17 Jan 2015
Appnimi SHA1 Decrypter helps in decrypting any SHA1 hash. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true SHA1 Decrypter available in the market. Above all it is FREE. It...
17 Jan 2015
Appnimi SHA1 Decrypter helps in decrypting any SHA1 hash. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true SHA1 Decrypter available in the market. Above all it is FREE. It...
17 Jan 2015
This application grabs a screen shot given pre-selected dimensions. It is an ideal adjunct to the highly acclaimed IrfanView image viewer. In addition to a stained-glass effect, there are thirteen image effects that can be applied after image capture. The...
17 Jan 2015
Appnimi SHA512 Decrypter helps in decrypting any SHA512 hash. In appropriate infrastructure it works at a speed of more than 1 million words per second. One of the fastest true SHA512 Decrypter available in the market.SHA512, is probably the most...
17 Jan 2015
Code written in Java is compiled into bytecode language. The problem is that Java bytecode can be easily decompiled into readable source code. This can be done with the help of decompilers such as JD or JAD decompiler, using such...
17 Jan 2015
Tom's Hash Calculator is a free Windows tool for verifying file integrity by calculating cryptographic hash values. The Hash Calculator offers a unique user interface that provides for easy bulk calculations of entire folders or you can double-click a file...
17 Jan 2015
Free MD5 SHA1 Verifier is a freeware tool designed to calculate and verify checksums (hash) of downloaded files. Supports MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512. Key Features: The program has a convenient user interface. Instantly calculate checksum (hash) for...
17 Jan 2015
RecoverIT is an easy to use password recovery tool that uses advanced forensic decryption algorithms to recover your lost passwords. RecoverIT does not depend on an installation procedure, and can therefore even be run from a USB-stick, without leaving any...
17 Jan 2015
DoGoodSoft Best Encryption Expert is a professional and powerful file and folder encryption package. It protects files and folder with super fast and strong encryption. You can choose from three encryption methods when encrypt a folder. Full encryption encrypts all...
17 Jan 2015
ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users,...
17 Jan 2015
USB Encryptor is a professional USB storage encryption package. It can encrypt all data in a storage device in just seconds, whether it is a USB flash drive, removable drive, memory card or a memory stick. Data encrypted by USB...
17 Jan 2015
Iside compares files and folders by computing their hash code (MD5,SHA1,CRC32,...). Right click on a file, select Copy and by right clicking on another file you will discover if the two files are equal. Includes file comparison, hash generating tool...
17 Jan 2015
KRyLack File Checksum Tool is advanced freeware utility to generate a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. A Hash (Checksum) is a sort of digital fingerprint, uniquely identifying each file. These are common hashes that...
17 Jan 2015
DoGoodSoft Best Folder Encryptor is a professional and mature file and folder encryption package. It encrypts files and folder with superfast, strong and faultless algorithms. You can choose from five encryption methods when encrypting a folder. Flash Encryption instantly encrypts...
17 Jan 2015
EF Commander is a powerful and multi-featured file manager witch a wide range of users, from beginners to professionals, will find easy to use. Here are some key features of EF Commander: * Easy to use - The modern interface...
17 Jan 2015
Crypto 2000 is a small, easy to use, Windows file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents and information, and then enter an encryption key to encode and decode the files you...