Skip to main content

idoo File Encryption Pro Giveaway

idoo File Encryption Pro is a powerful and easy to use file encryption software designed to help you easily lock and hide files on your computer in order to prevent unwanted access. idoo File Encryption uses 256-bit AES encryption to encrypt your files located either on the hard disk drive or any portable media such as USB drives. Using this software you can quickly hide files, folders or entire drives on your system, prevent reading of files as well as make files read-only where the file can be opened but cannot edited. idoo File Encryption can also monitor any number of folders for changes.

idoo-file-encryption

When you install the program you are prompted to choose a password. This password is needed to open the program and access it’s various tools. This is also the same password that is used to lock or unlock your files. When encrypting files, however, you are allowed to choose different passwords.

Locking and hiding files all occur from within the program window. You can also access these options from the context menu in explorer. Once a file is locked, attempting to open it displays a message such as this.

idoo-file-encryption2

Files that are denied write ability are can be opened but cannot be edited. Attempting to edit such a file throws another error message.

idoo-file-encryption3

From the messages it looks as if the file is corrupted or in use by another process. You might get a different message, but the point is – you aren’t asked for a password which can alert users to the fact that the file is purposefully locked or disabled. This will keep curious people away from further probing your computer.

idoo File Encryption Features

  • Hide Data: Hide your private files folders drives, to make them completely invisible to users programs.
  • Deny Read: The locked files/folders/drives cannot be opened, read, modified, moved, deleted, copied or renamed.
  • Deny Write: Files are made read-only denying any kind of editing.
  • Encrypt Data: It can encrypt files and folders of any type.
  • Portable Encryption: Packs and encrypts a folder into an executable (.exe file) with AES encryption.
  • Safe Delete: No one can recover deleted data from your disk if you secure delete it.
  • Password Protected: There's no way to run or un-install it if you don’t know the password.
  • Monitor Folder: Track any folder for changes made to it
  • Stealth Mode: Hide the program itself from start menu or disable shell extension.
  • Self Protect: Send email notification if more than 5 wrong passwords are entered and optionally disable account for 10 minutes.

Giveaway

We have 10 licenses of this software each worth $59.95 to giveaway. Those who are interested in entering the sweepstake may leave their name and email ID in the form below. Winners will be selected by a random draw. The contest closes on 27 December, 2011.

Comments

Post a Comment

Popular posts from this blog

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

69 alternatives to the default Facebook profile picture

If you have changed the default Facebook profile picture and uploaded your own, it’s fine. But if not, then why not replace that boring picture of the guy with a wisp of hair sticking out of his head with something different and funny?

How to remove watermark from an image or picture

A watermark is any recognizable text, logo or pattern that appears over an image to identify the owner of the image and generally used to prevent unauthorized reuse of the image. Watermarks are usually transparent and can be difficult to remove. The difficulty or ease of removal depends on the content of the image and the position, color, size etc of the watermark.