Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Using our file encryption software nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. With Invisible Secrets 4 - File encryption software you may encrypt and hide files directly from Windows Explorer, and then automatically transfer them by e-mail or via the Internet.
It features strong file encryption algorithms (including AES - Rijndael), a password management solution that stores all your passwords securely and helps you create secure passwords, a shredder that helps you destroy beyond recovery files, folders and internet traces, a locker that allows you to password protect certain applications, the ability to create self-decrypting packages and mail them to your friends or business partners, a tool that allows you to transfer a password securely over the internet, and a cryptboard to help you use the program from Windows Explorer. Invisible Secrets 4 - File encryption software is shell integrated and offers a wizard that guides you through all the necessary steps needed to protect your data.
Cryptography
File and folder encryption using 8 strong encryption algorithms (AES - Rijndael, Twofish, RC 4, Cast128, GOST, Diamond 2, Sapphire II, Blowfish).
Steganography
Hides your sensitive data into innocent files, so nobody can find them. Features five innocent carriers for hiding: JPEG, PNG, BMP, HTML and WAV.
Email Encryption
Possibility to create a package with encrypted content and to send it by e-mail.
Password manager - Random password generator
With Invisible Secrets 4 you can store passwords in encrypted password lists and you can also generate real-random passwords.
File Shredder
An integrated Shredder (DoD 5220.22-M compliant) to destroy files and folders beyond recovery.
Application Locker
An Application Locker to password protect any application installed on your computer.
IP-to-IP Password Transfer
Allows the secure transfer of passwords between two computers using an encrypted internet line.
Virtual Keyboard
The virtual keyboard was created in order to prevent any key logger software from stealing your passwords.
Cryptboard
A Shell Integrated Cryptboard - use it like a basket for storing file names and make various operations on them in a single step
No comments:
Post a Comment