|AÉÍÍÍÍÍÍÍÍÍÍ»ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÉÍÍÍÍÍÍÍÍÍÍ» |Aº |6Helpware |AºÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ ^1PC-Cypher |AÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͺ |6Helpware |Aº |AÈÍÍÍÍÍÍÍÍÍͼÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÈÍÍÍÍÍÍÍÍÍͼ ^Cby ^CHubert C. Borrmann We read and hear so much about damage done by the infamous computer virus that we often forget we can be just as hurt when sensitive data or programs are taken without our permission. ^1FluShot Plus^0, published in BBD #27, immunizes your computer from most viruses. How can we protect ourselves from theft? ^1PC-Cypher^0 allows you to encrypt the important information contained in your system based on a password you provide. Once the files are encrypted, you can copy the original data to floppy disks and store them in a secure location. Remove the unencrypted files from your PC and only a person that knows your password can ever decipher them. ^1ENCRYPTING A FILE^0 The program starts by prompting you for both source and destination filenames (you may include a valid path as part of the name.) If the destination file you have chosen should already exist, you will be prompted for permission to overwrite the file. Next, the program will prompt you for a password, which can be up to 70 characters long, to use for the encrypted file. Check this keyphrase very carefully, you will have to enter it again the exact same way when you wish to decode the file. Anytime prior to encrypting the data, you may press the key to exit the program. Once the process is complete, the destination file you specified will contain your encrypted data. ^1DECIPHERING A FILE^0 You will again be prompted for source and destination files. However, this time you should specify the encrypted file as your source. The destination file will contain your decoded information. The password you input must be exactly the same as the one used to encrypt the file originally. ^1NOTES AND WARNINGS^0 Choose your password carefully and don't forget it!!!! This technique of encryption is so good we currently have no way of deciphering a file without the password. Actually you should always keep a backup copy of the original information in a secure location on floppy disks or magnetic tape. Taking this precaution will always insure that you can recover the information should you forget the password. Though you can specify the same filename for both the source and destination files we do not recommend this technique. Should you decide to do this anyway, make backup copies prior to encrypting the information. This will guarantee that if you have a brown-out, power outage, flood, or other inconvenient event occur (don't they always seem to happen when we are most vulnerable?) you will always be able to recover the original information. To run this program outside Big Blue Disk, type ^1Cypher^0. DISK FILES THIS PROGRAM USES: ^FCYPHER.COM