PC World - Safe Calculator is a neat little utility that pretends to be the basic Window calculator when you launch it. In actuality, it's a safe that can take a single file and encrypt it, disappearing it into the application itself. This tiny, free utility would be useful on the go or when sharing a public computer, when you need to write something down and then hide it.
It's a good thing that it's a simple program, because you may have trouble getting any help using it. We found the feedback form at the app's native Web site, www.krilome.com, frequently unresponsive. For that matter, the site in its entirety went up and down during our testing period.
As for Safe Calculator itself, it's easy as pie. It doesn't even require installation. All you do is enter the password at any time and click MS, and "safe mode" appears, changing all the calculator buttons to ones that would be useful for an app like this. Then, click on + to store and = to confirm. After that, you can execute the file, bring it back from hiding, or delete it.
It's difficult to figure out why developer Krilome decided to make the utility look like the Windows calculator when not in use, since when you're in "safe mode," the buttons change anyway and it doesn't look anything like a calculator. Why not make a safe app that looks like a safe, instead? Do you really need that extra level of subterfuge?
At any rate, the fact that it doesn't install means that it can run from anywhere, even an external hard drive...so if you've got one file with important information that is for your eyes only, you can make it vanish with Safe Calculator.
Note: In our reviewer's experience, the Safe Calculator Web site at www.krilome.com is down frequently. The vendor assures us this is an unusual occurrence. PC World does not control the vendor site.
- Top 12 Laptop Bags for Mobile Pros
- Think Deleted Text Messages Are Gone Forever? Think Again
- 7 New Faces of the C-suite
- 5 Ways CIOs Can Rationalize Application Portfolios
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Architecting the Network of the Future Networks need to change, as does the way IT thinks about and manages them. In addition to reliability, IT must now add higher...
- BlackBeard Case Study In this case study, learn how a business with 95% of revenues generated online was hit by DDoS attacks over a 6-month period,...
- Four Ways DNS Can Accelerate Business Growth This e-book describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced traffic...
- Five Reasons to Think Again about UC There's a lot of noise out there about Unified Communications. Here are five good questions to ask yourself and your prospective UC vendor.
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Network Security White Papers |