Every day we offer FREE licensed software you’d have to buy otherwise.

Silver Key Standard 4.1.2 Giveaway
$29.95
EXPIRED

Giveaway of the day — Silver Key Standard 4.1.2

Silver Key allows you to package sensitive documents into self-decrypting .exe files.
$29.95 EXPIRED
User rating: 263 (38%) 436 (62%) 84 comments

Silver Key Standard 4.1.2 was available as a giveaway on June 21, 2013!

Today Giveaway of the Day
$53.32
free today
A slideshow creator with videos, pictures and audio files.

If you need to send sensitive data over the Internet you should encrypt it first. But what about the other side? Your correspondent will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key!

Silver Key produces encrypted files (or parcels) ideally suited for sending sensitive data over an insecure channel like the Internet. Silver Key parcels are self-extracting, so the correspondent on the receiving end does not need to install any software to decrypt the file. Creating an encrypted parcel with Silver Key is incredibly easy. All you need to do is right-click a file or a folder and select ‘Create Parcel’. Silver Key will produce an encrypted file, which you can upload to an Internet server, send over your local network, or just attach to an email. Silver Key uses highly reputable Advanced Encryption Standard to protect user data, with its 256-bit encryption key far exceeding the HIPAA requirements.

System Requirements:

Windows 95 /NT/ 98/ Me/ 2000/ XP/ 2003/ Vista/ Server 2008/ 7/ 8/ NT 4

Publisher:

Inv Softworks

Homepage:

http://www.kryptel.com/products/silverkey.php

File Size:

10.9 MB

Price:

$29.95

Comments on Silver Key Standard 4.1.2

Thank you for voting!
Please add a comment explaining the reason behind your vote.
#84

Jan 2014 early in start causing issues since mid Dec 2014. now says Account is temporarily locked, but license is good for years to come and nag screen keeps coming up, guess it is time to uninstall since I won't waste any more time on this. another extended trial time bomb!!no support for "free" users.

Reply   |   Comment by Bob2  –  5 years ago  –  Did you find this comment useful? yes | no (0)
#83

Installed the software and made few parcels to check how secure it was. Tried several methods to crack it, but nothing has worked yet so the software seems to be reliable for encrypting.

@57 Joe I tried to find anything new in startup after installing this software, but could find nothing. Can you post the names of the new startups please?

Reply   |   Comment by Havoc  –  6 years ago  –  Did you find this comment useful? yes | no (+4)
#82

Despite getting my question in this morning US time, there is no reply, so I guess I'll just have to pass on this one and use one of the free every day alternatives, or maybe Kryptel 6.22a from a previous offer.

Reply   |   Comment by loving thesixties  –  6 years ago  –  Did you find this comment useful? yes | no (-2)
#81

That should have been
Thank you Inv Softworks for this great giveaway :)

Reply   |   Comment by rodken  –  6 years ago  –  Did you find this comment useful? yes | no (+1)
#80

This is an excellent package. People who know nothing about encryption will be clueless about the real power of this program. If you are one of the guys who see the real need for this program, do yourself a favor, especially since you can get the USB version as well. You will be glad you did. It is much easier than a lot of the other programs mentioned on here, even allowing virtual keyboards for password entry if you're worried about keyboard loggers. It shows other types of virtual keyboards on the publishers site, haven't looked to see if this version supports that feature, but their example is a virtual keyboard with geometric shapes. If someone doesn't have the keyboard templates, they cannot decrypt. Just another security layer possibly.
If you are happy with 7-Zip or whatnot as some have said, disregard the previous stuff. If you need some serious software though check this out. I normally lurk this site (who doesn't like free?) but I posted for this one. Add your own certificates from something like http://www.gnupg.org/related_software/gpa/ if you do not have a real certificate to verify yourself as the real sender for intended recipients. This program is not really for newbies to encryption necessarily but a great next step. And for those who keep asking if they are secure, if you're connected to the Internet, NO. Simple as that. If you don't want it intercepted, the best place to keep the info is in your head. Best practices with encryption help stop casual interception, not concerted efforts. Just try it and form your own opinion. As for myself this will probably be a keeper. Thanks GOTD and especially the publisher. I like what I see so far. Thank you!

Reply   |   Comment by HiddenHobbyist  –  6 years ago  –  Did you find this comment useful? yes | no (+4)
#79

Ignore the thumbs as usual.
Why isn't there any comments on just how awesome this software is? The ones commenting here have not tried this or haven't even checked out what it can actually do!
You don't need this to open the parcel created with it. 256-bit encryption so why are there silly comments about someone cracking the password, only if they have hundreds of thousands of years! Ability to create parcels hidden in other innocent looking files. Size obfuscation to hide real size of small parcels. And much more! Freeware can't compare!
For those who are looking for such software the price can't be beat especially for the quality of the software.
It is a shame that most people don't realize what is being given away here.
Thank you Kyptel for this great giveaway! and as always GAOTD.

Reply   |   Comment by rodken  –  6 years ago  –  Did you find this comment useful? yes | no (+3)
#78

Definitely THUMBS UP. Downloaded the zip without any problems and even though the Install Wizard mentions that a re-start MAY be required, on my Vista I didn't need to go through it.

Tested the function with a PDF file. Right-clicked the file and selected to Create Parcel. Then entered a new password in the pop-up window, which would be required for the self-extraction and decryption. There is a pwd strength indicator bar above the field, so you can adjust the length/character combo, which is a nice touch. Emailed the newly created file (this time with an extension .sk) and once received on the other side, downloaded the attachment to the Desktop and opened it with the same password.

The PDF was extracted without any loss of data, both text and graphics look exactly as in the original. If you follow the instructions in the tutorial, which opens in your browser right after installation and Andre has posted the link to it a few times, you should be fine.

BTW, the password can contain characters of foreign alphabets for added security - I tested it with Cyrillic characters and it worked without a glitch: http://my.jetscreenshot.com/demo/20130622-gfpt-67kb -> link available for the next 24 hrs.


@ #28 - there are MANY applications for this program. Any bank statements/credit card bills/medical records that you store on your PC or a stick are fully exposed to anyone with access or a hacker data theft. You can create a really strong master pwd, then encrypt all sensitive files and delete the originals. Next time you need to open them, just enter the master pwd, extract the file and once you are done with it, shred it and leave just the protected version. Since decryption takes only a few seconds, there's no hassle. Warning: if you forget the password, there is no one else, who can restore it for you, so make it something *logical*. This way if you do forget it, you will have an algorithm for reconstructing it.

@ Mark #41 - you are not sending anyone an .exe file and asking them to run it, unless it's the target file that requires encryption. That's the point of this tool. It removes the need for the receiving party to deal with ANY encryption software. Just supply them with the password and they are good to go.

For those of you worried about the Gov't snooping on you - if they are interested in what you are sending and they fail to crack your password, they can simply present you with a subpoena and demand for you to unlock the file. Case closed. If the data is not threatening to Nat'l Security, you do not need to fear Gitmo. However, as a free citizen, you DO have the right to protect your sensitive info from hackers with criminal intent and that's why these types of tools will be proliferating in the future. Especially for business use.

The way this file encryption functions, you can literally upload the file openly to your blog and have it available for access to ONLY your Paying Members, as long as you have communicated the "open Sesame" phrase in an email beforehand -- hopefully the segmentation feature of your Autoresponder knows who is supposed to get access and who should be restricted.

You can also upload your encrypted presentation files, containing proprietary data on a temporary storage site for free for 30 days and have them available to you during your entire business trip, as a back-up, in case your laptop malfunctions/gets lost/gets stolen, etc. and you don't want to blow the deal. You get the picture.

And if you are really worried that someone will intercept your email communication, then DON'T hit the Send button. Attach the encrypted file, save the email as a Draft and then text the receiving party the email account, the password to it and the password to the attachments (separate texts via phone/Skype/snail mail...) They can just log into the account, retrieve the info, decrypt the files and delete the entire message, without it bouncing around the Net and the different servers.

Reply   |   Comment by Hans A.  –  6 years ago  –  Did you find this comment useful? yes | no (+2)
#77

Your EULA requires the user to have read and accepted your privacy policy. It refers the user to your website. I looked and could not find it. It may be there, but it is buried pretty deep???

Reply   |   Comment by John  –  6 years ago  –  Did you find this comment useful? yes | no (0)
#76

An attractive piece of software from a company that has gone out of its way to address any issues and generally offer help to those who need it, most impressive.
Regarding stenography, there is software advertised that claims it can detect image files containing other files with ease,
Probably the most secure form of encryption is using PGP, having said that it is not the most convenient method for the recipient or the sender.
However, it does publish an excellent article on encryption in general, well worth reading if you're concerned regarding the security of your documentation.
The link is-
http://www.pgpi.org/doc/pgpintro/

Reply   |   Comment by XP-Man  –  6 years ago  –  Did you find this comment useful? yes | no (+1)
#75

The only real way to keep data secure is to not put it on a device that can be stolen or can be compromised remotely in any way.

Everything else is a gamble, even strong encryption is a gamble as one never knows what exploit may have been discovered and never leaked.

I've often figured out ways to reverse engineer or work around encrypted protection schemes... the secret is to not let on the mechanisims have been compromised and one can continue to make use of techniques that would otherwise have been countered by the designers.

No direct opinions on this product over similar products as I find much of these things too much hassel and is too easy to forget a rarely used passphrase... got an old BLOCKMASTER safestick I configured up with a decent strength passphrase... and did not use it for a few weeks and when I went to try and use it... I'd forgotten the precise passphrase.
Now it's a shim for a wobbly tables short leg!

And #61, DD: more likely the first stage will be travelling with a device capable of non-approved encryption across state lines to make it a federal offense. State legeslators would have to mandate laws based on static ownership of non-approved encryption in my limited understanding of the roles of state and federal jurisdiction.

Reply   |   Comment by TK  –  6 years ago  –  Did you find this comment useful? yes | no (+1)
#74

Blowfish advanced CS is the only and best file encrypt-er always.

Reply   |   Comment by Jake  –  6 years ago  –  Did you find this comment useful? yes | no (-2)
#73

Downloaded it, installed it, put in the serial, tried it out, all worked fine for me. Seems simple enough. Don't know of any reason I need it at the moment, but right now it makes me feel like a kid again. I used to pass along messages in invisible ink to friends and they had to warm up the paper over a light bulb to see it.... Just emailed a text packet to my daughter with a subject line that said... important that you do this tomorrow...call for password. Ignored the first 5 phone calls from her and then finally answered and gave her the password. The only thing the message said was how about making me some of those cupcakes I like. Haven't heard back from her and don't think I'm getting any cupcakes.

Reply   |   Comment by grd  –  6 years ago  –  Did you find this comment useful? yes | no (+1)
#72

I have used this software since 2001, when it was IronKey. Great software as it does what it says and is extremely user friendly.

Reply   |   Comment by LoPockets  –  6 years ago  –  Did you find this comment useful? yes | no (+1)
#71

Subscription valis until: 01 January 2226

So, I have tot tell my grandson about this.

:)

Reply   |   Comment by atavi_  –  6 years ago  –  Did you find this comment useful? yes | no (-1)
#70

On the rare occasions I need to send documents to other secret agents without the enemy being able to read the contents I use Axcrypt and FlashCrypt. Both are free and use methods which will take GCHQ till the end of time to de-crypt!

Reply   |   Comment by John  –  6 years ago  –  Did you find this comment useful? yes | no (-3)
#69

Not sure what happened here , though it worked out.

I tried to run the portable version -- it asked for an ID I put in the ID from the GOTD txt and it "could not find the correct file. ( I did rename the folder from silverkey to silvekey encryption ??)

So I went and installed the Desktop version. It never asked me for an ID code and the program seems to run - my right click oprions are in place (though I have no tested it). I ran through the settings and there is no place to stick an ID code.

Is it possible that it "found" the ID code that I earlier inserted in the portable version.
The portable version also now runs, no longer requesting info for activation.

Is this all basically normal ... or have I missed a step somewhere. There is no GUI anywhere to check if this is properly/completely activated.

Reply   |   Comment by Frank Glatt  –  6 years ago  –  Did you find this comment useful? yes | no (-1)
#68

#19, #55
Thanks folks. I have no problem with warrants, there is nothing suspicous or outlaw I do. I just want to keep my privacy, far away from
junk who claims they work for gvmnt and state security, in fact, they collect info for mafia outside the gvmnt, they can kill your business, life, privacy just saying 1,2,3. I will propose to GOTD and all folks to make more givaway or make reserch on best freeware to find best software to keep the privacy we need.

Reply   |   Comment by zanardi  –  6 years ago  –  Did you find this comment useful? yes | no (-2)
#67

Is there any way to open/decrypt parcels on non-Windows operating systems?

Reply   |   Comment by eee  –  6 years ago  –  Did you find this comment useful? yes | no (-1)
#66

Giovanni Someone mentioned Hushmail…. Well, this FREE & PORTABLE cross platform email service is in my view a better and more secure alternative to encrypt email messages, files and notes using 2048-bit RSA key and AES 256-bit: Ever tried it before? [link to Valeso]

Er, that would be Valeso, headquartered in... Washington, D.C.
Yeah. Right. Thanks but...

Reply   |   Comment by BenAsp  –  6 years ago  –  Did you find this comment useful? yes | no (+2)
#65

@Andre Stoeff:

Despite the concerns (and some paranoia too here, he he he) I want to say Thank You for this offering. I would give you a thumbs up just because of your presence here today, and your willingness to answer questions and give help for a program you are offering here for free. There are very few vendors here that ever do that, and so kudos to you for that!

In addition, I have used Kryptel for a couple of years now (another great offer you made here or "that other giveaway site...") and I am extremely happy with the quality of that program. I have very little need for this program, but I think it will be handy to have in case I do need it.

So: bottom line is MY THANKS TO YOU for both this great offering and your willingness to be here to answer all these questions!!

Reply   |   Comment by DroidLuvr  –  6 years ago  –  Did you find this comment useful? yes | no (+5)
#64

Keymaster : "60.One quick question. Does this allow the ability to remove the encrypted file once it has been decrypted and uncompressed?"

Yes, it is possible to create such a parcel using Parcel Designer. Take note though that the recipient can make a copy of the file in the period between decryption and deletion. If you want to protect the file from copying, you need a DRM (Digital Rights Management) tool, not an encryption program.

Reply   |   Comment by Andre Stoeff  –  6 years ago  –  Did you find this comment useful? yes | no (+3)
#63

Downloaded and worked fine. Note that in the self-extracting (.exe) version, when you click on the .exe file, you are asked to input the password. After inputting the password, you are asked to select the destination directory.

Reply   |   Comment by Dennis  –  6 years ago  –  Did you find this comment useful? yes | no (+1)
#62

loving thesixties : "49.Upon running setup, I get “error changing registry key” followed by the installation aborting"

The message means that the installer can't access the system registry. This may be caused by an active antimalware program blocking registry access, another possible reason is corrupted registry.

dusterboy : "i was wondering if i could h’ a portable version of this programe already pre-activated"

Sorry, no pre-activation.

Joe : "57.Anvir Task Manager caught this program trying to install SEVEN new startup programs or tasks."

It is certainly not true. Silver Key places ONE program into the autorun list, and there is a good reason to do so. You can find a detailed explanation in our FAQ:
'Why is Kryptel Shredder in the autorun list?'
http://www.kryptel.com/support/faq-general.php#autorun

Reply   |   Comment by Andre Stoeff  –  6 years ago  –  Did you find this comment useful? yes | no (+5)
#61

The way things are going in the U.S., in five years it will be a federal offense for civilians to use any form of encryption on anything, or to even have software such as this on your machine.

Reply   |   Comment by DD  –  6 years ago  –  Did you find this comment useful? yes | no (+13)
#60

One quick question. Does this allow the ability to remove the encrypted file once it has been decrypted and uncompressed? I didnt see that in the comparison charts?

Reply   |   Comment by Keymaster  –  6 years ago  –  Did you find this comment useful? yes | no (-2)
#59

Parcel Designer is an advanced tool, it hardly is the best starting point for a new user. You should use it when you need to create an advanced parcel, for example, a parcel that decrypts a file, opens it, and deletes it after the recipient finishes viewing.

As always, should you or any of your IM Force be caught or killed, the Secretary will disavow any knowledge of your actions. This message will self-destruct in five seconds. Good luck, Jim.

Reply   |   Comment by Stan  –  6 years ago  –  Did you find this comment useful? yes | no (+1)
#58

#19, Hushmail? Seriously? You need to read up on Hushmail. It's no more secure than leaving an open door to your house. Hushmail has stated they will roll-over your encrypted information any time they are handed a warrant. They will cooperate FULLY with the government.
Just like #5 stated: "The government is about the only entity I would want to keep from reading my messages..." I agree.

Reply   |   Comment by Tom Jones  –  6 years ago  –  Did you find this comment useful? yes | no (+6)
#57

Anvir Task Manager caught this program trying to install SEVEN new startup programs or tasks. That's a bit over the top for me for a program I would rarely use. Why would you want all those running in memory all the time? No thanks.

Reply   |   Comment by Joe  –  6 years ago  –  Did you find this comment useful? yes | no (+3)
#56

#31: "I wonder though would the encryption be safe from say government security experts or other security professionals who’s job is to open secured files/"

If it's important enough that you don't want the gov reading or seeing it, best practice is to assume they can. ;) Seriously... I've read the CIA for example operates on the assumption that every network & system is compromised, & that way if it is in fact not secure, it doesn't matter that much.

Personally my opinion has long been that splitting data helps -- if you split a file or password & store the pieces separately, it adds a small speedbump as someone has to 1) find all the pieces needed & 2) figure out how they go together. You might for example take a chunk out of the middle of a encrypted file, post the 1st & last portions online, & send the middle portion email. It's not foolproof if someone is actually targeting you, but I'd think it should work for automated systems sifting through tons of data.

* * *

#38: "If I was to encrypt my files but want to share them with the public how do they know how to open these?"

MakeUseOf did something similar for quite a long time, requiring a password that was always the same. If you want people to know the password or key, just tell them, whether in a separate file, on your web page, alongside the link, via email etc. -- I've seen people do that sort of thing for years & years.

* * *

#41: "If someone is sending me data (even a friend) and I have to run an unknown EXE file to get that data, I’m going to discard it unread. It would be somewhat crazy of me to accept unknown EXE files and run them on my computer. And, assuming that the person who sent me the file didn’t write the original code himself, he can’t really know what that EXE that he sent might really do."

At some point some level of trust has to exist or you can't do much of anything other than living as a hermit. :) Even if the person sending a file wrote it themselves, who's to say they are really or still your friend, or that they didn't send it under some sort of duress? Neither paranoia nor overconfidence have Any limits, so you have to stake out some sort of middle ground.

Reply   |   Comment by mike  –  6 years ago  –  Did you find this comment useful? yes | no (+20)
#55

Someone mentioned Hushmail....

Well, this FREE & PORTABLE cross platform email service is in my view a better and more secure alternative to encrypt email messages, files and notes using 2048-bit RSA key and AES 256-bit:

https://www.valeso.com (==> SOFTPEDIA Editor Pick)

Ever tried it before?

Enjoy!!

Reply   |   Comment by Giovanni (King Of Freebies)  –  6 years ago  –  Did you find this comment useful? yes | no (+11)
#54

congratulations to developer for his direct support here!

Reply   |   Comment by jumbi  –  6 years ago  –  Did you find this comment useful? yes | no (+29)
#53

Whatever your position on the recent NSA leaks, the fact is that we don't know what the US or any gov or organization is doing -- if they monitor the data your PC sends over the Internet, the only way you can keep someone from reading it is by using a VPN [Virtual Private Network] or using encryption. Out of those 2, using encryption is often [usually] the only one you can fully control -- a VPN can be useless if the other end of the VPN is compromised or allows some organization or agency access. Encrypting files is also much cheaper & easier. Of course one downside is that you somehow have to get the key to anyone you send an encrypted file to. And there's also the possibility that some agency or group can break the key or password.

That said, how much & when you worry about that stuff is up to you -- there's no harm done if anyone reads an email that only contains a cookie recipe you found in a magazine. Considering how the NSA admits to an approach of gathering all the data, then sorting it afterward, being one person out of billions means nothing. I would suggest considering encryption though for anything you store online, since many if not all companies providing that sort of storage monitor the stuff they store for you & everyone else -- both people and filters make mistakes, & it would be a drag of something that took a long time to upload was deleted because they goofed or you made a typo.

As far as Silver Key vs. anything else, there are alternative products for almost everything -- choose the one you like to use. Years ago the way an app encrypted a file mattered more than it does today, because now there are standard methods of encryption & a focus on password or key cracking rather than trying to undo the encryption itself. With today's technology the amount of processing needed to crack a password isn't nearly as daunting as it once was. Using the same key, it'll take just as long to crack that key whether the file or files was encrypted with Silver Key or Axcrypt.

VPN [Virtual Private Network]
https://en.wikipedia.org/wiki/Virtual_private_network
-
Packet analyzer
https://en.wikipedia.org/wiki/Packet_analyzer
-
Deep packet inspection
https://en.wikipedia.org/wiki/Deep_packet_inspection
-
New 25 GPU Monster Devours Passwords In Seconds
https://securityledger.com/2012/12/new-25-gpu-monster-devours-passwords-in-seconds/
-
The NSA Is Building the Country’s Biggest Spy Center
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1
-

Reply   |   Comment by mike  –  6 years ago  –  Did you find this comment useful? yes | no (+22)
#52

#33.Thank you,Andre Stoeff for that link, that worked nicely. hmmm instead of mailing the desired document, i could encrypt some important program files as well. Kind of like archiving, with password, but all those archive software don't offer encrypting the files. This is one area where it stands out. Farely nice program, i was wondering if i could h' a portable version of this programe already pre-activated.
Hope i m not sneakily asking too much. :)

Reply   |   Comment by dusterboy  –  6 years ago  –  Did you find this comment useful? yes | no (+1)
#51

There is only one true way to test your encryption software to ensure it's not being intercepted and reviewed. However, that method could win you oneway trip to GITMO till you get a chance to explain and a nice orange jump suit size XXL when a large will do. I hear those bananna rats make nice pets.

Reply   |   Comment by tc1uscg  –  6 years ago  –  Did you find this comment useful? yes | no (-5)
#50

According to government sources, all encrypted software is intercepted and decrypted by NSA.
Sending any encrypted file raises a red flag on you and your intentions. Pass.
I have developed my own tables that the message can be sent not encrypted but coded. Without the right password will take a million years a super computer to find the right message hidden in a jumbled letters and numbers and characters.
Now that is a security.
This is a an example of how the part of the message look likes when received:
"..........jk;ns doiN OIUHOIN geoi jfs9087y034w58h bndxfl h0(*Y HOPDGYBIODUBPW(*098483phnpoi8*&^%&$)&)(*_Puihgdsizn pnzdfn GHHHGOIPjeopsi jpeijrt98w54u6-w............."

If I do not give you the password, guessing will never create the intended message to pop up.
And the message may be hidden inside of a text file with millions of characters.

Reply   |   Comment by Morton  –  6 years ago  –  Did you find this comment useful? yes | no (-9)
#49

Upon running setup, I get "error changing registry key" followed by the installation aborting. I am running 64-bit Windows 7 and have not had this kind of problem with any other program (and I have installed over one hundred of them on this same configuration of this same computer). Windows 7 offers to install using recommended settings (such as XP compatibility mode) but that does not work either. Can anyone help?

Reply   |   Comment by loving thesixties  –  6 years ago  –  Did you find this comment useful? yes | no (+2)
#48

Very good software. It installs easily with no problems and uninstalls clean, too. I've used the free edition for a while and now get to try this standard version. The comparison between the versions is here: http://www.kryptel.com/products/skeditions.php

It has a very "strong encryption using industry-standard AES cipher", you cannot retrieve the file(s) without the password. The file(s) size is unlimited to make an encrypted parcel(zip)/exe file. It has some unique features that other free ones don't have; the "ability to create parcels, hidden in other innocent looking files" and "size obfuscation to hide real size of small parcels". You can't do that with AxCrypt. The default encryption mode is AES 256-bit encryption and has optional Blowfish 576-bit, Serpent 256-bit, Triple DES 168-bit and Twofish 256-bit while AxCrypt is only AES 128-bit. These are a few good reasons to buy this instead of some of the free ones out there and has a lot more options, too. Despite people who brag about free alternatives, sometimes the paid versions offer a bit more, Silver Key Standard is one of them. There a lot more unique features in the Enterprise version, but you need an extra $10 for it, the total price is $39.95, too bad that version was not offered here today :(
It is a nice encryption software with some nice extra features to similar free software, but may need a bit more to entice the average Joe to spend money for it. My only disappointments are that there is no 64-bit version(for the Enterprise version only) and no multi-processor utilization (again, only for the Enterprise version). These two features should at least be in this standard version. I recommend for all to try it out. A good stable software and worth downloading to try out the extra options that most freeware don't have.

If you are looking for a 64-bit encryption software, I recommend Secure Archive: http://www.networkdls.com/Software/View/Secure_Archive/
It is open source and a good archive encryption software, but not as good as Silver Key Standard.
Thank you Inv Softworks LLC & Give Away of the Day!

Reply   |   Comment by RealBull  –  6 years ago  –  Did you find this comment useful? yes | no (+19)
#47

cbeth39: "If I was to encrypt my files but want to share them with the public" - if you want to share, why to encrypt it? It can be either pricate or public, not both at the same time.

cbeth39: "Can someone give me a tutorial on how to use this type of program" - http://www.kryptel.com/articles/sktutorial.php

cbeth39: "If I forget my password, is there a way to recover it" - No, if you forget the password, your files are lost.

Reply   |   Comment by Andre Stoeff  –  6 years ago  –  Did you find this comment useful? yes | no (+27)
#46

Ok I have installed this with little to no problems. My Antivirus program did not like the program and I use a good one, Trendmicro Inet Security. But that beeing said I know alot of programs out there that use Encryption tech are not liked so it installed once I convinced my Virus program to allow it. Things I like about this are its Free and all though Free is not always good, this one is. The program does what it says it can do. Also on there site there is a USB or portable edition of the program. Was able to make a self extarcting parcel out of a program and was able to, using the key, extract it with no problems. I am using Windows 7 64 bit and other than the "threat" created by my antivirus it worked like it should. I give it a 5 out of 10. Why the 5 well the "threat" factor that it created could have been avoided by providing information to the various Anti virus companies.

Reply   |   Comment by Keymaster  –  6 years ago  –  Did you find this comment useful? yes | no (+3)
#45

I downloaded the USB version and tested with no problems. The program works as noted and if you need to send something encripted this will work well. You do need to let the person know what the password is, but if this is already established, it works like a charm. I recommend giving it a try.

Reply   |   Comment by TomB  –  6 years ago  –  Did you find this comment useful? yes | no (+15)
#44

#38: If you're sharing something with the public, what on earth do you need to encrypt it for?

Reply   |   Comment by Werner Maurer  –  6 years ago  –  Did you find this comment useful? yes | no (+4)
#43

Public key encryption should be the backbone of all internet activity. It is free as PGP. Each user has a unique public and private key pair. Everyone knows all public keys. The user encodes data in his private key and your public key. Only your private key and his public key can decode the message. You know exactly from whom you are receiving data, and the sender knows exactly to whom the data is sent. Unfortunately the government hates this total internet security as it would be lights out for the NSA.

Today's software is a possible and simple alternative but the use of encryption is still obvious and therefore open to curiosity. Why not just use steganography to hide the message in the latest picture of your child or your latest vacation. The receiver needs the software package and a password to reveal it. With the right email message nobody would have reason to suspect surreptitious data.

Reply   |   Comment by Richard Reed  –  6 years ago  –  Did you find this comment useful? yes | no (0)
#42

Garpy: "would the encryption be safe from say government security experts".

No one really knows what is safe from the government and what is not. Those who know don't tell. We believe our software is safe, at least we have done everything possible for that. Just keep in mind that there are a lot of other (and often easier) ways to get to your data - theft, blackmail, even torture. Encryption is just the first step to security.

DoktorThomas: ElcomSoft's tools can break old weak ciphers, and help to crack weak passwords. You are safe if you are using strong encryption and 'good' passwords. You might find this article useful:
http://www.kryptel.com/articles/encryption_passwords.php

Reply   |   Comment by Andre Stoeff  –  6 years ago  –  Did you find this comment useful? yes | no (+32)
#41

If someone is sending me data (even a friend) and I have to run an unknown EXE file to get that data, I'm going to discard it unread. It would be somewhat crazy of me to accept unknown EXE files and run them on my computer. And, assuming that the person who sent me the file didn't write the original code himself, he can't really know what that EXE that he sent might really do.

No, I'm not going to be in the position of telling others "just run this program that I sent you and trust that it will not do anything evil". I can't know that and can't reassure others. It is inherently wrong to start telling people that such a behavior is O.K. and safe, in the long run people who run unknown EXEs will be hurt.

The hype that I'm seeing here, such as the post that effectively says: "read our technical specs. See? It clearly says NO BACK DOOR" makes me trust the company even less, not more.

No thanks, I'll go without or stick with Open Sores software that I can compile myself, or roll my own secure OTP software.

Reply   |   Comment by Mark Fordworth  –  6 years ago  –  Did you find this comment useful? yes | no (-13)
#40

I have used the free version of Silverkey off and on for a long time. Twelve or thirteen years ago, I owned the standard edition. I love Silverkey. Since I have the free version installed now, I will update to the standard edition. Thank you GOTD and Invsoftworks!

Reply   |   Comment by Jediknight9999  –  6 years ago  –  Did you find this comment useful? yes | no (+16)
#39

A.E.S. von Rijndael: "You could compare a parcel with a zipfile or a .7z-file and the selfaxecutable parcel with an sfx-exe file."

Those programs had different design priorities, and they are hard to compare directly. In my opinion, Zip is better for archiving and Silver Key is better for sending data, simply because that's what those programs were designed for.

"I happened to see there is a portable USB version aswell but it can not be activated with the data in the readme file."

It must. I have just tried to activate a USB version with GAOTD code, and it works perfectly. Download the USB version from http://www.kryptel.com/download/SilverKeyUSB.4.1.2.zip , don't try to simply copy the desktop version to a flash drive.

Reply   |   Comment by Andre Stoeff  –  6 years ago  –  Did you find this comment useful? yes | no (+39)
#38

OK to all the geniuses out there. I have never used encryption software. If I was to encrypt my files but want to share them with the public how do they know how to open these? I have people emailing me, now, wanting a tutorial to open 7-zip files. LOL. They certainly will be clueless on these. Is there a tool that is sent with it? Can someone give me a tutorial on how to use this type of program. Also If I forget my password, is there a way to recover it?
Thanks for any help.

Reply   |   Comment by cbeth39  –  6 years ago  –  Did you find this comment useful? yes | no (-10)
#37

This is actually very sophisticated and user friendly tool. The developer is responsive to questions and concerns. This is not a fly by night or throw it up on the Internet and walk away developer. Two thumbs up!

Reply   |   Comment by Charlie  –  6 years ago  –  Did you find this comment useful? yes | no (+22)
#36

This software probably works as well as it says, but $30 is a lot to pay for something which freeware programs like Axcrypt and 7Zip do just as well and with more features for free.

Reply   |   Comment by Mark J  –  6 years ago  –  Did you find this comment useful? yes | no (-12)
#35

Well, for starters, I give the author(s) thumbs up for addressing "issues" that posters are putting out there. Not many have the marbles to respond so much. Second, the only TRUE way to ensure security for you and THOSE PEOPLE you want to view your data is simple but expensive. It must be encrypted on the senders end and the destination must use the SAME decryption schema. Some of you may understand how cryptographic systems work and as long as you both hold the same crypto key and your devices are sync'd, no one can read it. However, if you have any John Walker(s) running around your house, well, you’re SOL because they may have "shared" your keys with other people. (Just Google John Anthony Walker). Now, this is apples and oranges when it comes to software encryption and device encryption but in my past experiences with this kind of setup between the sender/receiver, it's costly and out of reach for your average home user. PGP has been around and is still a thorn in the side of those listening ears throughout the country. I rather just encrypt my data on my thumb drives and other data storage devices instead of sending something sensitive over the internet that can be opened just by clicking on the file. If it's THAT special, the data that is, I think I'll just hand deliver it or wait for a GOOD self-destructing message software. Even if it falls into the wrong hands (wink), it will dissolve right before their eyes and then it becomes just hearsay. Just a thought.. OK.. time to paint the deck.

Reply   |   Comment by tc1uscg  –  6 years ago  –  Did you find this comment useful? yes | no (+3)
Add a comment

iPhone app giveaways »

Vxcam - AR Video Text & Emoji Giveaway
Add AR texts , emoji, videos in the environment around you.
$1.99 ➞ free today
Z Room Giveaway
Z Room is a 3D Zombie shooter game, designed to play on your Watch or Phone.
$0.99 ➞ free today
Battery Max - Tips for battery Giveaway
Battery Max is a nice battery health application that provides enhanced battery care for your iPhone/iPod battery.
$0.99 ➞ free today
Daily Stock Flip - Swing Trade Giveaway
Looking for daily stock trade alerts that you can use to flip stocks?
$59.99 ➞ free today
Spaceholes! Giveaway
Spaceholes! is a mashup of various space shooters.
$1.99 ➞ free today

Android app giveaways »

A Quick Festive Quest Giveaway
A Quick Festive Quest is a Christmas-themed game.
$0.99 ➞ free today
Confused Christmas 2 Giveaway
Oh no! It seems that a witch has used magic to mix up all of our presents and decorations.
$0.99 ➞ free today
Rocsy Square - Icon Pack Giveaway
An icon pack with custom visuals and graphics.
$0.99 ➞ free today
Reminder - Pro Giveaway
Reminder app without advertisements.
$1.99 ➞ free today
Buff Knight Advanced - Retro RPG Runner Giveaway
Buff Knight Advanced is a 2D Pixel RPG where a player's character is constantly on the move.
$1.49 ➞ free today