Free encryption software.Steganos has released its first freeware Software that is distributed without charge and which may be redistributed without charge by its users. However, ownership is retained by the developer who may change future releases from freeware to a paid product (feeware). See shareware, free software and public domain software. application, LockNote. The software is released under the GNU General Public License A software license from the Free Software Foundation (FSF) that ensures every user receives the essential freedoms that define "free" software, which is free of restrictions (see free software). (GPL See GNU General Public License.
1. GPL - General Purpose Language.
2. GPL - ["A Sample Management Application Program in a Graphical Data-driven Programming language", A.L. Davis et al, Digest of Papers, Compcon Spring 81, Feb 1981, pp. 162-167]. ), so that the open source community can use and build upon Steganos's source code.
Available to download from the Steganos website. LockNote looks like a normal text editor and works in the same way, with the small difference that it can only be opened using the correct password. Data entered into LockNote is automatically encrypted en·crypt
tr.v. en·crypt·ed, en·crypt·ing, en·crypts
1. To put into code or cipher.
2. Computer Science when the application is closed.
LockNote uses the worlds leading international standard encryption algorithm A formula used to turn ordinary data, or "plaintext," into a secret code known as "ciphertext." Each algorithm uses a string of bits known as a "key" to perform the calculations. The larger the key (the more bits), the greater the number of potential patterns can be created, thus making : 256-bit AES. This algorithm has never been cracked.
The program and data are stored in a single file and there is no need to install the software. The 300KB program can be downloaded, run and then used as a text editor. The user provides a password to secure the data. Next time LockNote is opened, the user just needs to enter the chosen password to open the file. This provides access to sensitive notes, passwords, access codes, addresses, telephone numbers, URLs--in short, anything that a normal text file could contain. It is also possible to convert an existing text file into a LockNote.
The user can decide how many LockNotes to use and where they are stored. They can be created in unlimited quantities and can be sent by email.
LockNote can be stored on and run from USB keys (1) An alternate term for a flash memory-based USB drive. See USB drive.
(2) A flash memory-based USB drive that is used to identify and authenticate a user. See authentication token. , so that data can be secure but readily accessible while on the move. Important addresses, customer data and telephone numbers, for example, can be transported in this way.
The data can be accessed by connecting the USB key to a computer, running LockNote and providing the correct password.
LockNote is available to download at: http://locknote.steganos.com