ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 4 5 6 ... Next » (7 pages) Displayed: 1 - 25 of 162
Sort by:  relevance | title | downloads | rating | date
VSCryptoHash 64-bit
VSCryptoHash 64-bit 2.5.3.509   
VSCryptoHash 64-bit is cryptographic hash calculation software. Simply drag and drop files (or type the text) in this calculator and hash string for the files (or for entered text) ... control sums. VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 ...
Freeware

Picard screenshot
Picard 2.27.2   
... can search by tag or short git commit hash. In your Picard clone, run ./gradlew shadowJar -Dhtsjdk.version=VERSION, where VERSION is the version of the HTSJDK master branch snapshot you want ...
Open Source

qBittorrent
qBittorrent 5.0.0   
... for various BitTorrent extensions, including Magnet links, Distributed Hash Table (DHT), Peer Exchange Protocol (PEX), and Local Peer Discovery (LSD). These extensions enhance the efficiency and speed of torrent downloads, ...
Open Source

VISCOM Video Edit Converter Gold
VISCOM Video Edit Converter Gold 5.27   
... different text style, including outline , filled outline, hash brush text style. Add awesome effects (over 50 effects) (any combination of video clips). Draw multi-line text at a specific time ...
Shareware | $40.00

Md5deep screenshot
Md5deep 4.4   
... - md5deep can accept a list of known hashes and compare them to a set of input ... input files that match the list of known hashes or those that do not match. Hashes sets ...
Freeware

Hash Suite
Hash Suite 4.0   
Hash Suite is a very efficient auditing tool for many password hash types. It is very fast, yet it has ... memory requirements even when attacking a million of hashes at once. The GUI is simple yet uses ...
Shareware | $39.95

File Checksum Tool
File Checksum Tool 1.41   
... a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. A Hash (Checksum) is a sort of digital fingerprint, uniquely identifying each file. These are common hashes that are used to verify the integrity and ...
Freeware

Boxoft Duplicate Music Finder
Boxoft Duplicate Music Finder 1.5   
... a good choice. You can also choose fast hash or file size algorithms in order to find exact duplicate mp3 files. When the scan process is finished the program shows ...
Shareware | $27.00

PostgreSQL
PostgreSQL 18.3   
... applications. Its advanced indexing techniques, such as B-tree, Hash, GiST, SP-GiST, GIN, and BRIN, ensure efficient data retrieval and management. **2. Extensibility:** One of PostgreSQL's standout features is its ...
Freeware

Awesome Miner Free Edition
Awesome Miner Free Edition 11.5   
... from a single location, with real-time data on hash rates, hardware temperatures, and overall system health. The ... hardware failures, temperature thresholds, or significant drops in hash rates. Notifications can be delivered via email or ...
Shareware | $4.00

HashPass screenshot
HashPass 5.2   
... transfers your chosen password-to-be into a unique secure hash, which becomes your real password. It can be ... use in drag-and-drop mode bypasses Clipboard entirely. With HashPass you will never ever enter your sensitive passwords ...
Freeware

Metamorphosec String Hash Generator
Metamorphosec String Hash Generator 3.1.0   
Metamorphosec String Hash Generator can generate hashes for specified string. It supports 95 hash algorithms. It also supports string properties (i.e. Lines, ... descending order. It also accommodates to set generated hashes in uppercase or lowercase. The results can be ...
Shareware | $24.95

ExpPrint x64 screenshot
ExpPrint x64 6.7.2.0   
... types that Windows supports, as well as computed hash values. It can output to HTML, plain text, ... Focal Length, Dimensions, Date Taken, etc. Computed hash values: CRC32, MD2, MD4, MD5, SHA-1, SHA-256, SHA-384, ...
Demo | $12.00

TinyUmbrella
TinyUmbrella 9.3.4   
... combines them with your ECID and generates a hash that ONLY APPLE can generate. iTunes packages up this valuable information and sends it to your device. Your device checks the ...
Freeware

JSignPdf
JSignPdf 2.2.0   
... through CRL and/or OCSP setting certification level setting hash algorithm PDF encryption and setting rights comprehensive Swing GUI support for batch processing (controlled by command line arguments, without GUI) ...
Freeware

RHash
RHash 1.3.3   
RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, MD4, MD5, ... RIPEMD-160, HAS-160, EDON-R 256/512, Whirlpool and Snefru-128/256 algorithms. Hash sums are used to ensure and verify integrity ...
Freeware

xCELLhash screenshot
xCELLhash 2.3   
... an Add-In that allows users to perform one-way hash functions (such as MD5, SHA-1, SHA-2) on data ... data as hexadecimal strings. xCELLhash also supports the hashing of files; select a file or provide the ...
Shareware | $9.99

Snapshotter Pro
Snapshotter Pro 2.0.0   
... many methods: Entered ID with each URL, MD5 Hash of the full URL, Server name of the URL, or Domain name of the URL. · Create full size screenshots or ...
Trialware | $79.00

SRecordizer screenshot
SRecordizer 1.0   
SRecordizer is a quick and simple S19 (Motorola S-Record) file editor created to fill the void. Features: - Open, edit and save directly in the S19 file format - Error ...
Open Source

.netshrink
.netshrink 2.8   
... password. Password protection uses verification based on SHA256 hash function and 256 bit AES / Rijndael encryption. ...
Demo | $59.00

DevToys
DevToys 1.0.13.0   
... generation and validation tools. These include GUID generation, hash computation, and even lorem ipsum text generation for ... includes utilities for generating secure passwords, calculating cryptographic hashes (MD5, SHA-1, SHA-256), and even encoding and decoding ...
Open Source

OPSWAT File Security for Chrome
OPSWAT File Security for Chrome 4.8.0   
**OPSWAT File Security for Chrome: A Robust Shield for Your Browser** In an era where cyber threats are becoming increasingly sophisticated, ensuring the security of your digital workspace is paramount. ...
Freeware

Azureus
Azureus 5.7.6.0   
... your shares (periodic scanning of a dir)... -Distributed Hash Table: host on it a completely decentralised torrent and/or benefit from it when the tracker is offline. ...
Freeware

Tixati Portable
Tixati Portable 3.39   
... noteworthy feature is Tixati's support for DHT (Distributed Hash Table) and PEX (Peer Exchange), which enhances the ability to find peers and improve download speeds. The software also includes a ...
Freeware

Appnimi MD2 Decrypter
Appnimi MD2 Decrypter 1.0   
Appnimi MD2 Decrypter helps in decrypting any MD2 hash string. In appropriate infrastructure it works at a ... FREE. The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.[2] The ...
Freeware
Results Page: 1 2 3 4 5 6 ... Next » (7 pages) Displayed: 1 - 25 of 162
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags