this program can use 6 different hashs. its not the best but dont care. it uses SHA1 , SHA2 , SHA3 , SHA4 , MD5 , CRC32. its 100% open source so enjoy.

Project Activity

See All Activity >

Follow file hashing

file hashing Web Site

You Might Also Like
DriveStrike: Remote Wipe | Data Breach Protection Icon
DriveStrike: Remote Wipe | Data Breach Protection

. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of file hashing!

Additional Project Details

Registered

2012-02-01