[go: up one dir, main page]

Results for: hash file

Suggested Categories:

File Repair Software
File repair software enables users to repair corrupt or damaged files. File repair software tools are useful for companies and users that need to repair and access files of all kinds including documents, downloads, images, videos, PDFs, and more.
File Converters
File converters are software tools that enable users to convert file types from one file type to another. File converters can convert different types of files such as documents, PDFs, images, and more.
File Sharing Software
File sharing software is software that enables users to securely share and exchange files and data over the internet. It allows people to easily store, access, and transfer documents, files, photos, videos, music, and other types of data to and from multiple devices. There are many popular file sharing programs available for both home networks and business use. These provide features such as file synchronization across multiple devices, security protocols for protection against malicious activity/hacking attempts, cloud-based storage capabilities, etc.
File Compression Software
File compression software reduces the size of files or folders to save storage space and speed up transfers. It works by using algorithms to eliminate redundancy and efficiently encode data, often resulting in significantly smaller file sizes. These tools typically support multiple compression formats, such as ZIP, RAR, and 7z, and can also encrypt archives for added security. Many include features like batch compression, password protection, file splitting, and integration with cloud storage. File compression software is essential for sharing large files, archiving data, and improving storage efficiency on both personal and enterprise systems.
File Copy Software
File copy software is designed to transfer files and folders quickly, reliably, and often with enhanced functionality compared to standard operating system copy tools. It can handle large files, resume interrupted transfers, and manage batch operations more efficiently. Many solutions include error recovery, speed optimization, file verification, and filtering to copy only specific file types or updated versions. Advanced tools may support copying across local drives, network locations, and external storage devices with minimal downtime. This makes file copy software essential for IT administrators, content managers, and anyone handling large-scale or frequent file transfers.
Business Filing Services
Business filing services enable anyone to quickly and easily create a business. Business filing services streamline the process of business registration, obtaining business licenses, and creating business entities such as an LLC, corporation, limited company, S corp, and more. Business filing services may also offer a la carte legal services.
File Sync Software
File sync software assists in the process of ensuring that edited files from multiple sources and locations are synchronized and have the same information.
Duplicate File Finders
Duplicate file finders are software tools that enable users to find and identify duplicate files, duplicate images, duplicate videos, duplicate documents, and more in order to prevent duplicates and free up space on their system or hard drive. Duplicate file finders are also known as duplicate file removers or duplicate file cleaners.
File Managers
File managers, also known as file browsers or file explorers, are software applications that enable a user to browse, search, organize, and manage the files and folders on their computer or device.
E-Filing Software
E-filing software for legal purposes enables attorneys, law firms, and self-represented litigants to electronically submit court documents to judicial systems. It streamlines the filing process by ensuring compliance with court formatting rules, deadlines, and procedural requirements. The software provides features like document tracking, real-time status updates, and automated notifications of court acceptance or rejection. With secure encryption and user authentication, it protects sensitive legal information from unauthorized access. By reducing reliance on paper filings, it increases efficiency, saves time, and minimizes the risk of errors or missed deadlines.
File Archiving Software
File archiving software is designed to compress, organize, and store files efficiently for long-term retention and easy retrieval. It helps reduce storage costs by using compression techniques and managing data lifecycle policies, such as automatic archiving and deletion. This software supports indexing and search capabilities, enabling quick access to archived files when needed. Many solutions integrate with backup and compliance systems to ensure data security and regulatory adherence. By centralizing archived data, it improves data management and preserves critical information over time.
File and Document Comparison Software
File and document comparison software enables users to compare the difference between two or more files or documents. File comparison tools can detect differences between files such as images, code, PDFs, media files, and more. Document comparison tools can detect the differences between two or more documents.
HR Employee File Management Software
HR employee file management software is designed to assist HR departments with the process of gathering, searching, structuring and managing all employee information.
Managed File Transfer (MFT) Software
Managed file transfer (MFT) software provides the tools to ensure the efficiency and security of file transfers and data exchange across a network from one machine to another.
File Integrity Monitoring Software
File integrity monitoring software is a type of security tool designed to monitor and track changes made to files on a computer system. It works by comparing the current state of a file to its known baseline, alerting users if any unauthorized modifications have been made. This software can detect both accidental and malicious changes, making it useful for maintaining the integrity of important files. It is often used in conjunction with other security measures such as firewalls and antivirus programs to provide comprehensive protection against cyber threats. Overall, file integrity monitoring software plays an important role in ensuring the security and reliability of computer systems.
File Transfer Protocol (FTP) Software
File transfer protocol (FTP) software is software used for transferring files between different devices over a network. It allows users to upload and download files securely and efficiently. The software uses a client-server architecture, meaning one device acts as the client initiating the file transfer while the other device acts as the server receiving the data. FTP software also allows for remote access to files stored on a server, making it convenient for businesses and individuals with large amounts of data. Additionally, it supports multiple file formats and can resume interrupted transfers.
Secure File Transfer Software
Secure file transfer software enables the safe exchange of files between users, systems, or organizations by encrypting data in transit and at rest. It often supports protocols like SFTP, FTPS, and HTTPS to ensure secure communication while preventing unauthorized access. Many solutions include authentication, access controls, and audit logs to enhance compliance with security regulations. Advanced features may include automation, integration with cloud storage, and endpoint protection for seamless and secure file sharing. These tools are essential for businesses handling sensitive data, such as financial institutions, healthcare providers, and enterprises with strict security requirements.
Encryption Software
Encryption software allows companies to protect and secure data using cryptography to protect valuable files and sensitive data and enhance security.
Desktop Search Software
Desktop search software is a tool that indexes the contents of a user’s computer—such as files, documents, emails, images, and archives—to enable rapid and precise searching across various data types. By building an index, these tools allow for lightning-fast queries, often supporting filters by file type, date, and content keywords. They commonly offer features like content preview, search result management (e.g., tagging or bookmarking), and compatibility with multiple formats including PDFs, Office files, archives, and more. Desktop search tools improve productivity by reducing the manual effort needed to locate files, serving professionals, researchers, students, and everyday users alike. They are designed to provide accurate, fast, and organized results, often operating silently in the background while keeping the index updated in real time.
Archiving Software
Archiving software is designed to securely store and manage digital data and documents over the long term, ensuring easy retrieval and compliance with legal or regulatory requirements. It automates the process of capturing, indexing, and preserving information from various sources such as emails, files, databases, and applications. The software often includes compression and encryption features to optimize storage space and protect sensitive data. By implementing retention policies and audit trails, archiving software helps organizations meet data governance standards and reduce risk. It supports efficient search and access, making historical data available for business intelligence and legal discovery.

38 Products for "hash file"

  • 1
    Airlock Digital

    Airlock Digital

    Airlock Digital

    Airlock Digital is an application control solution that enforces a Deny by Default security posture. It enables organizations to define trusted applications, scripts, libraries, and processes at a granular level using file hash, path, publisher, or parent process. Only those explicitly defined as trusted are allowed to execute. The platform supports Windows, macOS, and Linux systems, including legacy operating systems and operational technology (OT) environments. Airlock Digital includes...
  • 2
    AccuHash

    AccuHash

    AccuHash

    AccuHash 2.0 is Windows 95/98/Me/NT/2000/XP/2003 utility for protecting the integrity and verifying the accuracy of data files using checksum calculation algorithms (CRC32, MD5 and SHA-1). It will allow to easily and quickly verify integrity of files downloaded from Internet, transferred over a network and/or burned onto CD/DVD. AccuHash 2.0 use the checksum file format based on XML and Unicode-enabled - this allows to easily exchange checksum files between different systems in different...
    Starting Price: $19.95 one-time payment
  • 3
    TProof

    TProof

    TProof.io

    Create Decentralized Proof of Timestamp: Ethereum-based certifications for digital content existing prior a certain point in time. TProof is studied to support any amount of certification, as it's primarily based on two mainstream platforms: Ethereum and Arweave. Ethereum is where the certification happens, storing the hash of your file at a given timestamp. That combination is represented in the form of an NFT, free to move and trade as you with. Arweave is where you can optionally upload...
    Starting Price: 0.01Ξ hash-only
  • 4
    JM-Crypt

    JM-Crypt

    JM-Crypt

    ... and this for a derisory cost and an unlimited duration. Our software use the best known algorythm : AES-256 – CBC – PKCS official unaltered version with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. Better than full disk encryption slowing down your computer's performance, "JM-Crypt PC" can target for fast serial encryption specific folders or file extentions of your choice.
    Starting Price: $2.99 (Android) - $9.99 (PC)
  • 5
    Chainpoint

    Chainpoint

    Chainpoint

    Anchor an unlimited amount of data to the Bitcoin blockchain. Verify the integrity and existence of data without relying on a trusted third-party. Chainpoint links a hash of your data to a blockchain and returns a timestamp proof. A Chainpoint Node receives hashes which are aggregated together using a Merkle tree. The root of this tree is published in a Bitcoin transaction. The final Chainpoint proof defines a set of operations that cryptographically link your data to the Bitcoin blockchain...
  • 6
    DTube

    DTube

    DTube

    ... and Hive blockchains and benefit from interoperable features of Dtube. IPFS is a protocol that enables decentralized file storage. The principle behind it is called Distributed Hash Tables (DHT). The same principle also powers the BitTorrent network. Just like how cryptocurrency uses asymmetrical cryptography, DHT networks will hash contents in order to be able to identify a file.
  • 7
    Online-Convert.com

    Online-Convert.com

    Online-Convert.com

    .... A list of versatile online ebook converter that can convert your text documents to ebook easily. A collection of online video converter for your mobile device, gaming console or tablet. Generate a hash or checksum with these hash generator tools. Create archive files like a ZIP with this free compression tool. This free online file converter lets you convert media easy and fast from one format to another.
  • 8
    SegWit Paper Wallet

    SegWit Paper Wallet

    SegWit Paper Wallet

    Segwitaddress.org is an open source bitcoin paper wallet generator that utilizes Segregated Witness (SegWit) Pay To Witness Public Key Hash wrapped in a Pay to Script Hash (P2SH-P2WPKH) addresses. Segwitaddress.org uses the BitcoinJS library. All of the functions on the page https://segwitaddress.org/ can be ran offline, by saving the site and running the index.html file, except for the sweep function which requires internet access to check the UTXOs and broadcast to the network. You can enable...
  • 9
    Excavator

    Excavator

    NiceHash

    Excavator is a very lite NVIDIA mining software developed and signed by NiceHash. It delivers competitive hashrate performance and most importantly it has a 0% fee, unlike other 3rd party miners which generally charge a 1% development fee! Special mining protocol, reduced issues with routers, firewalls. Reduced bandwidth usage and lower latency. In-house built miner which can be trusted because the authors are fully known. It keeps multiple DAG files in the GPU memory, thus switching from one...
  • 10
    Trellix Detection as a Service
    Detect threats at any point in your workflow. Inspect your cloud infrastructure and the business logic of the data in your cloud apps. Validate your files and content with the latest threat intelligence and multiple dynamic machine learning, AI, and correlation engines. Easily integrate across your trusted cloud services, web applications, and collaboration tools. Scan files, hashes, and URLs for potential malware in a live virtual environment without risking your internal assets. Incorporate...
  • 11
    TeraCopy

    TeraCopy

    Code Sector

    ... that they are identical. This is done by comparing hashes of source and target files. TeraCopy can optionally show a confirmation dialog on every drag and drop operation. It can prevent you from moving folders accidentally from one location to another. TeraCopy can keep history of recently used directories, as well as show folders which are open in Explorer and other file managers.
    Starting Price: $29.95 one-time payment
  • 12
    PhoenixMiner

    PhoenixMiner

    PhoenixMiner

    ... to activate it. Double click your Bat file to start the miner. The miner will start, run the setx commands to set those environment variables, initialize each of your GPU’s, build the DAG file on each of your GPU’s and start hashing away. Let it run for about 20 seconds and then click “s” to display your Hashing speed. Now that your miner is set up, you’re able to sit back and watch as your video cards gain you passive income every day in the form of Ethereum.
  • 13
    Claymore Dual Miner

    Claymore Dual Miner

    Claymore Dual Miner

    ... commands to set those environment variables, initialize each of your GPU’s, build the DAG file on each of your GPU’s and start hashing away. Let it run for about 20 seconds and then click “s” to display your Hashing speed. If you’ve followed the steps above you should see this screen. Every pool has a different interface but the principle stays the same. You’ll need to go to your pools website and type in your public wallet address.
  • 14
    MailXaminer

    MailXaminer

    SysTools Software

    Search and discover relevant information by conducting, coordinating, and real-time monitoring of the case with your investigative team to get through explicit evidence data in court-admissible file format. The software complies with the benchmark values of the EDRM model. Manage, collaborate & gain strategic insight by building strong admissible proof verifiable MD5 hash format- "A digital seal of trust" under the law. Learn why an Email Examiner is an indispensable part of discovery & case...
  • 15
    Forensic Explorer

    Forensic Explorer

    GetData Forensics

    ... allocation tables, unallocated clusters, etc. Inbuilt data carving tool to carve more than 300 known file types. Sort and multiple sort files by attribute, including, extension, signature, hash, path and created, accessed and modified dates. Navigate a disk and its structure via a graphical view. Zoom in and out to graphically map disk usage. Access and analyze data at a text or hexadecimal. Automatically decode values with the data inspector.
    Starting Price: $1,695 one-time payment
  • 16
    VFind Security ToolKit
    ..., modified or duplicated. It can tighten baseline configuration control down to a single bit. It can also be used with surgical precision on an entire system or single file. The CIT tool produces a database of cryptographic hash values for every file it is directed to manage. Besides its use in anti-virus protection, the UAD tool is built for making identification based upon direct inspection of the data. It makes no assumptions about the file’s contents based upon the file’s name.
    Starting Price: $1035 one-time payment
  • 17
    RapidCopy Pro

    RapidCopy Pro

    L’espace Vision

    ...(like rsync), move, delete, etc, Various copy modes. Simple look and feel, but usage is the same as FastCopy. Source and destination diff check (Verify only mode) support. Various checksum algorithms (xxHash, MD5, SHA-1, etc.) If you are using the LTFS mode requires the installation and LTO device LTFS driver. If you want to add files/dirs to the source field by using drag and drop, simply drop by pushing the command key.
  • 18
    VeriPic Digital Evidence Manager
    Digital Evidence Manager enables law enforcement to manage all case files from any device and location in one place. File types include standard and proprietary video, crime scene photos, audio recordings, and documents. Manage evidence from multiple systems and devices in one place and benefit from features such as audit trail, security, encryption, and patented hashing technology. Share your digital evidence with your district attorney with our district attorney’s license. Control access...
    Starting Price: Free
  • 19
    sqlmap

    sqlmap

    sqlmap

    sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Support...
  • 20
    Qualifyed.ai

    Qualifyed.ai

    Qualifyed Marketing

    ... the model. A custom audience of hashed emails is then created from only the highest scored individuals and this file is delivered to media buying platforms such as Facebook to buy media against.
  • 21
    LLIMAGER

    LLIMAGER

    e-Forensics Inc

    ...OS versions, both past and present. This ensures that the tool remains functional across diverse system configurations and updates. FEATURES INCLUDE: Powerful and Fast "Live" imaging, CLI based Application Supports Intel, Apple Silicon, T2 Chips, and APFS File Systems. Full Acquisition Log SHA-256 or MD5 Hashed DMG Images Choice of Encrypted /Decrypted DMGs for use in commercial forensics tools Unlimited Technical Support
    Starting Price: $425
  • 22
    Stirdie

    Stirdie

    Stirdie

    ... provide a safe environment for businesses and users to transact sensitive data without fear of interception. We're eliminating fraud, and scams and saving businesses and individuals millions. Transactions and actions are recorded on the blockchain via a hash and unique ID, providing auditability of data. All transactions and actions from when data is created, sent, opened, and read are validated against the blockchain to ensure the integrity of the message.
  • 23
    TruKno

    TruKno

    TruKno

    Keep up with how adversaries are bypassing enterprise security controls based on the latest cyber attack sequences in the wild. Understand cyber attack sequences associated with malicious IP addresses, file hashes, domains, malware, actors, etc. Keep up with the latest cyber threats attacking your networks, your industry/peers/vendors, etc.​ Understand MITRE TTPs (at a ‘procedure’ level) used by adversaries in the latest cyber attack campaigns so you can enhance your threat detection...
  • 24
    OSForensics

    OSForensics

    PassMark Software

    Extract forensic data from computers, quicker and easier than ever. Uncover everything hidden inside a PC. Discover relevant data faster through high performance file searching and indexing. Extract passwords, decrypt files and recover deleted files quickly and automatically from Windows, Mac and Linux file systems. Identify evidence and suspicious activity through our hash matching and drive signature analysis features. Identify and analyze all files and even automatically create a timeline...
    Starting Price: $799 per user per year
  • 25
    AS2 Gateway

    AS2 Gateway

    Aayu Technologies LLC

    Assured Trading with AS2 to Digitalize your Business. AS2 Gateway provides a B2B trading platform for organizations trading over the AS2 protocol, with a simplified and intuitive interface concealing the underlying complexities from end users. AS2 Gateway is fully compliant with the AS2 specification published by Drummond and Morberg, while ensuring the security of exchanged data via encryption, digital signature validation and guaranteed integrity through MIC (Message Integrity Check) hashing...
    Starting Price: $59 per month
  • 26
    Shadow Realm

    Shadow Realm

    GenesysGo

    Everyone begins their cloud journey working with storage. Maybe that's Dropbox, OneDrive, Google Drive, or iCloud drive. But that's definitely where everyone's journey starts. So what is the web3 equivalent to those? Shadow Drive. Using any Solana wallet, and a little bit of $SHDW, users can carve out permanent, dedicated storage to store their files (and it doesn't even hash the filename). Beyond that, any software developer that wants to build a dApp that requires some sort of file storage...
  • 27
    Clearswift Information Governance Server
    ... both internally and externally. Files are registered using a web browser or through a client application where text is extracted and registered in a hashed form. If registered files or fragments of these files are emailed to unauthorized recipients internally or externally, or shared over the web to unsanctioned sites, action is taken according to the policy set for that data. The Clearswift IGS integrates seamlessly with all Clearswift Secure Gateways and ARgon for Email.
  • 28
    TheBrain

    TheBrain

    TheBrain Technologies

    Where can you really go on your computer today to hash out a new idea, current event, or expand your plans in a meaningful way? TheBrain lets you digitize your mind so you can literally see your thinking and refine your ideas. Each of your Thoughts comes to life on-screen with connections to other related Thoughts, creating a context for thinking and action. Your Brain can store an unlimited amount of all kinds of information. Write notes for all your ideas. Save files, web pages, images...
  • 29
    Dubidot

    Dubidot

    Dubidot

    Locators, scene detection, frame based indexing and creating rough cuts. Media Analytics, speech to text, image and face recognition. MUX, matching MXF Video and Audio files directly via the web browser. Scene generation by collecting clips and sub clips. Live Logging, easily indexing (candidates, actions, hash-tags) live streams on mobile devices and desktops. Rule-based recording of media including all technical metadata and generating proxy files in compliance with requirements of cutting...
  • 30
    Tower

    Tower

    SaaS.group GmbH

    ... superpowers: Give it a branch name and it will offer a checkout. Give it a file name and it will present the file's history. Give it a commit hash and it will show it in the commit history. Fast as lightning, easy as pie. Interactive Rebase is an incredibly powerful tool - but also quite awkward to use. But now, in Tower, it has become as easy as drag and drop! We've added so many new levels of detail in the new Tower. And at the same time, navigating Tower is now as simple as browsing the web.
    Starting Price: $69 per user, per year
  • Previous
  • You're on page 1
  • 2
  • Next