Every day we offer FREE licensed software you’d have to buy otherwise.

Ashampoo Privacy Protector 2015 Giveaway
$49.99
EXPIRED

Giveaway of the day — Ashampoo Privacy Protector 2015

Privacy Protector offers an innovative method of security, including encryption, archiving and cleaning.
$49.99 EXPIRED
User rating: 195 15 comments

Ashampoo Privacy Protector 2015 was available as a giveaway on July 22, 2015!

Today Giveaway of the Day
$69.00
free today
Cut out images perfectly, mount them neatly, and remove distracting elements!

Privacy Protector offers an innovative method of security, including encryption, archiving and cleaning. Now you can trust only one fully functioning solution, which will replace multiple instruments and confusing settings, in favor of its simplicity and convenience.

Key Features:

  • Maximum encryption for your private data;
  • Burn and archive data safely with high-security recordables;
  • Use flash drives as master keys;
  • Works without passwords ... Use existing files and images as password keys;
  • Delete sensitive information completely and permanently;
  • Find and eliminate revealing data traces from your system.

System Requirements:

Windows Vista/ 7/ 8 / 8.1/ 10; Microsoft .Net 4.0 Framework

Publisher:

Ashampoo GmbH & Co

Homepage:

https://www.ashampoo.com/en/usd/pin/0804/security-software/privacy-protector

File Size:

20.6 MB

Price:

$49.99

GIVEAWAY download basket

Log in to your system and web browsers using fingerprint management.
Developed by Kaspersky Lab
The standard anti-malware solution for Windows.
Recover lost or forgotten passwords for RAR files.

Comments on Ashampoo Privacy Protector 2015

Thank you for voting!
Please add a comment explaining the reason behind your vote.
#9

I couldn't get the popup to send me an email to get the link to download. Am I the only one having this problem?

Reply   |   Comment by Sheila  –  8 years ago  –  Did you find this comment useful? yes | no (+3)
#8

The product still needs to work with Windows XP Pro in spite of the fact that it is a legacy system precisely because it IS a legacy system. People need to dispose of their old computers (with XP) and allowing your program to run on XP would allow the use to have some real confidence that there is no private information on XP system that he just donated or sold.

Reply   |   Comment by Larry Southerland  –  8 years ago  –  Did you find this comment useful? yes | no (-1)
#7

This is a waste of time, don't keep ANYTHING on your internet connected computer you want to protect!!!

Keep sensitive data on a stand-alone computer, Linux is the right option here, use LibreOffice or OpenOffice can read all M$ Orifice files!!! They are still trying to hack VPN connections, but they haven't, yet...

Good luck with your privacy issues...if you DON'T want someone ELSE to read it, KEEP IT OFF THE INTERNET!!!

Reply   |   Comment by pcwiz7  –  8 years ago  –  Did you find this comment useful? yes | no (0)
#6

Installed on Win10 Pro without problem. The program works however I have not used all of the options. Would I buy it? Probably not because I don't really need it! Am I worried about security? YES and having a dedicated offsite dual Zeon RAID 10 www server which is backup every 24 hours I have to be! Calls from customers when it goes down are glad that Hillary Clinton isn't answerring the call! I have used a number of Ashampoo Products over the last 15 years because they have all worked. They send me offers in email and I usually scan them and respond to those that interest me.

I will probably uninstall it.

Thank You Ashampoo and GOTD Rick Martin

Reply   |   Comment by Rick Martin  –  8 years ago  –  Did you find this comment useful? yes | no (0)
#5

This doesn't work with Windows XP so I couldn't put it on most my PCs even if I wanted to.

If you have a newer OS and install this program, is the encryption utility portable/standalone or will it only run on the originally installed PC as part of the entire Privacy Protector suite?

Reply   |   Comment by Matthew  –  8 years ago  –  Did you find this comment useful? yes | no (+6)
#4

Quote
Use flash drives as master keys;
Works without passwords … Use existing files and images as password keys;

UnQuote

Flash drives, files and images are not ideal keys because things can easily go wrong.
I prefer passwords.

Reply   |   Comment by ric  –  8 years ago  –  Did you find this comment useful? yes | no (+18)

Good observation, my USB drives can get lost in the shuffle of over one hundred of them and what happens if you accidentally delete or insert new files, your encrypted files are gone forever.

Reply   |   Comment by Hanks  –  8 years ago  –  Did you find this comment useful? yes | no (+8)
#3

More interesting is the 1000 year claim (Microsoft can't even keep its OS relevant for a decade), which leads the curious to M-disc and the associated technology that this offering supports. I like the encryption/M-disc combination, especially with USB connection/portability. Am looking at M-disc products.

As for previous comments, I don't want third parties to even be sure I have a computer (this entry written by a Mongolian recluse on a Commodore and filed here by license)--in which case they won't know I use MSFT Office once in blue and only when I have to (because it so unhandy, bloated and poorly designed--with free open back doors for the US fed.gov and its 50 or so spy agencies) nor Adobe (which has its own unique ongoing insecurity issues coded in and governments' open door policy) nor any other software (that remains anonymous "to protect the innocent"). So while some fools may not care the world knows what programs they use, successful hackers want to know everything about users. Those individuals--whether Eastern European, Middle Eastern, Sudamericano, 中国 or D.C. and/or Utah based--I don't care to share. Glad to tell them where to go but not anything remotely related to me.

No, I do not feel paranoid, merely rational given the facts. No government nor hacker collects personal data for your benefit. Period.

Many general cleaning programs offer the erasing options criticized here, so some portion of fellow Internauts must think they are a risk ...

At least this offering is in the realm of cogent, contemporary needed/desired technology. Better grab it before the US fed.gov discovers it (if it promotes freedom, the US fed.gov will destroy it). ©2015

Reply   |   Comment by DoktorThomas™  –  8 years ago  –  Did you find this comment useful? yes | no (+22)

The only comfort I have after being told by a friend all the ways that the U.S. government has taken interest in me over the span of my colorful life is that here in the U.S. we get cheated by the amount of government we get, and the amount we pay for. If we got all the government we paid for, "all the books in all the world could not hold it". The government has become so large with so many people doing "jobs" that add no goods or services to the economy that they can't possible know who all can see a file on a "free citizen" and tell him what they saw. It would be a funny case of the clowns running the circus except the clowns take themselves so seriously (no matter how much evidence there is that they can't be anything but humorous). Encrypt all you want. The internet services in America have open doors to the government (It is easy to find the room they use at every major intersection of internet service, just ask any ATT or TIME-Warner long term employee). Bonce off "security servers" and do all you will, they already know what you sent from your computer to your internet service. Encryption? Who do you think wrote the encryption programs? You can keep honest people from reading your chocolate cake recipes if you like, but don't fool yourself into thinking that the U.S. government can't see what your sending over the internet even with this program, or any other available to the public. A NSA agent recently told me what I had done on my computer to try to find and explore the "Dark Net" because I had helped him to get the personal email address being used by someone bringing mislabeled packages from Red China (excuse me, we don't call it "Red" here in the U.S. anymore since we hit the Trillion dollar debt level to them). I am very comforted to know that my grandchildren can't read my will that I encrypted with Open Office password protection, but don't think for one minute that the government can't know who I'm leaving my "I'm from the government, and I'm here to help" joke book collection to if they cared.
A Commodore computer DrThomas? WOW. It would be hard for anyone to download their spy software into it's huge 64K memory (if it's a C-64 like the vast majority of them were). It's great to hear from someone still using those wonderful machines. Brings back memories of "Easy Script" and "Easy Spell", MSD dual drives, and early EA games (some of which are still around today in a much larger version).
It is food for thought that many still think they can "encrypt" their data out of the reach of the government with any of the publicly available schemes. On a totally unrelated note, the US government has been the largest customer of Cray computers for a very long time now, and the government finally admitted they were "storing" everything that went over the internet "backbone" in one of their new facilities (that they denied they were building until they couldn't anymore) in the US desert.
If any programmer wants to write a best seller, how about a program that would analyze what you send out over the internet and to who; Oh well. Never mind. The government finally admitted they had been copying and storing ALL traffic from target computers for years with a program called "sniffer". No way to know what they do with your traffic after it hits your provider.
On a final note, here's something for those who read all the way through this post to this point. Ashampoo really centers around your account. Be sure you keep all the information you give them to set up an account somewhere you can find it latter. I use throw away email addresses and rotating passwords, but then I can't "unsubscribe" to their flood of emails and "offers" (often in German) because I can't remember my account information so I have to "spam" folder them and lose any information they send about the programs I have. You very well may need your sign-in information again.

Reply   |   Comment by Father Richard  –  8 years ago  –  Did you find this comment useful? yes | no (+18)

If you are that paranoid, I mean protective, why are you still using Windows? Linux, for example, is a lot safer. I've gone through this paranoia stage myself, and in the end, the trouble and hassle isn't worth it. I've extensively explored this area before, and found that in fact, you can achieve fairly close to absolute protection from prying eyes and hackers (taking the right steps, of course). But, again this kind of protection is so much trouble and expensive. Even if I was a business that was guarding the formula to Pepsi or Coco Cola, I wouldn't need all the protection you claim to use. In fact, I could give you tips on improving your already overwhelming security. But, I am not. You don't need it (LOL).

You call people like me a fool. Well, its not that I don't care if anyone knows what programs I use, I just don't think they care. I really think you are delusional to call us fools. I mean that in a concerned, non offensive way. I think you are going to take a look back on your life one day, and wished you hadn't invested so much of your life in protecting yourself from hackers.

I wish you well.

Reply   |   Comment by James Scott  –  8 years ago  –  Did you find this comment useful? yes | no (+6)

I do not understand how intelligent people make the problem of encryption complicated.
First, do not save or keep any files on your primary (system) hard drive.
Second, 64GB USB drive can hold all of your personal data and correspondents for a whole year.
Third, backup your files daily to another USB drive and keep both in different secure places, problem solved, you can still encrypt your USB drives, just in case they may fall in wrong hands.

Reply   |   Comment by Hanks  –  8 years ago  –  Did you find this comment useful? yes | no (+16)
#2

Installed and registered the Ashampoo way without problems on a Win 8.1.3 Pro 64 bit system. Took some time to receive the key.

A German company with all required legal information.

Upon start a resizabloe intefrca opens. In the option you can change the laguage, disable updates and participate with anonymous data at an improve usabilty program, which contradicts in some meaning a "privacy protector".

This program is a mixture from two different, independent programs. A file encryption program with AES256 encryption and a scanner which remove "privacy" traces. These traces are open with list, MRU, temp folder, ....

http://i.imgur.com/jgY997W.png

Oops, 2331 "folder view settings". Who could be interested in that? And 553 application start count? Should I hide, that I use office, outlook and the browser 20 times per day?

Well, if THIS is a privacy issue, then this software does what it claims. If you need a proven encryption program with a 47,7 MB footprint in your program directory take this. There are completely different privacy issues. You'll read later...

Uninstalled via reboot, everybody may know, that I start ADOBE at least 3 times per day - and I like to keep the list of the last opened documents in the office programs.

--------------
about privacy...
It is far beyond my understanding, how users allow other people to read all of their emails. I know, you can't avoid everything but why that?
"Our mobile version run the emails through our servers (it’s all heavily encrypted) as we felt it was the best way to make it faster/use less battery. You can have unlimited accounts on the mobile version.
Comment by Nick Bolton — July 21st, 2015 at 9:20 am
"

it's all heavily encrypted. LOL...

Reply   |   Comment by Karl  –  8 years ago  –  Did you find this comment useful? yes | no (+116)

To avoid misunderstanding: The last part in "about privacy ..." concerning privacy of emails is cited from yesterdays GOTD Mailwasher, comment #22 as an answer to #21. Please distinguish that it's not concerning Ashampoo Privacy Protector 2015.

Very strange: after in comment #21 I revealed this problem (concerning gmail, too) I got downvoted.
I am very glad that Karl (for whose unrivaled work and comments we all are very grateful) mentions this problem here once more!

As far as I can see Ashampoo Privacy Protector 2015 is a means to overcome this Mailwasher weakness but unfortunately it isn't available for mobile devices.

But the encryption problem concerning emails is that the counterpart must "own" the same encryption software, i.e. has to buy Ashampoo Privacy Protector 2015 or use free PGP or alike.

The advantage with western European encryption products is: strict legislation in EU (European Union) doesn't allow that an enterprise builds a backdoor or alike into its products. I know about at least one big Asian country where a backdoor for government etc. use must be built into every encryption software otherwise severe punishments.

Therefore I trust Ashampoo Privacy Protector more than usual. Absolute security isn't available, endless life neither but you wouldn't kill yourselves tomorrow, wouldn't you?

Reply   |   Comment by FrancisBorne  –  8 years ago  –  Did you find this comment useful? yes | no (+41)

FrancisBorne ...I know about at least one big Asian country where a backdoor for government etc. use must be built into every encryption software otherwise severe punishments...

And I know of at least one big country at the Far Western edge of the world map with aspirations to being exceptional (perhaps it's that peripheral position on the map that's the problem?), where a backdoor for government etc. use is willingly adopted by certain well-known mega-corps. Agree with you about the EU standards, though.

Reply   |   Comment by BenAsp  –  8 years ago  –  Did you find this comment useful? yes | no (+10)
#1

Might be useful in cleaning the hardware from unwanted staff, however be careful with auto clean, check before deleting things. Most of the finds are marked as "dubious", but it does not tell much, can see the details...

Reply   |   Comment by jacko  –  8 years ago  –  Did you find this comment useful? yes | no (+22)
Add a comment

iPhone app giveaways »

Luca - Photo Editor & Filters Giveaway
Luca is the perfect app for photo editing.
$0.99 ➞ free today
Medieval Animal Stickers Giveaway
For those of us who can appreciate weird and funny drawings, these stickers can’t fail to fascinate.
$0.99 ➞ free today
enhanceAl Giveaway
enhanceAI will vastly improve less-than-ideal images and add incredible detail with our optional Super Resolution.
$2.99 ➞ free today
Python Coding Giveaway
Python Coding with numpy, pandas, sklearn, matplotlib and statsmodel.
$1.99 ➞ free today
Om Namah Shivay - Listen To Aarti and Mantra Audio Giveaway
Om Namah Shivay. You can listen to Om Namah Shivay aarti dedicated to Lord Shiva with this app.
$2.99 ➞ free today

Android app giveaways »

Equalizer & Bass Booster Pro Giveaway
The global bass booster and the equalizer enhances the sound quality of your Android device.
$1.99 ➞ free today
Train Simulator: metro 3D Pro Giveaway
Want to get experience and emotion from driving a real city train in the metro simulator?
$0.99 ➞ free today
Broken Bot Giveaway
An alien ship has taken possession of multiple cities on planet earth, deploying countless robots.
$2.99 ➞ free today
Volume Booster Max Pro Giveaway
If your device has low sound, use Volume Booster and Sound Amplifier to make your device super loud.
$1.99 ➞ free today
Equalizer Bass Booster Pro Giveaway
Improve the sound quality of your Android phone.
$1.99 ➞ free today