Share experiences or thoughts on hacking tools.
Deleting files and folders from Windows Explorer is not secure. This will delete only the file's name so that you will no longer see it in Windows Explorer. To destroy files and folder beyond recovery you must overwrite the file/folder before erase. Invisible Secrets 4 provides an integrated Shredder (DoD 5220.22-M compliant) for this operation.
New! Internet Trace Destructor
Internet Traces are information left behind on your computer while you browse the Internet: internet cache, cookies, recently typed URLs, Internet Explorer History and Most Recently Used Documents / Applications.
With Invisible Secrets 4 you can destroy all these traces so that nobody would ever know what did you use the Internet for, and what websites you visited.
The Cryptboard is a new concept in Invisible Secrets 4. While working in Window Explorer (or other shell programs) you can add files to the Cryptboard - which is similar to a basket that contains files. The files are remembered in a list (called Cryptboard), and you can perform various security operations on them in a single step, anytime you want. The Cryptboard is accessible through the context menu, the tray icon, or from the main program.
New! EMail Encryption
Invisible Secrets 4 offers a new function: creation of Self Decrypting Packages. Using this function you can create an executable package with encrypted content. Before encryption the files are compressed. After the package is created you can send it by email. All the receiver needs to decrypt the package at destination is the correct password (no need of special programs), since the package is a program itself.
New! IP-to-IP Password Transfer
In security everything is related to passwords and keys. Once two parties agree on a password they can initiate a secure communication and send encrypted emails or documents. The only problem is to communicate to the recipient the correct key,
without the danger that a hacker might intercept the password during the transfer. This feature allows you to exchange a password between two computers using an encrypted internet line.
New! Application Locker
If you have applications on your computer that you would like to keep only for yourself, or to restrict the access to those applications, the perfect solution for you is the Lock Applications function. Invisible Secrets will encrypt the application. When you want to run a locked application you need to provide the password. Invisible Secrets will decrypt the application and will allow you to run it. After the application is closed, Invisible Secrets re-encrypts it in the background. To quickly open the list of locked application you can define a hot-key, or use the tray menu.
proudindian wrote:but I heared that we can hide messges behind the picture,but is this possible to hide any executable code behind the pic????
aldoelam wrote:proudindian wrote:but I heared that we can hide messges behind the picture,but is this possible to hide any executable code behind the pic????
No, you cannot hide an executable inside a picture using steganography. Steganography can only be used to hide text, and encrypted it.
If you want to hide an executable, use a "wrapper" instead.
Users browsing this forum: No registered users and 1 guest