A closer look at Steganos Privacy Suite
by Zeljka Zorz - Thursday, 30 December 2010.
Steganos Privacy Suite (v.12) is a suite offering most Steganos privacy and encryption products bundled up together: Safe, Portable Safe, Crypt & Hide, Password Manager, Private Favorites, E-Mail Encryption, Trace Destructor and Shredder.

Welcome screen:



A simple click on any of the icons on the left part of the screen will take you to the tool you need.

Since I have previously presented Steganos Safe, Portable Safe and Shredder on this site, I won't be going into details about their functioning - I will just mention new features of the tools (if there are any).

Safe and Personal Safe

The only new feature in the Safe tool is the option of hiding (attaching) a Safe in a video, audio or executable file without affecting its form or function. This way, you can still run those files, but the Safe will have the additional bonus of being hidden in plain sight. Unfortunately, forensic tools can detect its existence, but the Safe can't be open without the right password. Also, you can hide a Safe in one of those files only if it doesn't exceed 3 GB in size.

Crypt & Hide

Used for encrypting and hiding files and folders:



With one click of a mouse, you can add or remove, save, hide or extract files. To save and hide them, you will need to provide a password to restrict access to it and to open it again. Original files must be deleted by hand.

Password Manager

To use it, you must first create a user profile and secure it with a password. Then, you can enter/edit bank account/credit card and general information:





When you close the database, it is automatically encrypted. If you are a Firefox user, the software will automatically add a toolbar on your browser that will help you access and use your data, passwords and Private Favorites.

Private Favorites

As with the Password Manager, you must first create a user profile. This tool helps you manage Internet addresses and make them invisible to third parties that might be using your computer.

E-Mail Encryption

To use this tool, an e-mail program must be associated with it - the association is created in the Default Programs control panel. You can encrypt entire e-mails as components or only part of the text you entered in the apposite field. The sent file is self-decrypting, but you need to provide the password for the recipient to be able to do that.

TraceDestructor

Use it to delete all trace of your computer use: browser, Windows, Windows-Settings and Office traces:





You can also create a "Traceless Drive":



With it, instead of deleting traces you leave on the computer, you won't be leaving any in the first place. For example, just launch the preinstalled Firefox browser on a traceless drive before you surf the web - launching the drive will start the browser. Traceless Drives are created on a RAM disk, so all the data is gone as soon as the disc is closed or the computer is shut down.

Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //