InfoLock homepage

Ben Hershey

Download InfoLock 6.2

Watch a Video Demonstration
View User's Manual

Welcome to the InfoLock project!
The goal of InfoLock software is to provide ultra secure encryption of sensitive information and documents. It is designed to encrypt documents only, not media type files. While InfoLock is very easy to use, there are a few things you need to know before you use it. See link above for a user's manual (don't worry, there's a very brief summary for the impatient).

Latest Version:
The latest version of InfoLock is v6.2 which is now available for download.

Screenshots:

Screenshot thumbnail
File Menu
Screenshot thumbnail
Encrypt Window


Key Features:
--Very secure unique algorithm, supports 1 gigabyte encryption†!
--Ultra lightweight: Less than 300 kilobytes after install!
--Very simple to use!
--InfoLock is 100% Free and always will be!

WARNING about sensitive data!
While InfoLock-encrypted data is extremely secure, your computer may not be. Deleting files from your computer does NOT remove them! To actually erase files, you need file purging software. Also, when using EKC encryption, keep in mind that if someone were to compromise the security of your computer and access your encrypted files, they may also have access to your EKC files. While InfoLock is a great choice for encrypting files before sending them to the Internet or other devices, it does not remove the original source files.

Want to know what's going on with your data?
Read about our unique algorithm

What platform does it run on?
Version 6.2 has been tested on Windows 7 (more tests pending). Previous versions have been tested on Windows XP and Windows 7.

What's so special about the InfoLock algorithm?
The software uses a unique algorithm that combines a passphrase and an optimized passkey to produce a very long, unintelligible master key with which to encrypt information. When using EKC encryption, the master key is roughly 1.5 gigabytes in length. Because EKC uses two keys, each of variable length, it is difficult to establish an exact strength rating of the algorithm. Thus, we label it as 1 gigabyte encryption, for the purpose of comparing EKC to other fixed-length algorithms.

Contact Ben Hershey Software Solutions
Please feel more than free to contact us with any questions, comments, suggestions, or complaints. Source code for our software is also available upon request. Use the following email address,
bhsoftsolutions@gmail.com
If you are writing to report a problem, ask questions, or offer suggestions regarding a particular software, please include in your message the software version number as well as the operating system you are using.


MongoDB Logo MongoDB