{"id":243,"date":"2010-05-08T06:08:49","date_gmt":"2010-05-08T06:08:49","guid":{"rendered":"http:\/\/www.gilisoft.com\/blog\/?p=243"},"modified":"2010-08-17T06:03:05","modified_gmt":"2010-08-17T06:03:05","slug":"how-to-encrypt-emails","status":"publish","type":"post","link":"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/","title":{"rendered":"How to Encrypt Emails?"},"content":{"rendered":"<p>We provide two ways to help you to encrypt your emails:<\/p>\n<p><strong>1: Use GiliSoft Private Disk to encrypt emails:<\/strong><\/p>\n<p><a href=\"http:\/\/gilisoft.com\/product-private-disk.htm\">GiliSoft Private Disk <\/a>is a file encryption software that does not only secure your data on your computer, but also offers another exceptional and valuable feature of sending your encrypted files and folders through emails, CDs\/DVDs and other portable devices like USB drive, thumb drive and memory cards. This feature of GiliSoft Private Disk\u00a0 enables you to backup, move, email and transfer your password protected files and folders anywhere you want.<\/p>\n<p>You can encrypt folders and files and send it easily through Email in the same way as you send any other file. All you need to do is simply attach the encrypted data to the email.<\/p>\n<p>\u2022 First, log in to your email service.<\/p>\n<p>\u2022 Open your email and go to the attach files option.<\/p>\n<p>\u2022 To attach encrypted files and folders, click browse and select the Private Disk (*.gpd) containing your encrypted data that you wish to send.<\/p>\n<p>All your files and folders inside Private Disk (*.gpd) will remain protected. You can access them by downloading the attached file on any computer and open it with GiliSoft Private Disk by providing correct password.<\/p>\n<p>These Private Disks(*.gpd) can be uploaded in web-based interface or you can even send them through messenger&#8217;s file transfer. GiliSoft Private Disk assures full portability of your encrypted folders. You can also keep a backup of these Private Disks(*.gpd) in your email, MySpace or even on your own web server. GiliSoft Private Disk with its 256-bit AES on-the-fly encryption standard makes it impossible to decrypt these files without the correct password; so you can feel safe keeping an online backup as well.<\/p>\n<p>Kindly note that GiliSoft.com for the sake of your security recommends not to send the password of the emailed Private Disks(*.gpd) via same email, it is rather safe to give your password through phone or by another means.<\/p>\n<p><strong>2: Use GiliSoft File Lock Pro to encrypt emails:<\/strong><\/p>\n<p>You can use a password to encrypt the data into a encrypted container (*.gfl) or you can use a password to packet a folder to a\u00a0 encrypted container (*.exe).<\/p>\n<p>Then send the container to reciever and tell us the password of it.They can access them by downloading the attached file on any computer and open it with <a href=\"http:\/\/gilisoft.com\/product-file-lock.htm\" target=\"_blank\"><strong>GiliSoft File Lock Pro<\/strong><\/a> by providing correct password. If the attached file is a\u00a0 encrypted container (*.exe),they can open it without GiliSoft File Lock Pro.<\/p>\n<div id=\"_mcePaste\" style=\"overflow: hidden; position: absolute; left: -10000px; top: 484px; width: 1px; height: 1px;\">a\u00a0 encrypted container (*.exe).<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We provide two ways to help you to encrypt your emails.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-243","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Encrypt Emails? - Gilisoft<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Encrypt Emails? - Gilisoft\" \/>\n<meta property=\"og:description\" content=\"We provide two ways to help you to encrypt your emails.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"Gilisoft\" \/>\n<meta property=\"article:published_time\" content=\"2010-05-08T06:08:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2010-08-17T06:03:05+00:00\" \/>\n<meta name=\"author\" content=\"Tom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/\",\"url\":\"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/\",\"name\":\"How to Encrypt Emails? - Gilisoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.gilisoft.com\/resources\/#website\"},\"datePublished\":\"2010-05-08T06:08:49+00:00\",\"dateModified\":\"2010-08-17T06:03:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.gilisoft.com\/resources\/#\/schema\/person\/3ad725640a6ecadf94dedaaf14a3fcce\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gilisoft.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Encrypt Emails?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gilisoft.com\/resources\/#website\",\"url\":\"https:\/\/www.gilisoft.com\/resources\/\",\"name\":\"Gilisoft\",\"description\":\"https:\/\/www.gilisoft.com\/resources\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gilisoft.com\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.gilisoft.com\/resources\/#\/schema\/person\/3ad725640a6ecadf94dedaaf14a3fcce\",\"name\":\"Tom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gilisoft.com\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3c14a77f24745e8e4a5720062c96917f901aaab33c8d86b8ba97bf59985faf6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3c14a77f24745e8e4a5720062c96917f901aaab33c8d86b8ba97bf59985faf6e?s=96&d=mm&r=g\",\"caption\":\"Tom\"},\"url\":\"https:\/\/www.gilisoft.com\/resources\/author\/talker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Encrypt Emails? - Gilisoft","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/","og_locale":"en_US","og_type":"article","og_title":"How to Encrypt Emails? - Gilisoft","og_description":"We provide two ways to help you to encrypt your emails.","og_url":"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/","og_site_name":"Gilisoft","article_published_time":"2010-05-08T06:08:49+00:00","article_modified_time":"2010-08-17T06:03:05+00:00","author":"Tom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/","url":"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/","name":"How to Encrypt Emails? - Gilisoft","isPartOf":{"@id":"https:\/\/www.gilisoft.com\/resources\/#website"},"datePublished":"2010-05-08T06:08:49+00:00","dateModified":"2010-08-17T06:03:05+00:00","author":{"@id":"https:\/\/www.gilisoft.com\/resources\/#\/schema\/person\/3ad725640a6ecadf94dedaaf14a3fcce"},"breadcrumb":{"@id":"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.gilisoft.com\/resources\/how-to-encrypt-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gilisoft.com\/resources\/"},{"@type":"ListItem","position":2,"name":"How to Encrypt Emails?"}]},{"@type":"WebSite","@id":"https:\/\/www.gilisoft.com\/resources\/#website","url":"https:\/\/www.gilisoft.com\/resources\/","name":"Gilisoft","description":"https:\/\/www.gilisoft.com\/resources","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gilisoft.com\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gilisoft.com\/resources\/#\/schema\/person\/3ad725640a6ecadf94dedaaf14a3fcce","name":"Tom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gilisoft.com\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3c14a77f24745e8e4a5720062c96917f901aaab33c8d86b8ba97bf59985faf6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3c14a77f24745e8e4a5720062c96917f901aaab33c8d86b8ba97bf59985faf6e?s=96&d=mm&r=g","caption":"Tom"},"url":"https:\/\/www.gilisoft.com\/resources\/author\/talker\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/posts\/243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/comments?post=243"}],"version-history":[{"count":4,"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/posts\/243\/revisions"}],"predecessor-version":[{"id":423,"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/posts\/243\/revisions\/423"}],"wp:attachment":[{"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/media?parent=243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/categories?post=243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gilisoft.com\/resources\/wp-json\/wp\/v2\/tags?post=243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}