|
||||||
|
||
|
Home > Gost software |
|
|
21. | Email CHAOS 4.52 (safechaos.net) | ||
With E-mail CHAOS you can protect the privacy of your e-mail messages, files and folders by encrypting them so that only the intended recipients can read them. You can also digitally sign messages and files, which ensures their authenticity. When someone sends you e-mail with their digital signature, CHAOS | |||
Updated: 9, 2005 | Rating: 0 | Size: 424 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
22. | EDCrypt 3.1 (softuarium.com) | ||
text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files Help files and example projects in | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
23. | Home CHAOS 3.5 (safechaos.net) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
24. | Active ERASER 4.01 (active-eraser.com) | ||
the right-click context menu. Supports U.S. DoD 5220.22-M, VSITR, GOST P50739-95 and Gutmann sanitation standards. Active Eraser is the most comprehensive data-destruction toolset that includes Windows and DOS applications, for keeping your PC secure from undesired data recovery. Supports U.S. DoD 5220.22-M, VSITR, GOST P50739-95 and Gutmann sanitation | |||
Updated: 9, 2005 | Rating: 489 | Author: Data Security | Size: 1030 kb | Demo Go to category: System Utilities > Other Similar programs | |||
25. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer. Of course, if you are really concerned about privacy of your data, there's nothing | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | SafeDisk 2.10 (guardcomplete.com) | ||
disks. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK, RSC. Stealth. Built-in protection against keyboard spies. Mode "under enforcement". Locking of access to workstation at Windows loading/idle. Low level wipe. SafeDisk is 128bit on-the-fly disk encription. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK. Stealth. Built-in | |||
Updated: 3, 2005 | Rating: 42 | Author: Andre Belokon | Size: 820 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | Advanced HTMLCoder 3.0 (raysion.com) | ||
use only, you can encrypt its code (using powerful Blowfish and GOST encryption algorithms) and set the access password. You can also protect the source code of your pages from unethical competitors by encrypting it and disabling certain functions, including the display of URLs in the status bar, text selection, right mouse button operations, printing and copying elements to the | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
28. | hCrypt 3.0 (raysion.com) | ||
Blowfish (448 bit encryption, password length up to 56 symbols) and GOST (256 bit encryption, password length 32 symbols) encryption algorithms. To protect less sensitive information, you may use simple but extremely fast XOR encryption. You can customize the appearance of the password prompt (fonts | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
29. | Hiding CHAOS 5.6 (safechaos.net) | ||
Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Gost software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|