Why do you need east-tec SafeBit?

These are just a few reasons to use east-tec SafeBit:

  1. If you have a spouse, children, or a boss who you don’t want knowing what you were doing on the computer. Why worry about other people using the computer after you. You need computer privacy software before someone else gets your personal information from your computer.
  2. Standard computer privacy software just cleans your traces! east-tec SafeBit is the perfect supplement to computer privacy software by allowing you to install and execute programs inside encrypted vaults, therefore leave all your traces encrypted inside the safe. Encrypted traces will not be visible to anyone.
  3. NO temporary unsecured files anymore! Increase your computer privacy by pointing your software to create temporary files inside the safe. Access to safe is password protected.
  4. east-tec SafeBit is a computer privacy software that features disk encryption techniques and strong encryption algorithms such as 256-bit AES Rijndael.

Is there a setting that hides your program from other users?

Yes. Open east-tec InvisibleSecrets, then click Options. In the Options dialog box, select the “Stealth Mode” check box. Click OK. The program will disappear from the Start Menu, too. To run the program again you must search the main EXE file and execute it (this is usually in the “Program files” folder where you installed east-tec InvisibleSecrets).

What is the difference between Passwords, Access Keys and Activation Keys?

Passwords are used to encrypt or hide files.

If you have many passwords, you can store all of them in a list, open with one “master password”. That master password is called Access Key (to a list of passwords).

Activation Keys are useful only to those that want to develop their own encryption algorithms or new carriers. It’s an internal security system of east-tec InvisibleSecrets.