Home Forums SharewareOnSale Deals Discussion Silver Key / Nov 5 2017

  • This topic contains 15 replies, has 2 voices, and was last updated by  Brian Davis 1 year, 4 months ago.
Viewing 15 posts - 1 through 15 (of 16 total)
  • Author
  • #9301873 Reply | Quote


    Have something to say about Silver Key? Say it here!

    Have suggestions, comments, or need help? Post it here! If you know of better software than Silver Key, post it here! If you know of issues with Silver Key, post it here! Share your knowledge with all of us. :-)

    #9303269 Reply | Quote



    #9303709 Reply | Quote


    “No Appropriate Licence Found”! Ater inserted the Customer ID.

    Note. I installed over a previous version of the same program!


    #9304969 Reply | Quote


    [@Mick] Did you use the portable or installer version?

    #9306051 Reply | Quote



    #9306147 Reply | Quote


    Thank you,Ashraf!

    #9307158 Reply | Quote


    customer ID:
    2718-72415-7393: says invalid; tried with both portable & installer versions

    #9308930 Reply | Quote


    On all these encryption programs, the self-extracting .EXE option is an excellent idea BUT a number of email services (Hotmail/Live Mail being a case in point) don’t allow you to email .EXE files. Does anyone know a way around this?

    #9310053 Reply | Quote


    [@Iceman] Yes. When sending the file, just change the extension from “.exe” to, for example, “_exe” or “.ex_” or anything else not flagged as a potentially dangerous executable.

    #9310081 Reply | Quote


    [@jmjsquared] P.S.: Of course, remind your recipient to change the extension back to “.exe” so that the parcel’s self-extracting ‘program’ can run.

    #9312925 Reply | Quote


    Why was this question not answered? I was wondering the same thing.

    Steve Dec 30, 2015 at 9:58 am

    What is the advantage of having software that encrypts an email message but does not require a password or key to unencrypt it at destination? If the email is intercepted – the possibility (or probability) of which is presumably the reason one would use encryption in the first place – what is to prevent the ‘interceptor’ from reading the encrypted content?

    #9315465 Reply | Quote


    [@NowayJose] If you use this (or any other method) to encrypt an email (or any other type of file) for sending via the Internet, then, of course, you have to send the decryption key (or file, or token) to the recipient via a separate email, text or some other method, even a phone call. SilverKey is intended mainly for sending encrypted ‘packages’ of files (parcels) and is not the best solution for sending encrypted emails. If you want to send just encrypted emails, then I suggest you look into getting a “secure-email signing-certificate”. Comodo offers a very good one for free.

    #9325633 Reply | Quote


    [@jmjsquared] So, they intercept the second email (presumably unencrypted, otherwise what would be the point) and you’re back to square one. An exercise in futility.

    #9331504 Reply | Quote


    This is not a review inasmuch as a note of warning. Ask yourself if you would use encryption that had known weaknesses in 1998? Then you won’t be surprised to learn how NOT to implement the so-called FIPS-140 standard.
    One, don’t rely on any piece of software that uses it. Period.
    Two, if you must use it, you need to realize the importance of key seperation. The article indicates that this is utmost: if an attacker has your secret key, they can recover ANYTHING encrypted with said key – past, present and future.
    This has a small positive effect and a massive negative one.
    You may like the idea of an application that help send files ‘securely’, but you need to look at the underlying structure before you trust ANY new software with something important.

    See article:

    #9335103 Reply | Quote


    [@EJS] Works just fine for me, I just tested it.

Viewing 15 posts - 1 through 15 (of 16 total)
Reply To: Silver Key / Nov 5 2017