No Image The program for cryptographic protection of the information. Includes 13 algorithms of enciphering (Blowfish, Twofish, GOST, AES (Rijndael), RC2, RC4, RC5, CAST, etc.), 21 algorithm of the elecronic-digital signature (MD, SHA, GOST, Tiger, Haval, etc.) and 3 algorithms of compression (LZ-77, LZ-78, LZW). The highest level of reliability.The interface is optimized for fast and convenient daily use (for enciphering-decoding enough 2-3 clicks mouse)

EDCrypt 3.1: Data encryption, computing message digests and file shredding ActiveX control.
EDCrypt 3.1

Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files

encryption, shredding, cryptography, hashing, decryption, message digest, cipher, security

No Image
SafeDisk 2.10

SafeDisk is 128bit on-the-fly disk encription. Allows to create and use virtual ciphered disks. Supports algorithms AES (RIJNDAEL), BLOWFISH, SQUARE, GOST, SKIPJACK, RSC. Stealth. Built-in protection against keyboard spies. Mode "under enforcement". Locking of access to workstation at Windows loading/idle. Low level wipe.

safe, disk, blowfish, square, encryption, virtual, gost, cipher, skipjack, security, rijndael

Advanced Hash Calculator 2.51: Feature full hash calculator, supports crc32, GOST, MD2, MD4, MD5, SHA1 and SHA2
Advanced Hash Calculator 2.51

Advanced File Calculator is a cryptographic data hash calculation software. Simply drag and drop files in this calculator and hash string for the files will be immideately displayed. Supported cryptographic hash calculation algorithms include CRC32, GOST hash, MD2, MD4, MD5, SHA-1, SHA2 (256, 384, 512). You may copy the hash string for a single file or export a full list of hash strings in a text file and compute hash right from Windows Explorer.

md5 hash, gost, control sum, cryptographic hash, cryptography, calculate hash, hashing, sha2, filesland, calculator, crc32 hash, hash function, crc32

Crypther DLL 2.5: With this program you can crypt you file secure with:Blowfish, Cast128, Cast256,
Crypther DLL 2.5

With this program you can crypt you file secure with:Blowfish, Cast128, Cast256, DES, 3DES, Gost, Ice, Ice2, Thin Ice, IDEA, Mars, Misty1, RC2, RC4, RC5, Twofish, RC6, Rijndael and CBC-MODE. DPCRYPT use the full crypt keysize from the cipher.

3des, blowfish, misty1, ice2, cast128, gost, cbc mode, mars, cast256, twofish, idea, rijndael, thin ice

Terminus 6 6.0: Terminus 6 - Leave No Traces -  The ultimate data destruction toolkit.
Terminus 6 6.0

Terminus 6 - Leave No Traces - The ultimate data destruction toolkit. Terminus 6 brings professional IT security/COMSEC grade destructive power to the masses: erase files, slack space, free space, protect your privacy, destroy chunks of data even if they`re not in a file, destroy huge files (2GB or larger) with ease, and more. Network aware, and International standards compliant - NISPOM, NAVSO, AFSSI, HIPPA, ACSI, GOST, VSITR, and more.

hippa, destruction, secure, file, gost, vsitr, navso, acsi, afssi, slack, free, nispom, purge

No Image
PowerKey 2.0

PowerKey is an advanced encryption toolkit with many unique features which you won`t come across in other products of such a kind available online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish).

3des, encrypt, cast, blowfish, wipe, encryption, gost, security, anti spy, shell, fast

More Results: 1  2  3  4  

World IT News