Cipher Command on Windows | Liberian Geek (2024)

Did you know you can recover your data after deleting it (even from the Recycle Bin)? This is a bit concerning, especially if you want to change your device. By default, the Windows OS creates whitespace on the locations where the data is stored on the disk, and until that space is filled, the deleted data is recoverable. To fill this whitespace and prevent Data Recovery, Microsoft has added the “Cipher” command.

The “Cipher Command on Windows” is mainly in use to encrypt and decrypt the data; however, it also lets you securely delete the data without any possibility of recovering it. You cannot use the “Cipher” command on Windows Home versions.

Quick Outline

Today’s guide explains the “Cipher Command in Windows” in detail using the following content:

  • How to Encrypt and Decrypt the Files Command in Windows
  • How to Make the Files Unrecoverable in Windows

Let’s begin!

How to Encrypt and Decrypt the Files in Windows

In Windows, the encrypted data can only be accessed by the current user account or other users who have imported the valid certificate and key used during the encryption. You must export and import certificates and keys for accessing the encrypted files. You can encrypt the files in Windows using the below methods:

  1. Using the Windows Explorer
  2. Using the Cipher Command

Let’s explain the above methods in detail as follows.

Method 1: Encrypt and Decrypt the Files in Windows | Windows Explorer

To encrypt and decrypt the files in Windows via Windows Explorer, follow these steps:

Step 1: Navigate to the file or directory you want to encrypt and open its Properties.

Step 2: Select the “General” tab and then click on the Advanced button.

Step 3: Tick the checkbox “Encrypt contents to secure data” and hit the “OK” button:

Cipher Command on Windows | Liberian Geek (1)

The file is now encrypted and cannot be used by other users or in other systems without a valid certificate and key. The encrypted files/folders are visible within the Windows Explorer with a Lock Sign, as seen below:

Cipher Command on Windows | Liberian Geek (2)

Method 2: Encrypt and Decrypt the Files in Windows | Cipher Command

The “Cipher” is a multi-functional command with powerful attributes such as encrypting and decrypting the data. Another interesting feature of the “Cipher” command is filling the white spaces on the disk to prevent data recovery. Let’s understand the use of the “Cipher” command via the following examples:

Example 1: Encrypt Data | Cipher Command Windows

To encrypt the data using the “Cipher” command, use the “/e” flag. It also encrypts the file added later:

Cipher /e
Cipher Command on Windows | Liberian Geek (3)

In the above command, some directories are not encrypted because they are protected and there is no way to encrypt them (restrictions from Microsoft). The list of files that you cannot encrypt includes the following:

  • System Files & Directories.
  • Root Directories.
  • Compressed System & Non-System Files.

Example 2: Decrypt Data | Cipher Command Windows

For decrypting the data, use the “/d” flag of the “Cipher” command:

Cipher /d
Cipher Command on Windows | Liberian Geek (4)

Example 3: View the Encryption Status | Cipher Command Windows

The “Cipher” command when used without any flag, outputs the encryption status of the current directory. In its output, the “E” stands for encrypted while the “U” represents the unencrypted files and directories:

Cipher
Cipher Command on Windows | Liberian Geek (5)

Example 4: Abort the Encryption Process if There’s an Error | Cipher Command Windows

The “Cipher” command keeps on encrypting even if there is an error. These errors can leave some files unencrypted and to stop the encryption process when an error comes up, use the “/b” flag as follows:

Cipher /e /b
Cipher Command on Windows | Liberian Geek (6)

Example 5: View Information of the Encrypted Files | Cipher Command Windows

To view the file/directory encryption information such as “Users who can encrypt”, “Users who can decrypt”, and “Encryption Key & its Algorithms”, use the “/c” flag as seen below:

Cipher /c
Cipher Command on Windows | Liberian Geek (7)

Example 7: View and Encrypt the Hidden Files | Cipher Command Windows

By default, the “Cipher Command on Windows” does not encrypt the hidden files. To view and encrypt the hidden files using the “Cipher” command, use the “/h” flag with the “/e” flag like below:

Cipher /e /h
Cipher Command on Windows | Liberian Geek (8)

Example 7: Create a New EFS Certificate | Cipher Command Windows

The “EFS” or “Encrypting File System” protects your files using various encryption algorithms and the Cipher command also uses it to encrypt your files on Windows. The “EFS Certificate” contains the public key to encrypt or decrypt the data. To create a new “EFS Certificate”, use the “/k” flag of the Cipher command on Windows:

Cipher /k
Cipher Command on Windows | Liberian Geek (9)

You can view the current “EFS Certificate” using the “/y” flag of the Cipher Command:

Cipher /y
Cipher Command on Windows | Liberian Geek (10)

How to Make the Files Unrecoverable in Windows

The traditionally deleted files can be recovered using the Data Recovery Software and to avoid this, Microsoft has added the “Cipher” command that can encrypt/decrypt the files or folders and securely delete the data as well. To make the Windows files unrecoverable, use the “Cipher” command as follows:

Cipher /w:Drive:\path-to-folder\
Cipher Command on Windows | Liberian Geek (11)

Additionally, you can do the same with the entire drive, as seen below:

Cipher /w:DRIVE:\
Cipher Command on Windows | Liberian Geek (12)

Note: The “Cipher” command fills the white spaces with the string of 0’s, 255’s, and Random Numbers.

Final Words

The “Cipher” command in Windows lets you encrypt and decrypt the files or folders. Additionally, you can use it to fill the white spaces and prevent the data recovery. It allows you to securely delete the data since the Windows OS creates the white spaces when you delete a file/folder and it can be recovered until that space is filled. Today’s guide explained the “Cipher Command on Windows” in detail.

Cipher Command on Windows | Liberian Geek (2024)
Top Articles
Factors That Lead to Aggression
7 reasons to use a local mortgage broker
Barstool Sports Gif
Antisis City/Antisis City Gym
Joe Taylor, K1JT – “WSJT-X FT8 and Beyond”
Global Foods Trading GmbH, Biebesheim a. Rhein
Gomoviesmalayalam
Regal Amc Near Me
Top Scorers Transfermarkt
COLA Takes Effect With Sept. 30 Benefit Payment
Kraziithegreat
What to Serve with Lasagna (80+ side dishes and wine pairings)
Die Windows GDI+ (Teil 1)
Directions To 401 East Chestnut Street Louisville Kentucky
Overzicht reviews voor 2Cheap.nl
Gina's Pizza Port Charlotte Fl
Regular Clear vs Low Iron Glass for Shower Doors
Job Shop Hearthside Schedule
Dc Gas Login
Colts Snap Counts
Nutrislice Menus
Overton Funeral Home Waterloo Iowa
Used Safari Condo Alto R1723 For Sale
Happy Homebodies Breakup
Obituaries Milwaukee Journal Sentinel
Drying Cloths At A Hammam Crossword Clue
Webworx Call Management
Encore Atlanta Cheer Competition
Grave Digger Wynncraft
Downtown Dispensary Promo Code
Biografie - Geertjan Lassche
lol Did he score on me ?
Evil Dead Rise Showtimes Near Regal Sawgrass & Imax
Palmadise Rv Lot
2008 Chevrolet Corvette for sale - Houston, TX - craigslist
The 50 Best Albums of 2023
The Blackening Showtimes Near Regal Edwards Santa Maria & Rpx
My.lifeway.come/Redeem
Wattengel Funeral Home Meadow Drive
Hindilinks4U Bollywood Action Movies
Danielle Ranslow Obituary
Ezpawn Online Payment
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
Gon Deer Forum
Gw2 Support Specter
Mail2World Sign Up
Msatlantathickdream
Hampton Inn Corbin Ky Bed Bugs
Grace Charis Shagmag
4015 Ballinger Rd Martinsville In 46151
Blippi Park Carlsbad
Bloons Tower Defense 1 Unblocked
Latest Posts
Article information

Author: Neely Ledner

Last Updated:

Views: 5618

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Neely Ledner

Birthday: 1998-06-09

Address: 443 Barrows Terrace, New Jodyberg, CO 57462-5329

Phone: +2433516856029

Job: Central Legal Facilitator

Hobby: Backpacking, Jogging, Magic, Driving, Macrame, Embroidery, Foraging

Introduction: My name is Neely Ledner, I am a bright, determined, beautiful, adventurous, adventurous, spotless, calm person who loves writing and wants to share my knowledge and understanding with you.