Thursday, November 24, 2011

KeyScrambler

A safe journey online begins with a single encrypted keystroke

KeyScrambler
Protects your secrets from keyloggers & keylogging malware attacking your computer.

  • The advanced key-encryption method keeps your keystrokes scrambled and indecipherable while they travel from your keyboard to the destination app.
  • The encryption of your keystroke stream is displayed realtime in the unobtrusive user interface so you know how and when KeyScrambler is working.

No user effort + Peace of mind

The Crucial Path in the Operating System
When you try do something online, for example access your checking account on your bank's website, your keystrokes will travel along a path in the operating system to reach the destination application. Many places along this path, malware can be physically or remotely planted by cyber criminals to intercept your keystrokes so they can steal your user name and password, which is why keystroke logging (keylogging) poses such a serious threat and is a thorny problem to solve.

KeyScrambler secures your keystroke data through the crucial path. How does it work?

  1. As you're typing on the keyboard, KeyScrambler is simultaneously encrypting your keystrokes at the keyboard driver level. Because KeyScrambler is located in the kernel, deep in the operating system, it is difficult for keyloggers to bypass the encryption.
  2. As the encrypted keystrokes travel along the crucial path, it doesn't matter if they get logged, or whether the keyloggers are known or brand new, because your keystrokes are completely indecipherable the whole time.
  3. When the encrypted keystrokes finally arrive at the destination app, the decryption component of KeyScrambler goes to work, and you see exactly the keys you've typed.
[howitworks_v.gif]
[howitworks_h.gif]

 

KeyScrambler Features 

Innovative User Interface Provides Transparency.

 

You're typing away on your computer. KeyScrambler's scrambling every of your keystrokes at the same time. And the process is reflected, like in a mirror, in the KeyScrambler's user interface, an unobtrusive green overlay window that appears in one of the corners of your computer screen. This is one of the most appealing innovations of KeyScrambler to our users: it keeps them in control and gives them peace of mind

Smart Engineering Keeps Ahead of the Bad Guys.

By encrypting realtime the user's keyboard entries in the kernel and decrypting them in the destination app, KeyScrambler adds an effective layer of defense to traditional anti-virus, anti-malware programs, whose detect-and-remove method often fails in dealing with new, unknown malware attacks. With its unique preventive approach and innovative use of state-of-the-art cryptography, KeyScrambler protects your keystroke data even on computers infected by keylogging malware, and defeats both known and unknown keyloggers. 



 

 

Read More

Wednesday, November 2, 2011

How to Hide Data in Image, Audio & Video Files: Steganography

Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.

How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:
1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.
<<<<<<<<<<DOWNLOAD HERE>>>>>>>>>>>>

Read More