Jump to content

Invisible Secrets 4.3


PC-fre@k
 Share

Recommended Posts

Invisible Secrets 4.3
[url="http://www.invisiblesecrets.com/images/box-middle.jpg"][img]http://www.invisiblesecrets.com/images/box-middle.jpg[/img][/url]

We are living in the information age.
Data transmissions are vital and became a necessity nowadays.
Whether you exchange private messages, or business / commercial secrets, you must protect your confidential information from hackers, your boss, or secret services. But we live in an insecure world where unwanted persons can access your personal information ( like e-mails or personal desktop documents ) and often use it against you.
You can encrypt your information, but when you realize that common encryption key lengths of 40 and 56 bits are routinely cracked with 4.0.8a minimum amount of effort, you can see why this might be a problem. what if you can hide the encrypted message, and make it 'invisible' to others?
This is how Invisible Secrets 4 works: it encrypts the message
(or any information you want) and then it hides the encrypted message into an "innocent" file called carrier file.
Browsing the Net is fun and useful but it leaves traces on your computer and others can see what you used the Internet for.
Invisible Secrets 4 is now a powerful security suite that helps you solve these problems. With Invisible Secrets 4 you can hide files, encrypt files, destroy your Internet traces, shred files, make secure IP to IP password transfer and even lock any application on your computer.
It is wizard-interfaced and it's also shell integrated (when you right-click an item in Explorer you will see a sub-menu with all the available features)

CRYPTOGRAPHY:
Encryption is the translation of data into a secret code. To read an
encrypted file, you must know the correct password (also called key)
that allows you to decrypt it. Encryption is based on encryption
algorithms - a process capable of translating data into a secret code.
Invisible Secrets 4 uses strong cryptography: AES-Rijdael, Blowfish,
Twofish, RC4 (RC4 is a registered trademark of RSA Data Securities Inc.),
Cast128, GOST, Diamond 2, Sapphire 2.
Invisible Secrets 4 is shell integrated (availabled from Windows Explorer),
so the encryption operations are easied than ever.

STEGANOGRAPHY:
Steganography is the art and science of hiding information by embedding
messages within other, seemingly harmless messages. When a message is encrypted,
it it has no meaning, and it’s easy to understand that it contains sensitive
information, a secret – and someone might try to break it. Steganography solves
this problem by hiding the sensitive information in a harmless file called
"carrier file". Invisible Secrets 4 allows you to hide information in five
innocent looking files types: JPEG, PNG, BMP, HTML and WAV.
This method of disguising data (steganography) is not infallible. But it
considerable raise the work of any experienced code-breaker, who must first
identify the right carrier, extract the sensitive data from it, and only after
that (if he gets this far) – the hard work of breaking the code.
Steganography is the perfect supplement for encryption!
Invisible Secrets 4 offers several methods of diversions to increase the stealth
and security of your secret message and also increase the work your opponent.

DATA DESTRUCTION:
Deleting files and folders from Windows Explorer is not secure. This will
delete only the file's name so that you will no longer see it in
Windows Explorer. To destroy files and folder beyond recovery you must
overwrite the file/folder before erase. Invisible Secrets 4 provides an
integrated Shredder (DoD 5220.22-M compliant) for this operation.

PASSWORD MANAGER:
With Invisible Secrets 4 you can store passwords in encrypted password lists.
The password lists are useful because you don’t have to remember all the
passwords you are using, only one access key to open the password list.
For each password you provide a description and some additional information
(like username and url related to the password, priority and more). When you
select a description from the list, the edit boxes from the main window which
require the input of a password will be automatically filled with the selected
password.
With Invisible Secrets you can also generate real-random passwords.

INTERNET TRACE DESTRUCTOR:
The Internet Traces are the informations left on your computer while you browse
the Internet: internet cache, cookies, recently typed URLs, Internet Explorer
History and Most Recently Used Documents / Applications.
With Invisible Secrets 4 you can destroy all these traces so that nobody would
ever know what did you use the Internet for, and what websites you visited.

CRYPTBOARD:
The cryptboard is a new concept in Invisible Secrets 4. While working in
Window Explorer (or other shell programs) you can add files to the Cryptboard
- which is similar to a basket that contains files. The files are remembered
in a list (called cryptboard), and you can perform various security operations
on them in a single step, anytime you want. The Cryptboard is accessible through
the context menu, the tray icon, or from the main program.

MAIL ENCRYPTION:
Invisible Secrets 4 offers a new function: creation of Self Decrypting Packages.
Using this function you can create an executable package with encrypted content.
Before encryption the files are compressed. After the package is created you can
send it by email. All the receiver needs to decrypt the package at destination
is the correct password (no need of special programs), since the package is a
program itself.

IP-to-IP PASSWORD TRANSFER:
In security everything is related to passwords and keys. Once two parties agree
on a password they can initiate a secure communication and send encrypted emails
or documents. The only problem is to communicate to the recipient the correct key,
without the danger that a hacker might intercept the password during the transfer.
This feature allows you to exchange a password between two computers using an
encrypted internet line.

APPLICATION LOCKER:
If you have applications on your computer that you would like to keep only for
yourself, or to restrict the access to those applications, the perfect solution
for you is the Lock Applications function. Invisible Secrets will encrypt the
application. When you want to run a locked application you need to provide the
password. Invisible Secrets will decrypt the application and will allow you to
run it. After the application is closed, Invisible Secrets re-encrypts it in the
background. To quickly open the list of locked application you can define a hot-key,
or use the tray menu.

FEATURES:
- Invisible Secrets is an easy-to-use yet a powerful wizard-interfaced
cryptography/steganography program.
- Five Carriers: JPG, PNG, HTML (without any data length restriction),
BMP and WAV (source data proportional with the size of the image/sound).
- Strong cryptography: AES-Rijndael, Blowfish, Twofish, RC4™, Cast128,
GOST, Diamond 2, Sapphire II.
- creation of self-decrypting files
- It includes a shredder which conforms to the norm of the US Department
of Defense DoD 5220.22-M
- wipes out internet traces
- It includes a Password Manager
- IP-to-IP password transfer
- Shell integration (The "Invisible Secrets" submenu appears in the
system context menu)
- Function available through the Tray Icon
- Cryptboard
- Application Locker
- It is also very flexible: The user can develop his own algorithms or
carriers and integrate them very easy in the program
- Data compression before the encrypt/hide process
- Mail the resulted carrier after the process or place it somewhere on
the Internet through a FTP Connection.
- A very well organized FTP Servers Library
- Secured algorithms and carriers libraries through activation keys
- Fake messages generator
- Perfect local security: all the temporary files used in the process are wiped out
- The posibility to wipe the source data or the original carrier after the process
Invisible Secrets uses a complex shredding method (DoD compliant): seven pass wiping
with randomly generated patterns which makes hardware recovery impossible.

[code]info: http://www.invisiblesecrets.com/[/code]

Version 4.3 FULL PACK
[code]http://rapidshare.de/files/11034108/Invis4.rar.html
http://rapidshare.de/files/12808723/ssnis43b-2005-04-29.rar.html[/code]
of
Version 4.0.8 FULL PACK
[code]http://rapidshare.de/files/12813345/invisec4.rar.html[/code]
Link to comment
Share on other sites

  • 2 years later...
Ik heb het zelf nooit geprobeerd. Maar er zijn mensen die het toch wel handig vinden als hun ouders niks terug kunnen vinden of hun partner. En als de FBI iets van je wil hebben ze vast wel andere methoden die beter werken :p
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
 Share

×
×
  • Create New...