X

Join or Sign In

Sign in to add and modify your software

Continue with email

By joining Download.com, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy.

East-Tec InvisibleSecrets

By East-Tec Free to try Editors' Rating

Editors' Review

Download.com Staff Feb 27, 2009

Invisible Secrets is a full-service tool that not only offers file encryption and decryption, but also shreds files and allows you to hide them in other files. Though the program worked well for us, we were a little put off by the files it left behind after we uninstalled it.

The program has a very user-friendly interface. Novice users will especially like the wizard-like approach it takes to walk you through each feature when selected. Encrypting a file was a piece of cake. We added the file, entered a password, chose an algorithm method, and the file was instantly encrypted. When we clicked on the encrypted file, we were asked to enter our password, and the file was successfully decrypted. Hiding an encrypted file was as easy selecting the file and carrier file, and entering our password. The Internet history cleaning was a little slow moving, but its comprehensive results made up for the speed.

We did come across one trial restriction that only allows for five password characters, but it didn't affect the program's performance. Also, 15 days is a little brief for a trial. We were a little disappointed to find that even after uninstalling the program, it left several files on our PC. We had to manually remove them. If you don't mind the extra files, the program itself is exceptional for file privacy.

Full Specifications

What's new in version 4.8

East-Tec rebranding and Windows 8 compatibility.

General

Release February 27, 2014
Date Added February 27, 2014
Version 4.8

Operating Systems

Operating Systems Windows Vista, Windows 98, Windows Me, Windows, Windows NT, Windows 2000, Windows 8, Windows 7, Windows XP
Additional Requirements None

Popularity

Total Downloads 39,882
Downloads Last Week 0
Report Software

Related Software

Vpn One Click

Free to try
Vpn One Click

Protected Folder

Free to try
Protected Folder

Random Password Generator

Free
Random Password Generator

Cryptomator

Free
Cryptomator

User Reviews

4.5/5
2 User Votes
5 Star
4 Star
3 Star
2 Star
1 Star

Developer's Description

east-tec InvisibleSecrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. east-tec InvisibleSecrets 4 features: strong encryption algorithms; steganography and a library of favorite carriers locations; a password management solution that stores all your passwords securely and helps you create secure passwords, faster access to your passwords by accessing the password manager directly from the tray menu; a virtual keyboard created in order to prevent any key logger software from stealing your passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain applications; the ability to create self-decrypting packages and mail them to your friends or business partners, you will be able to safely send the self-decrypting packages as zip files; a tool that allows you to transfer a password securely over the internet; a cryptboard to help you use the program from Windows Explorer and a real-time news system that allows you to be kept up-to-date with new versions, new products, new features, and special offers, without having to browse our website searching for new information. east-tec InvisibleSecrets 4 is shell integrated and offers a wizard that guides you through all the necessary steps needed to protect your data.