Security & Privacy - martin2k Software


Submit Software

Audio & Multimedia






Games & Entertainment

Graphic Apps

Home & Hobby

Network & Internet

Security & Privacy


System Utilities

Web Development

Security & Privacy > Encryption Tools

Secure IT Encryption Software Secure IT Encryption Software

Secure IT File Encryption Software

Author: Cypherix Software

Release date: 9th December 2017

Date added: 2nd January 2018

Type: Shareware

Expires after: 30 days (None)

Cost (US): $29.95

Place an Order

Install: Install and Uninstall

Size: 19.07 MB



Languages: English, French, German

Supported operating systems:

Windows 2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, Windows Server, Windows Other, Windows Vista, Windows Vista x64

System requirements: x486 or better, 20 MB RAM

Product Website



Cypherix's Secure IT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT File Encryption Software has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program. This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. SIT 2000 is so simple to use. SIT 2000 is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. The program is fast, and requires relatively few computing resources and little time to encrypt files. The software provides full access control. No unauthorized access to encrypted data is possible under any circumstances, i.e. there are no 'back doors'. It ensures encryption of every type of file such as spreadsheet, graphic, or word processor. The software works on any kind of medium, whether floppy disk, removable hard drive, zip drive or tape drive. Secure IT 2000 is transparent to the end user, designed to hide the complexities of encryption technology from the end user. It runs on all 32-bit as well as 64-bit versions of Microsoft Windows (Windows XP, Vista, Windows 7, Windows 8 as well as Windows 10).

Recent changes:

Substantive Updates. Effectively a new release.

Distribution permissions:

Distribution Agreement You are hereby granted permission to duplicate the original evaluation software (unregistered) and distribute exact copies of the software to anyone via electronic means (Internet, BBS's, Shareware distribution libraries, CD-ROMs, etc.). You may not charge any distribution fee for the copy or the distribution except a reasonable participation to any cost you incur distributing the evaluation software (e.g. packaging). You must not represent in any way that you are selling the software itself. You may not charge any distribution fee for the use of the software itself. Secure IT (c) 1999-2017 Cypherix Software

End-user licence agreement:

License Agreement Read this license agreement carefully before evaluating/using this product. By using this product you indicate your acceptance of the terms of the following agreement. These terms apply to you and any subsequent evaluee or licensee of this product. If you do not accept or agree to the terms of this agreement, then you must not continue with the evaluation and/or purchase of this product. Cypherix retains the ownership of this Copy and any subsequent copies of the Product. The Program is owned by Cypherix Company and is protected by Indian copyright laws and international treaty provisions. Cypherix retains all rights not expressly granted. None of the components of the Program (including the documentation) may be copied, removed or altered, in whole or part, for any unauthorized use. Cypherix does not warrant that the Program will satisfy the requirements of your computer system, or that the Program or its documentation are without defect or error, or that the operation of the Program will be uninterrupted. No Cypherix distributor, dealer, agent, or employee is authorized to make any warranty for the Program. Cypherix retains all rights not expressly granted herein. Nothing in this License Agreement constitutes a waiver of Cypherix's rights under Indian copyright law and all other applicable laws. This license is non-exclusive. This License and your right to use the Product automatically terminate without notice from Cypherix if you fail to comply with any provision of this License Agreement, or any terms and Conditions associated with the sale/evaluation of this Product. Upon termination, you will destroy all documentation and software components. This Agreement is governed by the laws of India under Bombay Jurisdiction. This copy is licensed to you for use under the following conditions: Permitted Uses: You may use the Product on any supported computer configuration, provided the Product is used on only one such computer and by only one user. Prohibited Uses: You may not rent, sub-license, or lease the Product or documentation; alter, modify, or adapt the Product or documentation, or portions thereof including, but not limited to, translation, decompiling, disassembling, or creating derivative works. Limited Warranty: Except as specifically provided above, Cypherix makes no warranty or representation, either express or implied, with respect to the product, including its quality, performance, merchantability, or fitness for a particular purpose. In no event will Cypherix be liable for direct, indirect, special, incidental, or consequential damages arising out of the use or inability to use the product or documentation, even if advised of the possibility of such damages. In no case shall Cypherix's liability exceed the amount of the license fee paid. The warranty and remedies set forth above are exclusive and in lieu of all others, oral or written, express or implied. The Licensee understands and accepts that, without a password, the licensee cannot access the encrypted contents, i.e. if you forget the password, the encrypted files cannot be opened. Cypherix or for that matter anyone cannot help you if you have forgotten the password. Secure IT (C) Copyright 1999-2017. Cypherix Software.

© martin2k 2013 - 2018 | Disclaimers