Hash Codes 1.5
A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value.
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- SSuite NetSurfer Browser x64
- UltraFileSearch Std
- Pen Drive Recovery Free
- Aiseesoft iPhone Cleaner...
- AnyMP4 Blu-ray Ripper
- Apeaksoft iOS Unlocker
- Apeaksoft Screen Recorder...
- AnyRec Video Enhancer
- Windows Data Files Undelete
- Data Unerase Software
- Mac Removable Media File...
- Data Recovery Software
- Vista Partition Data...
- Softaken MS PowerPoint...
- Verwijderde Bestanden...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Hash Function Download
-
1
-
2abylon FREEHASH 1.5
The hash function determined a fixed length checksum from a file of any size. This cross-or checksum is similar to a fingerprint for each file and almost clear. This allows files to compare, without checking the contents of the file itself. Features: ...Freeware -
3MDFiveCheck 1.0
The MD5 Message-Digest Algorithm is a widely used cryptographic hash function with a 128 -bit (16-byte) hash value. MDFiveCheck is a simple .NET ClickOnce MD5 checker application that can either validate or create an MD5 Checksum for any given file.Freeware -
4SumChecker 0.4
The MD5 Message-Digest Algorithm is a widely used cryptographic hash function with a 128-bit (16-byte) hash value. In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency and published by the NIST as a U.S. Federal ...Freeware -
5ASPEncrypt 2.4
With AspEncrypt, you can encrypt data, send S/MIME-based secure mail, compute one-way hash values, generate and verify digital signatures, issue and manage X.509 digital certificates, and more. This component can be used in an ASP/ASP.NET or VB environment ...$300.00 -
6ASP/Encrypt 2.6
With AspEncrypt, you can encrypt data, send S/MIME-based secure mail, compute one-way hash values, generate and verify digital signatures, issue and manage X.509 digital certificates. -
7Appnimi MD2 Decrypter 1.0
Appnimi MD2 Decrypter helps in decrypting any MD2 hash string. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true MD2 Decrypter available in the market. Above all it is FREE. The MD2 Message-Digest ...Freeware -
8Appnimi MD5 Decrypter 1.0
Appnimi MD5 Decrypter helps in decrypting any MD5 hash. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true MD5 Decrypter available in the market. Above all it is FREE. The MD5 message-digest ...Freeware -
9Appnimi SHA384 Decrypter 1.0
Appnimi SHA384 Decrypter helps in decrypting any SHA384 hash. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true SHA384 Decrypter available in the market. Above all it is FREE. A hash function ...Freeware -
10HIME: Huge Integer Math and
RSA public key, AES, RC4 secret key encryption, MD5, SHA-512 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman, compression, securely erase files. Every programming language that can access a dll can use HIME: C, C++, C#, ...$59.00 -
11.netshrink 2.6
Password protection uses verification based on SHA256 hash function and 256 bit AES / Rijndael encryption.$59.00
Buy -
12ZeitControl BasicCard Development
With the BasicCard Development Kit, any programmer proficient in BASIC will be programming a smart card in one day, even without prior smart card experience. BasicCard® is the first smart card programmable in BASIC. It is easy to use, open to ...$77.57 -
13AutoRunnerX 1.4.1
In addition, a hash function for programs is integrated to detect manipulations by computer viruses and this feature is very important especially when you use portable software.Freeware -
14Data Structures Using C 1
Some of topics Covered in this application are: 1) Introduction to Data Structures 2) Types of data structures 3) Primitive and Non-primitive Data Structures 4) Binary and Decimal Integers 5) Algorithm 6) Time and Space Complexity 7) Logical Information 8) Storage of Information 9) Hardware and Software 10) Concept of DataTypes 11) Abstract data type 12) Pointers 13) Structures in C 14) Union 15) Algorithm 16) Data Types 17) Data Types in C 18) Integer data types 19) Overflow in char and unsigned char data types 20) The Char Type 21) Floating-point numbers 22) Type conversion 23) Forced conversion 24) Type casting 25) Assignment operator 26) Arithmetic operators 27) Relational operators 28) Logical Operators 29) Ternary operators 30) Increment Operator 31) Comma operator 32) Bitwise operators 33) Operator precedence 34) Control Structures 35) if statement 36) if-else if 37) The switch statement 38) The while loop 39) The do-while loop 40) The for loop 41) The break statement 42) The continue statement 43) The printf Function 44) Placeholders ...$1.00 -
15Network Management & Security 1
Hash function 56. MD5 Message Digest Algorithm 57. MD5 Compression Function 58. Secure Hash Algorithm 59. RIPEMD-160 60. HMAC 61. Public key Cryptography 62. Attack on Public-key Cryptography 63. Applications for public-key cryptosystems 64. RSA algorithm ...$1.00 -
16iAntiSpy 1.0
Your information is safe, iAntiSpy does not actually know which domain you are requesting - all of our databases and the request itself is transformed using a one-way cryptographic hash function before processing. The only place the actual requested ...Freeware -
17Function Grapher 3.7.3
Function Grapher is graph maker to create 2D, 2.5D and 3D function graphs, animations and table graphs. 2D Features: -Explicit function, implicit function, parametric function, and inequality graphing. -Cartesian and polar coordinate systems. -Curve ...$35.00
Buy -
18Hash Suite 2.0
Hash Suite is a very efficient auditing tool for Windows password hashes (LM, NTLM, and Domain Cached Credentials also known as DCC or MSCash). It is very fast, yet it has modest memory requirements even when attacking a million of hashes at once. The ...$29.95
Buy -
19Hash Tool 1.1
A freeware utility to calculate the hash of multiple files. This is a 128-bit number usually expressed as a 32 character hexadecimal number. It can be said to be the 'signature' of a file or string and is used in many applications, including ...Freeware -
20Function Analyzer 1.0
Function Analyzer is a program that draws the graph of a function with one variable declared by the user. The operators used to build the mathematical expression are the usual ones used in software calculators: * for multiplying, / for dividing, ^ for ...Freeware -
21Hash Compare 1.5
Hash Compare is the FREE File Hash comparison tool. It performs Hash based Integrity Comparison using any of the the popular hash algorthms such as MD5, SHA1 or SHA256. To make the task easier and quicker, it also supports the 'File Drag & Drop' ...Freeware -
22Digital-Fever Hash Bruteforcer
Digital-Fever Hash Bruteforcer is an application that you can use to decode MD5, MD2 and SHA1 hashes using brute force. All you have to do is input the hash and select its type then start the task. Digital-Fever Hash Bruteforcer supports custom charsets ...$5.00 -
23NH's Function Point Analyzer 1.0
With NH's Function Point Analyzer it is easy to get a quick and clear documentation of function point countings according to IFPUG (International Function Point Users Group) standard 4.2. While counting, you will record functions and databases in NH's ...$150.00 -
24Unlock Copy Function in PDF 7.01
The easiest way possible to Unlock Copy Function in PDF documents is available with Unrestrict PDF software. This program gives apt solution to Unlock Copy Protection in PDF. Adobe PDF file when restricted with owner password protection it stops user ...$19.00
Buy -
25Unlock Print Function PDF File 7.01
Not a problem your PDF file must be locked with owner password protection in this situation you can use Unrestrict PDF software to Unlock Print Function PDF File. The best way to Unlock Print Function PDF is right here. There is no other tool better ...$19.00
Buy