The Cipher 4.0

The program is designed to encrypt and decrypt files. ... decryption of files using CHR, and BIT using the file-key; Select one or more methods of encryption; Creation of a separate encrypted file with the extension .Cip; Editor secret message; Total removal of the source file. ...

Author Perun, Ltd
License Free To Try
Price $9.00
Released 2010-02-17
Downloads 341
Filesize 3.19 MB
Requirements Windows, Linux
Installation Install and Uninstall
Keywords cypher, file, directory, encrypt, decrypt
Users' rating
(2 rating)
The CipherEncryption ToolsWindows XP, Windows Vista, Windows Vista x64, Windows 7 x32, Windows 7 x64, Win2000, Linux
The Cipher the secret - Download Notice

Using The Cipher Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of The Cipher on rapidshare.com, depositfiles.com, megaupload.com etc. All The Cipher download links are direct The Cipher full download from publisher site or their selected mirrors.
Avoid: the secret oem software, old version, warez, serial, torrent, The Cipher keygen, crack.
Consider: The Cipher full version, the secret full download, premium download, licensed copy.

The Cipher the secret - The Latest User Reviews

Most popular Encryption Tools downloads

abylon SHAREDDRIVE

23.60.1 download

The encrypted file clipboard abylon SHAREDDRIVE is shown in the MS File Explorer on the desktop level and protect your secret files. The complete integration into the Explorer environment simplify using ...

DeepSound

1.4.0.0 download

DeepSound is a steganography tool that hides secret data into audio files - wave and flac. The application also enable you to extract secret files directly from audio CD tracks. DeepSound might ...

ArmorTools

24.8.1 download

ArmorTools is a set of tools that expands the capabilities of the MS Windows operating system in the field of security and protection of user confidential ... file as a password. ArmorTools removes traces of the user's work on the computer, clears the history ...

Fast File Encryptor

12.3 download

... compatible with ArmorTools software. Fast File Encryptor features the following tools: Encrypt File, Encrypt Folder, Often Used ... a key to encryption. For example, when sending secret information by mail, you can encrypt the transmitted ...

BestCrypt Container Encryption

9.08.9 download

... Blowfish, Twofish, CAST, GOST 28147-89, Triple-Des, Serpent) and the largest possible key sizes with XTS, LRW and ... encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. BestCrypt Container Encryption includes a ...

AutoKrypt

13.10 download

... methods include password based, public and private key, secret key, OpenPGP password, OpenPGP public and private key. ... trial and FREE minor upgrades Features: The encryption module is a commandline wrapper around GnuPG. ...

Kruptos 2 (x64 bit)

7.0.0.0 download

... from being modified, read or even accessed without the correct password. With Kruptos 2 Professional you can ... documents or important files were to fall into the wrong hands? Over half a million users ...

FastEncryptor

12.3 download

... operations. FastEncryptor compatible with ArmorTools software. FastEncryptor features the following tools: Encrypt File, Encrypt Folder, Often Used ... a key to encryption. For example, when sending secret information by mail, you can encrypt the transmitted ...

abylon BASIC

23.60.1 download

The protection of your sensitive data is often disregarded. But the encrypting of diaries, pictures or other secret documents with the AES- or Blowfish-Algorithm is relatively simple. With the help of the Easy Encryption Technologie (EEnTe) only ...

east-tec InvisibleSecrets

4.8 download

... for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or ... your personal web page to exchange messages or secret documents. east-tec InvisibleSecrets 4 features: strong encryption algorithms; ...