The Cipher 4.0

The program is designed to encrypt and decrypt files. Features: Encryption and decryption of files using GOST, Blowfish, IDEA, ... Cast256, RC2, RC5, RC6, DES, TEA on password; Encryption and decryption of files using CHR, and BIT ... the file-key; Select one or more methods of encryption; Creation of a separate encrypted file with the extension .Cip; Editor secret message; Total removal of the source file. ...

Author Perun, Ltd
License Free To Try
Price $9.00
Released 2010-02-17
Downloads 345
Filesize 3.19 MB
Requirements Windows, Linux
Installation Install and Uninstall
Keywords cypher, file, directory, encrypt, decrypt
Users' rating
(3 rating)
The CipherEncryption ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7 x32, Windows 7 x64, Win2000, Linux
The Cipher encryption program - Download Notice

Using The Cipher Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of The Cipher on rapidshare.com, depositfiles.com, megaupload.com etc. All The Cipher download links are direct The Cipher full download from publisher site or their selected mirrors.
Avoid: encryption program oem software, old version, warez, serial, torrent, The Cipher keygen, crack.
Consider: The Cipher full version, encryption program full download, premium download, licensed copy.

The Cipher encryption program - The Latest User Reviews

Most popular Encryption Tools downloads

ArmorTools Home

25.1.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

ArmorTools Home x64

24.12.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in ... needing AEP2008 PRO or any other software. The program includes a file shredder that wipes the contents ...

ArmorTools Pro

24.8.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...

Home CHAOS

3.5 download

Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files ... whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. ...

ABC CHAOS

2.75 download

ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files ... whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. ...

PrimaSoft Encryption - Service Edition

1.0 download

Service Process: You can run scheduled auto-recurring encryption and decryption sessions as a service process. Encryption Scheduler: PrimaSoft Encryption utility comes with flexible scheduler. You can schedule auto recurring encryption sessions for any future date and time. Encryption ...

Advanced Encryption Package 2008 Professional

4.8.7 download

... someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in ... needing AEP2008 PRO or any other software. The program includes a file shredder that wipes the contents ...

XorIt

1.9 download

... physics!) XorIt is designed to use conventional XOR encryption on keys that are the same size as ... efficiency. XorIt is a simplified version of our program CryptIt. ...

5 award

ArmorTools

25.1.1 download

... disks, and folder-based disks. Encrypted disks use AES128/AES256 encryption algorithms and are designed to store your secret ... or use any file as a key to encryption. For example, when sending secret information by mail, ...