way gost free software
Search results for tag «way gost»:
EDCrypt 3.1
… ample projects in several languages are included in the package.
EDCrypt is a stand-alone component. It does not require any other files to work. The control can be distributed royalty-free in an unlimited number of commercial applications.…
SALVADOR 2.7.2
… d, signed and, at the desire, the compressed base. That, the malefactor cannot not only get access to contents of base but also how to modify it, that misinforming the owner of base.
The interface, for years of use in the several large organizatio…
QuickCrypt Library 2.51
… elp file has C, C++ and Visual Basic (VB) examples showing how to add encrypting/decrypting functionality to Windows applications quickly and easily.…
WinZit! 1.3.10
… ecuring your data in three different layers: WinZit!® Application level, Archive level and Data level. WinZit!® supports files and archives up to multi-therabyte in size, the number of archived files is, for all practical purposes, unlimited.…
VisualHash 1.0
… um-32, CRC-16, CRC-16-CCITT, CRC-16-XModem, CRC-32, CRC-32-MPEG2, CRC-64, ELF-32, FCS-16, FNV-32, FNV-64, GOST, MD2, MD4, MD5, PJW-32, SDBM-32, SHA-1, SHA-256, SHA-384, SHA-512, Sum-32, XUM-32 and many more.
Requirements
.NET framework 1.1…
Gizmo Hasher 2.0.4
… ash/compare
Create Hash Listings and compare for changes later
Support for MD5, SHA-1, SHA-2 [256,384,512], CRC32,
CRC16, CRC16-CCITT, RIPEMD160, RIPMD128, MD4,
MD2, HAVAL-5-256, GHASH-32-5, GHASH-32-3,
GOST, SizeHash-32, FCS-32, FCS-16, Tiger…
Omziff 3.0.9
… Rijndael, and Twofish.
Omziff will also generate random passwords, splits files and does simple file shredding according to DOD Standards. It is freeware, comes in a standalone executable file with no dependencies and is completely USB compatible!…
DPASHA 1.99
… AVAL224 224bits, HAVAL256 256bits, Tiger128 128bits, Tiger160 160bits, Tiger192 192bits and GOST R 34.11-94.
You can test files for manipulations. Easy to use, supports Drag & Drop. All hashes are standard with all other hash programs and hashes.…
Absolute CHAOS 3.8
… ute CHAOS has comprehensive privacy tools including file/folder compression, file/folder shredder.
Algorithm: Absolute CHAOS uses Blowfish (448 bit keysize), AES (256 bit keysize), GOST (256 bit keysize), 3DES (168 bit keysize) and stream cipher.…
Data Encrypt 1.0
… s deleted, using special software this file can be retrieve. Using the advanced SafeDelete technology the files encrypted and wiped using the overwrite technology that ensures that the file is not recoverable
Limitations
14 days evaluation period…
Related: