File and folder encryption using 8 strong encryption algorithms (AES - Rijndael, Twofish, RC 4, Cast128, GOST, Diamond 2, Sapphire II, Blowfish).
Hides your sensitive data into innocent files, so nobody can find them. Features five innocent carriers for hiding: JPEG, PNG, BMP, HTML and WAV.
Possibility to create a package with encrypted content and to send it by e-mail.
An integrated Shredder (DoD 5220.22-M compliant) to destroy files and folders beyond recovery.
An Application Locker to password protect any application installed on your computer.
The virtual keyboard was created in order to prevent any key logger software from stealing your passwords.
A Shell Integrated Cryptboard - use it like a basket for storing file names and make various operations on them in a single step
Real-time News System
It will allow you to be kept up-to-date with new versions, new products, new features, and special offers, without having to browse our website searching for new information. You will instantly get the news from us.
Some of Our Clients
Invisible Secrets' appeal lies in its ability to demystify the complicated subject of data security and provide even novice users with a valuable tool for safeguarding their data.
Overall, I consider this one of the best-written programs I've looked at. Very well designed. Very functional. The programmers included enough to make it a viable business program, but still have made it attractive to the individual user. A "MUST" for anyone worried about file and password security.
Functions & Concepts