The Cipher 4.0

... is designed to encrypt and decrypt files. Features: Encryption and decryption of files using GOST, Blowfish, IDEA, ... Cast256, RC2, RC5, RC6, DES, TEA on password; Encryption and decryption of files using CHR, and BIT ... the file-key; Select one or more methods of encryption; Creation of a separate encrypted file with the extension .Cip; Editor secret message; Total removal of the source file. ...

Author Perun, Ltd
License Free To Try
Price $9.00
Released 2010-02-17
Downloads 359
Filesize 3.19 MB
Requirements Windows, Linux
Installation Install and Uninstall
Keywords cypher, file, directory, encrypt, decrypt
Users' rating
(7 rating)
The CipherEncryption ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7 x32, Windows 7 x64, Win2000, Linux
The Cipher encryption - Download Notice

Using The Cipher Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of The Cipher on rapidshare.com, depositfiles.com, megaupload.com etc. All The Cipher download links are direct The Cipher full download from publisher site or their selected mirrors.
Avoid: encryption oem software, old version, warez, serial, torrent, The Cipher keygen, crack.
Consider: The Cipher full version, encryption full download, premium download, licensed copy.

The Cipher encryption - The Latest User Reviews

Most popular Encryption Tools downloads

PrivadoVPN

3.12.0 download

... the key features of PrivadoVPN is its strong encryption protocols, which safeguard your data from prying eyes. Utilizing industry-standard AES-256 encryption, it ensures that your online activities remain confidential ...

Secure Disc Creator

8.5.15 download

... enhancing convenience. 5. Reliability and Safety: Utilizes advanced encryption methods to secure data at the sector level, providing a high degree of protection. 6. Make ISO Image File: Users can ...

VPN Gate Client Plug-in

2025.07.15 Build 980 download

... user privacy and security. The software employs high-level encryption protocols to ensure that your online activities remain confidential and protected from prying eyes. Whether you're browsing from a public Wi-Fi ...

New Version

Fast File Encryptor

13.7 download

... or use any file as a key to encryption. For example, when sending secret information by mail, ... or use any file as a key to encryption. Fast File Encryptor : Often Used is a ...

New Version

GiliSoft File Lock Pro

13.9 download

... feature not natively supported by Windows. 6. File Encryption/Portable Encryption: Utilize AES encryption to convert files and folders into an encrypted ...

Guardian Of Data

3.008 download

... Guardian Of Data, it's a breeze. With AES encryption (Rijndael Encryption Algorithm) you protect any type of document, so ... entering the correct password! With up to 256-bit encryption, the software meets current security standards. Security doesn't ...

Bitdefender Antivirus Plus

27.2.3.8 download

... key features of Bitdefender VPN is its strong encryption protocols, which safeguard your data from prying eyes, ... your home connection. The software employs industry-standard AES-256 encryption, ensuring that your online activities remain confidential and ...

Geph

5.1.0 download

... online actions remain confidential. Additionally, Geph utilizes end-to-end encryption to safeguard data transmissions, further enhancing its security credentials. Geph's user interface is intuitive and user-friendly, making it accessible to ...

SecExMail Gate

1.2 download

... SMTP/POP3 mail server. SecExMail Gate implements open standard encryption algorithms to create a seamless security framework to protect the privacy of your corporate email on the public internet. No additional ...

USB Flash Security#

4.1.11 download

Add encryption to USB Flash Drive on the market. It ... Drive from PC, it will lock automatically. [Automated encryption] AES encryption which is recognized by speedy and cipher strength in encryption algorithm has been adopted. Data will be encrypted ...

5 award