home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
DP Tool Club 17
/
CD_ASCQ_17_101194.iso
/
vrac
/
dci101sw.zip
/
DCI.DOC
next >
Wrap
Text File
|
1994-07-13
|
19KB
|
458 lines
D/Crypt-It
Version 1.01 Documentation
Copyright (C) 1994, DataTek Computer Services.
All Rights Reserved.
Member
┌───────┐
┌────┴──┐ │ (R)
──┤ │ ├───────────────────
│ ┌────┴──┐ │ Association of
│ │ ├─┘ Shareware
└──┤ O │ Professionals
─────┤ │ ├─────────────────────
└───┴───┘
--- Shareware Concept:
Shareware distribution gives users a chance to try software before buying it.
If you try a Shareware program and continue using it, you are expected to
register. Individual programs differ on details -- some request registration
while others require it, some specify a maximum trial period. With
registration, you get anything from the simple right to continue using the
software to a myriad of benefits.
Copyright laws apply to both Shareware and commercial software, and the
copyright holder retains all rights, with a few specific exceptions as stated
below. Shareware authors are accomplished programmers, just like commercial
authors, and the programs are of comparable quality. (In both cases, there
are good programs and bad ones!) The main difference is in the method of
distribution. The author specifically grants the right to copy and distribute
the software, either to all and sundry or to a specific group. For example,
some authors require written permission before a commercial disk vendor may
copy their Shareware.
Shareware is a distribution method, not a type of software. You should find
software that suits your needs and pocketbook, whether it's commercial or
Shareware. The Shareware system makes fitting your needs easier, because you
can try before you buy. And because the overhead is low, prices are low also.
Shareware has the ultimate money-back guarantee -- if you don't use the
product, you don't pay for it.
--- Disclaimer / Agreement
Users of D/Crypt-It must accept this disclaimer of warranty:
D/Crypt-It is supplied as is. The author disclaims all warranties,
expressed or implied, including, without limitation, the warranties of
merchantability and of fitness for any purpose. The author assumes no
liability for damages, direct or consequential, which may result from the
use of D/Crypt-It.
D/Crypt-It is a "shareware program" and is provided at no charge to the
user for evaluation. Feel free to share it with your friends, but please do
not give it away altered or as part of another system. The essence of
"user-supported" software is to provide personal computer users with quality
software without high prices, and yet to provide incentive for programmers to
continue to develop new products. If you find this program useful and find
that you are using D/Crypt-It and continue to use it after a 30 day
trial period, you must make a registration payment to DataTek Computer
Services.
Commercial users of D/Crypt-It must register and pay for their copies of
D/Crypt-It within 30 days of first use or their license is withdrawn.
Site-License arrangements may be made by contacting DataTek Computer Services.
Anyone distributing D/Crypt-It for any kind of remuneration must first
contact DataTek Computer Services at the address below for authorization.
This authorization will be automatically granted to distributors recognized
by the (ASP) as adhering to its guidelines for shareware distributors, and
such distributors may begin offering D/Crypt-It immediately. However
DataTek must still be advised so that the distributor can be kept up-to-date
with the latest version of D/Crypt-It.
You are encouraged to pass a copy of D/Crypt-It along to your friends for
evaluation. Please encourage them to register their copy if they find that
they can use it. All registered users will receive a copy of the latest
version of D/Crypt-It along with other benefits described below.
--- ASP Ombudsman Statement:
"This program is produced by DataTek Computer Services, a member of the
Association of Shareware Professionals (ASP). ASP wants to make sure that
the shareware principle works for you. If you are unable to resolve a
shareware-related problem with an ASP member by contacting the member
directly, ASP may be able to help. The ASP Ombudsman can help you resolve a
dispute or problem with an ASP member, but does not provide technical support
for members' products. Please write to the ASP Ombudsman at 545 Grover
Road, Muskegon, MI 49442 or send a CompuServe message via CompuServe Mail to
ASP Ombudsman 70007,3536."
--- Cautions:
YOU MUST REMEMBER YOUR PASSWORD. IF YOU FORGET IT, THERE IS NO WAY THAT EVEN
WE CAN HELP YOU RETRIEVE AN ENCRYPTED FILE.
IF A REBOOT OR POWER FAILURE OCCURS DURING PROCESSING, THERE IS A HIGH
PROBABILITY THAT THE FILE WILL BE IRREPARABLY DAMAGED AND WILL MOST LIKELY
BE LOST.
THIS PROGRAM ENCRYPTS AN EXISTING FILE, IT DOES NOT ENCRYPT A COPY NOR DOES
IT CREATE A TEMPORARY FILE. COPIES OR TEMPORARY FILES CAN BE UNDELETED AND
THEREFORE THIS APPROACH WOULD COMPROMISE THE ENTIRE SECURITY ISSUE THAT THIS
PROGRAM IS MEANT TO ADDRESS.
IF YOU WISH TO GUARD AGAINST A POWER FAILURE OR REBOOT FILE DESTRUCTION, MAKE
A COPY OF YOUR FILE BEFORE RUNNING D/CRYPT-IT AND USE A UTILITY PROGRAM THAT
CAN COMPLETELY REMOVE ALL REFERENCES TO THE COPY AFTER D/CRYPT-IT HAS RUN.
THIS PROGRAM CAN BE A GREAT ASSET IN KEEPING FILES FROM PRYING EYES BUT WE
HAVE NO WAY TO HELP YOU RESTORE A DAMAGED FILE. USERS MUST USE THIS PROGRAM
RESPONSIBLY.
--- Installation:
To install D/Crypt-It (DCI), simply create a sub-directory and
decompress the distribution file to this sub-directory. For the purpose
of example we will assume that the user is copying the D/Crypt-It.ZIP
(DCIXXXXX.ZIP) file from drive A to drive C. You will have to substitute
whatever drive you intend to use.
Change to drive C type C: [press Enter]
make sure you're in
the root directory type CD\ [press Enter]
create the sub-directory type MD DCI [press Enter]
change to this new
sub-directory type CD DCI [press Enter]
copy the compressed file
to the sub-directory type COPY A:\DCIXXXXX.ZIP C: [press Enter]
de-compress the file type PKUNZIP DCIXXXXXX.ZIP [press Enter]
delete the .ZIP file type DEL DCIXXXXX.ZIP [press Enter]
That's it!
--- Overview:
D/Crypt-It is a utility for quickly and easily Encrypting and Decrypting
user files. D/Crypt-It actually encrypts files more than once. DCI encrypts
the file once using the user supplied password and the other encryption(s)
use password(s) hardcoded into the program.
--- Starting The Program:
Start the program by typing 'DCI' at the DOS prompt.
The following screen will appear. In the registered version your name and
serial number will appear and the question "Would you like to print the
order form?" will not appear.
Press 'Y' to print the order form and 'N' to skip the order form and enter
the program.
╔════════════════════════════════════════════════════════════════════════════╗
║ ╔════════════════════════════════════════════════════════════════════════╗ ║
║ ║ ╔════════════════════════════════════════════════════════════════════╗ ║ ║
║ ║ ║ D / C R Y P T - I T ║ ║ ║
║ ║ ║ ║ ║ ║
║ ║ ║ Version 1.01 ║ ║ ║
║ ║ ║ ║ ║ ║
║ ║ ║ Copyright (C) 1994, DataTek Computer Services ║ ║ ║
║ ║ ║ ║ ║ ║
║ ║ ║ Registered to: UNREGISTERED ║ ║ ║
║ ║ ║ Serial Number: UNREGISTERED ║ ║ ║
║ ║ ║ ║ ║ ║
║ ║ ║ Would you like to print the order form? ║ ║ ║
║ ║ ║ ║ ║ ║
║ ║ ║ ║ ║ ║
║ ║ ║ DataTek Computer Services ║ ║ ║
║ ║ ║ 547 Wunder Street ║ ║ ║
║ ║ ║ Reading, PA 19602-2005 ║ ║ ║
║ ║ ║ ║ ║ ║
║ ║ ║ Phone/FAX: (610) 375-6010 ║ ║ ║
║ ║ ║ 2400-19200 USR Courier HST ║ ║ ║
║ ║ ╚════════════════════════════════════════════════════════════════════╝ ║ ║
║ ╚════════════════════════════════════════════════════════════════════════╝ ║
╚════════════════════════════════════════════════════════════════════════════╝
--- Operation:
D/Crypt-It asks for very little information from the user.
Encrypt/Decrypt - Do you wish to encrypt (scramble) a file or decrypt
(unscramble) a file previously encrypted.
File Path/Name - The name of the file with or without a drive and path
designation. This is the file that will be encrypted or
decrypted.
Password - Enter your password in the first password field and re-enter the
same password in the second field to confirm. Your password will
NOT appear in either field. The program will not allow you proceed
if the two passwords do not match. CAPITALIZATION COUNTS!
You may abort the Encryption and Decryption procedures by pressing 'ESC' at
ANY field. However, once the processing begins, you cannot abort the
procedure. A power loss or reboot while processing will damage the file,
probably beyond repair. SEE CAUTIONS ABOVE.
--- Testing:
We've tested D/Crypt-It by encrypting and decrypting all type of files
including .TXT, .DOC, .EXE, .COM, .DLL, .LIB, .DTA, .HLP using file sizes
ranging from 24,000 bytes to 4,200,783 bytes. Obviously the larger files took
longer than the shorter files, but all files got converted and restored with
no problems at all. We've used passwords from 3 to 10 characters using all
the ASCII characters again with no problems.
--- Enryption Information:
You can encrypt a file more than once. If you do, you must decrypt the file
in reverse order. For example:
if you encrypt a file twice using these password:
Encryption #1: Password: JUDGE
Encryption #2: Password: KEYBOARD
then you must decrypt the file twice using the same password in this
sequence:
Decryption #1: Password: KEYBOARD
Decryption #2: Password: JUDGE
There are a few points to consider that will maximize the security provided
by D/Crypt-It.
1. Use a long password
2. Don't select a password that could be easily guessed.
3. Double encrypt the file.
Using a long password will minimize that chance of creating a recognizable
repeating pattern.
If you use a password such as your last name or birthday, you will make it
that much easier for someone to guess. Of course, don't go overboard with
something like 'J@GE#SVEY34KJFDE!OSNBDN", or you'll never remember it
yourself. MCI Mail uses a clever system of nonsense letters that are also
easy to pronounce, such as "YAXAKUPA" or "ZIGUMINI"
Here's a little table we saw via E-mail to help you determine your password
vulnerability.
Password "Hacking" Time
╔════════╤═══════════════╤═══════════════╤════════════════╗
║ │ 26 Characters │ 96 Characters │ 256 Characters ║
║ Length │ (a-z) │ (a-z,A-Z,etc) │ (All ASCII) ║
╠════════╪═══════════════╪═══════════════╪════════════════╣
║ 3 │ 2 seconds │ 1 minute │ 27 minutes ║
╟────────┼───────────────┼───────────────┼────────────────╢
║ 4 │ 1 minute │ 2.35 hours │ 4 days ║
╟────────┼───────────────┼───────────────┼────────────────╢
║ 5 │ 19 minutes │ 9 days │ 3 years ║
╟────────┼───────────────┼───────────────┼────────────────╢
║ 6 │ 8.6 hours │ 2 years │ 891 years ║
╟────────┼───────────────┼───────────────┼────────────────╢
║ 7 │ 9 days │ 238 years │2,283 centuries ║
╟────────┼───────────────┼───────────────┼────────────────╢
║ 8 │ 241 days │ 228 cent. │584,546 cent. ║
╟────────┼───────────────┼───────────────┼────────────────╢
║ 9 │ 17 years │ 21,945 cent. │149,643,989 c. ║
╟────────┼───────────────┼───────────────┼────────────────╢
║ 10 │ 447 years │ 1,106,744 c. │38,308,861,211 c║
╙────────┴───────────────┴───────────────┴────────────────╜
--- Error Codes:
Error Description/Solution
25 Device Fault - Disk write error. Physical problem exists with
the drive. Contact your service representative.
53 File Not Found - A file that D/Crypt-It needs can't be
found.
57 Device I/O Error - An error has occurred between your computer and
your hard drive. Contact your service representative.
58 File/Path already exists - The path already exists on the drive
you are trying to install to. Choose another drive.
61 Disk is full - The drive you are working on is full. Choose another
drive.
71 Disk not ready - Your floppy drive latch is not closed. Close the
latch.
72 Disk media error - The floppy disk or hard drive has a media
error. Contact your service representative.
75 Access denied - Your floppy diskette or hard drive is write
protected. Remove the write protection feature.
76 Path not found - The program is looking for a path on the hard
drive and cannot find it.
77 Invalid drive spec - The destination drive specified does not
exist.
Call DataTek Technical Support at 610-375-6010 if you are presented with any
other error codes or need help correcting a problem or have any questions
about D/Crypt-It.
--- History:
07/16/94
Documentation Changes
02/15/94
Initial Release
--- Support:
DataTek Computer Services is a small company that I run part-time from my
home. Like many people I have a regular job that keeps my family fed. I am
usually available every night between 6:00 pm and 11:00 pm Eastern time and
from 8:00 am to 11:00 pm on weekends. Occasionally I go out for an evening or
go on vacation, but my answering machine is ALWAYS on and I will return your
call assuming you leave a number and the best time to call you.
I will be just as happy to help Shareware users as I am to help registered
users, however, assuming there is a list of users for me to call, registered
users will be moved to the top of it. Fair is fair. As far as I'm concerned
support is perpetual.
You can contact DataTek in any of the following ways:
Phone: (610) 375-6010 or (610) 374-3735 during the hours listed above or
leave a message at other times.
Mail: Kirk A. Wentzel America Online: Leave E-Mail to user 'KirkAW'
DataTek Computer Services InterNet: Send message to 'KirkAW@aol.com
547 Wunder Street GEnie: Leave message to K.Wentzel
Reading, PA 19602-2005 CompuServe: 74473,2551
--- Benefits of Registration:
By registering D/Crypt-It you will receive the following:
1. The latest version of D/Crypt-It.
2. A certificate worth a 20% discount on one upgrade or 1 other DCS Software
program.
3. Our quarterly newsletter to advise registered users of tips, tricks, new
programs and new versions.
4. The header screen on DCI will stop asking if you want to print the
'Order Form' and the ending screen will just go bye-bye.
5. A laser printed manual.
6. The undying gratitude of our programmers who strive to bring you quality,
useful software at a reasonable cost.
--- Customization:
If you like, we would be happy to give you a quote on customizing D/Crypt-It.
While DCI is a good all-around tool, there may be some companies or
individuals who would prefer to have fields added, deleted, changed, etc.
DATATEK REGISTRATION FORM DCI 1.01
PROGRAM: # COPIES # DESIRED AMOUNT
D/Crypt-It ($19 per copy) 1 TO 5 _________ $________
" " ($17 per copy) 6 TO 10 _________ $________
" " ($15 per copy) 11 TO 25 _________ $________
" " ($13 per copy) 26 TO 50 _________ $________
" " ($11 per copy) 51 TO 99 _________ $________
100 or more call us, we'll sharpen the pencil! _________ $________
- DISK** - $2 per Disk Handling Fee (add if a disk is requested $________
A single handling fee is charged regardless of the
number of copies registered.)
Specify disk: 360K, 1.2M, 720K, 1.4M: __________
-SALES TAX- Pennsylvania residents add 6.00% $________
(Philadelphia residents add 7.00%)
(Allegheny County PA residents add 7.00%)
TOTAL . . . . . . . . . . . . . . . . . . . . $________
PAYMENT BY:
Check/Money Order No.___________________ enclosed for $__________
MasterCard ___ VISA ___ American Express ___ Optima ___
Card # _________________________ Expiration Date: _____________
Signature _______________________________
Personal Checks: Allow 10 business days for check to clear.
Purchase Orders: Accepted with prior credit approval.
Credit Card Orders: Charge will appear on your bill from Dragon BBS.
MAILING ADDRESS:
Name:____________________________________________________________
Address:_________________________________________________________
City/State/Province:_____________________________________________
Country/Postal Code:_____________________________________________
Telephone (Voice/FAX/Modem):_____________________________________
** Disks are available at the time of registration only. Disks
are shipped U.S. Mail First Class in the United States and Airmail
to foreign countries.
Registered Users will be notified by mail whenever upgrades are
available.