"View Point": Frequently Asked Questions

  • FAQ

What is this program's purpose?

You have a little secret. This secret is saved as a graphics file (for example, photo).

You do not want: 1. anyone to know your secret; 2. anyone to suspect you have a secret.

How is this task usually solved? Perhaps, you have tried keeping your secret within a password-protected file e.g. .zip, .rar, .arj, etc. This solution has some obvious disadvantages: 1. Anyone who has access to your computer may find the password-protected file. Their morbid curiosity may lead them to attempt opening this file with various software tools, just to see what you are hiding. 2. When you review your secret information, the archiving software may create a temporary file on your hard drive. Archive viewers may create one or more temporary files with your secret information. Very often these files are not removed from your hard drive even when you have closed the viewer. Even if they are removed it is still possible to recover their content with file unerase software. 3. The operating speed decreases when the temporary files are created. 4. Windows remembers the information and which software was used to view the files! 5. Just by having special cryptographic software on your computer makes you suspect for hiding things.

Almost all cryptographic software has some disadvantages.

Our program has none of these disadvantages: To avoid revealing your secret your file is encrypted by the most modern and strong cryptographic algorithms. To avoid any suspicion about your secret your file, it is hidden inside another file. The encoding program is also hidden inside another absolutely neutral (but very useful) program. As a result your computer has neither secret files nor obvious programs for encrypting information or secrets. The secret files are viewed without temporary files being created on your hard drive. Secret files are viewed with the same speed and convenience as are other files of this type and size. Windows only knows about the history of neutral files (containers) being viewed.

How to install and uninstall the program?

There is no special task to install. Just unzip the package and run.

Program does not use saved configuration, so it does not write any INI files nor the registry. To uninstall program, just delete all files and you're done.

What is the difference between the free and the commercial (full) versions?

The Shortcut keys combination for the free version is fixed at "111"; for full version - other The "Password" for the free version is fixed and can not be changed. The encrypting method is more secure for the commercial version. The Skin.

What cryptography methods are used?

Free version - 64-bit DES Full version - 256-bit AES (Rijndael) - the best known algorithm known to date.

How the files are deleted?

Our program allows you to shred your secret files from your computer when you hide them inside another file. Moving the files to the Recycle Bin only creates an illusion of data destruction. Simply writing over the old files also does not destroy the old information reliably. The hard drive writing head positioning inaccuracy does not completely remove magnetic information on each side of track. Data recovery methods could permit recovery of this information.

This program uses a special method of overwriting files with random byte combinations which makes recovery impossible. This technology conforms to the Peter Gutman method, which makes software and hardware file recovery impossible.

How to set the password?

With today's sophisticated password recovery programs, it is recommended that you use rules for creating your password that make password recovery almost impossible. Your password should not be shorter than 6 characters; you should use both upper and lower case letters; you should also include at least one number (0 - 9) and one special character (e.g. !@#$%^&*()_~`). Birthdays, proper names and common words are easily decrypted so if security is important, follow the above rules.

Flag Counter