Posts

Showing posts from November, 2025

Password

Image
-- Privacy is Key -- Password Change [ Home ] [ Password Change ] [ File Menu ] [ Edit Menu ] [ Tools Menu ] [ Help Menu ] [ Home ] [ Next ] Changing Your Password Once you have added yourself as a user, you should use this ID for your daily operations. Before exiting as Administrator, you should change the **Administrator password** to something different than the installation password. To do this, choose the **‘Change Password’ option** from the **tools menu**. The following screen will appear. Enter the current Administrator’s password in the **‘password’ field**. Enter your new password in the **‘New Password’ field** and type the new password again in the **‘Confirm New Pass...

Using

Image
-- Privacy is Key -- Using DataHush [ Home ] [ Overview ] [ Installation ] [ Setup ] [ Getting Started ] [ Using DataHush ] [ Back ] [ Home ] Using the DataHush Program Once you have finished as the administrator, **exit the program and re-start**. The password screen will have changed so that you can select a **UserID for logon**. The system defaults to the last user logged on, which in this case will be **<Admin>**. Change the UserID to your personal UserID, enter your password and click **<Ok>**.. Note that if the **incorrect password is entered too many times**, you will get the following message. The program will then exit and you will have to start it...

Getting Started

Image
-- Privacy is Key -- Getting Started [ Home ] [ Overview ] [ Installation ] [ Setup ] [ Getting Started ] [ Using DataHush ] [ Back ] [ Home ] [ Next ] Getting Started Getting Started Text File When you click the **<Finish> button**, the program will start for the first time. Since this is the first time that the program has been run, a special panel will open up with the contents of the **‘Getting Started’ text file** displayed. This file contains information on using the program for first time users. You can read the file now, if you wish, or press **<Close>** to continue with the program. The Getting Started file can be viewed anytime later ...

Setup

Image
-- Privacy is Key -- Setup [ Home ] [ Overview ] [ Installation ] [ Setup ] [ Getting Started ] [ Using DataHush ] [ Back ] [ Home ] [ Next ] Setup – First Time Running DataHush Once the DataHush program has been installed on your system, you need to set it up for daily operation. Click on the DataHush program icon illustrated above. Installation Password The first time you run DataHush, it will ask for the **installation password**. This is the installation password that was supplied with your program disks (**For the beta test, the password is 'chipster'**). Enter the installation password and click **ok**. Splash Screen ...

Installation

Image
-- Privacy is Key -- Installation [ Home ] [ Overview ] [ Installation ] [ Setup ] [ Getting Started ] [ Using DataHush ] [ Back ] [ Home ] [ Next ] Installation Setup – Installation **Note: Click here to install directly from our site!** Before using DataHush, you need to install it on your system. DataHush is provided with an easy installation routine, similar to other **Windows programs**. Before starting the installation program, it is a good idea to **close out all of your running programs and re-boot your system**. The installation program will be altering some of your system files and may run into problems if other programs are keeping those f...

The DataHush Program

Image
-- Privacy is Key -- DataHush Solution [ Home ] [ Introduction ] [ The Need For Encryption ] [ DataHush Solution ] [ Back ] [ Home ] Solution: The DataHush Program Overview One of the weaknesses of current encryption programs is that they are not readily usable by a wide audience. Many encryption programs exist, but in addition to their other problems, they are difficult to install and use for the average computer user. We have implemented a ‘user-friendly’ program called **‘DataHush’**, which runs under any **Windows or Windows compatible operating system**. **DataHush** allows for simple **cut and paste operations** to encrypt notes for forwarding via e-mail. It also includes menu options allowing the...

The Need For Encryption

Image
-- Privacy is Key -- The Need For Encryption [ Home ] [ Introduction ] [ The Need For Encryption ] [ DataHush Solution ] [ Back ] [ Home ] [ Next ] The Need for Encryption Overview As more of the world depends on electronic storage of information, they become more vulnerable to interception and alteration of that information. Consider for a moment what would happen if all of your banking was done by e-mail and someone could intercept and alter your messages. This is in effect what is happening today with the explosion of e-mail on the internet. Messages on the internet are unprotected When a message is sent across the internet, it travels from your computer to other computers on t...

Introduction

Image
-- Privacy is Key -- Introduction [ Home ] [ Introduction ] [ The Need For Encryption ] [ DataHush Solution ] [ Home ] [ Next ] Introduction Welcome to Cyberspace Whether we like it or not, the age of information is upon us. You are already a citizen of cyberspace unless you were raised by dingos in the outback. Your personal information is in government and industry databases and it passes from hand to hand with whatever level of privacy they choose to give you. If you have acquired our software program, you likely also have information of your own on a computer, and likely are sending e-mail across unprotected networks. We have been working on the DataHush code since 1985, when we saw the need to p...