InvisibleSecrets has been aquired by East-Tec. Support & development of the product will continue. Check out the new product page...

hide file encryption software, Hide Files, invisible secrets, hide file, encrypt files, encrypt file, encryptionHide File Encryption Software Hide files Encrypt files

Version 4.7
Windows 7 Compatible

Privacy Protection Pack

Buy The Privacy Protection Pack Now!
$79.95 $49.95

The ultimate security package containing all the latest versions of Invisible Secrets and east-tec Eraser 2014 is finally here, rolled into one internet security & privacy protection pack!

Invisible Secrets 4
Invisible Secrets hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution and a real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer.

east-tec Eraser 2014
east-tec Eraser 2014 protects your data and privacy and removes all evidence of your computer and online activity. Eraser meets and exceeds government and industry standards for the permanent erasure of digital information and removes every trace of sensitive data from your computer: Internet history, Web pages, pictures, unwanted cookies, conversations, confidential documents, e-mails deleted in the past, it cleans records kept by over 200 of the most popular applications, hard disk drives, Cds/DVDs, USB flash drives.

Special Offer for our site Visitors!
The privacy protection pack contains Invisible Secrets and east-tec Eraser 2014!
Available this week, for one low price of $49.95 - SAVE $30 TODAY!

  east-tec Eraser 2014

Protects Your Privacy and Identity

east-tec Eraser 2014 completely destroys information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet, unwanted cookies, chatroom conversations, deleted e-mail messages and files, temporary files, the Windows swap file, the Recycle Bin, etc.

Real Deletion

Normal deletion is not secure: when you delete a file, its contents and information about it remain on disk. east-tec Eraser 2014 makes sure deleted files are really deleted, so that previously deleted files like valuable corporate trade secrets, business plans, personal files, photos or confidential letters will not fall into the wrong hands.

Cleans Your Favorite Browsers

east-tec Eraser 2014 works with all your favorite browsers (Internet Explorer, Mozilla Firefox, Google Chrome, America Online, MSN Explorer, Opera, Safari, Netscape Navigator) and securely deletes all your Internet history, visited web pages and images (Temporary Internet Files or cache), address bar locations, unwanted cookies, and more.

Cleans Your Favorite Programs

east-tec Eraser 2014 cleans Yahoo Messenger, MSN Messenger, AOL Messenger, ICQ, Outlook and Outlook Express, Mozilla Thunderbird, Eudora, Limewire, Morpheus, Kazaa, Windows Media Player, RealPlayer, Winamp, Google Toolbar, Microsoft Office, Norton Antivirus, ZoneAlarm, WinZip, WinRar, Download Accelerator, and many more.

Improves System Performance

east-tec Eraser 2014 speeds up your computer and programs, deletes thousands of unnecessary and temporary files and frees up a lot of valuable disk space.

Permanent Erasing

east-tec Eraser 2014 meets and exceeds government and industry standards for the permanent erasure of digital information, Russian and German security standards, and industry standards like the Bruce Schneier Algorithm or the Peter Gutmann Method.

Automatic Protection

You can set east-tec Eraser 2014 to automatically clean your computer at specified intervals, like when you close your Internet browser, when the computer is not used, at a certain date and time, once a day, or you can set longer cleaning operations to run once a week.

 Entire Drive Wiper

east-tec Eraser 2014 can securely erase entire CD/DVD disks, USB drives or hard disk drives with all files and folders. Use this option if you share, give away or sell disks to other people and you don't want them to see what data you used to have on those disks.

 The Anti-Surprise (Anti-Boss or Panic) Key

Automatically close all open windows and immediately run east-tec Eraser 2014 with preselected options (e.g. erase your Internet traces in stealth mode) with just a combination of keys. Use it in emergency situations to protect your privacy.

Very Easy to Use

east-tec Eraser 2014 has an intuitive interface and wizards that guide you through all the necessary steps required to protect yourself. You can also erase files and folders with one click directly from Windows, or drag and drop them in east-tec Eraser 2014.

 Flexible and Personalized Protection

east-tec Eraser 2014 fully supports your personal privacy needs and allows you to define your own sensitive information, cookies you approve and want to keep, and even your own erase methods.

 Advanced Features for Professional Use

east-tec Eraser 2014 features running in stealth mode completely invisible to the user, preventing specific data from being erased based on filters, granting different permissions to users, password protection, processor usage priority settings, command line parameters to allow advanced automation or running from batch files, etc.

Read more about east-tec Eraser 2014....

   Invisible Secrets 4

File and folder encryption using 8 strong encryption algorithms (AES - Rijndael, Twofish, RC 4, Cast128, GOST, Diamond 2, Sapphire II, Blowfish).

Hides your sensitive data into innocent files, so nobody can find them. Features five innocent carriers for hiding: JPEG, PNG, BMP, HTML and WAV.

Email Encryption
Possibility to create a package with encrypted content and to send it by e-mail.

Password manager - Random password generator
With Invisible Secrets 4 you can store passwords in encrypted password lists and you can also generate real-random passwords.

File Shredder
An integrated Shredder (DoD 5220.22-M compliant) to destroy files and folders beyond recovery.

Application Locker
An Application Locker to password protect any application installed on your computer.

IP-to-IP Password Transfer
Allows the secure transfer of passwords between two computers using an encrypted internet line.

Virtual Keyboard
The virtual keyboard was created in order to prevent any key logger software from stealing your passwords.

A Shell Integrated Cryptboard - use it like a basket for storing file names and make various operations on them in a single step.

Real-time News System
It will allow you to be kept up-to-date with new versions, new products, new features, and special offers, without having to browse our website searching for new information. You will instantly get the news from us.

100% Money Back Guarantee
Get a faster and more secure computer or we will give you back your money - no questions asked, no hassles, guaranteed. We proudly stand behind our products and want you to be fully satisfied with your purchase or you will get a 100% refund.

This week's Special Offer!
Buy The Privacy Protection Pack Now!
$79.95 $49.95

System Requirements:
Windows 8/7/Vista/XP/Server 2008/Server 2003/2000
400 MHZ, 32 MB RAM
10 MB of available hard disk space

Some of Our Clients

Special Offers


Invisible Secrets' appeal lies in its ability to demystify the complicated subject of data security and provide even novice users with a valuable tool for safeguarding their data.

Overall, I consider this one of the best-written programs I've looked at. Very well designed. Very functional. The programmers included enough to make it a viable business program, but still have made it attractive to the individual user. A "MUST" for anyone worried about file and password security.

Software Download

More awards...

Functions & Concepts