home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Your Choice 3
/
Your Choice Software Collection 3.iso
/
dos
/
stealth5
/
whats.new
< prev
Wrap
Text File
|
1994-04-24
|
7KB
|
162 lines
╓────────────────────────────────────────────────────────────────╖
║ ║
║ ██▀▀▀▀ ║
║ ██▄▄▄▄ ▀▀██▀▀ ██▀▀▀ ██▀▀█ ██ ▀▀██▀▀ ██ █ ║
║ ═ ══ ══≡≡ ══≡≡═ ══ ══ ══≡≡═ ║
║ ▄▄▄▄▄█ ██ ██▄▄▄ ██ █ ██▄▄ ██ ██ █ ║
║ 5.1 (c) 1995 David Smith All rights reserved ║
║ ║
║ -= A complete code re-write =- ║
║ -= OFFICIAL RELEASE =- ║
║ ║
╙────────────────────────────────────────────────────────────────╜
Stealth 5.0 had some problems with lost clusters with DOS versions
6.0 and 6.2. If you have a previous version 5.0, please delete
it and replace it with this fix. I had many reports of Stealth 5.0
causing hard disk problems because its incompatibility with DOS 6.2
PLEASE REPLACE ALL STEALTH 5.0 VERSIONS WITH 5.1 !
IMPORTANT: Due to the recent hacking of Stealth, and the spreading
around of illegally registered copies (it wasn't that
hard to hack, guys), ALL REGISTERED USERS MUST WRITE ME
A NOTE TO GET AN UPDATED REGISTERED VERSION.
If you are a registered user, mail a note to:
David Smith
1104 Mason Drive
Hurst TX 76053
and I will send you a new copy of the current version. Your old
registration keys will NOT work with this and future versions.
Hackers should note that I have included some antidebugging techniques
and complicated algorithms within several parts of the program.
Good luck and enjoyment trying to plow your way through the interrupt
and randomized internal mess!
Stealth 5.1 adds a WHOLE LOT of new stuff that makes it more convenient,
and gives it an easier interface:
1) You can now specify a different CONFIG file on the command
line! That means you can have 35 or 100 different config
files, all of which are designed to fit your different needs.
This eliminates the need to change your entire STEALTH.CFG
everytime you have just a minor feature you want altered.
It's quicker, easier, and allows FULL customization.
2) Added /GETCOM for 'capturing' the comment from a .ZIP or .ARJ archive,
and placing in a file for later viewing or editing.
3) Stealth can create a LHA self-extractor as the "target"
archive. Therefore, you can convert several hundred .ZIP
files into LHA .EXE files, that can be distributed without
the need for including a unarchiver!
Specify: Archiver = LHASFX in your config file.
4) Stealth now has its own ENVIRONMENTAL VARIABLE that can be
used to change various settings. The size of logfile, virus
scanners, listing files, stripping comments, adding comments,
expanding executables, deletion, recursion of subdirs, breaking
of -AV seals, and normal-2-extra compression can be controlled
easily through the DOS environment.
5) Added the ability to truncate the STEALTH.LOG when it gets
over 40K.
6) Added /M to the LHA switches, to allow unattended operation of
LHA's features.
7) Added /LIST to list contents of archives without doing any conversion
on them.
8) /EVAL switch now 'backs up and erases the command line' if no valid
archive is found. This allows the screen to contain vital information,
rather than the whole directory scrolling by so fast that you cannot
see what was found.
9) Now supports VENDINFO.DIZ, the new standard in vendor and BBS
information. Stealth is the FIRST utility that supports this
great, new format.
10) Added ERRORLEVEL specifications, so you can judge how Stealth
exited from within a batch file.
11) Added 'back up and erase command line' when Stealth is paused.
Looks much cooler!
12) The ending 'PROCESSED' information is extremely specific now,
and can be quickly looked at and accessed to determine EXACTLY
what was found, and what Stealth did.
13) I included the file QCOM.EXE that will only re-comment files
that NEED the comment. This save tons of time and wasted
file processing.
14) The /ID switch was optimized so it scans the file quicker.
15) Now supports the LIMIT archiver.
============================================================================
I will now address all the questions that have been asked about
Stealth, and the complaints as well:
a) Have Stealth remove BBS advertisements!
Hell no. There are a TON of BBS advertisements hidden in a
million different file formats. Even if I allowed you to
list the different offending files in a separate file, you
still would miss the utils that tag the ad on the end of
FILE_ID.DIZ, or the end of the .DOC files (P.S.L. does that).
The only 100% way to eliminate those pesky files is to manually
scrounge through it yourself (sorry!).
b) Stealth should SCAN for virii using 2 or 3 different scanners!
If you're THAT paranoid about virii, get a better scanner!
Clearly, if you gotta use 6 or 100 scanners at once, then you
are anal retentive, and have absolutely NO KNOWLEDGE of virii.
If a virus writer wants to get one on your system, he'll just
use PROTECT EXE/COM or NOLITE, or another .EXE/COM encryptor
to hide it. You ain't gonna find it!
The BEST virus protection is a GOOD BACKUP!
c) Stealth sucks as an upload processor!
That's because it ain't meant to be an upload processor!!!!!
Stealth is a RUTHLESS and FAST! archive converter. That's
why I gave birth to it last year, and it has skyrocketed
ever since.
d) Stealth should support archives within archives.
Naaaa. That would botch up most installation programs (Apogee,
Epic Megagames, etc use their own unarchivers. If Stealth
were to convert them, the installation program would fail).
e) There are several archivers that Stealth does not convert!
Because no one has SENT THEM TO ME! If you send me the new
archivers, I will modify Stealth to accomodate them. Upload
them to my BBS! We love the new stuff!
f)