Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
This project incorporates, accesses, calls upon or otherwise uses encryption software with a symmetric key length greater than 64 bits ("encryption"). This review does not include products that use encryption for authentication only.
Calculate MD5, SHA-1, SHA-256 checksum hashes from a specific file, and compare these values with a given string.
Accept one filename as parameter.
Functionalities :
- automatically retrieve text from Windows clipboard and compare it.
- 32 & 64 bits windows platforms supported
- Installation (Add to file context menu)
- Uninstallation
Requirements:
- Microsfot .NET Framework 2.0
Files:
chksm-chkfile.exe
MD5: c0b7761deeb7d7dc45aa04726309d4ca
SHA1: b19e8013ce1ea6c297c682a9ad5940024f8ff68e
SHA256: a539d86960ec28429d98fc619a213efd8435d4c340f78c4d07bb1494ace82ce5
chksm-chkfile-src.zip
MD5: f60acabb5a5e3e0e930b74e918e20d71
SHA1: 05ec2018fe4de677b1f27b498be3b61afe5f15c1
SHA256: e5c9caba615066c539a7ff523ea1a89af6dcf1665fd47362dd95bc8adf88fe65
worlds first antimalware software which spreads like a malware.
...Features:
1. usb disk security
2. automated virus/malware removal from usb drives
3. disinfection of specific types virus/worms/adware/malware/trojans from the computer
4. restrictions removal.
5. complete protection from viruses spreaded via usb disks.
6. Works on all versions of windows (32/64).
Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
DocUMentDS is a cross platform desktop document management system. Story and any file or document type with ease. DocUMentDS runs on 32 and 64 bit systems. AES-256 encryption is planned for next releases.
XTEA (eXtended Tiny Encryption Algorithm) support for db4o open source object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32 rounds)
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
Yet Another Process Monitor (YAPM) is a powerful process viewer for Windows that monitors the services & processes, their modules, threads, handles, windows, TCP/UDP connections... etc. running on local system or on any of the computers on your network.
Powerful 512bit pseudo random encryption, optimized for the x86-64 architecture. Coded in x86-64 assembly language, this has the potential to be one of the most powerful and fastest file encryption engines to date.
This is a program which encrypts all kind of data. I implemented GOST 28147-89 (64, 256)and extended Blowfish (64, 512) in CFB mode. The key is retreived from SHA256/512 hashed user password. In future there will be Mono port.
YAWCU is a wireless LAN (WLAN) capture + WEP cracking utility. It can crack 64/128 Bit WEP keys on IEEE 802.11b/g networks by monitoring WLAN traffic and computing the resulting WEP key once enough packets have been gathered
K is a C++ library featuring Genetic Programming, cryptography, 64 bits arithmetic, cross-platform macros and unicode conversion routines. It compiles on NewtonOS, Mac < X, Unix and Windows and it makes little use of C++ templates.
Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
A simple working implementation of 64-bit DES encryption/decryption alogrithm in C++. Could act as guide to undestanding the algorithm. Its buggy so help me out :-)
This project incorporates, accesses, calls upon or otherwise uses encryption software with a symmetric key length greater than 64 bits ("encryption"). This review does not include products that use encryption for authentication only
Portable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish. Includes support for ECB, CBC, CFB, OFB and CTR block cipher modes, weak key detection and parallelisation using OpenMP.
Set of useful tools for payment service development
The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components:
- BP-CCALC: Cryptographic Calculator
- BP-CardEdit: Thales P3 Input/Output file editor
- BP-EMVT: EMV Tool
- BP-HCMD: Thales HSM Commander
Free offline encryption – Enigma + AES-256-GCM – no cloud
...Runs portable from USB stick, no installation needed.
Security: one-time handshake, replay protection, anti-debug detection, key destruction on tampering.
Free for Windows 10/11 (64-bit). Available in 10 languages.
https://www.bagdadi.de