The Cipher 4.0

The program is designed to encrypt and decrypt files. Features: Encryption and decryption of files using GOST, Blowfish, IDEA, Misty1, Rijndael, Twofish, Cast128, Cast256, RC2, RC5, RC6, DES, TEA on password; Encryption and decryption of files using CHR, and BIT using the file-key; Select one or more methods of encryption; Creation of a separate encrypted file with the extension .Cip; Editor secret message; Total removal of the source file. ...

Author Perun, Ltd
License Free To Try
Price $9.00
Released 2010-02-17
Downloads 350
Filesize 3.19 MB
Requirements Windows, Linux
Installation Install and Uninstall
Keywords cypher, file, directory, encrypt, decrypt
Users' rating
(4 rating)
The CipherEncryption ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7 x32, Windows 7 x64, Win2000, Linux
The Cipher key - Download Notice

Using The Cipher Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of The Cipher on rapidshare.com, depositfiles.com, megaupload.com etc. All The Cipher download links are direct The Cipher full download from publisher site or their selected mirrors.
Avoid: key oem software, old version, warez, serial, torrent, The Cipher keygen, crack.
Consider: The Cipher full version, key full download, premium download, licensed copy.

The Cipher key - The Latest User Reviews

Most popular Encryption Tools downloads

PrivadoVPN

3.12.0 download

... streaming, or working remotely. One of the key features of PrivadoVPN is its strong encryption protocols, which safeguard your data from prying eyes. Utilizing industry-standard AES-256 encryption, it ensures ...

VPN Gate Client Plug-in

2025.03.17 Build 979 download

... Primarily relying on volunteers, the server distribution covers key regions worldwide, with a strong presence in Asia. ... utilizing up to 256-bit AES encryption, RSA 4096-bit key encryption, and SHA-1 hashing. It supports multiple protocols, ...

New Version

Lux

1.29.5 download

... tasks without unnecessary distractions. One of the key advantages of Altair is its robust support for GraphQL subscriptions. This feature allows developers to receive real-time updates from their GraphQL ...

New Version

DRMsoft CHM to EXE Converter

2.0 download

... users. Easily distribute CHM files and protect it. Key Features : Multiple encryption modes: Non-PC-Binding, All computer ... be authenticated once on the same computer(With same Key and Product ID). You can specify the number ...

CryptIt

1.4 download

... of computational security, that is the difficulty of key factorisation prevents decryption ofthe file. But this method ... used to be considered that a 56 bit key was unbreakable to brute force attacks, but the ...

Fast File Encryptor

13.3 download

... your own or use any file as a key to encryption. For example, when sending secret information ... wallpaper image or the Calculator program as a key. After passing the information to the recipient, he ...

ArmorTools Professional

25.3.1 download

... your own or use any file as a key to encryption. For example, when sending secret information ... wallpaper image or the Calculator program as a key. Having transferred the information to the recipient, he ...

New Version

PrimaSoft Encryption - Service Edition

1.0 download

Service Process: You can run scheduled auto-recurring encryption and decryption sessions as a service process. Encryption Scheduler: PrimaSoft Encryption utility comes with flexible scheduler. You can schedule auto recurring encryption sessions ...

CryptoTE

0.5.390 download

... does not require you to fill in grids, key-value attributes, descriptions etc. Encryption is transparently performed using the highly-secure Serpent cipher. The editing interface is thoroughly optimized for speed and ...

BestCrypt Volume Encryption

5.12.7 download

**BestCrypt Volume Encryption by Jetico, Inc. - A Comprehensive Review** In an era where data breaches and cyber threats are ever-increasing, securing sensitive information has become paramount. BestCrypt Volume Encryption, ...