Disclaimer Downloads Email Examples Information Links Products Program Screens  
Eureka Global Eureka 5.5 Email FTP Messenger Steganographer Internet Voice Crypt Word PassPhrase Converter Key/System Send  
Program Info

Eureka v5.5.  The Eureka Enterprise system uses the finest cryptography with security and other features for Windows '95, '98, 2000, ME, XP and NT workstations.   We have designed several systems for the various uses of Eureka, and we have the correct version for you.  Compatible with Windows '95, '98, 2000, ME, XP and NT, all Eureka versions contain both Text and Binary mode encryption, a Code Book and Wizards.

The Eureka 5.5 Enterprise version also contains Merge encryption, Multiple encryption, Scrambling, File Insertion & Extractions and more! 


 

Download Now


Program Screens

Eureka File Popdown

The Crypt Wizard walks you through the encryption process automatically.  It's easy!  And with the Ultra Wizard you can define any of them to do in the sequence you want!
 


 
Cryptions Popdown

Most encryption programs can do only one type of encryption.  Now look at the choices available to you with Eureka. Plus, you get an added feature with Eureka - any encrypted file may encrypted again and again, using any combination of the encryption methods.



System Popdown

Here's where the management of the system datasets are done.  You can create as many unique systems as you wish.  Then you can delete, restore or copy those systems as you require.



Security Popdown

Here's where the various security items are reached.  Here you can Add Users, Delete Users, Sort and View and manage the abilities that they will have when running the program.  You can view and transfer and/or delete the log file used by the program, and search the log file for all kinds of activity.



Utilities Popdown

Here you can securely Delete Files, use the File Insertion and Extraction techniques, convert Binary and Text encryption to other formats, and use the Scrambling options as well, increasing your level of data security.



Code Book

There is no need to manually track a multitude of unique system parameters; Code Book allows you to attach each system setup scheme to as many Codenames - people, organizations, etc. - as you wish.  The Code Book is an integral part of your Eureka system files, and is an important tool for your data security.



Main Text Encryption
(The Binary Encryption (256-character encryption) is almost identical to this one.)

You can manually set up a configuration or let the Code Book populate the entries for you.



Multiple Text Encryption
(The Binary Encryption screen is almost identical to this one.)

You can encrypt an encryption of an encryption and repeat the procedure over and over using different setups, ensuring that there is no single decryption scheme that will decrypt your file.  This screen is where you enter the information needed to encrypt your files.



Merge Encryption
(The Binary Decryption screen is almost identical to this one.)

You can group files together from anywhere on your computer and they will be encrypted as one file.  When Merge Decryption is performed, after the merged file has been decrypted, the files will be replaced to the hard drive.


 
Diskette Encryption
(The Binary Decryption screen is almost identical to this one.)

This will encrypt and decrypt entire subdirectories at once.




Data Security Solutions, Inc.

Privacy Statement

Copyright © 1994 - 2009 Data Security Solutions, Inc. All rights reserved.
All registered marks and trademarks mentioned in this site are the property of their owners.