home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Big Blue Disk 31
/
bbd31.zip
/
CYPHER.TXT
< prev
next >
Wrap
Text File
|
1989-03-05
|
3KB
|
56 lines
|A╔══════════╗════════════════════════════════════════════════════════╔══════════╗
|A║ |6Helpware |A║═══════════════════════ ^1PC-Cypher |A══════════════════════║ |6Helpware |A║
|A╚══════════╝════════════════════════════════════════════════════════╚══════════╝
^Cby
^CHubert C. Borrmann
We read and hear so much about damage done by the infamous computer virus
that we often forget we can be just as hurt when sensitive data or programs are
taken without our permission. ^1FluShot Plus^0, published in BBD #27, immunizes
your computer from most viruses. How can we protect ourselves from theft?
^1PC-Cypher^0 allows you to encrypt the important information contained in your
system based on a password you provide. Once the files are encrypted, you can
copy the original data to floppy disks and store them in a secure location.
Remove the unencrypted files from your PC and only a person that knows your
password can ever decipher them.
^1ENCRYPTING A FILE^0
The program starts by prompting you for both source and destination
filenames (you may include a valid path as part of the name.) If the
destination file you have chosen should already exist, you will be prompted for
permission to overwrite the file. Next, the program will prompt you for a
password, which can be up to 70 characters long, to use for the encrypted file.
Check this keyphrase very carefully, you will have to enter it again the exact
same way when you wish to decode the file. Anytime prior to encrypting the
data, you may press the <ESC> key to exit the program. Once the process is
complete, the destination file you specified will contain your encrypted data.
^1DECIPHERING A FILE^0
You will again be prompted for source and destination files. However, this
time you should specify the encrypted file as your source. The destination
file will contain your decoded information. The password you input must be
exactly the same as the one used to encrypt the file originally.
^1NOTES AND WARNINGS^0
Choose your password carefully and don't forget it!!!! This technique of
encryption is so good we currently have no way of deciphering a file without
the password. Actually you should always keep a backup copy of the original
information in a secure location on floppy disks or magnetic tape. Taking
this precaution will always insure that you can recover the information should
you forget the password.
Though you can specify the same filename for both the source and destination
files we do not recommend this technique. Should you decide to do this anyway,
make backup copies prior to encrypting the information. This will guarantee
that if you have a brown-out, power outage, flood, or other inconvenient event
occur (don't they always seem to happen when we are most vulnerable?) you will
always be able to recover the original information.
To run this program outside Big Blue Disk, type ^1Cypher^0.
DISK FILES THIS PROGRAM USES:
^FCYPHER.COM