Robocopy hash check in Title/Summary
VT Hash Check
VT Hash Check adds a Windows Explorer context menu item to compute the MD5 or SHA1 hash checksum of any file and to then send them online for checking against their Virus database. Results may optionally be saved in plain text, CSV, or JSON. VT Hash Check comes with TrID built-in for identifying unknown files.
- Publisher: Boredom Software
- Home page: www.boredomsoft.org
- Last updated: August 30th, 2022
Robocopy GUI
RoboCopy GUI will copy all files, directories and subdirectories of the source directory to the target directory. RoboCopy GUI Features: - Graphical User Interface for the most robocopy functions - Simple usage - no Installation required To enable logging check the "Log to External File" checkbox.
- Publisher: Microsoft
- Last updated: March 2nd, 2008
Easy RoboCopy
It is very fast, fault-tolerant, and has dozens of parameters to customize the copy process, such as filtering by name, attributes, synchronizing folders, etc. Easy RoboCopy is a graphical user interface for RoboCopy. It shows all the options on one form with descriptive names and tooltip help.
- Publisher: Eric Black
- Last updated: February 2nd, 2023
Robocopy hash check in Description
HashCalc
Fast calculator to compute hash, checksum, HMAC values for file, text and hex string. Supports MD2, MD4, MD5, SHA1, SHA2, RIPEMD160, PANAMA, TIGER, CRC32, ADLER32 algorithms and the hash used in eMule and eDonkey (eDonkey2000, ed2k) tools.
- Publisher: SlavaSoft Inc.
- Last updated: March 6th, 2007
File Hash Checker
File Hash Checker is a tool which allows you to compute the MD5 and SHA1 hash of any file. It also allows you to check the computed hash against a database of known MD5 and SHA1. Currently this database only contains the hashes from ISO of Microsoft products like Windows 7, Windows Vista, Office, in English and French.
- Publisher: Julien MANICI
- Home page: www.julien-manici.com
- Last updated: October 21st, 2009
SumChecker
The MD5 Message-Digest Algorithm is a widely used cryptographic hash function with a 128-bit (16-byte) hash value. In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.
- Publisher: Strizhevsky Artem
- Home page: code.google.com
- Last updated: October 31st, 2011
HashCheck Shell Extension (x86-32)
This is a nifty tool for file checking - a Windows shell extension that allows your to check the integrity of files via a corresponding .SFV file. It is a lightweight application that integrates itself into your operating system and can be accessed in two ways: from the "Open with" context item, or the corresponding tab in the file properties.
- Publisher: Kai Liu
- Home page: code.kliu.org
- Last updated: September 22nd, 2011
NPE File Analyzer
NPE File Analyzer is a utility that allow users to view and edit 32bit and 64bit Portable Executable (PE) files, such as .EXE .DLL and .SYS files. NPE provides functions for inspection of unknown binaries, you can analyze sections, resources, import and export tables, relocations, TlsTable, and much more. It has a built-in process manager to analyze running processes and loaded modules.
- Publisher: Company Sqa
- Last updated: May 7th, 2011
Additional Robocopy hash check selection
HashTab
HashTab provides OS extensions to calculate file hashes and supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool.
- Publisher: Implbits LLC
- Last updated: April 11th, 2018
TOSHIBA Battery Check Utility
TOSHIBA Battery Check Utility is a free-to-use application for Windows OS that allows you to check if your battery pack is affected and qualifies for a replacement. Please Remove the battery and find the battery part number and serial number. The app is very easy-to-use.
- Publisher: TOSHIBA Corporation
- Last updated: December 19th, 2016
MD5 Hash Generator
The MD5 Hash generator allow you to generate 128-bit MD5 hashes for your files, allowing you to check for corruption during downloads, or to generate the MD5's for distributing with your software. The MD5 Hash generator has:Drag and Drop functionality, Right-clicking on any file shows "Generate MD5 hash" option, etc.
- Publisher: drnaylor.co.uk
- Last updated: October 11th, 2009
Check Point SSL Network Extender
SSL connections are a great remote access solution because they do not require IT departments to upgrade and manage client software. All a user needs is a Web browser. However, remote users still need to access network applications. SSL Network Extender is a browser plug-in that provides clientless remote access, while delivering full network connectivity for any IP-based application.
- Publisher: CheckPoint
- Home page: www.checkpoint.com
- Last updated: March 15th, 2008
Check Point Endpoint Security
Check Point endpoint security solutions provide data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. Check Point Anti-Malware and Application Control further help to efficiently detect malware with a single scan and make sure only approved software programs are running on end-user systems.
- Publisher: Checkpoint Software Inc.
- Home page: www.checkpoint.com
- Last updated: June 14th, 2016
Wi-Fi Password Recovery
Many times, when we format or uninstall updates from our system, we also lost the Wi-Fi password we use to connect to the Internet. This program allows us to recover this password using a variety of adjustable parameters.Please note that the program is not very easy to use for casual users. You need to check the Help file and follow closely the instructions to obtain good results.
- Publisher: SmartKey, Inc.
- Home page: www.recoverlostpassword.com
- Last updated: March 11th, 2017
Duplicate File Detective
This program can search for duplicate files in your folders, drives, removable storage devices, and network shares. It can compare the contents of files and perform byte-for-byte match confirmation before performing the deletion. Detected duplicates can also be moved to another location.
- Publisher: Key Metric Software, LLC.
- Home page: www.duplicatedetective.com
- Last updated: April 5th, 2023
OSForensics
OSForensics allows you to identify suspicious files and activity with hash matching, drive signature comparisons, e-mails, memory and binary data. It lets you extract forensic evidence from computers quickly with advanced file searching and indexing and enables this data to be managed effectively.
- Publisher: Passmark Software
- Home page: www.osforensics.com
- Last updated: November 18th, 2024
Price Check by AOL
Price Check is a Firefox & Internet Explorer extension that shows you the best price for products you're viewing – and it works on hundreds of sites, including Amazon, Best Buy and Buy.com (and the number is growing almost daily!). You can continue to shop as you always have, on the sites you love to use, and Price Check does the comparison shopping for you.
- Publisher: AOL Inc.
- Last updated: May 28th, 2012
- Publisher: Microsoft
- Last updated: June 20th, 2023