Portable Hash Codes is the portable version of Hash Codes developed to be able to run from a USB flash drive or any other portable device. This application is designed to hash data from keyboard, file or CD/DVD. It uses Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm.
· Hash data from keyboard, file or CD/DVD · Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm. · Copy hash codes to clipboard or save to disk · Can compare hash codes. · Load saved hash code file to comparison. · The progress bar show the current process. · Suspend, resume or stop the hash process. · Save the log information. · Display the hashing time. · Multilingual user interface (english, german, polish, slovenian). · Drag and drop support. · Can be used as standalone software.
We periodically updates pricing and software information of Portable Hash Codes 1.56.270.8500 full version from the publisher, so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of Portable Hash Codes 1.56.270.8500 Edition. Download links are directly from our mirror sites or publisher sites, torrent files or links from rapidshare, megaupload, torrent sites, mediafire, easyshare, 4shared, badongo, box.net, divshare, filefactory, ifile, ifolder, megashare, sendspace are not allowed
Secure NTFS Portable is a professional application designed to create invisible password protected storages for your files and folders on any portable drive formatted in NTFS. Requirements: · NTFS formatted portale disk Limitations: · 100 trial attempts to open storages · Storag....
Quick Checksum Verifier is a simple tool designed to help you check file integrity by using time proven algorithms.You can easily create checksums of files and verify their integrity in the future. The operation is very easy, just two steps. Load the file and paste the predefined checksum.This softw....
TrueCrypt is a software designed to protect your important data by encrypting it. It can also maintain an on-the-fly-encrypted volume (data storage device).Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations)....
Quick Checksum Verifier is a simple tool designed to help you check file integrity by using time proven algorithms.You can easily create checksums of files and verify their integrity in the future. The operation is very easy, just two steps. Load the file and paste the predefined checksum.This softw....
Portable Encryption and Decryption is a powerful application designed to encrypt documents, files and instant messages on different computers. Portable Encryption and Decryption is strong text and file encryption software for personal and professional security. It allows you to p....
Windows 7 Firewall Control Plus Portable is a useful program that allows you to control personal information leakage via controlling application network traffic. Manages and synchronizes port forwarding provided by external network connection (firewall/router) box with applications requirements and activity....
Windows 7 Firewall Control Portable is a lightweight application that allows you to control personal information leakage via controlling application network traffic. Manages and synchronizes port forwarding provided by external network connection (firewall/router) box with applications requirements and activity....
Portable Hash Codes is the portable version of Hash Codes developed to be able to run from a USB flash drive or any other portable device.This application is designed to hash data from keyboard, file or CD/DVD. It uses Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-....
Portable Code Master 2 is the portable version of Code Master 2 designed to be able to run from a USB flash drive or any other portable device. Portable Code Master 2 is designed with DES encryption and transposition encryption and you can also use a Caesar shift cipher to encrypt and decrypt your messages and many more ciphers besides....
Portable Hash Codes is the portable version of Hash Codes developed to be able to run from a USB flash drive or any other portable device.This application is designed to hash data from keyboard, file or CD/DVD. It uses Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-....
torrent files or links from rapidshare, megaupload, torrent, mediafire, 4shared, badongo, box.net, filefactory, ifile, ifolder, megashare, sendspace ARE NOT posted