InvisibleSecrets Quick Start

east-tec InvisibleSecrets has an attractive wizard driven interface. It will guide you step by step through any process.

Click the Next button to advance one step.

Click the Back button to jump back one step.

The Finish button completes a process.

The Exit Button quits the program.

The filename edit boxes contain in the left a browse button. Click it to browse the local computer (or local network) and select one or more files from the list.

All files list boxes support drag-and-drop operations. You can add files by dragging them from other applications and dropping them on the list box.

east-tec InvisibleSecrets it’s also shell integrated (when you right-click an item in Windows Explorer you will see a sub-menu with all the available features).

Main window of east-tec InvisibleSecrets When you start the program the main menu will open. On the main page the security features are displayed in sections: hide/unhide files, encrypt/decrypt files, create self decrypting packages, shred files, destroy internet traces, IP to IP secure password transfer, lock applications, passwords manager.

east-tec InvisibleSecrets also has a tray menu available. Right – click this icon and then select the function you want to use:

Open east-tec InvisibleSecrets – opens the main page of the program described above.

Show Cryptboard – displays the cryptboard.

Cryptboard – is a submenu with several actions made on the files from the cryptboard. You can choose to: hide, encrypt, decrypt, create a self decrypting package, to shred the files from the Cryptboard. You can also choose to clear the cryptboard (remove all the files from the list).

Run Locked Applications – opens a window where you can choose an application from the currently locked applications and run it.

Shutdown – shuts down the main program (east-tec InvisibleSecrets) and the tray program. When you start east-tec InvisibleSecrets, the Tray automatically starts to run. It will be available until you shut it down.


With east-tec InvisibleSecrets you can solve most of your security problems. Below some of the most important functions you might want to use.

Hide Files

Hide Files function allows you to encrypt and hide files in another file, that on the surface appears totally innocent – called carrier file.
  • Open east-tec InvisibleSecrets and locate and Click Hide Files link
  • or

  • right-click a file in any shell application (like Windows Explorer) and choose Hide from east-tec InvisibleSecrets Section.

read more on the subject

Encrypt Files

Encrypt Files function helps you to encrypt any file you want on your computer.
  • Open east-tec InvisibleSecrets and locate and Click Encrypt Files link
  • or

  • right-click a file in any shell application and choose Encrypt… from east-tec InvisibleSecrets Section.

read more on the subject

Mail Encryption

Do you want to send to your business partner encrypted documents but you still want to keep decryption as easy as possible? Create Self Decrypting Packages! You can encrypt several files in a package that you can send by email. The receiver of the encrypted package will be able to decrypt it using the correct password.

  • Open east-tec InvisibleSecrets and then locate and click Self Decrypting Packages.

read more on the subject

Shred Files

When you delete any file from your computer it is not permanently removed, it can be recovered. To delete files beyond recovery you must use the Shred Files function.
  • Open east-tec InvisibleSecrets and locate and click Shred Files link
  • or

  • right-click a file in any shell application and choose Shred… from east-tec InvisibleSecrets Section.

read more on the subject

Destroy Internet Traces

While surfing the Internet the browser leaves traces on your computer. Now you can remove these traces from your computer using Destroy Internet Traces.
  • Open east-tec InvisibleSecrets and then locate and Click Destroy Internet Traces.

read more on the subject

Make an IP to IP Secure Password Transfer

In security everything is related to passwords and keys. Once two parties agree on a password they can initiate a secure communication and send encrypted emails or documents. The only problem is to communicate to the recipient the correct key, without the danger that a hacker might intercept the password during the transfer. This feature allows you to exchange a password between two computers using an encrypted internet line.

  • Open east-tec InvisibleSecrets and then locate and Click IP to IP Secure Password Transfer.

read more on the subject

Lock Applications

Do you want to password protect certain applications to be used only by you? Do you want them not to be visible in the Start Menu, but still have quick access to them? The Application Locker can help you keep encrypted programs on your computer, and quickly run them with the correct password. Applications will be automatically re-encrypted after you close them.
  • Open east-tec InvisibleSecrets and then locate and click Lock Applications.

read more on the subject