East-Tec Logo

General

In the General tab you can make settings of general options:

Encryption Settings

  • Create .isc files: Check this box if want east-tec InvisibleSecrets to create encrypted .isc files. The new name of the encrypted file will be oldname(with extension).isc. Example: encrypting Readme.txt will create the file Readme.txt.isc. Creating .isc files is recommended because double-clicking an .isc file in a shell application (like Windows Explorer) will start the decryption process.

  • Encrypt in same filenames: Check this box if you want east-tec InvisibleSecrets to create encrypted files with the same names.

  • Shred original files: Check this box if you want to shred the original files after encryption.

Shredder Settings

  • DoD 5220.22-M: Check this box if you want the shred method to conform to the norms of US Department of Defence DoD 5220.22-M

  • Custom Shred Method: Check this box if you want to define your own shred method. You must also set the number of overwrite steps.

  • Overwrite Steps: (Available only if Custom Shred Method is checked). Each step overwrites the file with a randomly generated pattern. If you want to exceed the DoD recommendation use more than 7 steps. If you select 0 (zero) steps, the files will be only deleted (but this is not recommended).

Shell Integration

Here you can check options regarding the shell integration:

  • Close program after process: Check this box if you want Invisible Secrets to close after a process (encrypt/decrypt/hide/unhide/shred) started from the system context menu.

  • Show Decrypt option only for .isc files: Check this box if you want the Decrypt option to be available from the context menu for every file. This is useful if you want to decrypt files which do not have the .isc extension.

  • Show Unhide option only for installed carriers: Check this box if you want the Unhide option to be available from the context menu for every file. This is useful if you want to hide in files compatible with the installed carriers.

Security

You can set certain security options:

  • Ask for password when east-tec InvisibleSecrets starts: By checking this box you can prevent unauthorized access to east-tec InvisibleSecrets. You must also enter a password in the bottom edit box. If you select this option, each time you start east-tec InvisibleSecrets a dialog box will ask you to enter the password. If it is incorrect the program will not start.

  • Stealth Mode: Check this box if you want to remove east-tec InvisibleSecrets from the Start menu and the submenu from Windows Explorer. You can always make them visible again by unchecking this box.

  • Hide Tray Icon: Check this button if you want the tray icon and menu to be hidden. The tray program will still run in the background, because it remembers the cryptboard and handles the locker's hot-key event.

  • Start Tray & Cryptboard Features at logon: Uncheck this box if you don't want to work with the cryptboard, you do not need the tray menu, and don't want to waste memory resources. This will make the tray program not to start at windows logon.