|Iside is a message digest, hash code computing tool. It can be used for file integrity checking. It also compares files and folders by computing their hash code (MD5,SHA1,CRC32,...).|
Aug 29, 2014 17:29:13|
|OS||Windows ME, Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista|
click for full size
More author software:
- NCrypt TX 2.3 NCrypt TX is a text based cryptographic tool with Steganography capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of encrypted hexadecimal or Base64 characters.
|Show all author software|
Iside compares files and folders by computing their hash code (MD5,SHA1,CRC32,...). Right click on a file, select Copy and by right clicking on another file you will discover if the two files are equal. Includes file comparison, hash generating tool plus a complete folder comparison tool.
The hash function is the fingerprint of file: it allows to determine if two files are different even if their size is the same. Ideal tool for configuration managers, programmers, deployers. Useful also to compare photos, music and movies downloaded from Internet: can compute the hash code of an entire CDROM. It can also be used for file integrity checking.
Iside is capable of displaying the hash code of a file using any industry-standard algorithm. It also supports the generation of directory based hash codes, using MD5Sum or SFV format.
MD5, md5sum, .md5, SFV, MD2, MD4, SHA1, SHA256, CRC32, SHA384, SHA512, WHIRLPOOL, HAVAL, ADLER, FCS, TIGER, GOST, HMAC-SHA1, RIPEMD160, File Folder Comparison Utility, Versioning, Hash, File Integrity Checker
Requires Microsoft .NET Framework v.4.5
Supports Windows 8.1; does not require admin priviliges; UI enhancements; major bug fixing.
| Find last version of Iside|
| Freeware alternatives Iside 4.2.1020|
| Free Download Iside 4.2.1020 from littlelite.net|
Similar software shotlights:
|Find all software similar on Iside 4.2.1020|
- Linus Torvalds initiates Linux integrity check Linus Torvalds has begun an initiative to ensure the provenance of the Linux kernel is clear and transparent to avoid litigation like that currently being brought by SCO.
- Check Point Automates Integrity Firewall Check Point Software rolls out an updated Integrity firewall that uses a subscription service to control which applications can access the Internet, and launched its first security event manager, dubbed Eventia Analyzer.
|Find all news similar on Iside 4.2.1020|