"Secure your files and communications"
Invisible Secrets Encryption Software is a compact, yet all-inclusive file encryption/decryption solution that not only gives you the ability to secure all of your files, but also offers additional features like the ability to permanently dispose of data so that it can't be recovered, or hide it in other files for stealth data storage.
With a file size of only about 3 MB, this tiny application can be downloaded and installed in just a few minutes with the help of a wizard-style setup guide. Compatible with Windows 95, NT, 98, Millennium Edition (ME), 2000, XP, Vista, and Windows 7.
The user interface is comprised of various sections that neatly organize the core functionality and can be easily accessed from the main window. These integrated modules actually serve as independent utilities, letting you hide/unhide files, encrypt/decrypt files, create self decrypting packages, permanently delete files/folders, destroy all traces of Internet history, conduct secure password transfers, password protect application access, and manage randomly generated passwords.
Utilizes state-of-the-art encryption technology, letting you perform file/folder encryption with 8 different industry-standard algorithms, including Diamond 2, AES - Rijndael, Twofish, Blowfish, Cast128, RC 4, Sapphire II, and GOST
Includes a built-in application locker that allows you to password protect the launching of any application, so you can control who is able to use specific programs
Provides a random password generator and password manager that facilitates the process of creating strong passwords, and then storing them in encrypted password lists
Integrated file shredder utility completely destroys data beyond the possibility of recovery
Lets you securely transfer passwords from one computer to another via an encrypted Internet connection
Includes a virtual keyboard that can be used to type using your mouse in order to prevent key loggers from tracking and recording your keyboard activity
Lets you hide any type of data within five different types of decoy file formats (PNG, JPEG, HTML, BMP, and WAV)
Lets you create self-decrypting packages that automatically unpack after being opened
“Destroy Internet Traces” module makes it easy to quickly erase temporary Internet/system files like Internet Explorer cache, Internet Explorer cookies, recently typed URLs, Internet Explorer history, and most recently used documents/applications
Some users have complained that files are left behind after uninstallation. However, this problem can easily be solved by using an uninstallation utility like Revo Uninstaller to perform a complete removal of all associated application data
Popular file encryption/decryption software alternatives include CryptZoneÂ Endpoint Encryption, Cryptonite, dsCrypt, Kruptos Professional, CloudFogger, Advanced File Security Basic, Glary Utilities, and AxCrypt. Of these competitors, AxCrypt and Glary Utilities are the most popular, and both of these programs offer features not found in Invisible Secrets Encryption Software, such as file compression, startup delay, and registry/disk cleaning modules.
If you're looking for a simple, convenient, and secure way to encrypt or decrypt files of all kinds, Invisible Secrets Encryption Software offers a more-than-basic feature set with useful extras like file hiding and permanent deletion capabilities.
Requirements: Pentium II 333 CPU/ 64 MB RAM
What's new in this version: Windows 7 Compatibility
Top user review