icon

Search Results for "create and verify hash signatures"

Please type in the keywords that best describe the software you are searching for.

Only search for freeware (Fewer results)

These categories may be related to what you're looking for:

Filter results:

WinAES screenshot

icon WinAES

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 22

WinAES is a portable encryption tool that you can use to encrypt and password protect your sensitive files. Simply drag and drop one or more files onto the GUI, set a password and click a button to create encrypted copi... more Category: Encryption Tools

SyncFolders screenshot

icon SyncFolders

  • Our Rating: stars
  • User Rating: 5 (5)
  • Popularity: 44

SyncFolders enables you to synchronize or backup your files and folders. You can create multiple sync profiles (rules) for different folder locations, each with it's own synchronization or backup settings. ... more Category: File Synchronization

FileBot screenshot

icon FileBot

  • Our Rating: stars
  • User Rating: 4 (1)
  • Popularity: 33

FileBot is a TV and movie renamer that can automatically replace the cryptic file names from Torrent downloads with easy-to-read names, that include the name of the show or movie and the episode title. ... more Category: File Renaming Tools

FontCreator screenshot

icon FontCreator

  • Our Rating: stars
  • User Rating: 5 (1)
  • Popularity: 66

FontCreator puts font creation within the grasp of the average PC user, would-be typographers and graphic designers. It enables you to create and edit your own TrueType font files. Features include the ability to conve... more Category: Font Tools

PDF Shaper Free screenshot

icon PDF Shaper Free

  • Our Rating: stars
  • User Rating: 5 (5)
  • Popularity: 44

PDF Shaper Free offers a variety of tools to help you create, process and manipulate PDF files. You can convert PDF files to various formats (TXT, RTF and images) and also convert images and DOC fi... more Category: Document Conversion info Offers to install promotional, third party software.

NetMailBot screenshot

icon NetMailBot

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

NetMailBot is acommand line email application that runs from a DOS command prompt, which allows it to be easily called from other applications. It can be used from inside existing applications to send email notices, inv... more Category: Mail Server

Adobe Acrobat Reader screenshot

icon Adobe Acrobat Reader

  • Our Rating: stars
  • User Rating: 3 (5)
  • Popularity: 77

Adobe Acrobat Reader is the global standard for electronic document sharing. It can open and interact with all PDF documents. Use Adobe Reader to view, search, digitally sign, verify, print, and collaborate on Adobe PD... more Category: PDF Tools

Total Network Monitor screenshot

icon Total Network Monitor

  • Our Rating: stars
  • User Rating: 5 (2)
  • Popularity: 55

Total Network Monitor enables you to control and monitoring of the efficiency of your network. It supports various checks that monitor TCP/IP, FTP, SMTP, POP, IMAP connectivity, as well as Windows Probes (Eventlog, Regi... more Category: Network Monitoring

AOMEI Backupper Standard screenshot

icon AOMEI Backupper Standard

  • Our Rating: stars
  • User Rating: 3 (2)
  • Popularity: 66

AOMEI Backupper is a backup tool that supports basic as well as advanced backup procedures. You can use the software to simply back up selected files or folders, or you can use disk imaging options to back up your entir... more Category: Backup Software

HashPuzzle Proxy screenshot

icon HashPuzzle Proxy

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 33

HashPuzzle Proxy is a Stratum Proxy for Bitcoin and Crypto Mining that enables you to monitor and manage your mining rigs from a central interface. Instead of having to connect your miners to the... more Category: Misc. Internet Tools

Filter results:

Result pages: 1 2 3 4 5 6 7 8 9 10 »» Next


Need more search power? Search our site with Google! See results for create and verify hash signatures