home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Night Owl 6
/
Night Owl's Shareware - PDSI-006 - Night Owl Corp (1990).iso
/
029a
/
fes412s.zip
/
README.DOC
< prev
next >
Wrap
Text File
|
1991-05-05
|
6KB
|
117 lines
File Encryption System
There have been a lot of articles written in the media in the last few years
about data security. There have been a lot of incidents in which sensitive data
falls into the wrong hands either intentionally or accidentally and causes
problems ranging from embarrassment to financial loss to legal action. A lot of
people talk about the problem, but not many people do anything about it. Most
people do much more to protect their paper records then they do for their data
on disk. Locking a file cabinet is easy, but it is a real pain to have to keep
all your data on removable floppies and lock those away in that same cabinet.
But you now have the means to keep your data conveniently located on your hard
disk or on your network, online and ready for instant access, yet still have
your data totally protected from anyone else who has access to your computer or
network. The File Encryption System provides total security for your data with
an absolute mimimum of effort on your part. Unlike other data protection
programs, you do not have to keep your data on special disks, or in special
directories. You do not have to keep your data on a removable floppy to lock it
away. You do not have to remember to "decrypt" your data file before you start
to use it, nor remember to "encrypt" it again when you are finished. All you
need to do is remember your password.
Originally developed for, and licensed by, a major electronics company in 1985
to provide a solution for the PC data security problem, this latest version
is available to anyone who needs to protect their data. Version 4.0 is more
powerful than ever with more features. And it is easier to use. Most users of
the 4 major releases of the File Encryption System over the last 4 years have
been very impressed with its capabilities.
The most difficult part of using the File Encryption System is setting it up.
PLEASE READ THE MANUAL. Admittedly, it is not the easiest program to set up. It
does require some knowledge of what data files and program files your
application programs use. But the manual, along with a supplied utility program,
guides you through the setup process. Once your system is set up, it becomes
very easy to use.
Please remember, this software is being distributed as Shareware software. If
you find this software useful, please register as a user. The registration fee
is very modest, but it allows continued development of reasonably priced
software that is useful to all of us. See ORDER.DOC for registration
instructions.
Upon registration, you will be sent a much more powerful system than that you
obtained through the shareware distribution. In addition to the capabilities
you have seen and evaluated, the fully featured product has the following
added capabilities:
* Version 4.x has 5 levels of encryption compared to the 2 levels in
Version 4.xS. Levels 1 and 2 are the same in both versions. Level
3 is 4 iterations through the DES algorithm (refer to the manual for
an explanation of this), level 4 is 8 iterations, and level 5 is 16
iterations, which is the full DES standard.
* The EDITCFG program allows you to configure function keys for the
SECURE program.
* The EDITCFG program allows many more file extensions to allow the
use of many different application programs.
* The configuration files can be password protected. You must enter the
password in the EDITCFG program before you can edit a configuration
file.
* The EDITCFG program allows you to configure SECURE to automatically
execute an application. This allows you, with the use of batch files,
to make the File Encryption System totally transparent! You do not see
the SECURE shell screen. Instead, SECURE starts your application
program executing. The only difference a user sees is a prompt for the
password. This feature alone is well worth the registration price.
* The SECURE program has a built-in command line editor, with recall for
up to the last 16 commands.
** And, of course, that nuisance of a reminder to register will disappear.
You will also be eligible to receive update offers for enhanced versions as they
are available.
IMPORTANT NOTE:
Since the File Encryption System uses the DES algorithm, it is regarded as a
controlled product by the U.S. State Department and requires a special export
license for any destination outside the United States and Canada. As such, I
cannot ship this product outside the United States and Canada. However, for
any registrations outside of these destinations, I will send a modified version
of the full system (with all the above features), that does not use the
advanced DES algorithms. This is a major reason that you will receive the fully
featured product ONLY upon registration. This version, distributed via
shareware, is fully functional and is not crippled in any way, but does not
support the full DES algorithm; in this way I can control potential export
problems.
ORDER.DOC also covers customization of the File Encryption System and
availability of source/object code for your own customizations.
I'm sorry that I cannot provide telephone support at this time. But I will
strive to provide good support by mail. If you have any problems with the
File Encryption System, do not hesitate to write to me with the details. Be
as descriptive as you can. Enclose a printout from the LOGIO utility. If
possible, you can send me a disk with your program on it. I have developed
some quite sophisticated analysis tools to aid in analyzing problems with
interaction between applications and the File Encryption System. Such problems
are rare, but they do occur. I will try to resolve any problem you encounter
as quickly as possible. Please also send your phone number so I can contact
you if necessary.
I would also be very happy to receive your comments and suggestions on the
File Encryption System. Your suggestions may find themselves incorporated into
the next release.
Please address your correspondence to:
Bennett Scott
P.O. Box 867451
Plano, Tx 75086