SmartBrain Software Laboratories
Let's make things simple
Codename: ENIGMA - phase one

Codename: Enigma - phase one is a software designed to ensure confidentiality for any files by encrypting them.
The application has three algorithms for encrypting files, namely:
It is obvious that the program has the decryption functions corresponding to the three types of encryption.
The application has three algorithms for encrypting files, namely:
- encryption Alpha - modifies alpha-numeric characters and punctuation signs;
- bit encryption - changes all the characters at bit level;
- numerical encryption - converts all characters to their numeric representation using an internal key encryption.
It is obvious that the program has the decryption functions corresponding to the three types of encryption.
If you want to use the software for an unlimited period you should to purchase the registration code below.
Without this code, the software works only 14 days.
Without this code, the software works only 14 days.
Codename: MINERVA - phase one

Codename: Minerva - phase one is a software designed to ensure confidentiality for any files by encrypting them according to a numeric key.
File encryption is performed by two different algorithms. The first algorithm encrypts by replacing original characters with characters obtained by processing the encryption key entered by the user. Encryption key can contain up to 256 numeric characters. The second algorithm is developed after the first, the difference consist that the encrypted file characters are displayed in numeric format, therefore, the resulting file will be about three times larger than the original.
It is obvious that the program has the appropriate decryption functions for the two types of encryption. Type encryption algorithm is automatically recognized by the application (after extension *.MV1 or *.MV2) and decoding is performed under appropriate routine. File decryption occurs regardless of the correctness of the key inserted, but if it does not meet the original, the operation is unpredictable and the resulting file becomes totally unusable.
File encryption is performed by two different algorithms. The first algorithm encrypts by replacing original characters with characters obtained by processing the encryption key entered by the user. Encryption key can contain up to 256 numeric characters. The second algorithm is developed after the first, the difference consist that the encrypted file characters are displayed in numeric format, therefore, the resulting file will be about three times larger than the original.
It is obvious that the program has the appropriate decryption functions for the two types of encryption. Type encryption algorithm is automatically recognized by the application (after extension *.MV1 or *.MV2) and decoding is performed under appropriate routine. File decryption occurs regardless of the correctness of the key inserted, but if it does not meet the original, the operation is unpredictable and the resulting file becomes totally unusable.
If you want to use the software for an unlimited period you should to purchase the registration code below.
Without this code, the software works only 14 days.
Without this code, the software works only 14 days.
Codename: ATHENA - phase one

Codename: Athena - phase one is a software designed to ensure confidentiality for any files by encrypting them according to an alphanumeric key.
File encryption is performed by two different algorithms. The first algorithm encrypts by replacing original characters with characters obtained by processing the encryption key entered by the user. Encryption key can contain up to 256 alphanumeric characters. The second algorithm is developed after the first, the difference consist that the encrypted file characters are displayed in numeric format, therefore, the resulting file will be about three times larger than the original.
It is obvious that the program has the appropriate decryption functions for the two types of encryption. Type encryption algorithm is automatically recognized by the application (after extension *.AT1 or *.AT2) and decoding is performed under appropriate routine. File decryption occurs regardless of the correctness of the key inserted, but if it does not meet the original, the operation is unpredictable and the resulting file becomes totally unusable.
File encryption is performed by two different algorithms. The first algorithm encrypts by replacing original characters with characters obtained by processing the encryption key entered by the user. Encryption key can contain up to 256 alphanumeric characters. The second algorithm is developed after the first, the difference consist that the encrypted file characters are displayed in numeric format, therefore, the resulting file will be about three times larger than the original.
It is obvious that the program has the appropriate decryption functions for the two types of encryption. Type encryption algorithm is automatically recognized by the application (after extension *.AT1 or *.AT2) and decoding is performed under appropriate routine. File decryption occurs regardless of the correctness of the key inserted, but if it does not meet the original, the operation is unpredictable and the resulting file becomes totally unusable.
If you want to use the software for an unlimited period you should to purchase the registration code below.
Without this code, the software works only 14 days.
CHAMELEON - Privacy Keeper 1.0

Chameleon - Privacy Keeper 1.0 is a software designed to ensure confidentiality for files of any type.
To perform the encryption the program includes a number of 129 keys (0-128). Encrypting a file using key 0 does not alter the characters, but the resulting file can not be opened with his original program. Using other encryption keys (1-128) results become totally unreadable files regardless of their original format.
It is obvious that the application also has the corresponding decryption function. Encrypted files are automatically recognized by the algorithm application (after extension *.CPK), decryption will be done according to the appropriate routine. File decryption is performed regardless of the key inserted, but if it does not meet the original, operation is unpredictable, the resulting file is totally unusable.
Decoding a file can not run more than three (3) times. This limitation was designed to increase privacy when decryption is tried without knowing the encryption key.
To provide extra privacy, was introduced a secure delete function, which means that once a file has been deleted, its content recovery becomes impossible even for specialized data recovery programs.
To perform the encryption the program includes a number of 129 keys (0-128). Encrypting a file using key 0 does not alter the characters, but the resulting file can not be opened with his original program. Using other encryption keys (1-128) results become totally unreadable files regardless of their original format.
It is obvious that the application also has the corresponding decryption function. Encrypted files are automatically recognized by the algorithm application (after extension *.CPK), decryption will be done according to the appropriate routine. File decryption is performed regardless of the key inserted, but if it does not meet the original, operation is unpredictable, the resulting file is totally unusable.
Decoding a file can not run more than three (3) times. This limitation was designed to increase privacy when decryption is tried without knowing the encryption key.
To provide extra privacy, was introduced a secure delete function, which means that once a file has been deleted, its content recovery becomes impossible even for specialized data recovery programs.
If you want to use the software for an unlimited period you should to purchase the registration code below.
Without this code, the software works only 14 days.
Without this code, the software works only 14 days.