Program Info |
Eureka
v5.5. The
Eureka Enterprise system uses the finest cryptography with security and other
features for Windows '95, '98, 2000, ME, XP and NT workstations.
We have designed several systems for the various
uses of Eureka,
and we have the correct version for you. Compatible
with Windows '95, '98, 2000, ME, XP and NT, all
Eureka versions
contain both Text and Binary mode encryption,
a Code Book
and Wizards.
The Eureka 5.5 Enterprise
version also
contains Merge encryption, Multiple encryption, Scrambling,
File Insertion & Extractions and
more!
Download Now
|
|
|
Program Screens |
Eureka File Popdown
The Crypt
Wizard walks you through the encryption
process automatically. It's easy! And with the Ultra Wizard you
can define any of them to do in the sequence you want!
Cryptions
Popdown
Most encryption programs can do only one type of
encryption. Now look at the choices available to you with
Eureka.
Plus, you get an added feature with
Eureka -
any encrypted file may encrypted again and again, using
any combination of the encryption methods.
System
Popdown
Here's where the management of the system datasets
are done. You can create as many unique systems as you wish. Then
you can delete, restore or copy those systems as you require.
Security
Popdown
Here's where the various security items are reached. Here
you can Add Users, Delete Users, Sort and View and manage the abilities
that they will have when running the program. You can view and transfer
and/or delete the log file used by the program, and search the log file
for all kinds of activity.
Utilities
Popdown
Here you can securely Delete Files, use the File Insertion and Extraction
techniques, convert Binary and Text encryption to other formats, and use
the Scrambling options as well, increasing your level of data security.
Code
Book
There is no need to manually track a multitude of
unique system parameters; Code Book allows you to
attach each system setup scheme to as many Codenames -
people, organizations, etc. - as you
wish. The Code Book is an integral part of your
Eureka system
files, and is an important tool for your data security.
Main Text
Encryption (The Binary Encryption
(256-character encryption) is almost identical to
this one.)
You can manually set up a configuration or let the
Code Book populate the entries for you.
Multiple Text
Encryption (The Binary Encryption screen
is almost identical to this one.)
You can encrypt an encryption of an encryption and
repeat the procedure over and over using different setups,
ensuring that there is no single decryption scheme that will
decrypt your file. This screen is where you enter the
information needed to encrypt your files.
Merge Encryption (The Binary Decryption screen
is almost identical to this one.)
You can group files together from anywhere on your computer and they
will be encrypted as one file. When Merge Decryption is performed, after the
merged file has been decrypted, the files will be replaced to the hard drive.
Diskette Encryption
(The Binary Decryption screen
is almost identical to this one.)
This will encrypt and decrypt entire subdirectories at once.
|
|
|
|