EDCrypt 3.0
EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- AnyMP4 DVD Ripper for Mac
- FoneLab Data Retriever
- Recupero File Cancellati
- AnyRec Video Repair
- Aiseesoft Mac FoneLab
- SSuite NetSurfer E-Gamer x64
- USB Disk Undelete
- Verwijderde Bestanden...
- Business Purchase Order
- Secure Eraser
- Atlantis Word Processor
- FrontSketch
- Apeaksoft DVD Creator for Mac
- UltraFileSearch Std
- Pen Drive Recovery Free
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Gost Download
-
1$50.00
-
2Master Shredder 2.32
Army Standard, Russian GOST P50739-95 Data Destruction Standard and others. It destructs files not only on FAT16 and FAT32 formatted hard drives and other media, but it includes special algorithms for NTFS formatted hard drives, it recognized and destructs ...$39.95
Buy -
3Pin Box Manager 1.5
The key feature of this application is symbol view conformance to the GOST, which makes schematic symbols to look better and simplifies the design process. PBM has a row of adjustable parameters which allow achieving exactly that graphic representation ...$100.00 -
4S.S.E. File Encryptor 9R4C
● Files are encrypted using strong encryption algorithm: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 256bit/448bit, Twofish 256bit and GOST 256bit ciphers are available. ● GUI Version and Command Line Version are available. ● Compatible ...Freeware -
5Paranoia Text Encryption for PC
Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. A steganography ...Freeware -
6S.S.E. File Encryptor for PC 15.0.2
Files are encrypted using strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro Version) ciphers are available. Cross-Platform ...Freeware -
7Hardwipe 5.1.1
It also offers read-back verification, report logs, and supports all major sanitization schemes, including: GOST R 50739-95, DOD 5220.22-M, Schneier and Gutmann. Hardwipe is free for non-commercial use (some premium features require a paid upgrade).$12.99
Buy -
8BCWipe 7.50.2
1-2) standards, as well as other popular wiping standards: German VSITR standard, Bruce Schneier's recommended wiping scheme, Peter Gutmann method, British HMG IS5 (Baseline, Enhanced), Canadian RCMP TSSIT OPS-II, NAVSO-P5239-26, Russian GOST R 50739-95, US Army ...$39.95
Buy -
9CryptoForge 5.1.0
This strong encryption program provides four encryption algorithms: 448-bit Blowfish, 256-bit Rijndael (AES), 168-bit Triple DES, and 256-bit Gost. It also includes powerful compression to strengthen cryptographic security even more. The command line ...$39.70
Buy -
10Active Kill Disk - Hard Drive
22 MGutmann's algorithm, German VSITRHMG IS5 BaselineHMG IS5 EnhancedNavso P-5329-26 (RL), Navso P-5329-26 (MFM)NCSC-TG-025, Russian GOST p50739-95, US Army AR380-19US Air Force 5020 and some othersYou can be sure that once you wipe a disk with Active ...Freeware -
11BestCrypt 8.03
Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options.$59.95 -
12CryptoLead Home 1.04
CryptoLead encrypts the files using the strong algorithms, such as RSA, RC4, MD5, GOST 28147-89 and so on. CryptoLead is distributed free. -
13Advanced Encryption Package 2005
) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, SAFER, 3-WAY, GOST, SHARK, SQUARE, SKIPJACK, TWOFISH, MARS, SERPENT. The latest version has support for RSA algorithm and Public-Private Key cryptography.$49.95 -
14Advanced Encryption Plug-In Pro
Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CAST, RC2, Twofish, Diamond2, Mars, Gost, Tea, Safer and so on (17 algorithms). All algorithms are industrial encryption standards. Shredding ...$34.95 -
15Advanced Encryption Plug-In Pro
Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CAST, RC2, Twofish, Diamond2, Mars, Gost, Tea, Safer and so on (17 algorithms). All algorithms are industrial encryption standards. Shredding ...$34.95 -
16Advanced Encryption Package 2008
) undustrial encryption algorithms: DESX, BLOWFISH, RIJNDAEL(AES), CAST, 3-DES, RC2, DIAMOND2, TEA, SAFER, 3-WAY, GOST, SHARK, SQUARE, SKIPJACK, TWOFISH, MARS, SERPENT.$49.95 -
17InternetTV Player 1.1
InternetTV Player is a program for watching television channels over the Internet. There are hundreds of TV channels that stream their content over the Internet - all you need to be able to watch them is a PC connected to the Internet and a web browser.Freeware -
18Files Terminator Free 2.6.0.1
The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and ...Freeware -
19WinSTEEL 7.0
The best tool to find foreign equivalents of world steel grades WinSteel includes: -The largest steel database covering more than 84,000 grades worldwide. -Great search system, which allows to find grades and their equivalents in seconds. We are ...$470.00 -
20Absolute CHAOS 3.8
Absolute CHAOS allows to encrypt the files and folders and to hide it as the files .ipg, .gif, .doc, .rtf or any others. Absolute CHAOS has high speed and allows variable-length keys, making it very reliable and easy to use. The program is compact, efficient ...$29.95 -
21Home CHAOS 3.5
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable.$19.95 -
22Files Terminator Free Portable
The software uses several shredding methods (one pass Pseudorandom, British HMG IS5, two pass Russian GOST P50739-95, three pass US DoD 5220.22M, seven pass German VSITR, Canadian RCPM TSSIT OPS-II, Bruce Schneier and the 35-pass Peter Gutmann) and ...Freeware -
23By the Methods 1.1.4
The tools also support standard conditions defined by NIST, IUPAC, and GOST. All data is easily viewable on a single, scrollable display, and saved to your SDCARD as date and time stamped Microsoft Excel spreadsheets for later use and verification. ...$4.99 -
24BestCrypt Container Encryption
BestCrypt encrypts files and folders on Windows, Mac OS X and Linux by utilizing a wide variety of algorithms (AES, Blowfish, Twofish, CAST, GOST 28147-89, Triple-Des, Serpent) and the largest possible key sizes with XTS, LRW and CBC encryption modes.$59.95
Buy