Sha Software

 

Authent-I

Authent-I includes over 20 forms of authentication hashes supported, including the popular MD5, CRC, & SHA methods! Also, you get an intricate file comparison tool that verifies every file and finds any duplicates! In addition it features a full fledged Mass File verification tool to run multiple authentications on thousands of files at once! And theres more!

The UDC

Program is designed for the password recovery by the hash-value (44 hash-functions included - MD4, MD5, DES, NTLM, GOST, SHA and others) using 5 high-speed attack methods. Distributed bruteforce and multicore attack are supported. The program is considerably optimized for the "mass cracking" (very big amount of hashes at once without decreasing of the search speed).

RSP Checksum OCX

This ActiveX OCX can compute very fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and SHA-256 , the code is optimized for new AMD and Intel processors running very fast in the win32 environment

Polar Crypto Component

Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto is an ActiveX and DLL component featuring the latest encryption technology and including full source code written in MS Visual C++.

Duplicatch

Analinx Duplicatch provides you with power to find and reliably identify duplicates (copies) of any file on your storage media not by its name or size, but by its content! Pictures could be optionally compared on the basis of their visual similarity using unique picture fuzzy comparison technology. Duplicatch supports more than 30 different graphic formats, 5 different modes of file comparison, and looks simply amazing!

ASP/Encrypt

ASP/Encrypt is a server side COM component that allows web developers to strong encrypting and decrypting of text and files. Supports the latest industry-standard strong encryption and hashing algorithms including: Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160, etc.

Hexprobe Disk Encryption Tool

A simple, easy-to-use disk encryption tool that encrypts and password protects your removable and external disk. It allows you choose a secure password and a gold lock or a silver lock to encrypt the logical drive on your various disks. And it uses 256-bit AES algorithm for maximum security and does not store the password on any media. Its powerful encryption ensures that only you can open an encrypted logical drive.

Hash

Forensic examiners often need to quickly obtain the hash values for potential evidence files for reports or to verify their results. Pinpoint Hash was created to allow users to quickly obtain the hash values for CRC-32, MD5, SHA-1 and SHA-256 hash values for any file and quickly copy the results to the clipboard for easy transport to any other application. It''s quick. It''s simple. It''s free. Enjoy.

Encoder Wizard ActiveX

Encoder Wizard is a collection of two ActiveX (ocx) controls, Encoder Wizard and Decoder Wizard. These two controls allow you to fully support the Base64, Quoted- Printable, UUEncode, yEnc, MD5,HMAC MD5, URL, SHA-1, and Binary 2 Hex encoding methods. You can Encode and Decode data quickly and intelligently.

Signit

Create small (~40Kb) self-checking signature (exe-file) for folder contents. Based on SHA-1. Allows receive list of modified and removed files.

Secret Server - Password Management

Secret Server is a secure password management system for information technology teams. This password manager features AES 256 bit encryption, the U.S. government standard encryption algorithm. Users can safely store, view, audit and when necessary, share administrator passwords. Secret Server features two powerful add-ons: Active Directory (integration, synchronization) and remote password changing.

Sentinel

Sentinel works by analyzing exploits in both your Registry and your system folders; integrating with ANY Anti-Virus program to quarantine these threats. Sentinel's Integrity Checker will notify your anti-virus/trojan application(s) if any file has been modified or added in any way whatsoever (using either a heavily optimized CRC32, SHA-1, MD5 or MD4 algorithm--for those of you who don't speak geek: Sentinel is fast, and very secure).

AccuHash

Utility for protecting the integrity and verifying the accuracy of data files using checksum (message digest, hash) calculation algorithms like CRC32, MD5, SHA-1 and more. Its will allow to easily and quickly verify integrity of files downloaded from Internet, transferred over a network and/or burned onto CD/DVD. Uses the XML-based and Unicode-enabled checksum file format and also supports the SFV, MD5SUM and other checksum files formats.

FreeOTFE

FreeOTFE is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored. Many features included, with both PC and PDA versions available.

FSUM

Fast file checksum generation & verification tool. Allows to create/verify popular file hash/checksum: MD2,MD4,MD5, SHA-1,SHA-2(256,384,512), RIPEMD-160,PANAMA,TIGER, CRC-32,ADLER32, and the message digest used in eMule/eDonkey(ed2k) software. Use it to check files for corruption (data integrity checking). Allows to recurse directories. Supports MD5 & SFV files. Compatible with md5sum, MD5Summer, Easy MD5 Creator, SFV Checker/Verifier, Win CRC32.

PasswordsPro

The professional program to recover the passwords for user hashes. The range of hashes supported include: MySQL, MD5, SHA-1 and others. The program also supports many complex hashes like md5($pass.$salt), md5(md5($pass)) and others. Because the program has a convenient open API, it is possible to quickly modify and supply the program with any required hashing module written in any programming language.

NCrypt TX

NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal characters. Automatically converts a weak password into a strong one.

HIME: Huge Integer Math and Encryption

HIME is a library with encryption functions and huge integer math functions. RSA public key, AES (Rijndael), RC4 secret key encryption, MD5, SHA-256 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman... Every programming language that can access a dll can use HIME: C, C++, Visual Basic, Delphi, PowerBASIC, PureBASIC.. The math functions work with huge integers that can be up to 2^31 bits long (268 million digits).

SecureWord

SecureWord was originally designed as the most convenient and fully functional program for storing important information such as logins, passwords and files. Modern and secure encryption algorithms, An improved security system, Convenient and easy interface, Quick and adjustable search system, The passwords generator and much more.

Hyper Hasher Suite

The Hyper Hasher Suite will fulfill all your file hashing needs. Hyper Hasher allows you to calculate 26 different hash/checksum and HMAC values for any file on your system, while the HashFile utility adds support for MD5 & SFV file creation and verification. These tools feature advanced options including a unique customizable interface, configuration saving, optional windows shell integration, Pentium 4 optimizations for speed, and much more!

febooti fileTweak Hash & CRC

febooti fileTweak Hash & CRC is a freeware hash / CRC calculator. Compute hash fingerprint / CRC checksum from any provided file. Supported hash / CRC formats: CRC32, MD2, MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, WHIRLPOOL-1 and Tiger-192.

Neo Napster

NeoNapster is a free file sharing program based on the Gnutella protocol. Similar to Napster and Morpheus, NeoNapster gives users the ability to search for, download, and share music, videos, software and more with millions of others. NeoNapster supports the most powerful Gnutella features, such as multi-host download swarming, Ultrapeer compatibility, SHA-1 hashing, download resuming, IRC integrated chat, firewall compatibility, and much more.

CommuniCrypt File Encryption Tools

File encryption/decryption tools with strongest AES algorithm. Can generate the hash of the source file as password for symmetric encryption(64 digits password). Encryption strength AES Rijndael: 256 bit / Hash: SHA-256

cryptlib

A security toolkit letting even less experienced programmers add encryption and authentication services to their apps, features that are becoming indispensable. The library hides low-level details of security from developers. It supports a variety of algorithms for symmetric/asymmetric encryption, authentication, and hashing. The library is free for non-commercial/shareware projects. It is written in C. ActiveX and C++ wrappers are available.

MEO File Encryption Software

MEO is a powerful data encryption application to encrypt or decrypt files of any type, including Microsoft Word, Excel and PDF documents. MEO allows you to protect your sensitive data against un-authorized viewers by utilizing the latest data encryption technologies. Keep your documents safe and secure with this free data encryption software.

QuickHash Library

Fast, highly optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums and HMACs for files, memory blocks, strings, streaming data. Has no external dependencies such as MFC DLL, COM/DCOM or other component. The help file has examples in Visual Basic(VB), C, C++.

 

Copyright (C) 2003-2011 FilesLand.com