Every day we offer FREE licensed software you’d have to buy otherwise.

Invisible Secrets 4 Giveaway
$39.95
EXPIRED

Giveaway of the day — Invisible Secrets 4

Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages.
$39.95 EXPIRED
User rating: 321 86 comments

Invisible Secrets 4 was available as a giveaway on August 8, 2007!

Today Giveaway of the Day
$69.00
free today
Retro looks for stylish photos!

Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages.

Invisible Secrets 4 features strong file encryption algorithms (including AES - Rijndael), a password management solution that stores all your passwords securely and helps you create secure passwords, a shredder that helps you destroy beyond recovery files, folders and internet traces, a locker that allows you to password protect certain applications, the ability to create self-decrypting packages and mail them to your friends or business partners, a tool that allows you to transfer a password securely over the internet, and a cryptboard to help you use the program from Windows Explorer.

Invisible Secrets 4 is shell integrated and offers a wizard that guides you through all the necessary steps needed to protect your data.

System Requirements:

Windows 95/98/Me/NT/2000/XP

Publisher:

NeoByte Solutions

Homepage:

http://www.neobytesolutions.com/invisiblesecrets/

File Size:

3.11 MB

Price:

$39.95

GIVEAWAY download basket

Log in to your system and web browsers using fingerprint management.
Developed by Kaspersky Lab
The standard anti-malware solution for Windows.
Recover lost or forgotten passwords for RAR files.

Comments on Invisible Secrets 4

Thank you for voting!
Please add a comment explaining the reason behind your vote.
#86

are aloud to reinstall the software after the 24 hour give away?

Reply   |   Comment by saints22  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#85

Okay, I'm going to repeat this for those you haven't been paying attention:

ON THE UNLIKELY EVENT THAT THE SOFTWARE EXPIRES OR THAT YOUR OPERATING SYSTEM BECOMES INOPERABLE AND YOU HAVE TO REINSTALL, THE TRIAL VERSION OF THE SOFTWARE GIVES YOU UNLIMITED DECRYPTING SO THAT YOU CAN RETRIEVE ANY FILES YOU MAY HAVE ENCRYPTED OR HIDDEN. THERE IS THEREFORE NO NEED TO WORRY.

Reply   |   Comment by Keilaron  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#84

Get off vactation already GAOTD! You have been open since October 24th 2006.. 95% of the companies out there require 1 year!.. Get with the times.. Is business so SLOW that you all can afford it?

Reply   |   Comment by A-Troll  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#83

I do not see where this software will only work for one year, would someone be so good as to show me? Thank you. :)

The program is small 3MB, easy to use, has a nice interface and many features already explained such as the ability to hide a file in a file, encrypt files and shred them securely.

It only takes a trial of the program to decrypt or unhide your files.

You can also send hidden, encypted, self-extracting files with this.

Reply   |   Comment by Robert Huntington  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#82

Post 58.. "I gave everybody a yes for their comment being usefull i got bored and had nothin better to do, good comments though :D"

I was also bored and recountered your yes's with NO's.. That was fun

Reply   |   Comment by A-Troll  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#81

Okay, so I install and activate this program today. I encrypt some of my most precious files with it.
Tomorrow I have a software problem and I'm not able to start Invisible Secrets. How on earth do I get back my encrypted files? BUY the software for 39.95 bucks?!!!

Reply   |   Comment by sd  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#80

honestly, everyone saying they are an expert, or this is their area of expertise is getting on my damn nerves. does it work on vista? I only saw one comment and that person (sorry don't remember who) didn't say if they had installed it.

GOATD... Thanks for all the Great software. !!!!!!

Reply   |   Comment by david  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#79

oooooooops....lol read the agreement, don't try to update it and it will last as long as your computer does and longer if you back up the dir

Reply   |   Comment by rebel  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#78

I really love this site, the reviews are great.

#45 you are totaly correct about this. like you i also have a dgree in computer scince, not to mention A+ cert. and MCSA.

to all those that keeps asking about what happens if your computer crashes....ever heard of back up. in fact very few people know this but with these give aways once you install the program you can copy the dir to an extenail HDD or server or what ever you have for backup. I have tryed this method with other programs and it works.

to all those who wants to know what happens when this prog expires, its a GIVE AWAY

Reply   |   Comment by rebel  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#77

i read toth's review.
only five filetypes can be carrier (steno container). gmp? that's some kind of mathematics format. having a gmp file on hard drive would raise suspicion :-)
that leaves only 4 filetypes to hide within :-)

though I've downloaded a few, amidst speculative enthusiasm, I've never quite got to install any gotd apps***. but i much appreciate the discussions.

***partly because i already use some FW that perform tasks of some gotd apps that I'd find most valuable.

Reply   |   Comment by em  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#76

#c44, disk image: i think you want to set hardware settings to as generic as possible before making an image, otherwise be sure the destination hardware is the same as the source's hardware.

as to hiding in large enough files.: i suppose you could hide it in a file that is very uncompressed (word processor doc?), but any of these "host" files will be suspect as soon as the scanning ("bad guy's") program tries to read the file.

as to re-stamping/attributes: does the stenography somehow reset hash? (although hash should rarely be a worry, because scanning program wouldn't know what the file's hash was before it became a steno host.

Reply   |   Comment by em  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#75

#3 it's Monkey, not money!
Everybody's Got Something to Hide 'Cept for Me and My MONKEY.

I'm not reading through all these comments to see if someone has pointed that out already. :(

Reply   |   Comment by FABScott  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#74

It definitely changes the file size whether the carrier is bigger or not. I need to know what some security expert is doing that their file size has not changed.

Reply   |   Comment by edu  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#73

I was doing better with my decision of downloading and using this program before I read the reviews, than after. Usually there are so many reviews that are so helpful that I dont mind reading all of them. Today I felt like it was a ton of nit-picking whiners with hardly a review in them. No offense ment to anyone, but how about some actual reviews about it?

Thanks and sorry if anyone was offended,
ibwebb

Reply   |   Comment by Gregg Webb  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#72

Hmm, what ever happened to simply hiding files in plain sight? No imagination?

Reply   |   Comment by Sager  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#71

what if: the guy (kid or not)look at your computer, get frustrated because of your good protection, decide to run this handy program mass encryption your entire disk, with zfj;jez!#@$# code, what then ?

Reply   |   Comment by Whatif  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#70

Totally OT, but to #3, the John Lennon line is "me and my monkey."
And, back OT, thanks for the mentions of the free sites that do pretty much the same thing.

Reply   |   Comment by jennifer  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#69

Hi explorator here


thanks gaotd users, after reading all your comments, which often proves to be fun, i decided not to download today's program for two main reasons: (1) there's no guarantee that the encrypted/hidden files will be recovered in case of accidental crash or after the license expires.

i remember once that my windows vista failed and i had to do a restore point to recover many of my programs but those i downloaded from GAOTD were not usable anymore as you would require to have installed them only at the time they were made available.

i remember how i was using a file hide utility and was scared that i may have lost those precious important files i had hidden in that program.

it took me hours to recover them because somehow the restore point did not contain the data or perhaps because i had hidden the files at a later time when the restore point was made...

anyway, i don't trust concealing in programs important files that may or may not be recoverable, as #6 and #14 mention above. Of course, at your discretion, you can always purchase the program after the expiration of its license, in answer to #11 & #12. But judging from today's comments it seems that truecrypt is a more reliable open source free program.

(2) As #30 states above, this program does not support windows vista and today many of us use vista already. As for me, i like using only programs that are fresh or up to date with technological developments.

Finally, i sincerely want to say that this program is good insofar as it does steganography file data cocealment. If you are really concerned with securing your sensitive, private, important risk data, then you should save a copy in a usb disk or any other portable device for security measures; but if you require using the pc where the private files/folders are, then it is wise to do (1) have a fake copy of random files on the pc desktop, hd (2) encrypt the real data using professional trustworthy secured programs. [run a search in any of the known search engines for this] Otherwise, just keep the valuable info at another pc or server that none can ever touch or see or enter into. of course there are many options available for securing your pc & valuable data against hacker attacks/intrusions or prying eyes etc.

as always, thanks to the GAOTD team and developers, and again to the members of this community

until then from new york
explorator

wishing you all a happy surfing summer day

Reply   |   Comment by explorator  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#68

This software is a good one with many options & a cool skin.

BUT i am not going to use it!

Bcoz this is not a freeware, If i store all my confidential data in it, in case of a Windows XP crash(leading to format) i wont be able to retrieve all the encrypted files! Bcoz the giveaway offer would have finished and i will have no option but to buy it to retrieve the encrypted files.

I am currently using a Freeware called "Kruptos" for the encrypting files. The good old Winzip password protection is also very handy.

Reply   |   Comment by bgm  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#67

So what's the bottom line -- does this expire in a year or not? I don't mean just the decrypting, but all of the functionality in program.

Reply   |   Comment by Ron  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#66

The interface of this program looks better than the program is itself. With Encrypting and Decrypting some little things in my test-file got lost.
I think this program is ok for the transfer of pictures and documents, but if you're gonna share some important programs or documents, you'd better use a memory stick or something..
In a scale from 1-10, this program gets 6 points.

Reply   |   Comment by Matthijs  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#65

Additional uses for this software"

***
Using this in conjunction with TrueCrypt.

One of the options in TrueCrypt is to use an existing file on a disk as part of the key pair which unlocks the encrypted volume. Usual suggestions are audio or image files.

One can use this product to modify a file (e.g. an mp3) by embedding an encrypted message into the file. This will not change the way the file functions, but it means that the modified file, which is the same size and plays the same as the original file, can be used as a key, while the unmodified file cannot.

e.g. if you are using an mp3 file called "My Song" for the key, and it contains within it an embedded file of "Our Song" then anyone else's copy of "My Song" cannot be used to unlock the volume. Same of course goes for pictures.

This technique provides another layer of obfuscation to hide your encrypted data. And if anyone decrypts the hidden file within the file, it will not be meaningful to them.

The same technique can probably be used on other encryption programs which permit such a "secondary key" system.

***

Of course, the same process can be used to 'fingerprint" your files to prove ownership for copyright purposes, you can embed your logo and copyright information into your files to permit you to track their origin should they be replicated ac cross the net.

Since the encrypted data is actually not of any intrinsic value, anyone recovering the data merely knows where the file came from--thus the encryption algorithm and it's implementation do not unnecessarily have to be secure.

While I doubt that such a system has been subjected to legal testing in the courts, it at least provides people who do not want to or cannot afford to pay for commercial "fingerprinting" of their files to still provide a degree of protection for their intellectual property.

This should work particularly well if the "fingerprint" file is encrypted or signed in a public key system (e.g. PGP or GNU GPG.) You encrypt/sign the "fingerprint" in your private key before embedding, thus permitting proof upon decrypting that the fingerprint is, indeed yours.

cmb

Reply   |   Comment by Charles Barnard  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#64

I have read GAOTD for months, downloaded 4 things and 2 would not install. While I fool around with this stuff I could be getting REAL work done. Sorry GAOTD,I can't waste any more time here......

Reply   |   Comment by Mury  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#63

The software is great works well! For those with Vista Truecrypt is Vista ready! I don't worry about tomorrow just take 1 day at a time and use the software then before it runs out decrypt your files and download the freebie then encrypt them again, no biggie, or invest in this software! Cheers!!

Reply   |   Comment by wiseman57  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#62

#45,#56 Rakos... quoting your exact words:

"…are you out of your mind..you obviously didnt try the program out or you would have found that the file size doesnt change…if it did it wouldnt be stegenography…the only hint that the file contains data would be the comparison of the file stamp time and date to the original"

If you were to embed the carrier file with hidden information such that the carrier file size _didn't_ change, the hidden file would be too small to hold any valuable information. If you added even a 1kb file to any carrier file, it would change the file size appreciably. My '1mb to 100mb' analogy was only brought up to illustrate my point(albeit somewhat exaggeratedly). In fact, I just created an Excel spreadsheet which contained a single period and the file size is already 13.5k...

The point of steganography as used in this application is only to encrypt information within innocuous files such as jpegs or wavs. The carrier file size would change but you could hide it in plain sight with other jpegs or wavs. The idea never was to create an encrypted file the exact same size as the original as you contend.

And it really is ridiculous when people boast about "A+'s" and "honor roll" on the Internet. You know full there's no way to corroborate claims like that. But based on your grammar and spelling, I would believe you were a DeVry dropout.

Reply   |   Comment by Jim  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#61

I feel really bad. I just purchased a copy of 96Crypt. This Giveawayoftheday "Invisible Secrets 4" is so much better. Much easier to use and can do more for you.

Reply   |   Comment by Andy K  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#60

To #17
Camflage is a very bad choice. It's only merging file to hide with container file. Try to compare some file before and after whole hiding process. You'll be surprized.

Reply   |   Comment by sfenson  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#59

Is it policy for GAOTD to restict registrations for just one license per IP?

Not as far as I know. Try again, I suppose, or from another computer.

Reply   |   Comment by Keilaron  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#58

I gave everybody a yes for their comment being usefull i got bored and had nothin better to do, good comments though :D

Reply   |   Comment by zack  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#57

Registration Issue: I am one of two beta testers that feeds off of the same IP address. My partner was able to download and register Invisible Secrets 4 with no problem. I have downloaded it too and when I tried to run the install executable I keep getting this message "Activation module failed to connect to giveawayoftheday.com. Software activation is not possible at the moment. Please try again later or check your firewall settings."

I have tried redownloading the zip file twice and I still get this error. Others I have contacted say they were able to connect and register this app during the timeframe I was trying to register. Is it policy for GAOTD to restict registrations for just one license per IP? or is my issue really just the fact that I am having technical difficulties connecting. I tried turning off my firewall and that did not help. Please let me know. Thanks.

Reply   |   Comment by Andy K  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#56

Charles...thanks for the feedback...as I usually don't bother to comment it is not a problem but today I have felt a bit more provacative as this IS my area of expertise...
the other reason that I have commented as of late has been to make sure to reinforce the efforts of GOTD to provide useful programs for us to try and eventually buy if we want to keep them...
it is so much better doing it this way than just going to a freeware site and dling anything that may or may not be useful..

now as to the steganographic capabilities of this software..
If you take a wav file for instance and use it as a "carrier" and make sure that the size of the "carrier" file is larger than the file you are trying to bury in it there should be no problems with the process and the resulting file will in fact work just fine as the file type does not change...neat little trick..

as for trying to use a 35kb carrier to hide a large MB file..that is just plaid uninformed stupidity (or ignorance) because then the file will definately look jury rigged and not accomplish much...
now if you take your file and encrypt it before ( or during ) the process you will in fact find that it nestles up into the "carrier" file just fine and as I have said in my other post the only difference will be the file data and time stamp is changed...which you can change back using any number of off the shelf utilities to change it back...
as to the reason for this...Charles hit it squarely on the head in that if you REALLY want to protect your data you should use some manner of encryption or steganography to insure that data doesnt get compromised...now the only question left is how much effort to put into using this method since as we all know that have any REAL experience in this field we find that social engineering is the BEST way to circumvent these protections...
ever write your password on a sticky note and put it on your monitor or keep a password file with all your passwords in it...which by the way this program has a password encryption/retaining program that is VERY cool...
So to all I wish only that you keep your data safe and good luck!

Reply   |   Comment by Rakos  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#55

To #47 (AnonAMouse):

Thank you for pointing this out. I didn't have a lot of time to hunt around their site this morning. I will add a little add-on to my review about that (Give you credit of course) here shortly. I thank you for pointing this out for me :)

BladedThoth

Reply   |   Comment by BladedThoth  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#54

Addendum to Charles Barnard (#48)'s post:
For #6: The amount of time it takes to break encryption also depends on it's complexity. If you use GPG for example, you can set how large you want your encryption key to be (as high as 4096 bits! And to think browsers today only use 128- or 256-bit encryption at most.). A larger key will take longer to crack than a smaller one, naturally.
For #8: It gets better. In Linux, there is a utility called "file" that will tell you what it thinks a particular file is, making it really easy to figure out what certain common filetypes are without even having to peek at them yourself (assuming they're not encrypted), and thus showing that just renaming a file is not secure at all. Here's an example:
First, I copy files to new names for a test. This way, they don't have any obvious name nor extension. Then I run the program:
user@deepsea ~ $ cp Escape-Velocity-Nova file1
user@deepsea ~ $ cp NPSW\ picnic.ppt file2
user@deepsea ~ $ cp agm-1.3.1.tar.gz file3
user@deepsea ~ $ file file?
file1: exported SGML document text
file2: Microsoft Installer
file3: gzip compressed data, was "agm-1.3.1.tar", from Unix, last modified: Tue Mar 17 20:02:30 1998

Wow! It only got one wrong, and it knew what the original filename was for one of them (although that's stored by gzip, I'm guessing - weird, I always thought it used the current filename).

Wildcat (#51) - See Charles Barnard (#48)'s post.
Wildcat (#52) - It varies. Some of it is excessive protection, while a good portion of it is necessary. Children shouldn't, for example, be exposed to porn until they're adults... ...but could you stay on topic, please?

Reply   |   Comment by Keilaron  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#53

Hey #42 BT, they esentially DO have a freeware devrypter in that when their trial expires, that function (decrypting) will still work. that also answers the question as to how do i decrypt files after the lecense expires.

Reply   |   Comment by W98 is alive!  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#52

Another thing I have always wondered about is why is there parental protection everywhere. Your little offspring (semen globs) aways want to do bad things just like you did. It's like putting wool mittens on little Johnny to keep him from masturbating. Bet you hated your parents when they did that to you. See waht happens when you try to control to your judgement. The kid will take the mitts off and jack off on your pillow.

Reply   |   Comment by Wildcat  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#51

The fun thing with these hide'ems is you will eventually forget that you hid them. Gone forever. But why do you have to hide them anyway? Do you let strangers visit your house and have access to your deviuos hard drive?

Reply   |   Comment by Wildcat  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#50

#40, you can download a trial of this program from the homepage. After the 15 day trial is up, you can't encrypt of hide files. But you CAN decrypt and hide files for as long as you want. That part doesn't expire. So you just put the trial on your new computer and use a external hard drive or usb stick to transfer the files. Then decrypt them. Or maybe the original can still decrypt your files after the period. Then you don't even need the trial. Just decrypt and transfer.

Reply   |   Comment by Walker Texas Ranger  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#49

Hello,

I just wanted to say that if you lose the GAOTD version, you would have to pay only if you wanted to keep encrypting data. The decryption part is free for as long as you have a copy of the trial version.

-Mario

Reply   |   Comment by pauloparra  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#48

The steganographic capabilities are nice, although as has been mentioned there are free alternatives out there.

The program seems to work as advertised, and for routine use by people merely concerned about casual interception of privileged but not highly valuable information, it could be useful. I will not use it because I do not have the ability to see exactly what the code does, and in my book that is not secure.

For my clients (attorneys) the stakes are too high to use anything which cannot be examined for flaws--often the lives and/or fortunes of their clients are on the line.

Note that historically, commercial encryption and codes have been implemented AFTER a major loss. The first few years of ATM machines the banks sent all information in clear over phone lines and didn't even insure themselves against losses. It took a number of thefts to change their minds. Also note that the British and French underground during WWII were using extremely poor ciphers at the insistence of bureaucrats with no knowledge of cryptography, and that the use of these ciphers resulted in the deaths of many, many underground agents before they were convinced to change their methods.

I'm sure that many of you have "nothing to hide"--the sheer number of idiots posting their illegal actions on MySpace and the like proves it. Just as the fact that law enforcement regularly searches such sites for leads proves that you should, perhaps, consider that you MAY have things you SHOULD hide!

General answers to some concerns:

1) Data corruption leading to inability to access the data. Like this can't and doesn't happen to clear data? Backup often, keep multiple backups at multiple sites--or be prepared to lose the data. Encryption allows you to backup to a public online site without worrying about the security of their protective mechanisms (including their encryption software!) I use Mozy to back-up TrueCrypt volumes.

2) Identifying steganographic data files. CRC MD5 checks will detect that "something" is wrong. It will not, however tell you WHAT that something is--there are other analysis methods which will tell you WHAT but probably will not, in and of themselves, give you the data.

3) To #18 "I for one give out what I know & what I have everyday on my website" Thanks, what is your website? I need your bank account and other financial account data. For myself, I assume that my information is compromised as I have a long history as a political agitator--but I don't give the stuff out, and my major preparation is being ready to admit to my warts rather than suffer blackmail.

4) There are different reasons to encrypt data:
a) To protect it from eavesdroppers during transmission.
b) To protect it from theft while stored.
c) To prevent casual access.
d) To allow immediate access by authorized people.
e) Innumerable other reasons as people discover them.

5) Storing data on a "hidden" cd only works against casual invasion--anyone who is really looking will take them all and examine them all carefully. Hiding files on a machine is silly--software can search and ID all of the files on your computer in less time than you can find them manually by drilling down through the directory structure. It will then deliver a list (and copies!) of any files it finds which are suspicious.

6) Like other locks and keys, encryption will only delay anyone trying to access the secured information for a period of time. The amount of time is highly defendant upon the determination and funding of the searcher. Computers permit multiple attacks on secured data in a short time--limited by desire and funding. No lock is perfect.

7) Steganography relies upon a 2-fold protection:
a) Encryption
b) "Hide it in plain sight" disguised as something else.

8) I use TrueCrypt. I like TrueCrypt. I won't use anything that isn't open source. I do not find that TrueCrypt's "hidden" volume is much use although it is highly touted--the program asks for a hidden volume password, and anyone who knows about the program (read: anyone who can Google,) will work to get both passwords out of you--even if only one exists...! But renaming a file extension for a TC volume is NOT the same as steganographic hiding--if you rename it as a audio, video, photo or word file--whatever, it is very easy to see that it is not the file type it says it is, as the bits will appear random and attempting to open it as the filetype it is labeled will NOT bring up a song/video/picture/whatever, but will instead give an "unrecognized file type" error. This alone is enough to make an cryptographer suspicious enough to attack the file.

9) A prime reason to encrypt data on your machine these days is that an increasingly large percentage of machines are compromised daily and the people compromising them are no longer "teenagers with nothing to do," but highly skilled criminal programmers, in search of ANYTHING which can be converted to money. It is not possible to prove that a machine has NOT been compromised, although by isolating it from the net (yeah, try and run much of anything that way anymore!) one can ensure to a reasonable degree that it is not communicating (but not to certainty, as there are always ways to physically compromise a machine.)

10) Rakos--I down checked your positive comment because it was not useful. It gave no information, no comments about WHY you like the program. I routinely down check any comment without more than a "I like/I don't like," They waste my time reading them. I believe that I am not alone in this.

Reply   |   Comment by Charles Barnard  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#47

#42 BladedThoth:
In my above post #32 I advised and I re-quote:

Try reading the Invisible Secrets Website!
(http://www.neobytesolutions.com/invisiblesecrets/faq.php)

I quote:
Question : If I purchase this program and want to send hidden messages to someone who doesn’t have Invisible Secrets and doesn’t want to buy it, how can he/she unhide, decrypt and view my messages?

Answer : The receiver can download and use the trial version of Invisible Secrets 4. The unhide and decrypt functions from the trial version will NOT expire! After the 15 days of evalution the receiver will not be able to encrypt or hide, but will be able to unhide and decrypt any message.

Also used to unhide/decrypt your own files if you accidentally lose the original program for any reason.

FTP was suggested for putting files via encrypted images etc. onto your own website/webspace etc, not for direct to other users.
An example of this would be family photo's (pics showing house number etc for friends embedded in say garden pics) visitors see garden pics, and friends (using free trial) can get the remaining pics from the other images. (Only if you tell em the password!)

Everyone else:
So the free trial from the site (Not the GOTD full program) gives permenant unhide/decryption option.

I always recommend reading the programs site's FAQ.
Another question from the FAQ:
Question :
After installing Invisible Secrets 4, when I right click a file in Windows Explorer, the Invisible Secrets menu-item appears. This indicates to everyone that on this computer there might be encrypted documents... Is there a way to keep it out ???

Answer :
Yes. Open Invisible Secrets 4, click Options. In the Options Dialog Box select the Stealth Mode check box. Click Ok. The program will disappear from the Start Menu also. To run the program again you must search the main EXE and execute it.(this is usually in the "Program files" folder where you installed Invisible Secrets)

Ty very much for the +6 for my #32 post people.
(Was +6 at time of this post)

Reply   |   Comment by AnonAMouse  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#46

There is a very simple way to ensure that you can recover your encrypted files in the future, even if you no longer have the encryption software installed and are unwilling or unable to obtain and install it again. Back up your files in their unencrypted form to cheap CD, DVD or even diskette, and store it in your home, your bank safe deposit box, parent's house, etc. Refresh as necessary. You know this is necessary whether or not the files on your computer or your removable flash drive (n.b., subject to loss or assorted fatal forms of damage) are encrypted. A file not backed up is a file at risk; the risk of being unable to decrypt is minor in comparison.

And if you can't bear to buy the software you get for free through GOTD - which is, of course, the motivation behind the giveaways - then back up your system partition periodically so you can restore that if lost, or encourage some friends to take advantage of GOTD so you can provide each other with emergency recovery platforms.

Reply   |   Comment by Richard Blake  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#45

#41...here here Jim...YES...I DID try the program and it is AWESOME as I have said before...
now let me ask YOU a question...
how on earth do you expect to cram a 100mb file into a 1MB file..that kind of math just doesnt work in my book...you could try retaking algebra and maybe then you would realize that you need a carrier file that is LARGER than the file you want to stuff into it...
the way that the program accomplishes this is to inject the code of the file you want to hide in the "spaces" left by the code of the original "carrier" file and thereby "hides" it...WHY would you want to try and affect the file size when you could conveniently "hide" the program inside another and then you could always use a utility that changes the file date and time back to the original if you REALLY wanted to "hide" a file...thats what this program is all about...
SECURITY 101...take a secuturity class and you may learn what I am talking about...I actually hold a degree in Computer Security and passed with a grade of A+ and made the honor roll...my domain...
I DO know what I am talking about Jim...
ALL HAIL BLOWFISH!!!
Beam me up Scotty...please!

Reply   |   Comment by Rakos  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#44

If you are worried about having ANY program available when you have to re-install Windows use an image backup like Acronis True Image . Then you can reinstall with your exact entire system from the image.

When you upgrade to a new OS you may be able to setup a dual boot using the image and run the GOTD programs from there.

Reply   |   Comment by Eric Bloch  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#43

Just had to comment to #38 (rakos): It does bloat the file if you add too much data. Can't avoid it. I have a demo file if you'd like to see it. I took one of Windows sample images, added 3 Flash files to it, and the file (blue hills.jpg) went from 27.8KB to 72MB. It would be impossible to stash 72.9MB (Original 3 Flash files) of data in a 27.8KB file. If it were, you should start looking at this for file compression, not .zip, .rar or all the others :)

Reply   |   Comment by BladedThoth  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#42

Hello all! Today's 15-Minute Review is up! Check it out!

http://www.bladedthoth.com/reviews/15mrs/invisible-secrets-v4-6-3/

Reply   |   Comment by BladedThoth  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#41

#38 - rakos, YOU obviously haven't tried the program. It absolutely changes the file size from the original carrier file. How on earth would you embed a 100mb encrypted file in a 1mb jpeg with no file size change. Just because you can look up the word "steganography" doesn't mean you know how it applies to this software.

And why should we blindly applaud every piece of software that's made available by GAOTD? If the program has drawbacks we should just overlook them because the software is free? And anyway, the people who complain about the screensavers are not necessarily the same people who are griping about this prog.

Reply   |   Comment by Jim  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#40

I love visiting this site everyday but I do have to ask this about the encryption programs.

If you encrypt something with one of these giveaways and then reinstall your computer or go to another computer to decrypt your files, aren't you s.o.l.?

Just wondering and if someone has an answer that would be great!

Reply   |   Comment by Luc Ippersiel  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#39

#36 - You don't have to encrypt the whole flash drive. You can create an encrypted TrueCrypt partition that only takes up a portion of the space on the drive. If you have files that you must be able to access anywhere, just keep them outside the encrypted volume.

Anyway, I'm not entirely sure what you're getting at. That same problem would affect _any_ encryption program. Are you saying that if you can't access the files at the internet cafe, you should just do without security?

Reply   |   Comment by Jim  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#38

BOY...I thought you guys were up to the task of reviewing this program but now you really got me worried...
1. #14 BLOAT...are you out of your mind..you obviously didnt try the program out or you would have found that the file size doesnt change...if it did it wouldnt be stegenography...the only hint that the file contains data would be the comparison of the file stamp time and date to the original...
2. I looked at and tried the program and made a positive comment early on last night and I am getting negative ratings...whats up with that...I think some people just like punching buttons...
3. Steganography is the "art" of obusification...meaning that if I want to hide something from prying eyes I can do it...a real winner in this day and age of people tapping my phones and emails
4. They hit this one into the ballpark...this program is ace #1 available in the market to do this and also includes the ability to add encryption algorythms as they develop...a must have for security...hooray for "blowfish"
5. here on the east coast it is 3 hours earlier than there on the west coast so if it looks like the hours are differrent it is obvious people all over the world are using this site...BRAVO GOTD...you have mass appeal
6. after all the belly aching I have been reading about people not liking screen savers and such...there should be rave reviews from the listening public about a program that is a powerful and useful program...come on people use those brains and stop being nit pickers when you dont get what you want...you may have to go and actually spend some money on real programs instead of standing in the mooch line...get real!

Reply   |   Comment by rakos  –  16 years ago  –  Did you find this comment useful? yes | no (0)
#37

I warn everybody to use open source cryptography applications ONLY. Open source can guarantee that the application doesn't have backdoors and it correctly implements the encryption algorithms. You may be surprised how many applications implement encryption algorithms the wrong way. Yes, that means broken encryption.

fospuNpa (az Árkádban ingyen lehet szarni, pina volt ma?)

Reply   |   Comment by Az Árkádban ingyen lehet szarni  –  16 years ago  –  Did you find this comment useful? yes | no (0)
Add a comment

iPhone app giveaways »

Mox MTG Life Counter Giveaway
The ultimate MTG Companion app to keep track of your life total, poison, energy, loyalty counters and much more.
$3.99 ➞ free today
Hacker News Tracker Giveaway
This App will help you to check if your email id has appeared in any recent data breach.
$1.99 ➞ free today
Click Planet - Spacecraft Giveaway
Collect enough resources and then build the facility.
$4.99 ➞ free today
RevisApp Giveaway
An application with the main subjects loaded in Secondary and Primary schools in a simple, practical and objective way.
$11.99 ➞ free today
NeoAria2 Giveaway
NeoAria2 Manager refers to a tool used to manage the Aria2.
$1.99 ➞ free today

Android app giveaways »

Weigh-In Deluxe Weight Tracker Giveaway
The Best Weight Tracker!
$2.35 ➞ free today
Dairy With Lock :Daily Journal Giveaway
Diary with password, a daily journal app to vent your feelings & record thoughts!
$9.49 ➞ free today
Home Screen Music Player Giveaway
WMusic is a minimalist offline music player that can be placed on your home screen.
$0.99 ➞ free today
Water Reflection Photo Effects Giveaway
Add water reflection photo effects to your photos and give amazing touch to your photos.
$0.99 ➞ free today
Camping Watch Face Wear Os Giveaway
Get ready for your outdoor adventures with the Camping Watch Face for Wear OS!
$2.99 ➞ free today