Gost Software

Affordable and powerful .NET Encryption.

.NET Encryption Library
 

Kellerman Software
 

Affordable, powerful, and easy to use .NET Encryption/Hashing/Compression Library. Encrypt sensitive information such as passwords, credit cards and social security numbers. Supports Rijndael (AES), DES, TripleDES, RC2, Blowfish, Twofish, Whirlpool, MD2, MD4, MD5, SHA1, SHA2, HAVAL, GOST, Ripend320, FCS16, FCS32, CRC32, Adler32, X509, UUencode, Base64, GZip, and Deflate.

Software Keywords: encryption library compression hashing .net encryption

 
Fast, highly optimized encryption library.

QuickCrypt Library
 

SlavaSoft Inc.
 

Fast, highly optimized implementation of symmetric (private-key) encryption algorithms: DES, Triple DES (3DES), DESX, BLOWFISH, RIJNDAEL (AES-Advanced Encryption Standard), GOST. Supports 5 modes of operation. Allows to encrypt/decrypt files, memory blocks, strings, streaming data. Supports 2 interfaces: API and C++. Has no external dependencies such as MFC DLL, COM/DCOM or other component. The help file has examples in Visual Basic(VB),C,C++.

Software Keywords: aes private decrypting encryption triple decryption

 
Encrypt Web pages to restrict access to them.

hCrypt
 

Raysion Software Co.
 

hCrypt is a friendly tool that helps you encrypt and password-protect non-public Web pages. It features clear wizard-style interface, lets you process multiple files at a time and configure various advanced protection settings in a few simple steps. hCrypt uses powerful Blowfish and GOST encryption algorithms with password length up to 56 characters. To protect less sensitive information, you may use simple but extremely fast XOR encryption.

Software Keywords: access encrypting pages them specific

Secure Files Deletion Software

Master Shredder
 

SecureAction Research, LLC
 

Master Shredder is a professional files wiping utility. Files deleted by this software cannot be recovered by any third party software, even by special hardware devices (analyzing remanent magnetization of hard drive's surface). Master Shredder can securely delete your important files using 18 wiping algorithms, including U.S. DoD 5200.28, NATO Data Destruction Standard, U.S. Air Force Standard, U.S. Army Standard, Russian GOST P50739-95, others

Software Keywords: quick wipe schneier shredder dod

Protect your PC privacy from prying eyes!

AEVITA Tracks Eraser
 

AEVITA Software Ltd.
 

AEVITA Tracks Eraser is a slim data erasing program designed to protect your computer from nosy people and boost computer performance. It securely erases your usage tracks in Windows, Internet Explorer, MS Office and other applications. For maximum efficiency the program utilizes erasing methods based on the US Department of Defense DOD 5220.22-M, NAVSO P-5239-26, VSITR, GOST P50739-95 and Gutmann data clearing and sanitizing directives.

Software Keywords: wipe history index.dat sure secure tracks

Cryption tool

Crypther DLL
 

Paehl
 

With this program you can crypt you file secure with:Blowfish, Cast128, Cast256, DES, 3DES, Gost, Ice, Ice2, Thin Ice, IDEA, Mars, Misty1, RC2, RC4, RC5, Twofish, RC6, Rijndael and CBC-MODE. DPCRYPT use the full crypt keysize from the cipher.

Software Keywords: ice rc5 ice2 3des misty1

Encryption Workshop is a encrypt/decrypt tool

Encryption Workshop
 

Newera Software Technology Inc.
 

Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want to consider using encryption rather than password protection - it is much safer.

Software Keywords: folder encrypt-decrypt file decryption workshop

Encrypted virtual disks manager

SecretDrive
 

Eterlogic Software
 

Store your sencitive data securely on virtual encrypted drives. SecretDrive is a small and reliable program that allows you to create up to 16 encrypted virtual disks. SecretDrive provides transparent on-the-fly data encryption by one of five modern encryption algorithms. Encrypted flash drive container support. Algorithms: AES (Rijndael), GOST 28174-89, Blowfish, Twofish, CAST 256.

Software Keywords: encrypt data protect private virtual disk drive

Encryption, hashing, file shredding utility.

EDCrypt
 

Softuarium
 

Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files

Software Keywords: shredding message message digest cryptography data

Creates files for testing file integrity.

ExactFile
 

StudyLamp Software
 

Creates and tests file checksum digests: md5, sha1, sfv, crc32, ripemd, gost, tiger, md5sum, fsum, sha1sum, etc. Multi-threaded and Unicode compliant. Makes sure files you put on CD-ROM and memory sticks are perfect copies.

Software Keywords: md5 integrity sum folder checksum

 

Page 1 out of 4    1 2 3 4


 

Copyright © 2003-2012 TverSoft Software