Why do we need this program:
1) a normal user:
Do you have any secret files that no one should see? Do you want to correspond with a friend and do not want
I read your letters to a stranger? For your computer run a lot of users, and you do not want that they
climbed on your files?
- Then this program is for you! It is for you to program simple and convenient interface.
2) information security specialists:
GOST 28147-89 encryption algorithm, advanced and maintainable contains 4 main mode
encryption. It supports all requirements for the quality of key information and key sources. Contains
additional program key generator, which can come in handy in the work on other cryptographic
algorithms. The program also contains the source code !!!
3) Students:
On the nose surrender course project on programming, but you have not chosen the theme?
-Then This software is for you. The program contains the source code !!! and an Internet link where you can
take the Old to the explanatory note.
1) a normal user:
Do you have any secret files that no one should see? Do you want to correspond with a friend and do not want
I read your letters to a stranger? For your computer run a lot of users, and you do not want that they
climbed on your files?
- Then this program is for you! It is for you to program simple and convenient interface.
2) information security specialists:
GOST 28147-89 encryption algorithm, advanced and maintainable contains 4 main mode
encryption. It supports all requirements for the quality of key information and key sources. Contains
additional program key generator, which can come in handy in the work on other cryptographic
algorithms. The program also contains the source code !!!
3) Students:
On the nose surrender course project on programming, but you have not chosen the theme?
-Then This software is for you. The program contains the source code !!! and an Internet link where you can
take the Old to the explanatory note.
NO COMMENTS YET