pictuENIGMAtnnnnnnnnnnnnn nnernen nnnnnnnnnENIGMAportant question: who has access to your computer? Please don't be nnnnnnnnnnnnaive, High Security File Encryption Utility

Image......... Download

............Enigma is an file encryption program. That means you can input a secret password, only known by you, and Enigma will encrypt all selected files with that password. After the encryption nobody has access to the original data if (s)he doesn't know the right password. If you want to restore your original files you only have to type in the same password and Enigma will do the rest.
v So far, so good. But why do I need such a program, you might ask. Well, we're living in a world where informations becomes more and more important. And today's informations are mostly stored on computer systems. Ask your self: which data on my computer's hard drive is private? Or confidential? There might be some love letters you want nobody to read them. Or, much more important, sensitive buisness data, documents containing informations about your financial status, your next step against the competition and so on. Or just those pictures with the sexy stuff you got from the Internet. Now the second important question: who has access to your computer?
Please don't be naive, the answer is: nearly everybody.
vEverybody can turn on your computer and get any information that is stored on it.In a network people might have access to your computer because all users have the same rights. If you have a protected account the system administrator is still the last instance and is able to watch everything you read or write in the network. Not to talk about the real bad guys: crackers breaking into computer systems to steal important data. The list of those possible and really frightening situations is very long and if you've got enough fantasy and/or technical background you'll find even more of them.The solution for all these problems is encryption. If you encrypt a file containing sensitive informations with a proved algorithm and a password complex and long enough to resist a brute force attack (that means to try out all possible passwords) your private data will be safe. Crackers might be able to copy the encrypted files but they are absolutely worthless without the right password to decrypt them.

............................................................Design by....

...............................