home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Software Vault: The Gold Collection
/
Software Vault - The Gold Collection (American Databankers) (1993).ISO
/
cdr11
/
pcv06n01.zip
/
ENCRYPT.DOC
< prev
next >
Wrap
Text File
|
1993-06-07
|
6KB
|
105 lines
ENCRYPT.DOC January 1993 Matthew Lake/Jeff Prosise
----------------------------------------------------------------
Purpose: Keep your files secret by providing password-
level protection through encryption.
Files ENCRYPT.COM, SCRAMBLE.BAT, SEE.BAT, GET.BAT,
Required: and SECRET.BAT
Format: Type ENCRYPT at the DOS command line to to see
the program's command-line syntax for usage.
Usage: The password-protection routines in this file set
are all based on a smill file-encryption program
called ENCRYPT.COM. The four batch files
(SCRAMBLE, SEE, GET, and SECRET) enhance the
program.
SCRAMBLE encrypts files with a password you
provide.
SEE shows text hidden in encrypted files when you
provide the correct password.
GET extracts files from encryption.
SECRET enables you to write confidential
information in a text file and encrypt it
in one step.
Remarks: Although ENCRYPT works fine by itself, its
complicated command-line syntax and rudimentary
help instructions leave a little to be desired.
To make things easier (and to guard against
typing mistakes), use the batch files SCRAMBLE,
SEE, and GET.
SCRAMBLE.BAT Enter SCRAMBLE at the DOS prompt for instructions
for using SCRAMBLE.BAT. To encrypt an existing file
of any sort--text, formatted text, etc.--use the
following syntax:
SCRAMBLE [source] [password] [target]
If you miss any of the three required parameters,
the batch file's IF (%3)==0 GOTO INFO line jumps
to a help paragraph. You can customize any line
in this paragraph (just remember to precede any
line you want to see onscreen with an ECHO command).
The batch file offers to delete the original file as
a security measure. If you want to delete the
original, press Enter. For a little protection against
DOSs UNDELETE command, the batch file overwrites the
original file with a single word so that once you've
deleted the file, it's extremely difficult to restore
the information. This poses a risk to your data (if
you forget the password, you'll never get your file
back), but it also provides a fair amount of security.
If you don't want to delete the original file, simply
press Ctrl-C or Ctrl-Break when the batch file prompts
you, and answer Y to DOSs question "Terminate Batch
Operation?" If you don't like this option, just
delete the lines between ECHO and :INFO or precede
each of the lines with REM to make them remarks
instead of instructions.
SEE.BAT If you want to scan an encrypted text file without
first decrypting it, use SEE.BAT. This batch file
requires only two parameters: the encrypted file's
name and the password. The batch file redirects
decrypted information to the DOS command MORE,
which displays it onscreen one page at a time.
When you've finished reading the file, SEE clears
the screen so that nobody else can see your files.
If you don't want to clear the screen, press
Ctrl-C or Ctrl-Break to stop the batch file.
GET.BAT To extract a file from its encrypted form and have
it on disk, use GET. This batch file requires three
parameters: the encrypted source file, its password,
and the target file name. The DIR %3 command at the
end of the batch file verifies that the file has
been decrypted. If you get a FILE NOT FOUND state-
ment, it's because there was a problem creating it.
Make sure you entered the encrypted file's name
correctly and that it's in the current directory or
in your path. Then try running GET again.
SECRET.BAT To make a quick, confidential file of secret
information, use SECRET, which sends the text you
type to ENCRYPT. This batch file requires two
parameters: output filename and password. First,
the batch file uses COPY CON to create a text file
from the characters you type. Enter data line by
line and DOS stuffs it into a temporary file called
TEMP.TMP. When you've finished entering data, press
Ctrl-Z (of F6) and Enter. The batch file then calls
ENCRYPT.COM and passes it the name of the temporary
file and the two parameters you entered at the DOS
prompt when you invoked SECRET. Finally, SECRET
overwrites the temporary file with a single word to
make it difficult to recover and then deletes it.
Refer to the article on pages 272 through 276 for more information
about this program file.