Invisible Secrets -
Prevent Unwanted People From Reading Your Private Files
Secrets not only encrypts your data and files for safe
keeping or for secure transfer across the Internet, it also hides
them in places that on the surface appear totally innocent, such
as picture or sound files, or web pages. These types of files are
a perfect disguise for sensitive information. Nobody, not even
your wife, boss, or a hacker would realize that your important
papers or letters are stored in your last holiday pictures, or
that you use your personal web page to exchange messages or secret
Are you are afraid that someone else can
see your sensitive and secret data stored on your computer?
With Invisible Secrets you may encrypt and hide files
directly from Windows Explorer, and then automatically transfer
them by e-mail or via the Internet. Invisible Secrets
features strong encryption algorithms, a wizard that guides you
through all the necessary steps needed to protect your data, a
password management solution that stores all your passwords
securely and helps you create secure passwords and a shredder that
helps you destroy the originals after encryption.
Buy Invisible Secrets Today!
Data transmissions are vital and very often encrypted. When a
message is encrypted, it doesn’t mean anything, and it’s easy to
understand that it contains sensitive information, a secret – and
someone might try to break it. When you realize that common
encryption key lengths of 40 and 56 bits are routinely cracked
with a minimum amount of effort, you can see why this might be a
problem. But what if you can hide the encrypted message, and make
it invisible to others?…
You can encrypt your information, but when you
realize that common encryption key lengths of 40 and 56 bits are
routinely cracked with a minimum amount of effort, you can see why
this might be a problem. But what if you can hide the encrypted
message, and make it invisible to others?
This is how Invisible Secrets 4 works: it encrypts the message (or
any information you want) and then it hides the encrypted message
into an "innocent" file called carrier file.
Browsing the Net is fun and useful but it leaves traces on your
computer and others can see what you used the Internet for.
Invisible Secrets 4 is now a powerful security suite that helps
you solve these problems. With Invisible Secrets 4 you can hide
files, encrypt files, destroy your Internet traces, shred files,
make secure IP to IP password transfer and even lock any
application on your computer.
Do you want to send a
secure email to your friend or partner and you want nobody to read
or to access it?
How Invisible Secrets Works:
Steganography is the practice of hiding an important file inside
of another one that on the surface appears totally innocent. If
anyone finds the file they won't think you're hiding a secret
document and move on. Invisible Secrets provides five carriers:
JPEG, PNG, BMP, HTML and WAV.
This method of disguising data (steganography) is not infallible.
But it considerable raise the work of any experienced
code-breaker, who must identify first the right carrier, extract
the sensitive data from it, and only after that (if he gets this
far) – the hard work of breaking the code.
fake messages are the best method to create diversions. They
contain randomly generated data. Their only purpose is to distract
the attention of your opponent. You can send multiple carriers
with fake messages, and one with a real message. The addressee
will recognize the right carrier from the meaning of that carrier.
So you can say this method encrypts data with two keys: one for
decryption, and the subjective one for recognition. Invisible
Secrets 4 allows you to hide information in five innocent looking
files types: JPEG, PNG, BMP, HTML and WAV.
Encryption is the translation of data into a
secret code. To read an encrypted file, you must know the correct
password (also called key) that allows you to decrypt it. File
encryption is based on encryption algorithms - a process capable
of translating data into a secret code.
Invisible Secrets uses strong cryptography: Invisible Secrets 4
uses strong cryptography: AES-Rijndael, Blowfish,
Twofish, RC4 (RC4 is a registered trademark of RSA Data
Securities Inc.), Cast128, GOST, Diamond 2,
The user can encrypt (and send)/decrypt files and folders (with all
subfolders) from Windows Explorer (or any other shell-based
program) by right-clicking some items and select the desired
process (from the Invisible Secrets submenu).
With Invisible Secrets you can store passwords in encrypted
password lists. The Password Lists are useful because you don’t
have to remember all the passwords you are using, only one access
masterkey to open the password list. For each password you provide
a description and some additional information (and, of course, the
password). The description will be the only thing you’ll see in
the list about the password. When you select a description from
the list, the edit boxes from the main window which require the
input of a password will be filled with the selected password.
With Invisible Secrets you can also generate real-random
Deleting files and folders from Windows Explorer is not secure.
This will delete only the file's name so that you will no longer
see it in Windows Explorer. To destroy files and folders beyond
recovery you must overwrite the file/folder before erase.
Invisible Secrets provides an integrated Shredder (DoD 5220.22-M
compliant) for this operation.
The Internet Traces are the
informations left on your computer while you browse the Internet:
internet cache, cookies, recently typed URLs, Internet Explorer
History and Most Recently Used Documents / Applications. With
Invisible Secrets 4 you can destroy all these traces so that
nobody would ever know what did you use the Internet for, and what
websites you visited.
The cryptboard is a new concept in Invisible
Secrets 4. While working in Window Explorer (or other shell
programs) you can add files to the Cryptboard - which is similar
to a basket that contains files. The files are remembered in a
list (called cryptboard), and you can perform various security
operations on them in a single step, anytime you want. The
Cryptboard is accessible through the context menu, the tray icon,
or from the main program.
Invisible Secrets 4 offers a new
function: creation of Self Decrypting Packages. Using this
function you can create an executable package with encrypted
content. Before encryption the files are compressed. After the
package is created you can send it by email. All the receiver
needs to decrypt the package at destination is the correct
password (no need of special programs), since the package is a
IP-to-IP Password Transfer
In security everything is
related to passwords and keys. Once two parties agree on a
password they can initiate a secure communication and send
encrypted emails or documents. The only problem is to communicate
to the recipient the correct key,
without the danger that a
hacker might intercept the password during the transfer. This
feature allows you to exchange a password between two computers
using an encrypted internet line.
New! Application Locker
you have applications on your computer that you would like to keep
only for yourself, or to restrict the access to those
applications, the perfect solution for you is the Lock
Applications function. Invisible Secrets will encrypt the
application. When you want to run a locked application you need to
provide the password. Invisible Secrets will decrypt the
application and will allow you to run it. After the application is
closed, Invisible Secrets re-encrypts it in the background. To
quickly open the list of locked application you can define a
hot-key, or use the tray menu.
Complete List of Features for Invisible Secrets
Invisible Secrets is an easy-to-use yet a powerful
wizard interfaced file encryption and steganography software, your
best choice for computer security
Five Carriers: hide files in JPG, PNG, HTML
(without any data length restriction), BMP and WAV (source data
proportional with the size of the image/sound).
Strong cryptography: file encryption using
AES-Rijndael, Blowfish, Twofish, RC4(TM), Cast128, GOST, Diamond
2, Sapphire II.
New! Email Encryption: create self-decrypting
It includes a shredder which conforms to the norm
of the US Department of Defense DoD 5220.22-M
New! wipes out internet traces
It includes a Password Manager
New! IP-to-IP password transfer
Shell integration (The "Invisible Secrets" submenu
appears in the system context menu)
New! Functions available through the Tray Icon
New! Application Locker
It is also very flexible: The user can develop his
own algorithms or carriers and integrate them very easy in the
Data compression before the encrypt/hide process
Mail the resulted carrier after the process or
place it somewhere on the Internet through a FTP Connection.
A very well organized FTP Servers Library
Secured algorithms and carriers libraries through
Fake messages generator.
Perfect local security: all the temporary files
used in the process are wiped out
The possibility to wipe the source data or the
original carrier after the process
Invisible Secrets uses a complex shredding method
(DoD compliant): seven pass wiping with randomly generated
patterns which makes hardware recovery impossible.
Give it a try with a free evaluation
download of Invisible Secrets
Buy Invisible Secrets Today!