east-tec InvisibleSecretsc free download is a program used for hiding confidential files using encryption techniques called Steganography (steganographical techniques). This application gives you access to powerful cryptographic algorithms for protecting files and folders against unauthorised access, using encryption algorithms which offer full protection of their integrity against unauthorized intrusion. Accessing our data is protected with passwords, while virtual keyboards can help avoid keyloggers intercepting it.
East-Tec InvisibleSecrets download for pc comes equipped with a password manager and generator, an irretrievable destruction module of files and directories, the ability to block specific applications’ launch by disabling their appearance in Start Menu as well as CryptBoard lists allowing data for future encryption/hiding/etc. This program allows for secure password transfer between two IP addresses via an encrypted channel. With this module, it’s possible to generate executable files or ZIP archives containing encrypted content that can then be decoded after being opened with an active internet browser and entering their password – eliminating the need for recipient of data to run and install program on their hard disks.
East-Tec InvisibleSecrets download for android can operate discreetly; unknowing users will likely remain unaware that we’re using its powerful toolkit. Secure data can be stored on hard drives (internal and external), SSD drives, CD/DVD/Blu-Ray discs, floppy disks, pendrives, memory cards and mobile phones with flash memory as well as by sending using email and FTP server functionality built into the program. East-Tec InvisibleSecrets features functions to decrypt previously encoded information (meaning access won’t require password protection or encryption), reverse steganography performed within the program, and extract files hidden inside other files. Supported file systems: NTFS, exFAT, FAT32, FAT16 and FAT12.
Key features of the application:
- Encryption using AES-256 Rijndael, Twofish, RC 4, Cast128, GOST Diamond 2, Sapphire 2, Blowfish cryptographic algorithms is implemented *
- Data that needs to remain private may be concealed within seemingly innocent JPEG, PNG, BMP, WAV files and HTML documents using techniques known as steganography and bit morphing; such techniques work especially well when applied to graphic and WAV files containing data whose least significant bit has been modified in some fashion.
- Decryption and reverse of steganography process (available only with East-Tec InvisibleSecrets files encoded or hidden steganographically);
- Password Manager and Generator – With these applications you can generate lists containing passwords for various applications or websites and manage these lists of authentication data easily, using only one master password to gain entry to each password list and generate random passwords of any length containing upper/lower case letters, numbers, special characters and anything else contained within Windows Character Table (WCT).
- Secure transmission of passwords over the Internet – The password is sent from recipient IP to sender IP over an encrypted channel; to achieve this result, this program requires their public IP address as input.
- Module responsible for creating executable files and ZIP archives from encrypted data, using password authentication when opening them to access its contents; East-Tec InvisibleSecrets installation or running aren’t needed in such instances.
- Ability to quickly send encrypted data as emails as well as EXE files and archives with encrypted contents as E-Mail attachments
- File and Folder Shredder – this program deletes data by overwriting disk space several times with different patterns to destroy anything remaining, making recovery of erased information very challenging. It follows DoD 5220.22-M’s standard overwrite cycle number (3 for an effective destruction), or allows users to specify their own number.
- Erasing any private traces left online – This erasure only applies to Internet Explorer and includes cache data, cookies, autofill history, recent documents/applications opened/used as well as visited website history.
- This tool allows you to block certain programs from being launched; as well as disable their displays in Start Menu and password protect them. Having made certain applications inaccessible makes them harder for us to open; in such instances you can use keyboard shortcuts which bring up a list of blocked applications with functionality for running them after entering passwords for each of them.
- CryptBoard list- Provides an easy and efficient way of grouping data intended to later encrypt, create EXE files from, archive to other files or destroy. During each of these operations, using CryptBoard list to quickly load specific files or directories can speed up operations significantly.
- Virtual Keyboard – provides protection from keyloggers who intercept real keyboard signals during password inputs and intercept real keyboard signals when typing passwords into password fields.
- Hide Mode – When selecting this option, your program will no longer appear in Start Menu and Windows Explorer, including its executable file disappearing but leaving installation folder and files behind. Furthermore, you have an additional choice not displaying application icon in system tray but using both options may cause serious difficulties when trying to restore most important program windows if combined together; should any issues arise then please reinstall or repair East-Tec InvisibleSecrets using UNWISE file found within installation folder of East-Tec InvisibleSecrets installation folder
Graphically, the application features an attractive graphic design. Furthermore, its use should not prove too challenging and even less experienced users should find it manageable. Should any issues arise while mastering its many functions online help is available from its manufacturer’s website.
Attention!
Please be aware that this program also runs on both Windows Server 2003 and 2008.
Trial version
East-Tec InvisibleSecrets free download latest version Trial Version Is Fully-Featured The Trial version offers almost the full functionality of its paid counterpart for 15 days; with some password length limits set at five characters only as its only limitation. Once this period has expired, users may purchase full access via manufacturer website.
Requirements!
Installation may require a system restart.
System Information
- Producent:Â East-Tec
- License : Trial
- Operating System : Windows XP/Vista/7/8/10