home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Software Vault: The Diamond Collection
/
The Diamond Collection (Software Vault)(Digital Impact).ISO
/
cdr34
/
sc12wi.zip
/
SUPCRPT.TXT
< prev
next >
Wrap
Text File
|
1995-02-09
|
28KB
|
605 lines
SUPERCRYPT 1.2 FOR WINDOWS HELP TEXT
COPYRIGHT 1995 NAILLONWORKS PROGRAMMING
DO NOT ALTER THIS FILE! This file is used for
your online help.
ABOUT NAILLONWORKS PROGRAMMING
Naillonworks programming specializes in data encryption and security routines
for IBM compatible MS-DOS and WINDOWS machines.
You will find our programs easy to use, productivity oriented, and extremely
secure.
If you have questions you would like to ask us, our AMERICA ONLINE E-MAIL
address is NAILPROG, Compuserve address 75240,1746. You can mail us your
questions at:
NAILLONWORKS PROGRAMMING,
ROUTE 1, BOX F-19
OROVILLE, WASH. 98844
You can reach the programmer by phone at 509-476-2872.
INTRODUCTION TO SUPERCRYPT 1.2
SUPERCRYPT FOR WINDOWS brings unbreakable encryption to the
Windows desk top at a very reasonable price. Multiple file capabilities,
background processing, clipboard encryption, selected text encryption,
the new TEXT MODE engine, the ability to completely remove sensitive
data from your system, and the integrated note pad make this
a complete file encryption solution.
SYSTEM REQUIREMENTS
This program requires MICROSOFT WINDOWS 3.1, MICROSOFT DOS 4.0 or
greater, 286 IBM COMPATIBLE, 2mb RAM, color monitor, hard drive with 2mb
free space. It also requires the presence of the microsoft run time module
VBRUN300.DLL , COMMDLG.DLL, CMDIALOG.VBX and the THREED.VBX
(latest version) control file to be located in your windows\system directory or
the same directory as scrptwin.exe.
INSTALLATION
This evaluation version can be installed in the directory of your choice.
Make sure that all of the distribution files are copied to the same directory
on your hard drive. This includes SCRPTWIN.EXE, SUPCRPT.TXT,
READFRST.TXT and VENDOR.TXT. This is easily accomplished by
placing the compressed distribution archive SC11WIN.ZIP in the
selected directory and expanding it there.
After installation is complete, You can run SUPERCRYPT FOR WINDOWS by
clicking on the SCRPTWIN.EXE filename in the new directory, or by setting up
a program item for it in the WINDOWS PROGRAM MANAGER.
Make sure that your windows system directory contains copies of these
Microsoft support files :
VBRUN300.DLL, COMMDLG.DLL, CMDIALOG.VBX and the THREED.VBX
(latest version) control file.
Check your distribution archive for these files, most are included in the
sc12win.zip file. You can get the VBRUN300.DLL file from most major on-line
services.
METHODS OF ENCRYPTION
SUPERCRYPT 1.2 FOR WINDOWS offers two types of file encryption. The
advantages and disadvantages of each are listed below.
TEXT ENCRYPTION
Text encryption was designed for the encryption of legible text. It utilizes only
legible, printable, scanable characters when it encrypts a file. When it
encounters a non printable character in a file during encryption, that
character is ignored. It also leaves the structure of the document intact, with
reference to line length and paragraphs, so that the file can be completely
recognized by optical character recognition systems. Spaces between
individual words are eliminated, and turned into encrypted text.
ADVANTAGES
Allows a text file to be encrypted, and printed to paper for physical delivery to
another person, who may then scan the text into their system and decrypt it
with the valid password.
Allows for the encryption of electronic mail for delivery to windows interfaces
that don't support the full range of ASCII characters. They can then be saved
to a file at the other end with accurate character translation, making
decryption possible.
Text encrypted with the TEXT method can be spliced into documents created
by word processors that don't support the full range of characters as so many
WINDOWS products don't. They can then at any time be cut from the host
document, pasted to an empty file, and then decrypted. This facilitates the
embedding of privileged information into otherwise legible files.
DISADVANTAGES
Fewer characters are available to the encryption engine during encoding.
In graphic and executable files that contain mostly non printable characters,
the majority of the file will remain in its' original form, as those characters will
be ignored during encryption.
FULL ENCRYPTION
This is ideal for files of all types that are not intended to be printed, scanned,
or fully viewed after encryption. Encrypted files of this type may be sent in file
form to any user with a copy of SUPERCRYPT and the proper password.
FULL encryption utilizes the full range of ascii characters during encryption,
and no characters are ignored. The structure of a file encrypted with this
method is completely demolished, with no similarity to the original file.
ADVANTAGES
Extremely secure. Unbreakable. Even files that consist of one long string of
the same character come out patternless, even with the utilization of very
simple passwords. Ideal for text, graphic and executable files.
DISADVANTAGES
Fully encrypted text cannot be printed or viewed by text editors that don't
support the full range of ascii characters. Also, scanning of this type of file
is impossible.
FILE SELECTION (OPENING FILES)
Supercrypt provides single and multiple file selection capability in the
encryption interface.
Operation of the file selection system is quite simple, with procedures as
follows:
SINGLE FILE SELECTION
This is the mode you will use most often with SUPERCRYPT. It allows you the
greatest control over the operations performed on each file. Files opened
individually may be viewed with the integrated text editor, providing they are
under 32,000 bytes in length. Also, if you have chosen to back up this file
during processing, you can pick any valid filename as the backup file. When
using the multiple selection mode, the default backup file naming scheme is
implemented.
To select a single file for processing or editing, Use the OPEN selection in the
FILE menu of the SUPERCRYPT interface, or press the OPEN command
button. The OPEN dialog box will appear, with a drive, directory, and file list
boxes to help you make your selection. Pick a file by opening the drive list
box with a click on the arrow, double clicking on the desired drive, the
directory, and then the filename in the file list box. The text box at the top of
the dialog will reflect the selected filename, and the directories label at the
top center of the dialog will reflect the selected path.
You can alternately type the desired filename into the text box. You can type
in a complete path/filename, or if the directories label already reflects the
correct path, just type the filename.
You can also open a file while the text editor is active by using the OPEN
selection in the FILE menu of the editor. The OPEN dialog will appear, and
file selection follows the same procedure as when you are opening a file with
the SUPERCRYPT interface.
MULTIPLE FILE SELECTION
You can use this mode to greatly increase productivity when you need to
process more than one file.
Multiple file selection works with the ENCRYPT, DECRYPT, DELETE, and
DATA WIPE functions of supercrypt.
The convenient file tagging procedure of this program allows you to select
entire directories in seconds, initiate the desired function, and let
SUPERCRYPT go to work until all of the files have been processed.
<NOTE>
When tagging multiple files for any ENCRYPTION or DECRYPTION operation,
you must remember that the same configuration settings are used on all the
selected files. This means that if you are encrypting, they will all be encrypted
with either the FULL METHOD or TEXT METHOD depending on your selection,
the same password will be used on all the files, and backup files will be
created for each file processed if the have chosen the BACKUP FILE option.
Make absolutely sure that all of the files that you are tagging for any
DECRYPTION operation were encrypted with the same password, or the file
may not be decrypted properly.
The default backup naming procedure during multiple file operations is as
follows. As each file is processed, a new file is created, with the same name
as the original file, except that the extension is replaced with .NSC. Therefore,
the filename private.txt would be backed up with the file private.nsc. If there
is another file with the name private.nsc in the same directory, you will be
notified that the filename already exists, and you may choose to overwrite the
file if you wish. If you choose not to overwrite, you will be given an opportunity
to select a filename. The filename must include a full path, and must indicate
the same drive that contains the file being processed. If at this time you fail to
provide a viable backup filename, SUPERCRYPT will revert to the default
filename of private.nsc, and overwrite the existing file.
Any difficulty can easily be avoided by examining the directories that contain
the files you want to encrypt or decrypt, making sure they do not contain
backup files with the extension .NSC that may interfere with the multiple
operation.
To select multiple files, activate the OPEN dialog by using the FILE menu or
the OPEN button on the main SUPERCRYPT interface. You can not open
multiple files with the text editor.
When the dialog appears, select multiple files by holing down the Ctrl key while
clicking on the desired filenames. To open multiple files that are in succession
in the file list box, hold down the Shift key, click the file at the top of the
group of files, then while still holding the Shift key, click the file at the bottom
of the group. All files between those two selections will be included in the
selection.
You will notice that as a file is selected, it becomes highlighted. If you wish to
deselect any highlighted file, hold down the Ctrl key and click it again. It will
be removed from the current selection.
Once you are satisfied with files you have chosen, you may choose to encrypt,
decrypt, delete, or use the DATA WIPE function on them.
PASSWORD SELECTION
The password selection form of SUPERCRYPT for WINDOWS offers three
different options for password entry. You can choose to mask the characters
upon entry, display them, or paste a password to the password entry form from
the clipboard.
All characters must be within the ascii character range of 32 to 126. This
means any printable key on your keyboard will do. Upper and lower case
letters, numeric keys, punctuation, etc.
Password length is limited to 501 characters. Passwords that are over length
will be trimmed or may be reselected.
The three methods are described in closer detail below.
MASK CHARACTERS OPTION
By pressing the MASK CHARACTERS option button on the password entry
form before you type in the password, you will instruct the password entry
form not to display the actual characters as they are typed. To assure that
the password you typed is the one that you intended, (because you will not be
able to verify it visually), the form will ask you to retype the password to
confirm it with you.
DISPLAY CHARACTERS OPTION
This is the default password selection mode. It is indicated by a checked
condition of the DISPLAY CHARACTERS option button. Each character that
you type will be displayed on the screen as you type. You must confirm the
accuracy of the password visually, because the interface will not ask you to
validate the spelling while in this mode.
PASTING TEXT INTO THE FORM
You may opt to use the windows clipboard to paste password strings into the
interface. This will allow you to use text stored in other documents as the
password string. This can eliminate the tedious manual typing and possible
misspelling of long passwords.
To use this mode, you should first open the file that contains the string that
you wish to use as the password in any windows text editor that supports
clipboard operations. You can use the integrated SUPERCRYPT NOTEPAD
if the file is under 32,000 bytes.
Copy the desired text string into the clipboard.
Now use the SUPERCRYPT interface to open the file that you wish to encrypt,
select the encryption options, and press the ENCRYPT button. The password
entry form will appear, and you can at that time press the PASTE TEXT button
to copy the text in the clipboard into the password entry form.
Make sure that you only paste printable characters into the password form,
and that the length of the password string is 501 characters or less.
MAKE SURE THAT YOU ARE QUITE POSITIVE ABOUT ANY PASSWORD
THAT YOU MAY USE TO ENCRYPT OR DECRYPT A FILE. THE USE OF
AN INCORRECT PASSWORD CAN DESTROY A FILE. MAKE SURE THAT
YOU KNOW WHAT YOU TYPED.
ENCRYPTING/DECRYPTING FILES
DO NOT ENCRYPT ANY FILE THAT YOU CANNOT AFFORD TO LOSE,
WITHOUT KEEPING A BACKUP COPY OFF-LINE. ALL IT TAKES IS ONE
WRONG PASSWORD TO DESTROY YOUR DATA.
File encryption/decryption is a very simple procedure with SUPERCRYPT for
WINDOWS. The convenient interface make it very easy to specify single or
multiple filenames for the encryption/decryption operation. See the help topic
FILE SELECTION(OPENING FILES) for information on opening the file or files
you wish to encrypt or decrypt.
If you are encrypting files, you should now choose the encryption method you
wish to employ. You can choose either the TEXT METHOD or FULL method
from the right of the SUPERCRYPT for WINDOWS INTERFACE by clicking on
the appropriate option button. You may also select the method from the
OPTIONS menu of the SUPERCRYPT interface. See the help topic METHODS
OF ENCRYPTION for a detailed explanation of the differences between the
two types.
If you are decrypting files, it is unnecessary to select a method because
SUPERCRYPT will recognize the encryption type used on the file automatically,
and make the appropriate adjustments during processing.
Now you must decide if you wish to create a backup copy of the file in the
state it was in before the encryption or decryption operation. Click the
BACKUP FILE option button or select it in the OPTIONS menu of the
SUPERCRYPT interface to select this procedure.
Creating a backup file is a good idea, especially if you are decrypting files. If
you mistype a password, the file may be ruined and you may need to turn to
this backup file. See the help topic BACKUP FILE PROCEDURE for details
regarding usage and naming convention of the backup files.
The last option available that you may select is the SHARE CPU option. This
option will configure SUPERCRYPT to run in the background, freeing you to
work in another windows application, or even in SUPERCRYPT, while the
processing of your file or files is taking place. See the help topic SHARING
YOUR CPU for advantages, disadvantages, precautions, and a
definition of this option.
Now your files have been selected, and your options have been set, and you
are ready to initiate the encryption or decryption operation. Press the
ENCRYPT or DECRYPT command button, or select ENCRYPT OR DECRYPT
from the OPERATIONS menu of the SUPERCRYPT interface.
The password form will appear, ready to accept the password to use during the
operation. see the help topic PASSWORD SELECTION for the options
available to you during the entering of your password. When the desired
password has been entered into the password forms' text box, click the button
titled ENTER PASSWORD. The password will be fed to the encryption
engine, and the process will begin.
When the file or files have been completely processed, you will be presented
with a message box stating that the encryption or decryption of the selected
file or files has been completed.
ENCRYPTING/DECRYPTING THE CLIPBOARD.
SUPERCRYPT FOR WINDOWS has the ability to encrypt or decrypt text that
is contained in the windows system clipboard. This gives this program the
ability to encrypt/decrypt portions of documents created in any windows
editor or word processor, while leaving the remainder unaltered.
The following example describes the steps necessary for SUPERCRYPT to
work in conjunction with the clipboard and the windows WRITE editor.
In the program manager, start the SUPERCRYPT program by clicking on the
ICON you have created for it or by clicking on the scrptwin.exe filename in the
file manager.
Once the SUPERCRYPT FOR WINDOWS interface is loaded, press Ctrl-Esc to
activate the task manager. Then use the task manager to switch to the
program manager, and from there start WINDOWS WRITE.
Once in WRITE, type the following line:
Bill, I have spoken to my broker and he indicated that I should pass you
the following information . >>Sell all of your apple stock now!<<.
You will notice that I used the delimiters >> and << around the text that I wish
to cut, encrypt and place back into the file. This is so that the recipient of the
document will know what text to cut into the clipboard for their copy of
SUPERCRYPT to process.
Now select the phrase Sell all of your apple stock now! with the curser, and
use the WRITE edit menu to cut the phrase from the document.
The line in WRITE will now appear as follows:
Bill, I have spoken to my broker and he indicated that I should pass you
the following information .>><<
Use the WRITE Ctrl-Esc again to switch to the windows task manager, then
from there switch to SUPERCRYPT.
Once in SUPERCRYPT, open the OPERATIONS menu, then select ENCRYPT
CLIPBOARD. You will be asked for a password, and the contents of the
clipboard will be encrypted.
Use the task manager to return to WRITE, and with the curser between the
two delimiters, select paste from the edit menu. The result, encrypted with my
password looks like:
Bill, I have spoken to my broker and he indicated that I should pass you
the following information . >>6]-W?^OKp~E2gD89`hR1t^qu<gBCYTh;%<<.
Clipboard encryption always uses the text method of encryption, so there is no
reason to indicate to SUPERCRYPT which method you prefer.
Decryption is handled in the same manner as encryption. Select the text
between the delimiters, switch to SUPERCRYPT, select DECRYPT
CLIPBOARD, provide the correct password, then paste the clipboard contents
back into the document.
Bill, I have spoken to my broker and he indicated that I should pass you
the following information . >>Sell all of your apple stock now!<<.
You can also use the clipboard encryption option to encrypt portions of
documents created in the SUPERCRYPT NOTEPAD.
The choice of delimiter characters is up to you, just make sure the recipient
of any message is aware of your choice.
ENCRYPTING SELECTED TEXT.
With documents that are being viewed in the integrated notepad, you may
wish to encrypt selected text only. This is similar in effect to encrypting
the clipboard, except that it is faster and simpler to do. The restriction is
that only selected text in the integrated notepad is recognized.
To use this feature, open any text file under 32000 bytes long and activate
the integrated notepad.
Use the mouse to highlight the text that you wish to encrypt, then with the
text highlighted, choose ENCRYPT SELECTED TEXT in the OPERATIONS
menu of the main SUPERCRYPT interface. Provide a password and the
selected text will be replaced with encrypted code. You may wish to
use delimiter characters to help identify the text that needs to be selected
in order to be decrypted properly. See the help topic ENCRYPTING\
DECRYPTING THE CLIPBOARD for an example using delimiters.
SHARING YOUR CPU
Supercrypt can be instructed to encrypt in the background while you work
in another windows program or the SUPERCRYPT editor.
A few precautions should be taken when processing files in the background.
Do not attempt to open, close save to, delete, or data wipe a file that is
currently being processed by Supercrypt.
ADVANTAGES
When processing large or large numbers of files, it allows you to remain
productive in another WINDOWS application while SUPERCRYPT is
busy.
DISADVANTAGES
The processing speed of SUPERCRYPT does diminish when sharing
the CPU with other applications. The exact amount of performance loss
depends on the processing requirements of the competing application.
BACKUP FILE PROCEDURE
SUPERCRYPT contains a system that allows you to generate copies of
files that are being processed by the encryption engine, in their condition
prior to processing.
When encrypting files, unencrypted copies are generated, and when
decrypting, encrypted copies are maintained.
Activating this system requires a click on the BACKUP FILE option button
on the right of the SUPERCRYPT interface, or select BACKUP FILE from
the OPTIONS menu. This option must be selected AFTER the file or files
have been opened, because the system needs to know if you are planning
to process single or multiple files.
If you have a single file selected when you select the BACKUP FILE
option, a dialog box will appear, asking you to provide a filename for the
backup file. This dialog displays the default name for the backup file, that
you may use by pressing O.K. if you wish. Or you may enter a different
filename and then press O.K. SUPERCRYPT will check to see if the
indicated filename already exists on your system, and if it does, you will
be asked if you would like this file to be overwritten. If you choose NO,
then you will be given an opportunity to select a different one.
If you have selected multiple files and have chosen the BACKUP FILE
MODE, A dialog box will appear, indicating that the default backup file
naming scheme will be used. The reason for this is so that you will not
be interrupted by a dialog box each time SUPERCRYPT begins processing
a different file in your selection.
The default backup naming procedure during multiple file operations is as
follows. As each file is processed, a new file is created, with the same name
as the original file, except that the extension is replaced with .NSC. Therefore,
the filename private.txt would be backed up with the file private.nsc. If there
is another file with the name private.nsc in the same directory, you will be
notified that the filename already exists, and you may choose to overwrite the
file if you wish. If you choose not to overwrite, you will be given an opportunity
to select a filename. The filename must include a full path, and must indicate
the same drive that contains the file being processed. If at this time you fail to
provide a viable backup filename, SUPERCRYPT will revert to the default
filename of private.nsc, and overwrite the existing file.
DATA WIPE SYSTEM
Supercrypt incorporates the technology of one of my earlier utilities,
NAILLONWORKS DATA-WIPE. The essence of this program has been
assigned to the DATA WIPE command button.
DATA WIPE is a method in which sensitive data can be completely
scrubbed from your hard drive, making it impossible for others to restore
the file with undelete utilities.
This operation may be performed on single as well as multiple files. You
may open the file or files with either the main SUPERCRYPT or the
SUPERCRYPT NOTEPAD interface, but in order to select multiple files
you must use the prior. File selection is handled in the identical manner
as described in the help topic FILE SELECTION(OPENING FILES).
Once your file or files have been selected, press the DATA WIPE button
or select Data Wipe from the Operations menu of the main SUPERCRYPT
interface. You will be asked for confirmation and given the opportunity to
cancel the procedure. If you continue, the DATA WIPE engine will begin
to totally remove your selection from your drive.
DELETING FILES
You are able to delete any file or files currently selected (listed in the file
box of the main SUPERCRYPT interface), by selecting Delete File from the
File menu of SUPERCRYPT. You will be asked for confirmation before any
files are removed from your system.
The trash can is nothing more than a quick delete facility. It allows you to
select the filename or names contained in the file box with a mouse click on
the filename or filenames listed in the file box, and then with the mouse
button depressed, drag it into the trash can.
Deletion is not the same as DATA WIPE, where files are rendered
unrecoverable by undelete utilities.
REGISTRATION
(CANNOT BE FILLED OUT WHILE IN SUPERCRYPT HELP. PRESS
THE PRINT ORDER FORM BUTTON TO PRINT A COPY, OR
PROVIDE THE FOLLOWING INFORMATION IF YOU DO NOT HAVE
A PRINTER. THE INTRODUCTION SCREEN ALSO PROVIDES A
CONVENIENT WAY TO FILL OUT THE ORDER FORM ON SCREEN
AND PRINT IT OUT WHEN COMPLETED ).
SUPERCRYPT 1.2 FOR WINDOWS REGISTRATION FORM
NAME _________________________________________________
COMPANY _________________________________________________
ADDRESS _________________________________________________
CITY/STATE ________________________________________________
PHONE _________________________________________________
COMPUTER_________________________________________________
WINDOWS VERSION_________________________________________
COPIES OF SUPERCRYPT 1.2 FOR WINDOWS ___x$39.95 = ______
COMMENTS_________________________________________________
____________________________________________________________
Send completed order form and registration fee to:
NAILLONWORKS PROGRAMMING
ROUTE 1 BOX F 19
OROVILLE, WASHINGTON 98844
ORDERS SHIPPED IMMEDIATELY.
Registered users will recieve the registered version of SUPERCRYPT 1.2
FOR WINDOWS with a TWO site license.
RIGHTS AND LIMITATIONS
You have the right to distribute this evaluation version of Naillonworks
Supercrypt royalty free and in unlimited supply, providing the files
READFRST.TXT, VENDOR.TXT, SUPRCRPT.EXE, SUPCRPT.TXT
are all included, unaltered and in their entirety, on any distribution
diskette, in any compressed distribution archive, or any other distribution
method. It is also advisable to include the microsoft files VBRUN300.DLL,
THREED.VBX (latest version), COMMDLG.DLL, and CMDIALOG.VBX
in any distribution, or make sure that the files are readily available to the
user, as they are required for SUPERCRYPT to run.
DISCLAIMER
NAILLONWORKS PROGRAMMING is in no way responsible for any loss,
including but not limited to lost time, profits, data, or equipment failure
resulting from the use, improper use or inability to use SUPERCRYPT
1.2 FOR WINDOWS.