CEX

With this reliable and user-friendly program, you can successfully protect the contents of your most sensitive files using three encryption engines.

  • CEX
  • Version :1.2 / 1.3 Beta
  • License :Trial
  • OS :Windows All
  • Publisher :VTDev.com

Download Now

CEX Description

CEX is a comprehensive and efficient software solution designed to help you protect your most important files, making sure that even if there were to fall into the wrong hands, no one would be able to get past the encryption layer.

Initial configuration steps

The program experiences a brief installation, with no noteworthy events, but the first time you run it, you will be required to opt for a preferred ‘Security Level’, between ‘Low’, ‘Medium’ and ‘High’, depending on your particular needs.

Similarly, you will need to create a master password which (depending on the selected ‘Security Level’) will need to be provided every time you access CEX.

Protect your files using self-made encryption keys

The strength of the CEX resides in the variety of configuration options which can be found in the ‘Application Security’ section. From this location, you can select one of the three available encryption algorithms (Rijndael Extended, Rijndael / Serpent Hybrid or Dual AES CTR Stream).

You can also opt for a preferred ‘Key Size’ (256 or 512) and ‘Cypher Mode’ (Cipher Block Chaining, Segmented Integer Counter or Parallel Segmented Counter). CEX lets you choose a ‘Vector Size’ and a ‘Padding Mode’, as well as define how the tool should behave, security-wise.

To protect a file, you firstly need to create an encryption key and store it to a location of your choice. You can then load the source document into CEX and pick the key you wish to employ, define an output location, then click on the ‘Encrypt’ button; it is as simple as that. To perform the reverse operation, you just need to open the file into the program and click on ‘Decrypt’.

A powerful file encryption instrument

In summary, CEX is a useful and reliable utility whose main purpose consists of offering you a safe method of encrypting your documents, in order to prevent ill-intended individuals from gaining access to their contents.

Leave a Reply

Your email address will not be published.