DiamondCS MD5 1.0
This is our implementation of the famous MD5 algorithm, and presents an easy and highly secure way of verifying the integrity of files. Single-line text, multi-line text and file contents are all supported inputs.Software is often accompanied by an MD5 ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- SSuite Office Premium HD+
- Android Files Recovery Program
- FoneLab HyperTrans
- Convert MySQL to Microsoft SQL
- Aiseesoft FoneLab for Android
- AnyMP4 Blu-ray Creator
- Flash Drive Data Restore
- FAT Volume Data Recovery
- Restore Deleted Mac Files
- Quick Receipt Software
- UltraFileSearch Std Portable
- MSMassEmailSenderPro
- USB Flash Drive Recovery
- Softaken MS Excel Recovery
- ToolsBaer MSG to Hotmail...
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Algorithm Download
-
26Freeware
-
27Younicate Speech Recognition
Powered by a sophisticated algorithm, Younicate launches commands from speech recognition without mistake nor training. Add songs automatically to the organized collection to start. User-friendly sound feedback, acknoledges and automatically recognizes ...Freeware -
28ActiveX/ASP/VBA/COM Multi
Free-threaded hi-speed dictionary algorithm with unique/nonunique keys (map/multimap). Connect to another dictionary object in the same process. Lock and Unlock methods to synchronize tasks (application scope). Share ASP Application/Session objects.$34.00 -
29Nucleus Kernel Undelete 4.02
Nucleus Kernel Undelete Data Recovery Software uses quick algorithm QFSCI for searching and restoring deleted files and folders and hence is a fast, simple and easy to use Windows Undelete file recovery software, which helps you to recover your lost ...$29.00 -
30Privacy Fence 1.2
Privacy Fence is Internet Eraser, it completely erases all your tracks on a computer with security algorithm approved by DoD and NSA, therefore your privacy is fully protected.$39.95 -
31MD5 Com Component 1.00
The MD5 Com Component creates an RFC1321 compliant MD5 string from a string of text or file content, The MD5 algorithm takes as input a string of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" ...$39.95 -
32FileEncryptor 1.0.3.0
FileEncrypter is a small freeware utility that is capable of encrypting files with the officially recognized encryption algorithm - AES (Rijndael). The key length of the algorithm may vary from 128 to 256 bit to ensure the maximum protection of encrypted ...Freeware -
33FirmTools PhotoPrinter Pro 2.0
PhotoPrinter software will help you to print photos of a higher quality than in many other advanced programs due to our own algorithm of resizing. Automatic optimal arrangement of different sized photos on one page or multiple pages allows you to save ...$19.95 -
34LanVoyager 1.2
Using the fastest search algorithm, LanVoyager helps you to find music, films, pictures, documents and other files in LAN. The main idea of the program is to create the data base of all computers in your network. Then you can look for necessary files ...$20.00 -
35IDFile 1.0
File verification utility, uses SHA-2 algorithm.Freeware -
36CryptWizard 1.0
It support many encryption algorithm including AES, Serpent, Blowfish, Twofish and Triple DES. It also supports compression at the same time.24.00
Buy -
37HLPlanner 1.0
HLPlanner is completely FREE mixed gas decompression software utilising the VPM-B algorithm. HLPlanner’s “engine” is loosely based on Erik Baker’s Fortran 77 code, available in the public domain. The program has ...Freeware -
38PHP Protector 1.3
The PHP Protector algorithm is based on components and functions which are available on all PHP web servers. To put it another way: scripts protected using PHP Protector run in all places where non-protected scripts would also run. The PHP Protector ...$119.00 -
39The Link King 6.5
The Link King’s probabilistic record linkage protocol was adapted from the algorithm developed by MEDSTAT for the Substance Abuse and Mental Health Services Administration’s (SAMHSA) Integrated Database Project. The deterministic ...Freeware -
40Neurotechnology Free Fingerprint
In 1998 Neurotechnology developed VeriFinger, a fingerprint identification algorithm, designed for biometric system integrators. Since that time, the company has released 14 algorithm versions, with the current version, VeriFinger 6.3, providing the ...Freeware -
41My Free Antivirus 2.2
My Free Antivirus is a unique algorithm of scanning, high speed of detection, daily antivirus base updates, protection from cyber viruses, trojans, worms. The Free Antivirus real-time protection module allows you to prevent malware intrusion attempts. -
42WinSesame 10.3
WinSesame comes with 6 encryption algorithms, including 3 special algorithms with limitless key length and 1 algorithm allowing the use of signature files. WinSesame is the most powerful encryption software to encrypt and password protect all types of ...$47.25 -
43Uconomix Encryption Engine 1.0
The Uconomix Encryption Engine is a encryption/decryption software for protecting files by using powerful mathematics algorithm for encryption and a personal password. The encrypted files are hidden so nobody can see them, unless by using the password ...$19.99 -
44Alligator Data Guard 1.0
Alligator Data Guard is a powerful tool for protecting your confidential information, using AES algorithm with 256-bit key and Haval 256-bit Hash Message Authentication Code (HMAC) to simultaneously verify the data integrity and the authenticity. Alligator ...$79.95 -
45ZoneAlarm SocialGuard 1.2
SocialGuard scans millions of records using a unique algorithm to determine threats and sends warnings to you the minute they happen, not just once a day like the competition. If you are a parent monitoring your child’s Facebook account, you ...$19.95 -
46MSD Crypto 1.1
Strong encryption The program uses a strong encryption algorithm to encrypt the information with the key selected by the user. Hidden encryption key The encryption key is not stored in the encrypted file, improving the security of the enctyped information. -
47MD5 Checksum Tool 3.0
MD5 is an algorithm invented by Ron Rivest, which became an Internet standard. It's now widely used as a file integrity check as it provides a fingerprint for each file. MD5 Checksum Tool is a program that helps you know the MD5 of your files so ... -
48DWebPro 8.4
DWebPro includes the DWebPro Encoder, a little tool that encodes the PHP scripts using the AES algorithm. This tool is strongly limited in its functionalities in comparison with the optimal ionCube Cerberus and is provided only as an entry level protection ...$167.00 -
49DupeNuker 3.0
Uses the CRC32 algorithm to identify duplicate files on your system. You can then review the list of duplicates and decide whether or not to delete them. DupeNuker keeps a database of every file it examines, so new files can be checked quickly. New files ... -
50BeeGui 1.0
BeeGui uses as compression algorithm the core of Bee, a sophisticated algorithm created by Andrew Filinsky; the technique used for the data compression is based on the use of a PPM modeller (Prediction with Partial string Matching) and of a kind of Range ...Freeware