Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Hash algorithms in cobol program in Title/Summary

MultiHasher

MultiHasher

MultiHasher is a free file hash calculator that supports hash algorithms such as CRC32, MD5, RIPEMD-160, SHA-1, SHA-256, SHA-384, SHA-512. With this program, you can calculate one or more hash values for a single file at once, hash values for multiple files and text string. Also, it supports hash file verification (MHX, SFV, MD5Sum).

Cobol DataViewer

Cobol DataViewer

The DataViewer is a handy tool for Cobol data files reverse engineering. It reads Cobol data files with known and unknown record layouts, displays them, and converts them to non-Cobol formats. DataViewer recovers valuable data from Cobol files even if you do not have source of the Cobol program that wrote these files.

  • Publisher: Siber Systems Inc.
  • Home page: www.siber.com
  • Last updated: May 17th, 2013
Micro Focus Visual COBOL for Eclipse

Micro Focus Visual COBOL for Eclipse

Visual COBOL provides COBOL development and integration tools for Eclipse that offers programmers an unrivaled development experience. The program features: COBOL editor and integrated COBOL debug experience, mixed-language support, native code generator for the leading Enterprise platforms, RDBMS support, and more.

Hash algorithms in cobol program in Description

BCArchive

BCArchive

BCArchiveTM is designed to compress a group of files/folders to a single encrypted file.BCArchive enables the use of existing public key databases, such as those created for PGP software, which have been used world-wide for many years.It allows you to use Public Keys to send an encrypted archive - avoid the need for a Password.

  • Publisher: Jetico, Inc.
  • Home page: www.jetico.com
  • Last updated: June 16th, 2023
VeraCrypt

VeraCrypt

VeraCrypt is intended to protect sensitive data by creating encrypted volumes. The tool allows storing files in an encrypted container file, which you can mount as a virtual drive. Moreover, it can encrypt a partition or a drive, even if it stores system files. Since the tool supports on-the-fly-encryption, there will not be any leftovers after the volume is unmounted.

  • Publisher: IDRIX
  • Home page: www.idrix.fr
  • Last updated: November 18th, 2024
CryptoSys API

CryptoSys API

CryptoSys API is a toolkit of fast, efficient symmetrical cryptographic functions in Visual Basic, VBA, VB.NET/VB2005/8/x, C/C++, C#, and ASP. You can incorporate it in your own apps or call it from VBA applications like Access, Excel and Word. It provides four of the major block cipher algorithms, a stream cipher algorithm, key wrap etc.

  • Publisher: D.I. Management Services Pty Limited
  • Home page: www.cryptosys.net
  • Last updated: March 22nd, 2013
WinAES

WinAES

WinAES is an application that allows you to encrypt and decrypt files. It uses one of the most secure symmetric-key algorithms to protect your data. With the "Secure File Eraser" function it can erase a file up to 35 times, ensuring there is no possibility of recovering an erased file.

  • Publisher: FatLYZ
  • Last updated: May 27th, 2020
PeaUtils

PeaUtils

PeaUtils is a free suite of file management tools, spin-off of PeaZip project, also available as portable software not requiring installation. Supports file hashing, checksum, split/merge, secure data deletion. Open Source (LGPLv3), free for any use.

  • Publisher: Giorgio Tani
  • Last updated: May 27th, 2020

Additional Hash algorithms in cobol program selection

HashTab

HashTab

HashTab provides OS extensions to calculate file hashes and supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool.

  • Publisher: Implbits LLC
  • Last updated: April 11th, 2018
Chilkat Crypt ActiveX

Chilkat Crypt ActiveX

Chilkat Encryption ActiveX is a program that provides symmetric encryption: AES, Blowfish, Twofish, RC2, ARC4, DES, 3DES, PBES1, PBES2. It allows you to create and verify DSA signatures, generate DSA keys based on parameters created by OpenSSL and set public key explicitly from P, Q, G, and Y values.

  • Publisher: Chilkat Software Inc
  • Last updated: July 6th, 2015
LuxRender

LuxRender

LuxRender is a physically based and unbiased rendering engine. Based on state of the art algorithms, this program simulates the flow of light according to physical equations, thus producing realistic images of photographic quality. LuxRender features a variety of material types.

  • Publisher: LuxRender
  • Last updated: July 30th, 2016
CorelDraw Recovery Kit

CorelDraw Recovery Kit

CorelDraw Recovery Kit is a recovery tool for corrupted files. Featuring an ultimately powerful file analysis engine based on a set of advanced algorithms, the program is capable of recovering drawings from files seriously damaged in various data corruption incidents.

Krush

Krush

Krush is a lively bit-crusher plugin for Windows users. With its bit crushing and downsampling algorithms, the program combines the crispy taste of the digital realm with the warmth of its drive stage and analog modeled resonant filters. A modulation section allows you to quickly add extra life to the sound by modulating any parameter.

  • Publisher: tritik
  • Home page: www.tritik.com
  • Last updated: October 19th, 2019
CorelDraw Recovery Toolbox

CorelDraw Recovery Toolbox

CorelDraw Recovery Toolbox is an efficient and reliable recovery tool for damaged CorelDraw (*.cdr) files. Thanks to the use of complex analysis algorithms, the program ensures a consistently high chance of successful recovery in every situation. CorelDraw Recovery Toolbox is easy to use and requires no skills or data recovery experience.

SummerProperties

SummerProperties

SummerProperties is a free software tool that adds a new feature to Microsoft Windows - the ability to calculate and display the checksums for any file using four different algorithms: CRC16, CRC32, MD5, and SHA1. The program inserts a new tab on the file's properties window, where you can find all the checksum information.

Anti-UltraSurf

Anti-UltraSurf

Anti-UltraSurf is a program that uses heuristic analysis to identify and block UltraSurf’s traffic rather than relying on hash signatures. The program can block traffic generated by all original and modified versions of UltraSurf with zero false positives.

  • Publisher: Zemana Ltd.
  • Home page: blog.zemana.com
  • Last updated: May 18th, 2015
NCrypt TX

NCrypt TX

NCrypt TX is a text based cryptographic conversion and scrambling tool. It can perform hashing using SHA1, SHA256 and MD5 algorithms. The program can encrypt your messages using the required algorithm. We may send encrypted email using a password. The receiver can then use this password to decode it using the same program.

  • Publisher: LittleLite Software
  • Last updated: April 25th, 2010
MD5 Fingerabdruck

MD5 Fingerabdruck

MD5 Fingerabdruck is a tool for calculating any file's MD5 hash. The program can generate a .md5 file with the found MD5 that can be used the program later for verifying that the file was not changed . The program also supports command-line arguments.

  • Publisher: Carstens & Co. GmbH Informationsmanagement
  • Last updated: March 9th, 2008