QArchive.ORG Main Page
Home | Blog | Terms of service | Sign in
All Vista Win Linux Mac
Sha 512 512 Bits Free Downloads




tool to compute and check message digest JSummer java 0.1.0.0 JSummer is a tool to compute and check MD5, MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160, WHIRLPOOL, TIGER, HAVAL message digest. The Program consists of a Console-Version (CLI) and a nice GUI using SWT. Implemented in Java. License: GPL (see http://www.gnu.org/copyleft/gpl.html)

Its reallly a nice tool. Its integration with Windows Explores enables fast and easy making of Hashes. Also this piece of software is pretty fast in calculating the hashes.Would like to know what are the activities you are involved. I am interested in hashing.

JSummer was extremely easy to install and use on my PC, and calculated SHA values for me extremely quickly. I would have happily paid for this tool!





tool to compute and check message digest JSummer native 0.1.0.0 JSummer is a tool to compute and check MD5, MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160, WHIRLPOOL, TIGER, HAVAL message digest. The Program consists of a Console-Version (CLI) and a nice GUI using SWT. Implemented in Java. This native version is running without a JRE! License: GPL (see http://www.gnu.org/copyleft/gpl.html)




DPASHA check files/strings with many hashes DPASHA 1.99 DPASHA created a single HASH. MD2, MD4, MD5 120bits, RIPEMD128 128bits, RIPEMD160 160bits, CRC32 32bits,CRC16 16bits, ARC-CRC 16bits, SHA1 160bits, SHA-256 256 bits, SHA-384 384 bits, SHA-512 512 bits, HAVAL128 128bits, HAVAL160 160bits, HAVAL192 192bits, HAVAL224 224bits, HAVAL256 256bits, Tiger128 128bits, Tiger160 160bits, Tiger192 192bits and GOST R 34.11-94. Freeware version.You can test files for manipulations.

Hard to understand user interface

DPASHA is great. However, I would like to see some sort of automation or server-side implementation in the future :)

Nice program!It helped me prove which hash was being used in a particular security research issue.I had the password, and the hash, and DPASHA returned a matching hash, thus identifying which hash was being used.Sweet!Kaos Kidd

I needed to verify a file and DPASHA did exactly that. Very intuitive

The hash algorithms seem to perform well. The interface is clear enough but fairly ugly. A useful addition would be a status bar or progress meter - for large files that take time to process the application window freezes with some display issues (missing buttons etc) and it is hard to tell that it is running even though it is. Overall this did the job for me - as freeware it's good value but I don't know if I'd pay for it in its current form.

My review. I'm not understanding how this works. Does the program decrypt hash into text format or just make a comparison to the hash key it'self? I'm looking for a hash decrypter to convert from md2 md4 md5 sha1 256 512 and so forth. I'm still learning to use the various hashes for encrypting files and other types of media and so on. Thank you for the program.



Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Search