A Security tool that will help to verify the hash codes of files .

Currently,Our Hash Code verifier tool supports the following Hash types:
MD5,SHA,CRC32.

More details about the tool can be found in the project homepage.

Project Samples

Project Activity

See All Activity >

Categories

Cryptography

License

Creative Commons Attribution License

Follow Files Hash code Verifier

Files Hash code Verifier Web Site

You Might Also Like
The Secure Workspace for Remote Work Icon
The Secure Workspace for Remote Work

Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
0
1
0
0
1
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5

User Reviews

  • Interesting tool!! Other than this, One of the interesting tools that I found recently is DuplicateFilesDeleter.It is tool that can be used to find & remove duplicate files. It is a simple to use,but very effective tool to locate duplicate files in one or more selected search paths.It scans the files and compares them based on Byte for Byte Comparison, which ensures 100% accuracy. You can then choose to delete the selected duplicate or original files. The program is multi-threaded which enhances the performance immensely & performs scans very quickly.You should try it.
    1 user found this review helpful.
  • Too bad it requires me to download a whopping 600MiB to use the jar file.
    1 user found this review helpful.
Read more reviews >

Additional Project Details

Intended Audience

Security

User Interface

Java Swing

Programming Language

Java

Related Categories

Java Cryptography Software

Registered

2012-05-05