The Cipher 4.0

The program is designed to encrypt and decrypt files. Features: Encryption and decryption of files using GOST, Blowfish, IDEA, ... Cast256, RC2, RC5, RC6, DES, TEA on password; Encryption and decryption of files using CHR, and BIT ... the file-key; Select one or more methods of encryption; Creation of a separate encrypted file with the extension .Cip; Editor secret message; Total removal of the source file. ...

Author Perun, Ltd
License Free To Try
Price $9.00
Released 2010-02-17
Downloads 353
Filesize 3.19 MB
Requirements Windows, Linux
Installation Install and Uninstall
Keywords cypher, file, directory, encrypt, decrypt
Users' rating
(4 rating)
The CipherEncryption ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7 x32, Windows 7 x64, Win2000, Linux
The Cipher encryption program - Download Notice

Using The Cipher Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of The Cipher on rapidshare.com, depositfiles.com, megaupload.com etc. All The Cipher download links are direct The Cipher full download from publisher site or their selected mirrors.
Avoid: encryption program oem software, old version, warez, serial, torrent, The Cipher keygen, crack.
Consider: The Cipher full version, encryption program full download, premium download, licensed copy.

The Cipher encryption program - The Latest User Reviews

Most popular Encryption Tools downloads

FastEncryptor

13.4 download

... or use any file as a key to encryption. For example, when sending secret information by mail, ... file using a wallpaper image or the Calculator program as a key. After passing the information to ...

ArmorTools Professional x64

25.4.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

ArmorTools

25.4.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

DriveCrypt

5.1.0 download

... the hard disk, it is automatically re-encrypted. The encryption/decryption process is completely transparent to the user or any application program - the data is caught "on-the-fly" as it ...

Fast File Encryptor

13.4 download

... or use any file as a key to encryption. For example, when sending secret information by mail, ... file using a wallpaper image or the Calculator program as a key. After passing the information to ...

ArmorTools Home x64

25.4.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

ArmorTools

25.4.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

Rohos Disk Encryption

2.2 download

Easy-to-use and smart disk encryption program that lets you create encrypted disk partitions (volumes) ... your private data secure. Rohos Disk hides your programs and data, and restricts access to them. Rohos ...

Kruptos 2

7.0.0.1 download

Kruptos 2 Professional is an easy to use encryption program that uses 256-bit encryption to password protect your private files and prevent ... Kruptos 2 Professional is an easy to use encryption program that uses 256-bit encryption to password protect ...

Protectorion

1.0 B10.104 RC download

... the solution for secure management of data. The program functions as a file manager and additionally allows the encryption, versioning and describing of files. Files can be ...