Hashing scripts download

[

hashing script overview « 1 - 30 » of 66 scripts

]
«« « 123 » »»
336 336

... Use hash() method of QControl class to convert ... string to integer hash value. My original algorithm takes ... moment to convert and guarantee secure and collision-free convolution even of short strings. ...

... as an hex string ... is needed to compare very large files.So in readfile, ... chunks of 1kb.You can substitute md5 with the hashing function you prefer ...

... SecPay callback this module uses the MD5 hash comparison to determine whether the callback came from Secpay ... SecPay callback this module uses the MD5 hash comparison to determine whether the callback came from Secpay ...

... cross-browser and easy to use open source web-based chat system written in PHP and JavaScript. Support for ... IM like toolbar for formatting your chat messages. It does not require any browser plugins ... requires MySQL, all data stored in ordinary files. ChaNT included privacy features such as traffic encryption ...

... website administrators protect and add security to their data. Using the built in functions, you can encrypt ... and decrypt data using the encryption and decryption algorithms as well as hash your data with over ... 40 different hashing algorithms! Features ... Decryption Algorithms! Over 40 Hashing algorithms ...

... collection of the best encryption and hashing algorithms: RSA public key algorithm AES symmetric block algorithm ... Blowfish symmetric block algorithm Cast5 symmetric block algorithm TripleDES symmetric block algorithm Twofish symmetric block algorithm ... MD5 hash SHA1 hash Ripemd hash 32-bit CRC checksum algorithm 24-bit CRC checksum algorithm PGP ...

... for Active Server Pages and stand-alone applications. It includes collection of the best encryption and hashing algorithms ... 2048 bits); AES symmetric block algorithm ... 256 bits); Blowfish symmetric block algorithm ... 64 to 448 bits); Twofish symmetric block algorithm ...

... an ASP and VB version of the RSA-MD5 signature hashing algorithm. This allows you to obtain ... 32 digit signature for any text string or file. This is NOT encryption, it is ... 32 digit signature for any text string or file. This is NOT encryption, it is ... to reverse decode the MD5 Signature. ANEI-MD5 can be used to read in ...

... modular and extensible collection of cryptography functions, for encryption and hashing. Includes Blowfish, MD5, SHA functions, XXTEA, ... and others, all coded from easy-to-read and object-oriented JavaScript code. ...

... Protects files by securing links to them using MD5 hashing. This way nobody ... ever knows the true location of your files. Links can also have an expiry time from ... minute to several years if required making it easy to control access. Linklok URL ... download form to email secure time limited links to ...

... Just wrote this tool, to allow instant transformation of data into following ... base64 encode decode, urlencode decode, md5 and sha1 hashing, rot13, addslashes and htmlentities. Really cool to select ... then compare these encodings side by side. This tool can be used to decode URLs, encode base64 ... for tricky characters or decode for checking mail ...

... secure login script for your website. It can even be implemented ... into an existing database. The script supports userlevels which enable you to control what ... type of user can access your pages. Sessions are also used to store login information ... on your server so attackers cannot reach it. Hashing of passwords is also used in the script ...

... wonderful set of library functions for encrypting, decrypting, and hashing data.Getting Started With Mcrypt ...

... export features, full multi-lingual support, anti-leech, fulltext searching, file hashing, URL verification, unlimited categories, sub-categories, announcements, files ... download mirrors, document agreements, custom fields, file ranking, commenting, images, galleries. Database backup, clean, prune ... and resync tools, public file submissions, filetype filtering, administrator and archive logging ...

... Comet WebFileManager) is ... complete Web-based file manager with Explorer-like interface. Features ... Multiuser with per-user configurable permissions ... Context menu in file and tree area ... Easy admin panel; Access all areas of file system ...

... It was written in PHP, supporting PHP4 and PHP5 and works with MySQL, MySQLi, PostgreSQL and SQLite. ... Most important functions of FluxBB:• XHTML compliant ... Post preview• Move topics ... Close topics• Sticky topics ...

... It is used for publishing files/documents on the web for corporations and small businesses ... alike.Most important functions of Owl Intranet Knowledgebase:• Multi-user environment Folder and file permissions. ... Self register capabilities, Capcha Support password size policy enforcement ...

... or anything like that. Most important functions of Ajaxy:• Back button support ... many Ajax driven websites don ... support the back-button in browsers, meaning that users have no means to bring back previous content. ... built-in to Ajaxy is ...

... flexible, powerful, cross-browser and easy to use open source web-based chat ... system written in PHP and JavaScript. It has support for BBCode, 3D Animated Smileys ... your chat messages. It does not require any browser plugins like Java or Flash. Also it not ... MySQL, all data is stored in ordinary files. ChaNT includes privacy features such as traffic encryption ...

... MTS component that allows Application Developers to encrypt and decrypt text and files. It supports the ... latest industry-standard strong encryption and hashing algorithms including ... Blowfish, Cast 128, Cast 256, Rijndael, Serpent, Twofish, TEA, MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, ... one-way encryption algorithm ...

... create records of users which are stored in text files. The class can also authenticate users by ... looking up the record text files and check if the supplied password matches the ... out when the case. Most important functions of Simple Login Class:• Proven Security system and Unbreakable ...

... Ruby implementation of the Chord distributed hashing protocol using Distributed Ruby.Harmonium is ... Ruby implementation of the Chord distributed hashing protocol using Distributed Ruby. ...

... EPP Domain Registration System) is ... full-cycle domain registration and management system. It allows you to run an automated domain ... registration service, with ability for your clients to register, renew, ... transfer domain names. System web interface consists of ...

... Hashing the field names ensures that bots don ... know which of them require human input. The class checks whether the form is ... too fast or too slow to have been submitted by ... human user.It also checks whether the values stored in the hidden inputs are valid. Demands ...

... is an advanced file manager, developed with the aim to be not too ... Is therefore advised to put "lfman.php" file among web site pages, in particular in ... the root directory, to avoid errors in web pages links. It ... also possible to place Light FMan PHP's various icons into the directory you choose, into ...

... hashing, Image encoders, and JSON serialization as well as general Number, String and Date ... hashing, Image encoders, and JSON serialization as well as general Number, String and Date ...

... searches inside its database. Most important functions of PhpBibliography:• Customizing the format of ... Adding and modifying users and papers• BibTex Management ... Classification of papers• Viewing and showing papers ... Besides standard fields, new attributes can be specified for papers ...

... It includes collection of the best encryption and hashing algorithms ... RSA public key algorithm ... 2048 bits key size ... AES symmetric block algorithm ... 256 bits key size ... Blowfish symmetric block algorithm ...

... Quickly enable your .NET applications to accept online payments by Credit Cards and eChecks through the Authorize.Net ... payment gateway with Duis PaymentGateway software component.Duis PaymentGateway component is ... Credit Card or eCheck transactions to the Authorize.Net payment gateway. The component supports Authorize.Net Advanced Integration Method ...

... file and string hashing utility for Win32, Mac and Unix.Features ... 15 Hashing functions ... Drag and drop file hashing ... cross platform library ...

Scripting hashing programming is written in computer programming languages that is typically interpreted and can be typed directly from a keyboard. Hashing scripts are often distinguished from executable files. This hashing scripts are safe to use virus free and spyware free.

«« « 123 » »»