Codename: ENIGMA - phase one

Codename: Enigma - phase one is a software designed to ensure confidentiality for any files by encrypting them.

The application has three algorithms for encrypting files, namely:
  • encryption Alpha - modifies alpha-numeric characters and punctuation signs;
  • bit encryption - changes all the characters at bit level;
  • numerical encryption - converts all characters to their numeric representation using an internal key encryption.

It is obvious that the program has the decryption functions corresponding to the three types of encryption.
If you want to use the software for an unlimited period you should to purchase the registration code below.
Without this code, the software works only 14 days.

Codename: MINERVA - phase one

Codename: Minerva - phase one is a software designed to ensure confidentiality for any files by encrypting them according to a numeric key.

File encryption is performed by two different algorithms. The first algorithm encrypts by replacing original characters with characters obtained by processing the encryption key entered by the user. Encryption key can contain up to 256 numeric characters. The second algorithm is developed after the first, the difference consist that the encrypted file characters are displayed in numeric format, therefore, the resulting file will be about three times larger than the original.

It is obvious that the program has the appropriate decryption functions for the two types of encryption. Type encryption algorithm is automatically recognized by the application (after extension *.MV1 or *.MV2) and decoding is performed under appropriate routine. File decryption occurs regardless of the correctness of the key inserted, but if it does not meet the  original, the operation is unpredictable and the resulting file becomes totally unusable.
If you want to use the software for an unlimited period you should to purchase the registration code below.
Without this code, the software works only 14 days.

Codename: ATHENA - phase one

Codename: Athena - phase one is a software designed to ensure confidentiality for any files by encrypting them according to an alphanumeric key.

File encryption is performed by two different algorithms. The first algorithm encrypts by replacing original characters with characters obtained by processing the encryption key entered by the user. Encryption key can contain up to 256 alphanumeric characters. The second algorithm is developed after the first, the difference consist that the encrypted file characters are displayed in numeric format, therefore, the resulting file will be about three times larger than the original.

It is obvious that the program has the appropriate decryption functions for the two types of encryption. Type encryption algorithm is automatically recognized by the application (after extension *.AT1 or *.AT2) and decoding is performed under appropriate routine. File decryption occurs regardless of the correctness of the key inserted, but if it does not meet the  original, the operation is unpredictable and the resulting file becomes totally unusable.
If you want to use the software for an unlimited period you should to purchase the registration code below.
Without this code, the software works only 14 days.

CHAMELEON - Privacy Keeper 1.0

Chameleon - Privacy Keeper 1.0 is a software designed to ensure confidentiality for files of any type.

To perform the encryption the program includes a number of 129 keys (0-128). Encrypting a file using key 0 does not alter the characters, but the resulting file can not be opened with his original  program. Using other encryption keys (1-128) results become totally unreadable files regardless of their original format.

It is obvious that the application also has the corresponding decryption function. Encrypted files are automatically recognized by the algorithm application (after extension *.CPK), decryption will be done according to the appropriate routine. File decryption is performed regardless of the key inserted, but if it does not meet the original, operation is unpredictable, the resulting file is totally unusable.

Decoding a file can not run more than three (3) times. This limitation was designed to increase privacy when decryption is tried without knowing the encryption key.

To provide extra privacy, was introduced a secure delete function, which means that once a file has been deleted, its content recovery becomes impossible even for specialized data recovery programs.
If you want to use the software for an unlimited period you should to purchase the registration code below.
Without this code, the software works only 14 days.

Very important
Please read carefully

Since this software is a shareware version, it will work only for 14 days. Before the deadline you should to purchase the registration code if you want to use the software for an unlimited period.

Downloading of the installation package is free of charge. You will receive a copy of this software in a zip file. All you need to do is to unzip the file to the desired location on your hard drive and then run the file UNPACK.EXE and follow the instructions.

Immediately after the PayPal payment you will get to download a file containing the registration code for the software that you have downloaded earlier for evaluation.

Save the recived file on disk, and then complete the registration form of the software with the received code.