Zip, encrypt and hide any files in pictures! Make your files invisible.
Insider creates compressed archives and works with these files while the archives themselves are not evident on a user's computer. They are strongly encrypted and hidden inside other files (containers or carrier). The containers are image files which are still viewable in spite of their hidden contents.
Insider has two modes of operation:
open to all users (a WinZip-like tool to make working with compressed archives);
hidden, accessible only to those who know the shortcut key.
The above mentioned features are very important psychologically. When the secrets, their traces or special tools are absent, the computer's owner is above of suspicion. As a result nobody will try to reveal their secrets.
Being inside of this program the user (knowing the valid password) may work with the hidden and encrypted file as simply as with a .zip file.
If the file had been deleted by this program they cannot be restored. Any special software or hardware is powerless to restore them.
This program may be used for information exchange via Internet. Hidden archives may be sent via e-mail or published on web sites e.g. free family pictures sites.
Also you may send the photos (with hidden files) via mobile devices. The files-carrier may be kept within mobile phones or digital cameras where they will look like usual photos.
Zip, encrypt and hide any files in pictures! Make your files invisible.
You have a little secret. This secret is saved as a graphics file (for example, photo).
You do not want:
anyone to know your secret;
anyone to suspect you have a secret.
How is this task usually solved? Perhaps, you have tried keeping your secret within a password-protected file e.g. .zip, .rar, .arj, etc. This solution has some obvious disadvantages:
Anyone who has access to your computer may find the password-protected file. Their morbid curiosity may lead them to attempt opening this file with various software tools, just to see what you are hiding.
When you review your secret information, the archiving software may create a temporary file on your hard drive. Archive viewers may create one or more temporary files with your secret information. Very often these files are not removed from your hard drive even when you have closed the viewer. Even if they are removed it is still possible to recover their content with file unerase software.
The operating speed decreases when the temporary files are created.
Windows remembers the information and which software was used to view the files!
Just by having special cryptographic software on your computer makes you suspect for hiding things.
Almost all cryptographic software has some disadvantages.
Our program has none of these disadvantages:
To avoid revealing your secret your file is encrypted by the most modern and strong cryptographic algorithms.
To avoid any suspicion about your secret your file, it is hidden inside another file. The encoding program is also hidden inside another absolutely neutral (but very useful) program. As a result your computer has neither secret files nor obvious programs for encrypting information or secrets.
The secret files are viewed without temporary files being created on your hard drive.
Secret files are viewed with the same speed and convenience as are other files of this type and size.
Windows only knows about the history of neutral files (containers) being viewed.
What cryptography methods are used?
Free version - 64-bit DES
Full version - 256-bit AES (Rijndael) - the best known algorithm known to date.
How the files are deleted?
Our program allows you to shred your secret files from your computer when you hide them inside another file. Moving the files to the Recycle Bin only creates an illusion of data destruction. Simply writing over the old files also does not destroy the old information reliably. The hard drive writing head positioning inaccuracy does not completely remove magnetic information on each side of track. Data recovery methods could permit recovery of this information.
This program uses a special method of overwriting files with random byte combinations which makes recovery impossible. This technology conforms to the Peter Gutman method, which makes software and hardware file recovery impossible.
What is "View Point"
"ViewPoint" - is a picture viewer for Windows. An image or picture can be a photograph, line drawing, or text document converted (digitized) to a graphic, usually by scanning or from a digital camera. You can acquire/download your images from these devices and save them in a folder.
Scrolling through selected pictures (slides);
Zooming in or out to change the preview size;
Viewing images full size or to fit your window;
Managing viewed pictures (copying, moving or deleting);
Changing the viewing order of the pictures;
Viewing all or selected pictures as a slide show;
Rotating images 90 degrees right or left.
What is "Another ViewPoint"
Everybody has a right to privacy and business secrets. This program allows the user to conceal details (of their private life or business) from unauthorized viewers. If the user needs to conceal confidential pictures (photos, illustrations, scanned documents etc.) from hackers, a boss, fellow-employees, wife, children, parents, etc., they can use various programs for protection. Meanwhile these programs do not allow use of the concealed data as easily and safely, as you can with normally unprotected files.
This program is not available obviously. It is hidden inside another, absolutely usual and neutral program.
Confidential files are not kept as hidden files. They are kept inside carriers - usually pictures. The pictures (carriers) themselves are not distorted. Any program that can be used to view pictures will show the carrier's content only.
The above mentioned features are very important psychologically. When the secrets or their traces are absent, the computer's owner is above of suspicion. As a result nobody will try to reveal their secrets.
When you review confidential information, the program does not leave any traces on your computer (almost all similar programs create, for example, temporary files).
To encrypt data before hiding it uses the latest strong cryptography methods known, e.g. AES (Rijndael).
The size of hidden pictures is not limited.
If you know the right password, the hidden pictures are viewed with the same speed and comfort as usual ones.
The program allows restoring hidden files and clearing the carriers along with their original file names.
If this program had deleted the files they could not be restored. Any special software or hardware is powerless to restore them.
This program may be used for safe information exchange via Internet or mobile communications providers.
"!Janusware Thumbs.db Viewer"
Displays Thumbs.db, Thumbcache_*.db (Vista) and Ehthumbs.db content
Thumbs.db Viewer displays Thumbs.db database records as well as the miniature graphics contained in each (with the original file name and timestamp); collects all the Thumbs.db files in and below the specified folder; searches the Recycle Bin (INFO2 files) for deleted Thumbs.db files; extract and view pictures as an HTML representation; using a heuristic algorithm, the program can search swap and hibernation files for JPG graphic files.
"!Janusware Total Recall"
Our program was written to give the computer user a tool to reconstruct Internet Explorer activity and some of the user's activity on their computer.
Microsoft Internet Explorer stores its Internet activity in index.dat files. These files are binary database files, which are used by Microsoft as the file type for storing several different sets of information. Included among these files are user data, Internet cookies, and Internet history storage. These files are found dispersed throughout the user's profile folders.
Our program automatically defines the location of your index.dat files, but you may select another location.
A lot of different information about the user's activity is stored on your personal computer. Usually the user knows nothing about the existence of this information.
"!Janusware Total Recall" is able to locate a major portion of this data.
Currently, our program finds:
MS Internet Explorer activity;
MS Internet Explorer history;
MS Internet Explorer cookie;
MS Internet Explorer favorites;
Recent files and folders;
Unerased temporary files.
Research results are shown as handy tables. The tables have search options, and a context menu to help you manipulate these files. Tabled data may be sorted. You may export found information in various formats. You can also open the file by the program with which it is associated.
Can the program automatically recall and show the information about user's activity?
Recall data may be completed automatically for the current user. With this end in view click the button (menu item) "Total Recall" and wait when the information will be collected and shown. All the tables for "Internet Explorer" and "Documents" partitions will be filled in one by one.
Can the program collect the information for a definite date?
The program allows collecting data for all tables or for some tables in according to the following set of criteria:
date of the last access (within date range or outside date range);
by field contents, existence of a word, phrase or group of characters or by exception if you want information pertaining to entries that do contain this information.
How I can open the file which is shown inside table?
You may double click the table's row or use a context menu. Right-click anywhere on the table to see the context options for your selection. The file may be opened by the program associated with the file type or you may select the program to open this file, at your option.
Is it possible to view the pictures inside the program?
When you select the image from the table its thumbnail is shown at the bottom right corner and it helps you to preview the pictures using a built-in viewer. Click the thumbnail to view it inside of special viewer window. If the picture contains multiple-frames, the panel will preview thumbnails showing the initial two frames for a multiple-frame TIFF file and nonstop animation for GIF files.
Is it possible to research the index.dat files of different users if I have administrator priviledge?
Yes, just include the full path to the related file manually.
"!Janusware Total Recall" is absolutely free software and there is no commercial version.
What is "Total Recall"
"!Janusware Total Recall" was written to give the computer user tools to reconstruct Internet Explorer activity and some user's activity on the computer.
Almost every computer user is familiar with a Web browser, such as Internet Explorer.
This Web browser holds the history files of the Web Sites (or Uniform Resource Locators - URLs) visited by users of this system. Because browser history files are in binary form, special tools are required to read them.
Internet Explorer caches URLs which were visited by users. When a user visits any Web Site, Internet Explorer checks to see if it has already stored (cached) a local copy of that Web Site on the hard drive first. If a local copy exists, Internet Explorer uses the locally cached file instead of downloading the information from the Internet. Internet Explorer stores cached files in the Temporary Internet Folders on the local hard drive. It also assigns each cached file an alphanumeric name, and maps the new filename to the actual filename in the system file. The system file used to map the cached alphanumeric names to the actual URLs and filenames is the index.dat file. Internet Explorer saves numerous files named "index.dat" within each user's home directory on the computer system. This file maps web sites visited to locally saved cache files in randomly named directories so that the next time the user visits the same web site, he will not have to download the same graphics and web pages all over again.
Now, our program investigates:
MS Internet Explorer activity
MS Internet Explorer history
MS Internet Explorer cookie
MS Internet Explorer favorites
Recent files and folders
Not erased temporary files
"ViewPoint": to avoid any suspicion about your secret your file, it is hidden inside another file. The encoding program is also hidden inside another absolutely neutral (but very useful) program. As a result your computer has neither secret files nor obvious programs for encrypting information or secrets.
"Total Recall": forensic analysis tools to reconstruct Internet Explorer activity and some user's activity on the computer.
program and information hiding,file encryption,encryption software, encrypt files,viewpoint,encryption,security soft,total steganography,AES,secure files,private files,protect privacy,shred,destroy,rijndael,password,total recall,forensic analysis of internet explorer activity files,index.dat,history,cookie,recent files and folders,unerased temporary files