Encryption in Notes Software?

  • Thread starter Thread starter Howard Schwartz
  • Start date Start date
H

Howard Schwartz

I used treepad lite to store little notes and info. on various subjects.
I realize there are others. Is there a similar program, or an independent
program that can conveniently encrypte some of the notes I put in such
an application.

I store various passwords and user IDs in treepad, and recently realized
I do not want them easily readable, for some hacker trying to break in
to my computer during an internet session.
 
Howard Schwartz said:
I used treepad lite to store little notes and info. on various subjects.
I realize there are others. Is there a similar program, or an independent
program that can conveniently encrypte some of the notes I put in such
an application.

I store various passwords and user IDs in treepad, and recently realized
I do not want them easily readable, for some hacker trying to break in
to my computer during an internet session.
=----

try http://sourceforge.net/projects/keynote/

I use it for just this purpose

CK
 
I used treepad lite to store little notes and info. on various subjects.
I realize there are others. Is there a similar program, or an independent
program that can conveniently encrypte some of the notes I put in such
an application.

I store various passwords and user IDs in treepad, and recently realized
I do not want them easily readable, for some hacker trying to break in
to my computer during an internet session.

What is ICE Encrypt ?

ICE Encrypt is a simple files/folder encrypting program. ICE Encrypt
uses for encryption algorithm of the new generation - ICESafe. This is
symmetric algorithm of encryption outperform all known symmetric block
algorithms (DES, AES, BlowFish, GOST, ...).

1. The size of a key for encryption/decryption always is about 1 million
bits.

2. The size of the block is a true variable. It can has any length like:
64-bit, 72-bit, 80-bit, ..., 128-bit, 1024-bit, 2097152-bit, ... up
to 17179869184-bits.

3. Theoretically is NOT impossible to create faster block algorithm.

4. Brute force attack against ICESafe is not effective. It's difficult
to crack key with size 1 million bits.

5. Easy to implement in hardware.

6. It is possible to make very fast parallel encryption/decryption.

7. Is easy to use ICESafe for making hash or CRC.

8. ICESafe is a very simple and clear algorithm.

ICE Encrypt is always use block size equal to file size. Try to imagine
it with algroithm like AES and try to predict required time for
encrypting what block.

Just try to encrypt file with size 1 MB or more and you can understand
how is fast ICESafe.

Due to block size always equal to file size, do not recommend to encrypt
very large files. Do not recommended to encrypt files larger than 50% of
the free physical memory.

So, the main task for ICE Encrypt is a protecting not very big, but very
important files for you.

http://www.ice-graphics.com/ICEEncrypt/IndexE.html
 
Howard said:
I used treepad lite to store little notes and info. on various subjects.
I realize there are others. Is there a similar program, or an independent
program that can conveniently encrypte some of the notes I put in such
an application.

I store various passwords and user IDs in treepad, and recently realized
I do not want them easily readable, for some hacker trying to break in
to my computer during an internet session.

I've used Cryptext for years but Nick Payne's site seems to have vanished:
http://www.tip.net.au/~njpayne/

You can get it from many locations if you Google it.
 
What is ICE Encrypt ?

ICE Encrypt is a simple files/folder encrypting program. ICE Encrypt
uses for encryption algorithm of the new generation - ICESafe. This is
symmetric algorithm of encryption outperform all known symmetric block
algorithms (DES, AES, BlowFish, GOST, ...).

1. The size of a key for encryption/decryption always is about 1 million
bits.

2. The size of the block is a true variable. It can has any length like:
64-bit, 72-bit, 80-bit, ..., 128-bit, 1024-bit, 2097152-bit, ... up
to 17179869184-bits.

3. Theoretically is NOT impossible to create faster block algorithm.

4. Brute force attack against ICESafe is not effective. It's difficult
to crack key with size 1 million bits.

5. Easy to implement in hardware.

6. It is possible to make very fast parallel encryption/decryption.

7. Is easy to use ICESafe for making hash or CRC.

8. ICESafe is a very simple and clear algorithm.

ICE Encrypt is always use block size equal to file size. Try to imagine
it with algroithm like AES and try to predict required time for
encrypting what block.

Just try to encrypt file with size 1 MB or more and you can understand
how is fast ICESafe.

Due to block size always equal to file size, do not recommend to encrypt
very large files. Do not recommended to encrypt files larger than 50% of
the free physical memory.

So, the main task for ICE Encrypt is a protecting not very big, but very
important files for you.

http://www.ice-graphics.com/ICEEncrypt/IndexE.html

Hey, Mel, not beating up on you but how can ICE make the following
statement:

ICE Encrypt uses for encryption algorithm of the new generation - ICESafe.
This is symmetric algorithm of encryption *outperforms all known symmetric
block algorithms (DES, AES, BlowFish, GOST, ...)*.
 
Hey, Mel, not beating up on you but how can ICE make the following
statement:

ICE Encrypt uses for encryption algorithm of the new generation - ICESafe.
This is symmetric algorithm of encryption *outperforms all known symmetric
block algorithms (DES, AES, BlowFish, GOST, ...)*.

Seems like a good question to pose to ice-graphics.
 
Try Evernote, the best I've seen yet.

This even has browser plugins to make adding clippings from web pages a
snap, plugins are available for IE, Mozilla, and Firefox, and of course
offers encryption.
 
davidogg said:
Try Evernote, the best I've seen yet.

This even has browser plugins to make adding clippings from web pages a
snap, plugins are available for IE, Mozilla, and Firefox, and of course
offers encryption.

EverNote is free *betaware* (for Windows 2000/XP/XP Tablet PC Edition).
EverNote is nearing the official 1.0 release, *which will be commercial* .
It seems to be impressive software, though, (although I am not sure I will
have use for it, personally), so I agree that it deserves mentioning here
(compare last freeware versions, although not exactly the same).

http://www.evernote.com/en/products/evernote/
 
The problem with statements like these are threefold:
(1) "Jesus I know, and Peter I know, but who are you?"
(2) People who proclaim that their algorithm is better, while keeping
it secret and not subjecting it to rigorous peer-review, pretty much
scream to be "rank amateurs." Unless proven otherwise, and "why
bother?"
(3) Omitted entirely from the discussion is the REAL crucial
question: HOW is the KEY being MANAGED?

A chain is only as strong as its WEAKEST link. That "weak link" is not
very likely to be "the encryption algorithm." It's probably going to
be something having to do with the handling of the key. In any
symmetric cipher algorithm the secrecy of the key is paramount; nothing
else really matters. Even passwords are not broken, in real life, by
exhaustively trying every possibility... they're broken by looking for
pieces of paper taped on the underside of keyboards; by trying words in
a dictionary; and so-on.

An intruder is going to buy a copy of the system, set known passwords,
and study the contents of the Registry (in a Windows system). He's
going to reverse-engineer the object code, or use a debugger on a
running copy of the program. In other words, searching for the WEAKEST
link.

If a vendor crows about the "impregnible security" of his new,
unpublished and undisclosed encryption algorithm... not only is that
vendor screaming "I AM AN AMATEUR!", but he's showing that he himself
has not considered the whole problem from all angles. It does no good
to put an impregnible iron door into a wooden wall and forget to lock
it... But that sort of thing happens all the time. :-/
 
The problem with statements like these are threefold:
(1) "Jesus I know, and Peter I know, but who are you?"
(2) People who proclaim that their algorithm is better, while keeping
it secret and not subjecting it to rigorous peer-review, pretty much
scream to be "rank amateurs." Unless proven otherwise, and "why
bother?"
(3) Omitted entirely from the discussion is the REAL crucial
question: HOW is the KEY being MANAGED?

A chain is only as strong as its WEAKEST link. That "weak link" is not
very likely to be "the encryption algorithm." It's probably going to
be something having to do with the handling of the key. In any
symmetric cipher algorithm the secrecy of the key is paramount; nothing
else really matters. Even passwords are not broken, in real life, by
exhaustively trying every possibility... they're broken by looking for
pieces of paper taped on the underside of keyboards; by trying words in
a dictionary; and so-on.

An intruder is going to buy a copy of the system, set known passwords,
and study the contents of the Registry (in a Windows system). He's
going to reverse-engineer the object code, or use a debugger on a
running copy of the program. In other words, searching for the WEAKEST
link.

If a vendor crows about the "impregnible security" of his new,
unpublished and undisclosed encryption algorithm... not only is that
vendor screaming "I AM AN AMATEUR!", but he's showing that he himself
has not considered the whole problem from all angles. It does no good
to put an impregnible iron door into a wooden wall and forget to lock
it... But that sort of thing happens all the time. :-/

Excellent, thank you, as a novice I have learned that all of what you have
said to be true. Cryptography is a tough nut to understand so I have to
rely on clues like you have given above.

I now Axcrypt all emails, TrueCrypt my HDs, use Tor/Privoxy, have an
anonymous email service, I'm getting there, bit by bit.

I am seriously thinking about chin collar high, shirts!
 
Whatabout EFS (Encrypted File System). Standard Windows Feature which
is well-implemented...
 
I used treepad lite to store little notes and info. on various subjects.
I realize there are others. Is there a similar program, or an independent
program that can conveniently encrypte some of the notes I put in such
an application.

I store various passwords and user IDs in treepad, and recently realized
I do not want them easily readable, for some hacker trying to break in
to my computer during an internet session.

ClipCrypt
Just copy and paste from your clipboard. Homepage is defunct but you can
d/l it here:
http://www.tuttogratis.it/download.htm?39376

regards

Dud
 
Duddits said:
ClipCrypt
Just copy and paste from your clipboard. Homepage is defunct but you can
d/l it here:
http://www.tuttogratis.it/download.htm?39376

regards

Dud
--

Other:


ClipCrypt v1.5 - 637 KB
This is an encryption program that will take text data from the
clipboard and encrypt/decrypt it. You can save the contents as a file
or paste it into an application. ClipCrypt can be set to automatically
encrypt/decrypt data on copying to clipboard. You can also open several
types of file and encrypt them.
ClipCrypt was originally conceived as a means of quickly and easily
encrypting email text but it will work with any editor/word processor.
By setting Auto ON and Activated ON, you can encrypt text by selecting,
copying it to clipboard then immediately pasting within the program.
Double clicking the tray icon will switch Auto on & off. Right clicking
the tray icon will open ClipCrypt.
ClipCrypt uses the very secure Blowfish encryption algorithm. The key
can be changed by clicking the Key button. As a security precaution, it
will not be saved on exit. The longer the key the more complex the
encryption! The key can be up to 56 characters long.
Note: homepage is down, let you use direct link!
BRS's Software
(e-mail address removed)
http://chesterway.co.uk/
http://chesterway.co.uk/software/clipcryptinstall.zip
 
Back
Top