFF fingerprint images. Full/Fast search mode (search for duplicates or not). Limitations Demo version allow enroll only 10 persons.… 

BioCert Authenticator Lite Edition 10 Users 1.2 BioCert Authenticator Lite Edition 10 Users 1.2
… e includes a Numerical an Alpha-Numerical field and also a Payload that makes it possible to hide and highly encrypt a secret value within the fingerprint template. Requirements Need BioCert Fingerprint scanner Limitations 10 fingerprints… 

Desktop Identity 1.0.1 Desktop Identity 1.0.1
… ormation to the third-party software. In this mode it integrates with any existing system, such as time and attendance, check-in / check-out, access control, even if this is a legacy, text-oriented, system. How does it work? When you register the fingerprints, you link each person to an ID (h… 

Fingerprint Recognition System 5.1 Fingerprint Recognition System 5.1
…  explicit detection of complete ridge structures in the fingerprint are difficult to extract automatically. The widely used minutiae-based representation does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be… 


Related: