the integrity free software
Search results for tag «the integrity»:
crc 2.2.4
… rc features
Check the CD integrity (zip, disque,etc)
Check the integrity of a network transfer (local network, ftp, e-mail..)
Check the integrity of a disk area.
Check if a CD/Hard disk is readable.…
Floke Integrity 0.01
… rprints" are stored and checked against, when you fear that your files have been subject to tampering or changes from hardware/software malfunction. New in this release is increased user friendliness, with the use of Wizards and an overall face-lift.…
GFI LANguard System Integrity Monitor 1.0
… indows 2000/XP system.
If this happens, it alerts the administrator by email. Because hackers need to change certain system files to gain access, this FREEWARE utility provides a great means to identify any servers that are open to attack.…
Integrity Messenger 4.11
… Connects to 5 networks
(Integrity, MSN, AIM, ICQ, Yahoo)
Emoticons and Emotisounds
Searchable Chat History
Contact Groups
Firewall Support
Language Filtering
Chat Rooms (Public or Private)
Multi Send
(Send a Message to Mulitple buddie…
MD5 Checksum Verifier 6.2
… verify the integrity of your received files…
FileCheckMD5 00.02.01.1
… hich can then be loaded in for testing to determine if the files have changed at all.
Great for putting in the root folder of a CD-ROM to make sure the disc isn't defective when it is burned or mass produced.…
System Integrity Checker 0.0.1
… …
FastSum Command Line Edition 1.9.0.149
… mmand-line interface. It is an analogue of a famous md5sum Unix platform utility.
FastSum has two basic modes:
Checksums calculation - checksums are used as samples for ulterior verification of sample values with the current ones to identify the integrity of files between the verifications.…
EF CheckSum Manager 22.03
… ble to verify in a simple manner the integrity of the downloaded data. Save online costs, download only the bad, corrupt, incorrect size or missing files.
Requirements
2 MB free space on your harddisk…
SafeLaunch 2.0
… ny attempt to modify files or the registry, to access a device directly, or to connect out over the network will be automatically intercepted by Safe Launch, giving you the option of either allowing the activity to occur or denying permission.…
Related: