Every day we offer FREE licensed software you’d have to buy otherwise.

Ashampoo Privacy Protector 2015 Giveaway
$49.99
EXPIRED

Giveaway of the day — Ashampoo Privacy Protector 2015

Privacy Protector offers an innovative method of security, including encryption, archiving and cleaning.
$49.99 EXPIRED
User rating: 195 (58%) 141 (42%) 16 comments

Ashampoo Privacy Protector 2015 was available as a giveaway on July 22, 2015!

Today Giveaway of the Day
$19.99
free today
Convert .heic or .heif photos from your iDevice into any pop graphic format.

Privacy Protector offers an innovative method of security, including encryption, archiving and cleaning. Now you can trust only one fully functioning solution, which will replace multiple instruments and confusing settings, in favor of its simplicity and convenience.

Key Features:

  • Maximum encryption for your private data;
  • Burn and archive data safely with high-security recordables;
  • Use flash drives as master keys;
  • Works without passwords ... Use existing files and images as password keys;
  • Delete sensitive information completely and permanently;
  • Find and eliminate revealing data traces from your system.

System Requirements:

Windows Vista/ 7/ 8 / 8.1/ 10; Microsoft .Net 4.0 Framework

Publisher:

Ashampoo GmbH & Co

Homepage:

https://www.ashampoo.com/en/usd/pin/0804/security-software/privacy-protector

File Size:

20.6 MB

Price:

$49.99

GIVEAWAY download basket

Developed by Hewlett-Packard
Developed by Kaspersky Lab
The standard anti-malware solution for Windows.
Recover lost or forgotten passwords for RAR files.

Comments on Ashampoo Privacy Protector 2015

Thank you for voting!
Please add a comment explaining the reason behind your vote.
#9

I couldn't get the popup to send me an email to get the link to download. Am I the only one having this problem?

Reply   |   Comment by Sheila  –  3 years ago  –  Did you find this comment useful? yes | no (+3)
#8

The product still needs to work with Windows XP Pro in spite of the fact that it is a legacy system precisely because it IS a legacy system. People need to dispose of their old computers (with XP) and allowing your program to run on XP would allow the use to have some real confidence that there is no private information on XP system that he just donated or sold.

Reply   |   Comment by Larry Southerland  –  3 years ago  –  Did you find this comment useful? yes | no (-1)
#7

This is a waste of time, don't keep ANYTHING on your internet connected computer you want to protect!!!

Keep sensitive data on a stand-alone computer, Linux is the right option here, use LibreOffice or OpenOffice can read all M$ Orifice files!!! They are still trying to hack VPN connections, but they haven't, yet...

Good luck with your privacy issues...if you DON'T want someone ELSE to read it, KEEP IT OFF THE INTERNET!!!

Reply   |   Comment by pcwiz7  –  3 years ago  –  Did you find this comment useful? yes | no (0)
#6

Installed on Win10 Pro without problem. The program works however I have not used all of the options. Would I buy it? Probably not because I don't really need it! Am I worried about security? YES and having a dedicated offsite dual Zeon RAID 10 www server which is backup every 24 hours I have to be! Calls from customers when it goes down are glad that Hillary Clinton isn't answerring the call! I have used a number of Ashampoo Products over the last 15 years because they have all worked. They send me offers in email and I usually scan them and respond to those that interest me.

I will probably uninstall it.

Thank You Ashampoo and GOTD Rick Martin

Reply   |   Comment by Rick Martin  –  3 years ago  –  Did you find this comment useful? yes | no (0)
#5

This doesn't work with Windows XP so I couldn't put it on most my PCs even if I wanted to.

If you have a newer OS and install this program, is the encryption utility portable/standalone or will it only run on the originally installed PC as part of the entire Privacy Protector suite?

Reply   |   Comment by Matthew  –  3 years ago  –  Did you find this comment useful? yes | no (+6)

You can use the programme folder as a semi-portable. But you will have to register/activate it on a new computer.

Reply   |   Comment by krypteller  –  3 years ago  –  Did you find this comment useful? yes | no (-1)
#4

Quote
Use flash drives as master keys;
Works without passwords … Use existing files and images as password keys;

UnQuote

Flash drives, files and images are not ideal keys because things can easily go wrong.
I prefer passwords.

Reply   |   Comment by ric  –  3 years ago  –  Did you find this comment useful? yes | no (+18)

Good observation, my USB drives can get lost in the shuffle of over one hundred of them and what happens if you accidentally delete or insert new files, your encrypted files are gone forever.

Reply   |   Comment by Hanks  –  3 years ago  –  Did you find this comment useful? yes | no (+8)
#3

More interesting is the 1000 year claim (Microsoft can't even keep its OS relevant for a decade), which leads the curious to M-disc and the associated technology that this offering supports. I like the encryption/M-disc combination, especially with USB connection/portability. Am looking at M-disc products.

As for previous comments, I don't want third parties to even be sure I have a computer (this entry written by a Mongolian recluse on a Commodore and filed here by license)--in which case they won't know I use MSFT Office once in blue and only when I have to (because it so unhandy, bloated and poorly designed--with free open back doors for the US fed.gov and its 50 or so spy agencies) nor Adobe (which has its own unique ongoing insecurity issues coded in and governments' open door policy) nor any other software (that remains anonymous "to protect the innocent"). So while some fools may not care the world knows what programs they use, successful hackers want to know everything about users. Those individuals--whether Eastern European, Middle Eastern, Sudamericano, 中国 or D.C. and/or Utah based--I don't care to share. Glad to tell them where to go but not anything remotely related to me.

No, I do not feel paranoid, merely rational given the facts. No government nor hacker collects personal data for your benefit. Period.

Many general cleaning programs offer the erasing options criticized here, so some portion of fellow Internauts must think they are a risk ...

At least this offering is in the realm of cogent, contemporary needed/desired technology. Better grab it before the US fed.gov discovers it (if it promotes freedom, the US fed.gov will destroy it). ©2015

Reply   |   Comment by DoktorThomas™  –  3 years ago  –  Did you find this comment useful? yes | no (+22)

The only comfort I have after being told by a friend all the ways that the U.S. government has taken interest in me over the span of my colorful life is that here in the U.S. we get cheated by the amount of government we get, and the amount we pay for. If we got all the government we paid for, "all the books in all the world could not hold it". The government has become so large with so many people doing "jobs" that add no goods or services to the economy that they can't possible know who all can see a file on a "free citizen" and tell him what they saw. It would be a funny case of the clowns running the circus except the clowns take themselves so seriously (no matter how much evidence there is that they can't be anything but humorous). Encrypt all you want. The internet services in America have open doors to the government (It is easy to find the room they use at every major intersection of internet service, just ask any ATT or TIME-Warner long term employee). Bonce off "security servers" and do all you will, they already know what you sent from your computer to your internet service. Encryption? Who do you think wrote the encryption programs? You can keep honest people from reading your chocolate cake recipes if you like, but don't fool yourself into thinking that the U.S. government can't see what your sending over the internet even with this program, or any other available to the public. A NSA agent recently told me what I had done on my computer to try to find and explore the "Dark Net" because I had helped him to get the personal email address being used by someone bringing mislabeled packages from Red China (excuse me, we don't call it "Red" here in the U.S. anymore since we hit the Trillion dollar debt level to them). I am very comforted to know that my grandchildren can't read my will that I encrypted with Open Office password protection, but don't think for one minute that the government can't know who I'm leaving my "I'm from the government, and I'm here to help" joke book collection to if they cared.
A Commodore computer DrThomas? WOW. It would be hard for anyone to download their spy software into it's huge 64K memory (if it's a C-64 like the vast majority of them were). It's great to hear from someone still using those wonderful machines. Brings back memories of "Easy Script" and "Easy Spell", MSD dual drives, and early EA games (some of which are still around today in a much larger version).
It is food for thought that many still think they can "encrypt" their data out of the reach of the government with any of the publicly available schemes. On a totally unrelated note, the US government has been the largest customer of Cray computers for a very long time now, and the government finally admitted they were "storing" everything that went over the internet "backbone" in one of their new facilities (that they denied they were building until they couldn't anymore) in the US desert.
If any programmer wants to write a best seller, how about a program that would analyze what you send out over the internet and to who; Oh well. Never mind. The government finally admitted they had been copying and storing ALL traffic from target computers for years with a program called "sniffer". No way to know what they do with your traffic after it hits your provider.
On a final note, here's something for those who read all the way through this post to this point. Ashampoo really centers around your account. Be sure you keep all the information you give them to set up an account somewhere you can find it latter. I use throw away email addresses and rotating passwords, but then I can't "unsubscribe" to their flood of emails and "offers" (often in German) because I can't remember my account information so I have to "spam" folder them and lose any information they send about the programs I have. You very well may need your sign-in information again.

Reply   |   Comment by Father Richard  –  3 years ago  –  Did you find this comment useful? yes | no (+18)

If you are that paranoid, I mean protective, why are you still using Windows? Linux, for example, is a lot safer. I've gone through this paranoia stage myself, and in the end, the trouble and hassle isn't worth it. I've extensively explored this area before, and found that in fact, you can achieve fairly close to absolute protection from prying eyes and hackers (taking the right steps, of course). But, again this kind of protection is so much trouble and expensive. Even if I was a business that was guarding the formula to Pepsi or Coco Cola, I wouldn't need all the protection you claim to use. In fact, I could give you tips on improving your already overwhelming security. But, I am not. You don't need it (LOL).

You call people like me a fool. Well, its not that I don't care if anyone knows what programs I use, I just don't think they care. I really think you are delusional to call us fools. I mean that in a concerned, non offensive way. I think you are going to take a look back on your life one day, and wished you hadn't invested so much of your life in protecting yourself from hackers.

I wish you well.

Reply   |   Comment by James Scott  –  3 years ago  –  Did you find this comment useful? yes | no (+6)

I do not understand how intelligent people make the problem of encryption complicated.
First, do not save or keep any files on your primary (system) hard drive.
Second, 64GB USB drive can hold all of your personal data and correspondents for a whole year.
Third, backup your files daily to another USB drive and keep both in different secure places, problem solved, you can still encrypt your USB drives, just in case they may fall in wrong hands.

Reply   |   Comment by Hanks  –  3 years ago  –  Did you find this comment useful? yes | no (+16)
#2

Installed and registered the Ashampoo way without problems on a Win 8.1.3 Pro 64 bit system. Took some time to receive the key.

A German company with all required legal information.

Upon start a resizabloe intefrca opens. In the option you can change the laguage, disable updates and participate with anonymous data at an improve usabilty program, which contradicts in some meaning a "privacy protector".

This program is a mixture from two different, independent programs. A file encryption program with AES256 encryption and a scanner which remove "privacy" traces. These traces are open with list, MRU, temp folder, ....

http://i.imgur.com/jgY997W.png

Oops, 2331 "folder view settings". Who could be interested in that? And 553 application start count? Should I hide, that I use office, outlook and the browser 20 times per day?

Well, if THIS is a privacy issue, then this software does what it claims. If you need a proven encryption program with a 47,7 MB footprint in your program directory take this. There are completely different privacy issues. You'll read later...

Uninstalled via reboot, everybody may know, that I start ADOBE at least 3 times per day - and I like to keep the list of the last opened documents in the office programs.

--------------
about privacy...
It is far beyond my understanding, how users allow other people to read all of their emails. I know, you can't avoid everything but why that?
"Our mobile version run the emails through our servers (it’s all heavily encrypted) as we felt it was the best way to make it faster/use less battery. You can have unlimited accounts on the mobile version.
Comment by Nick Bolton — July 21st, 2015 at 9:20 am
"

it's all heavily encrypted. LOL...

Reply   |   Comment by Karl  –  3 years ago  –  Did you find this comment useful? yes | no (+116)

To avoid misunderstanding: The last part in "about privacy ..." concerning privacy of emails is cited from yesterdays GOTD Mailwasher, comment #22 as an answer to #21. Please distinguish that it's not concerning Ashampoo Privacy Protector 2015.

Very strange: after in comment #21 I revealed this problem (concerning gmail, too) I got downvoted.
I am very glad that Karl (for whose unrivaled work and comments we all are very grateful) mentions this problem here once more!

As far as I can see Ashampoo Privacy Protector 2015 is a means to overcome this Mailwasher weakness but unfortunately it isn't available for mobile devices.

But the encryption problem concerning emails is that the counterpart must "own" the same encryption software, i.e. has to buy Ashampoo Privacy Protector 2015 or use free PGP or alike.

The advantage with western European encryption products is: strict legislation in EU (European Union) doesn't allow that an enterprise builds a backdoor or alike into its products. I know about at least one big Asian country where a backdoor for government etc. use must be built into every encryption software otherwise severe punishments.

Therefore I trust Ashampoo Privacy Protector more than usual. Absolute security isn't available, endless life neither but you wouldn't kill yourselves tomorrow, wouldn't you?

Reply   |   Comment by FrancisBorne  –  3 years ago  –  Did you find this comment useful? yes | no (+41)

FrancisBorne ...I know about at least one big Asian country where a backdoor for government etc. use must be built into every encryption software otherwise severe punishments...

And I know of at least one big country at the Far Western edge of the world map with aspirations to being exceptional (perhaps it's that peripheral position on the map that's the problem?), where a backdoor for government etc. use is willingly adopted by certain well-known mega-corps. Agree with you about the EU standards, though.

Reply   |   Comment by BenAsp  –  3 years ago  –  Did you find this comment useful? yes | no (+10)
#1

Might be useful in cleaning the hardware from unwanted staff, however be careful with auto clean, check before deleting things. Most of the finds are marked as "dubious", but it does not tell much, can see the details...

Reply   |   Comment by jacko  –  3 years ago  –  Did you find this comment useful? yes | no (+22)
Add a comment

iPhone app giveaways »

Block vs Block II Giveaway
The world most attractive puzzle game!
$2.99 ➞ free today
PixelWakker Giveaway
PixelWakker has a creative suite of effects that you won't find anywhere else.
$2.99 ➞ free today
Stack X -The Extreme Stack Giveaway
Stack X, the extreme stack builder game. Do you have what it takes to reach the top?
$1.99 ➞ free today
Beautiful Monsters - Stickers Giveaway
A set of cute stickers with monsters!
$0.99 ➞ free today
Scroll 'n Roll Text Scrolling Giveaway
This app is a simple text banner/ticker.
$0.99 ➞ free today

Android app giveaways »

PRO-Video player KM, HD 4K Perfect Player-MOV, AVI Giveaway
Best player in video player, KM player!
$3.99 ➞ free today
Pro Mp3 player - Qamp Giveaway
Qamp is a powerful music player and mp3 player for Android.
$1.49 ➞ free today
Root Checker Pro Giveaway
Verify root access of your android device to know if your device is correctly rooted.
$4.49 ➞ free today
Dead Rain : New zombie virus Giveaway
An independent and ambitious game developer has created one of the best platform games of this year.
$0.99 ➞ free today
The Hunt for the Lost Treasure Giveaway
Hunt for the pirate’s lost treasure in this beautifully designed classic point and click adventure puzzle game.
$1.99 ➞ free today