While it is well known that letters can be intercepted and phone lines can be tapped, it is not so well known that even e-mails can be easily read. In fact it is commonly believed that the login password provides privacy and security. This is not actually so! Any employee of the Internet Service Provider (ISP) that you you use, can tap into your e-mail at your end or that of the recipient with the use of fairly basic equipment. Tapping can also be done by anyone who links up to the dozens of Internet routers through which your message passes. The mail can even be accessed by someone at the phone company's office or a hacker who taps in through them. There are also a number of more sophisticated methods and a wide range of equipment by which all electronic communication can be intercepted. These are used primarily by government agencies, but can also be employed by business rivals and competitors. Such agencies can also use specially designed software that can automatically search all e-mails and faxes passing through a particular phone network for keywords, or analyze phone calls digitally. So even if you are using unlisted numbers, or public call offices and cyber cafes, your communication can be traced and intercepted by picking up commonly used terms or phrases.
File Encryption Software Features
Strong and proven encryption algorithms to protect your confidential documents
To secure sensitive data AEP PRO file encryption software uses 20 proven and strong encryption algorithms. AES, Blowfish, Twofish, GOST, Serpent and others.
Easy to use for novices. Integration with Windows context menu.
Encryption technology is a difficult thing, especially if you are not technical savvy. How is an older family member supposed to figure out how to create self-decrypting file, securely delete file, use Public Key Infrastructure to receive mails securely?
This file encryption software made easy for novices. It integrates nicely with Windows Explorer, allowing you to use Explorer's context menus for file encryption/decryption/secure deletion directly from well known Windows Explorer.
AEP file encryption software can encrypt single file, multiple files at once or even whole windows folder(s).
Using USB sticks to store encryption / decryption keys
It is possible to store all your encryption passwords on USB Flash Drive. You just need to remember single Master Password for the password vault on this USB memory stick. No need to keep 20 passwords in mind when you can store these encryption keys on flash memory in an encrypted form and remember just one password.
It might sound simplistic, but strong passwords are a must for good security. And good password is combination of several words that aren't themselves a word interspersed with special characters (e.g., !4scOrE&sDayNYeaRs_ag0).
What is the real difference between weak password and stong randomly generated password?
AEP file encryption software can generate really strong encryption key (the real example is "(+3!';0.;4{M>tMpRnK7&*u'F7)SYu2Q"). And ability to remember such strong passwords (with the help of usb memory stick of course) is the key to use modern encryption algorithms 100% effectively.
See Screenshots: How to use AEP to keep encryption & decryption keys on USB memory stick
Securely delete source files after encryption. Never delete confidential files using Windows Explorer!
It is a common misconception of PC users that once they have dropped a file into the recycle bin and emptied it that that is it, the file is gone for good.
All that happens when you erase a file by either deleting it or putting it into the trash, is that Windows has been told not to recognize the file so you do not see it when you open a folder or your desktop. In fact, it is not erased at all, the data is still there on your hard drive and it will remain there until the information is over written by some other file or data.
We know what we say, we have developed special software to recover accidentally deleted files and we know all about file systems used in Windows Vista and XP.
AEP file encryption software can wipe the contents of the original pre-encrypted file beyond recovery to make sure that not even a trace remains after shredding. AEP PRO matching and exceeding the specifications of the U.S. Department of Defense to stop software and hardware recovery tools.
AEP supports about 20 ways to securely delete file: Peter Gutmann algorithm, U.S. DoD 5200.28, VSITR, German Standard, Bruce Schneier algorithm, NATO Data Destruction Standard, GOST P50739-95 Russian Standard, The National Computer Security Center Standard, Canadian Standard, NAVSO P-5239-26, US Navy Standard, AFSSI-5020, US Air-Force Standard, AR380-19, US Army Standard and simple Quick Wipe algorithm.
Symmetric and asymmetric encryption (support for PKI)
AEP PRO file encryption software supports symmetric and asymmetric encryption.
In first mode (symmetric) you just use the same password and for encryption and for decryption using one of ~20 available symmetric encryption algorithms (AES, Blowfish, Serpent and etc).
In second mode (asymmetric) you create (using AEP PRO) a pair of keys: the public key and the private key. You publish the public key file on web site (or send it to any person via e-mail). This key is used to encrypt file and send it back to you. Once encrypted, the file cannot be decrypted using this public key file. You receive file and use the private key file - i.e. your secret key file to decrypt document.
AEP PRO includes the PKI keys manager and the key generator tool. It generates pair of public/private keys with strength: 512, 768, 1024 or 2048 bit.
RSA encryption is used with strong symmetric encryption algorithms together. Public key is used to encrypt randomly generated password. And this password is used to encrypt whole file.
AEP PRO can protect private key file by password. So, you can store your decryption keys in an open form on USB sticks, windows folders, etc. It can be stolen but cannot be used.
See Screeshots: Public-Key cryptography in Advanced Encryptino Package Pro
Bonus! Command line utility to automate file encryption and decryption tasks
In a program folder you will find a separate command line utility (aepcmd.exe). It supports all program operations: encryption and decryption with password, PKI encryption and decryption, secure file deletion, generation of PKI keys. This utility understands file masks, can process windows folders recursively, can fetch file/folder list from text file or can be set in command line.
This command line utility can easily be integrated with your batch script because this console utility returns status codes on every operation (errorlevel, that can be analyzed in your script). All command line keys and switches and status codes are fully documented in the help file.
AEPCMD can be configured to securely delete file(s) after encryption and you can use it to encrypt all new files in folder and its subfolders on a schedule basis (the encryption console utility will recognize and skip already encrypted files).
Easily share confidential documents / safely transfer data via internet. No need to have AEP on other side.
Once encrypted, the document/file can safely be uploaded to your web site, sent as attachement in email, sent on compact disc via postal mail and etc. Your email/compact disc with important documents can be intercepted by third side. But nobody can read these documents without password and there is absolutely no way to break this password.
When you burn encrypted files to compact disc, just burn our free decryption utlity Crypt4Free to this CD also. Your recipient can use this utility to decrypt files on your compact disc. This utility can also be downloaded from our web site abolutely for free by everyone.
Alternatively, you can create self-decrypting versions of your encrypted files. Self-decrypting file is just usual executable file with encrypted file inside. The recipient of this secure document just lanches this executable file and see the text field to enter decryption password and "decrypt" button. So, the recipient of your files has no need to purchase AEP program to decrypt your files.
Additionally, in situation when both the sender and the recipient have AEP PRO file encryption software, they can use Public Key Infrastructure to exchange files. You just generate public/private key pair and send public key to your recipient. The recipient uses your public key file to encrypt confidential file and sends it back to you in an encrypted form. You decrypt it using another key - private key file. So, in this situation you never need to tell decryption password via phone to your friends/collegues and it cannot be heard/recorded by third side.
Additionally, AEP PRO compresses file before encryption to reduce its size significally.
Scrambling text messages
AEP includes special utility: Clipboard Encryptor. Its icon is located in the tray notification area and it monitors Windows Clipboard.
By pressing special global hot key, text in clipboard can be scrambled and then you can paste it in yor email message.
AEP prevents the use of 'weak' passwords and enhances total security
AEP file encryption software controls entered encryption password is different ways. On one side it has special password quality indicator. It becomes red for weak passwords (short passwords, passwords consisting of characters only or digits only and etc). On other side, AEP maintains internal dictionay or 45,000 common english words and recognizes these words in password and warns you when you use weak dictionary password to prevent well known dictionary attack.
more-->home sitehttp://www.aeppro.com
System Requirements
IBM or compatible Pentium/AMD processor (900 MHz or greater), 512 MB RAM or greater. 1024 x 768, 16-bit display (32-bit recommended)
Windows 2000 SP (Service Pack) 4+
Windows XP SP2+ x32 and x64 Editions
Windows Vista all SP x32 and x64 Editions
Windows 7 x32 and x64 Editions
Language Languages: deutsch, english, finnish, japanese, russian, slovak, spanish, swedish