using sha256 free software
Search results for tag «using sha256»:
FastMD5 1.3 NET 1.1 / 1.4 NET 2.0
… FASTMD5 create very fast with low CPU use a
MD5/SHA1/SHA256/SHA384/SHA/512 hash.
Can make a MD5 sample for SimplyMephis2004.ISO 689MB in 15,97 second.
Requirements
.NET Framework…
JSummer java build 0.0.5.1
… D5, SHA-160 and SHA-256 message digest. Console-Version and GUI.
Here are some key features of "JSummer":
calculation of MD5, SHA160 and SHA256 message digest
recursion of directories
checking of MD5, SHA160 and SHA256 message digest
GUI (SWT)…
JSummer native 0.0.5.1 beta
… er, *.exe-wrapper for java-version and file-menue entries
Here are some key features of "JSummer native":
calculation of MD5, SHA160 and SHA256 message digest
recursion of directories
checking of MD5, SHA160 and SHA256 message digest
GUI (SWT)…
EDCrypt 3.1
… ample projects in several languages are included in the package.
EDCrypt is a stand-alone component. It does not require any other files to work. The control can be distributed royalty-free in an unlimited number of commercial applications.…
Fire Encrypter 2.8
… g ciphers:
AES (Rijndael 128Bit)
Affine
Vigenere
Caesar
XOR
OTP (One Time Pad)
Morse Encoder
Rail Fence
MD2 Hashing
MD5 Hashing
SHA1 Hashing
SHA256 Hashing
SHA384 Hashing
SHA512 Hashing
Secure password generator.
Requirements
Mozil…
CypherZIP 1.0.0
… (SHA256), safer than the 128/160 bits used by others.
CypherZIP is very affordable since it can also be called through the MS-Windows Explorer context menu. If you need privacy in ZIP files, you need CypherZIP!
Limitations
30 day trial…
CYPHER MILLENIUM 6.0.3
… ons using a very friendly interface.
- Allows to encode/decode thousands of files in one single operation.
- File-Lists allows users to make repetitive/daily operations of cryptography in files and folders.
- File-Lists protected against intruders…
LLCryptoLib 2.0.1024
… Framework 1.1
Limitations
This version has no limitations, but it can't be used in enterprise or commercial projects and can't be redistributed.…
CryptoStorage for Pocket PC 1.5.1
… and SHA256 hash algorithms and is based on the password you enter.
The program has no "backdoors". If you do not know the password, you will not get access to the encrypted data!
CryptoStorage works on Pocket PC 2002 or Windows Mobile 2003 devices.…
Ultra Crypto Component 2.0.2013.6
… SHA384, SHA512, DES, 3DES, 3DES2, AES128, AES192, AES256
Import and export key in plain or raw bits
Demos in VBScript, ASP, ASP.Net, C#, VB.Net, Php, VB6, Delphi, Coldfusion and BCB are avaiable
.Net ready component
Limitations
30 day trial…
Related: