Download Online App Box . HASH VALUE, MD5 HASH
Easy and advanced encryption, decryption and hash ActiveX component for ASP or ASP.Net ***Support standard encryption and decryption algorithm like RSA, RC4, DES etc Ultra Crypto Component supports crypto algorihtm with industry strength like RC2, RC4, DES, 3DES, 3DES2, AES128, AES192, AES256. The encryption and decryption algorithm is implemented by underline crypto service providers. So the algorithms supported will be increased as the security requirements advance. ***Support standard hash algorithm like MD5, SHA Ultra Crypto Component also supports the typical hash algorithm like MD2, MD4, MD5, SHA, SHA256, SHA384, SHA512. This enables the user to easily calculate the hash value of a file, string or a binary buffer. The value can be used to validate the data completeness. More importantly, the hash algorithm can be combined with a private key to create digital signature to futher improve security. Support encryption and decryption of file Support encryption and decryption of string Support encryption and decryption of memory buffer Support calculation of hash on string, file or memory buffer Support digital signature creation and validation Support state of art crypto algorithm like RC2, RC4, MD2, MD4, MD5, SHA, SHA256, SHA384, SHA512, DES, 3DES, 3DES2, AES128, AES192, AES256 Import and export key in plain or raw bits Demos in VBScript, ASP, ASP.Net, C#, VB.Net, Php, VB6, Delphi, Coldfusion and BCB are avaiable .Net ready component Support x64 windows Visit Plenty of Software http://www.plentyofsoft.com/, you can review and download a lot of newest shareware or free software!

  

Secure Hash Algorithm

md5 message digest algorithm

Hash Tables

md5 activex

hash function

check md5 sum utility

flyingbit hash calculator

 

-------------------------

 

 

Simple file and text hash value calculator. Supports more than 130 hash functions including: AP Hash, Adler 16, Adler 32, Adler 8, BKDR Hash, BP Hash, CK SUM MPEG-2, CK Sum, CRC DNP, CRC-16, CRC-16 (IBM), CRC-16 (Kermit), CRC-16 (Modbus), CRC-16 (Sick), CRC-16 (X25), CRC-16 CCITT (0x1D0F), CRC-16 CCITT (0xFFFF), CRC-16 CCITT (XModem), CRC-16 CCITT (ZModem), CRC-24, CRC-32, CRC-32 bzip2, CRC-32 jam, CRC-32 mpeg-2, CRC-64, CRC-64 (ECMA), DJB Hash, Dek Hash, Elf, FCS 16, FCS 32, FNV 0 8-1024, FNV 1 8-1024, FNV 1a 8-1024, Fletcher-16, Fletcher-32, Fletcher-8, GHash 3, GHash 5, GOST, Haval 128 (3-5), Haval 160 (3-5), Haval 192 (3-5), Haval 224 (3-5), Haval 256 (3-5), JHash, JS Hash, MD-2, MD-4, MD-5, Murmur, Murmur 2, One at a time, PJW Hash, Pearson Hash, RIPEMD 128, RIPEMD 160, RIPEMD 320, RS Hash, SDBM Hash, Sapphire 128, Sapphire 160, Sapphire 192, Sapphire 224, Sapphire 256, Sapphire 288, Sapphire 320, Sha-1, Sha-224, Sha-256, Sha-384, Sha-512, Size64, Sum BSD, Sum Sys V, Sum16, Sum24, Sum32, Sum64, Sum8, Tiger 128, Tiger 160, Tiger 192, Whirlpool 512, XOR16, XOR32, XOR8, XUM 32. Can be used directly from pendrive or CD/DVD! Generated hashes can be saved into CSV, HTML, SHA1, MD5 or SFV files. Program can load MD5, SFV and SHA1 files and check files integrity. Can be easily integrated with Total Commander, Unreal Commander and Free Commander.

Ultra Crypto Component: http://www.ultrashareware.com/Crypto.exe

Easy Hash: http://odzysk.info/licznik_pobran.php?plik=easyhash13.zip

 

diProtector includes the following features: - total destruction of the protected code fragments logic, which makes it impossible to analyse by disassembling; - detection and protection from active debuggers like eVC, eVB debuggers and others; - protection from code tracing under a debugger; - protection of application's import table; - entry point protection; - protection from code modification; - protected registry work; - resource and executable code compression; - internal short (16 chars) serial number manager with strong encryption (symmetric crypto-algorithm 3DES is used); - external serial number generator with keygen interface; - quick addition of trial-features and short serial number support to any applications; - no more "owner names" needed yet. Unique ID produced by diProtector is a MD5 hash-function of PresetID, PlatformID and random number. Therefor it's unique to each device and protected programs copy. Also diProtector is an advanced executable file compressor, capable of reducing the file size of programs by as much as 70%. diProtector makes executable files and libraries smaller, increase free space on memory cards and flash-memory, decrease load times across networks and download times from the internet. 

diProtector: http://www.diprotector.com/downloads/diProtector_wince_arm_demo.zip

MD5 Password: http://lastbit.com/md5pswdemo.zip

MD5 Password is a password recovery tool for security professionals, which can be used to recover a password if its MD5 hash is known. MD5 is an industry standard hash algorithm that is used in many applications to store passwords. MD5 Password features fast, highly optimized recovery engine that can recover multiple hashes at once: up to 32,000 hashes in the Pro version. The number of hashes being recovered simultaneously does not have significant performance impact. The recovery engine is fully configurable, so you can adjust the recovery options as needed.Since there is no known way to reverse the MD5 algorithm, MD5 Password provides a number of tools to recover the password:Brute Force Attack, Dictionary Attack, Hybrid Dictionary Attack, Smart Force Attack. MD5 Password supports the distributed recovery technology, which allows you to utilize the power of several computers when performing the recovery process, drastically reducing the recovery time. MD5 Password has a feature-rich user interface that allows you to utilize its functionality with maximum efficiency. The export and import feature can be used to export and import hashes to or from text files and the Report feature is used to generate text reports after the recovery process is completed. MD5 Password comes in two versions: Standard and Pro. The Standard version can process up to 10 hashes simultaneously and the Pro version has a technical limit of 32,000. There is also a free Demo version that can recover only short passwords (up to 3 characters). 

Copyright © Online App Box (onlineappbox.com), All rights reserved.