Free Downloads: Sha Encryption Java

License:  All 1 2 | Free

Freeware
IDFile Screenshot
more

File verification utility, uses SHA-2 algorithm. .

File verification utility, uses SHA-2 algorithm.

Category: Utilities
Publisher: eCat, License: Freeware, Price: USD $0.00, File Size: 221.1 KB
Platform: Windows



Shareware
more

ToTal Encryption is a software developed by Open Pages Research & Development, that can encrypt and decrypt files.

ToTal Encryption is a software developed by Open Pages Research & Development, that can encrypt and decrypt files.
It's main functions are: RSA Public/private key pair based Encryption/decryption of text and files, MD5 and Sha Hashing of text and files, Base64 Encoding/Decoding.

Category: Security & Privacy / Encrypting
Publisher: Open Pages Research & Development, License: Shareware, Price: USD $0.00, File Size: 2.8 MB
Platform: Windows

Ultra Crypto Component Screenshot
more

Easy and advanced encryption, decryption and hash ActiveX component for ASP or ASP.Net Support encryption and decryption of file, string, memory buffer Support calculation of hash on string, file or memory buffer Support digital signature

Easy and advanced Encryption, decryption and hash ActiveX component for ASP or ASP.Net ***Support standard Encryption and decryption algorithm like RSA, RC4, DES etc Ultra Crypto Component supports crypto algorihtm with industry strength like RC2, RC4, DES, 3DES, 3DES2, AES128, AES192, AES256. The Encryption and decryption algorithm is implemented by underline crypto...

Category: Software Development / ActiveX
Publisher: Utralshareware Software, License: Shareware, Price: USD $149.95, File Size: 1024.0 KB
Platform: Windows

Shareware
more

JChecksum is a free and open-source program that calculates MD2, MD5 and SHA checksums.

JChecksum is a free and open-source program that calculates MD2, MD5 and Sha checksums. Checksums or hash sums are values used to check data correctness. Although it has different names and uses (from cryptography to parity bit), the main principle is always the same.

Digital data is composed of zeros and ones. A checksum is a function (you can think of it as the result of...

Category: Utilities / Misc. Utilities
Publisher: Josh Walters, License: Shareware, Price: USD $0.00, File Size: 17.4 MB
Platform: Windows

Freeware
Japplis Toolbox Screenshot
more

Japplis Toolbox is a compilation of text utilities in one application. It can encode and decode URL, Base64, Hex, SoundEx, Metaphone. It can convert numbers from/to binary, octal, decimal and hexadecimal.

Japplis Toolbox is a compilation of text utilities in one application. It can encode and decode URL, Base64, Hex, SoundEx or Metaphone. It can convert numbers from/to binary, octal, decimal, hexadecimal and to date. It gives you text information such as character count, word count, MD5 or Sha. You can get Java system properties, environment variables or Swing default...

Category: Software Development / Tools & Editors
Publisher: Anthony Goubard, License: Freeware, Price: USD $0.00, File Size: 486.7 KB
Platform: Windows

Freeware
more

File hashes are used to verify the authenticity and integrity of files - especially those transmitted over the internet.

File hashes are used to verify the authenticity and integrity of files - especially those transmitted over the internet. When downloading a file from MSDN for instance, you are presented with the Sha-1 Hash - a list of seemingly random characters and numbers that are generated using the Sha-1 Encryption algorithm to uniquely identify that file. If even a single bit of that...

Category: Home & Education / Miscellaneous
Publisher: McKechney, License: Freeware, Price: USD $0.00, File Size: 185.8 KB
Platform: Windows

more

IgorWare Hasher is a free and portable SHA-1, MD5 and CRC32 hash generator for files and text.

IgorWare Hasher is a free and portable Sha-1, MD5 and CRC32 hash generator for files and text. It can be used to generate checksums for a single file and save cheksums in verification files (.Sha, .md5 and .sfv) or verify its integrity by using verificati

Category: Utilities / File & Disk Management
Publisher: igorware.com, License: Freeware, Price: USD $0.00, File Size: 44.8 KB
Platform: Windows, Vista, 7 (32-Bit, 64-Bit)

Freeware
more

Karen’s Hasher is very useful tool for everyone.

Karen’s Hasher is very useful tool for everyone. It is a small utility but it can do great jobs for you. It is much typical to find duplicate files from thousands of files even if they have the same file name and size. But what if you have thousands of files but with different file names and what if you have thousands of different files but with the same name! How you will find these...

Category: Utilities / Misc. Utilities
Publisher: Karen Kenworthy, License: Freeware, Price: USD $0.00, File Size: 1.2 MB
Platform: Windows

Freeware
more

DPASHA created a single HASH.

DPASHA created a single HASH. SHA1 160bits, MD5/MD4 120bits, RIPEMD-128 128 bits RipeMD-160 160 bits, CRC32, Sha-256 256 bits Sha-384 384 bits Sha-512 512 bits and HAVAL 256 Freewareversion. Current Version 1.5 You can test files for manipulations. Easy to use, support Drag&Drop. All hashes are standard with all other hash program and hashes. Multilanguage

Category: Security & Privacy / Other
Publisher: Paehl, License: Freeware, Price: USD $0.00, File Size: 59.0 KB
Platform: Windows

IgorWare Hasher (64bit, portable) Screenshot
more

IgorWare Hasher is a free and portable SHA-1, MD5 and CRC32 hash generator for files and text.

IgorWare Hasher is a free and portable Sha-1, MD5 and CRC32 hash generator for files and text. It can be used to generate checksums for a single file and save cheksums in verification files (.Sha, .md5 and .sfv) or verify its integrity by using verification files generated by Total Commander and FreeComander. Supports UTF-8 verification files. Verification files will be loaded...

Category: Utilities / Misc. Utilities
Publisher: IgorWare, License: Freeware, Price: USD $0.00, File Size: 44.0 KB
Platform: Windows

more

Program to calculate and verify checksums of files downloaded from the internet.

Program to calculate and verify checksums of files downloaded from the internet. Supports major checksum types: MD4, MD5, SHA1, Sha-256, Sha-384, Sha-512, RIPEMD-128, RIPEMD-160, HAVAL 256, TIGER 192. Portable version - no installer, just one file. Basic interface with no fireworks. File Chcecksum Verifier (FCV) can save window position, stay on top on other windows or can...

Category: Utilities / File & Disk Management
Publisher: Marek Mantaj, License: Freeware, Price: USD $0.00, File Size: 257.0 KB
Platform: Windows

Shareware
more

This ActiveX OCX can compute very fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and SHA-256 , the code is optimized for new AMD and Intel processors running very fast in the win32 environment. .

This ActiveX OCX can compute very fast the checksum of strings or files using Adler32 , CRC32 , MD5 , SHA-1 and SHA-256 , the code is optimized for new AMD and Intel processors running very fast in the win32 environment

Category: Software Development / Components: VB
Publisher: RSP Software, License: Shareware, Price: USD $50.00, File Size: 366.0 KB
Platform: Windows

Shareware
NCrypt TX Screenshot
more

This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications.

This text based Encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has hashing capabilities to verify message integrity. It supports DES, Rijndael-AES, Sha, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With NCrypt TX you can convert your text messages into a sequence of encrypted...

Category: Security & Privacy / Encrypting
Publisher: LittleLite Software, License: Shareware, Price: USD $15.00, File Size: 511.0 KB
Platform: Windows

more

Chilkat Crypt ActiveX is a useful software component for encrypting and decrypting both strings and binary data.

Chilkat Crypt ActiveX is a useful software component for encrypting and decrypting both strings and binary data. It has symmetric Encryption like AES, Blowfish, Twofish, RC2, ARC4, DES, 3DES, PBES1, PBES2 and hash algorithms like Sha-1, SHA256, SHA384, SHA512, MD2, MD4, MD5, HAVAL, RIPEMD128, RIPEMD160, RIPEMD256 and RIPEMD320. This tool also has public key Encryption and...

Category: Software Development / Components & Libraries
Publisher: Chilkat Software Inc, License: Shareware, Price: USD $149.00, File Size: 1.8 MB
Platform: Windows

Hexprobe Storage Encryption Tool Screenshot
more

A simple, easy-to-use disk encryption tool that encrypts and password protects your removable and external disk. Its powerful encryption ensures that only you can open an encrypted logical drive.

This is a simple, easy-to-use disk Encryption tool that encrypts and password protects your removable and external disk. Its powerful Encryption ensures that only you can open an encrypted logical drive. Key Features: 1. Encrypt data using 256-bit AES algorithm; gold lock can encrypt every bit of the data with high security level; silver lock can encrypt file system with very...

Category: Utilities
Publisher: Hexprobe System, License: Shareware, Price: USD $24.95, File Size: 675.0 KB
Platform: Windows

Freeware
more

OpenStego is a tool implemented in Java for image based steganography, with support for password-based encryption of the data.

OpenStego is a tool implemented in Java for image based steganography, with support for password-based Encryption of the data. It currently supports embedding of messages/files in a 24bpp images. Implementation of the same in C++ is also planned.

Category: Security & Privacy / Encrypting
Publisher: sourceforge.net, License: Freeware, Price: USD $0.00, File Size: 115.0 KB
Platform: Mac, Independent

5 Stars5 Stars5 Stars5 Stars5 Stars Commercial
Java Barcode Screenshot
more

Java Barcode library to generate barcode images, supports Linear, PDF417, Data Matrix, QACode. java barcode can generating barcode in java server side environment, java application and java reporting.

Java Barcode to generate barcode images, supports Linear (1D), PDF417, Data Matrix, QACode. Developer can use this Java barcode generator to generate high quality 1D and 2D barcode, also Java barcode can generating barcode in Java server side environment, Java application and Java reporting. For the Java server side environment, it's support...

Category: Software Development / Components & Libraries
Publisher: Pefetic.com, License: Commercial, Price: USD $59.00, File Size: 97.7 KB
Platform: Windows, Mac, Linux, Palm, Pocket PC

MEO File Encryption for Mac Screenshot
more

Encrypt or decrypt files of any type on Mac OS X using this powerful data encryption tool. MEO allows you to protect your sensitive data against un-authorized viewers by utilizing the latest data encryption technologies.

MEO is a powerful data Encryption application to encrypt or decrypt files of any type, including Microsoft Word, emaill and PDF documents on Mac OS X. MEO allows you to protect your sensitive data against un-authorized viewers by utilizing the latest data Encryption technologies. Keep your documents safe and secure with this free data Encryption software. MEO also features...

Category: Utilities / Command Line Utilities
Publisher: NCH Software, License: Freeware, Price: USD $0.00, File Size: 533.8 KB
Platform: Mac

PasswordsPro Screenshot
more

The professional program to recover the passwords for user hashes. The range of hashes supported include: MySQL, MD5, SHA-1 and others. The program also supports many complex hashes like md5($pass.$salt), md5(md5($pass)) and others.

The professional program to recover the passwords for user hashes. The range of hashes supported include: MySQL, MySQL5, DES(Unix), MD4, MD4(HMAC), MD5, MD5(HMAC), MD5(Unix), MD5(APR), Sha-1, Sha-1(HMAC), Sha-256, Sha-384, Sha-512, Domain Cached Credentials, Haval-128, Haval-160, Haval-192, Haval-224, Haval-256, Tiger-128, Tiger-160, Tiger-192, Whirlpool and...

Category: Security & Privacy / Password Managers & Generators
Publisher: InsidePro Software, License: Demo, Price: USD $60.00, EUR39.95, File Size: 15.5 MB
Platform: Windows

more

This is a simple, easy-to-use disk encryption tool that encrypts and password protects your removable and external disk.

This is a simple, easy-to-use disk Encryption tool that encrypts and password protects your removable and external disk. Its powerful Encryption ensures that only you can open an encrypted logical drive. Key Features: 1. Encrypt data using 256-bit AES algorithm; gold lock can encrypt every bit of the data with high security level; silver lock can encrypt file system with very fast...

Category: Utilities / File & Disk Management
Publisher: Hexprobe System, License: Shareware, Price: USD $29.95, File Size: 778.2 KB
Platform: Windows

Freeware
more

You must have Java 1.

You must have Java 1.4.0 (or later) installed and Java WebStart 1.0 (or later) configured to run this demo. (Java WebStart is installed as part of Java 1.4 so a separate download is not required). For best results you currently also need a screen set to 1280x1024 resolution .

Category: Internet / Tools & Utilities
Publisher: SLAC, License: Freeware, Price: USD $0.00, File Size: 918 B
Platform: Windows

Freeware
more

A program to calculate the CRC-32, MD5, or SHA-1 hash value for a file.

A program to calculate the CRC-32, MD5, or Sha-1 hash value for a file. It is implemented as a shell extension, i.e. right-click on a file, in Windows Explorer, to calculate the hash value for a file. It?s that simple!

Category: Utilities / File & Disk Management
Publisher: 2brightsparks.com, License: Freeware, Price: USD $0.00, File Size: 1.1 MB
Platform: Windows, Vista

Polar Crypto Component Screenshot
more

Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to integrate it into your existing systems, enhancing their security and performance.

Polar Crypto Component gives your Windows applications the functionality of unbreakable Encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto is a DLL/COM component which can be implemented whenever data security, authenticity and integrity are needed; -in all...

Category: Software Development
Publisher: Polar, License: Shareware, Price: USD $239.00, File Size: 24.4 MB
Platform: Windows

more

Java 2 Runtime Environment contains all the necessary modules for execution, including Java Virtual Machine to execute Java applications.

Java 2 Runtime Environment contains all the necessary modules for execution, including Java Virtual Machine to execute Java applications. Also includes the main Java classes (Core Classes) and support files. As Java 2 Runtime Environment is the component for the execution of Java Developer Kit, this one includes also the Java Plug-in.

Category: Web Authoring / JavaScript
Publisher: Sun Microsystems, Inc., License: Shareware, Price: USD $0.00, File Size: 0
Platform: Windows

Freeware
more

This is a Super Simple Java Editor written entirely in Java.

This is a Super Simple Java Editor written entirely in Java. It allows you to compile and run Java programs in an mdi interface with syntax highlighting and easy commenting.

Category: Software Development / Compilers & Interpreters
Publisher: sourceforge.net, License: Freeware, Price: USD $0.00, File Size: 77.8 KB
Platform: Mac, Linux, Windows

blank

License:  All 1 2 | Free