
Unless you have the password, there's no way to decrypt an encrypted document. The resulting intelligence served the Allied forces well.Ĭryptographic algorithms used today have a certain connection to the old Enigma Machine, but of course they're totally code-based, with no steampunk buttons or wheels. However, not only did the Allied forces crack the code, they managed to keep that fact from the enemy, so the Nazi generals kept sharing their strategies using the faulty encryption system. With its rows of buttons and actuator wheels, the device looked quite impressive. The Nazi government used a device called the Enigma Machine to encrypt sensitive military communications before and during World War II. Note, though, that in the four years since my original review the product only went from 7.6 to 7.7. When the next version comes out, you can either pay an update fee or just keep using the current version.

You also get free access to all updates until the next major point update. You don't have to buy right away you can run the program 25 times before it demands payment. Folder Lock does all three things, and more, balancing ease of use with a wide range of features.Īs with most competing products, your $39.95 purchase entitles you to use Folder Lock (the version I tested) indefinitely. Most encryption utilities stick to just one of these functions. Still others maintain encrypted storage in the cloud. Others create secure storage locations that act like standard drives or folders but can be locked, encrypting all of their contents.

Some encryption utilities turn files and folders into encoded versions of themselves. You can take precautions to secure your own most sensitive files and folders by encrypting them.


Best Hosted Endpoint Protection and Security Softwareīy now it should be clear that encryption isn't just for security geeks and IT administrators.
