home *** CD-ROM | disk | FTP | other *** search
- GUARDSET / SENTRY 2.0
-
-
- Who needs the GUARDSET/SENTRY encryption/decryption system?
- Typically, the IBM or compatible user who wants to put some of his
- hard disk or diskette files out of reach. For example:
-
- E.g.#1. You are a college student. You can't or don't want to
- lock your roommate out of your computer altogether, but
- you want to keep him/her from accessing certain programs
- or files.
-
- E.g.#2. You are a small businessperson using a personal computer
- for both business and personal applications. You want your
- secretary to have free access to the computer, but not to
- payroll information, or to your personal files.
-
- E.g.#3. You want to mail diskettes containing sensitive data
- and ensure that it will be readable only by the intended
- recipients (who know the password).
-
- E.g.#4. You travel with a portable computer, and want to be sure
- that certain classified information will not be readable
- should your computer become lost or separated from you.
-
-
- Through GUARDSET, you custom-design your own security system to
- keep sensitive information out of the reach of unauthorized
- people, while allowing free access to the rest of your hard disk.
- You may want to create several of the SENTRY encryption modules
- to handle different areas of your disk.
-
- GUARDSET allows you to design your system with the level of
- security you feel you need. For modest protection, choose a light
- security level which is quick and efficient, while still keeping
- 99% of would-be snoopers at bay. If, on the other hand, you
- suspect a proficient "computer jock" may pose a threat, you may
- choose a heavy level of security that will keep him out.
-
- What if someone tries to gain access to your encrypted areas? If
- he doesn't know the password (which you control), tough luckski.
- Even if he boots your computer from his own DOS system diskette,
- the encrypted directories and files remain off limits. Any
- unauthorized attempt to gain access is recorded, and displayed at
- your next access, so that you know someone has tried to get in.
- You will see the time and date of the failed attempts, and the
- passwords the violator attempted to use, which might serve as
- useful clues to his identity. The time and date of the last
- successful access are displayed at each access, too, which means
- you can even catch someone who has learned your password and has
- been accessing your secured areas.
-
- There is no need to restructure any of your directories or files;
- continue to use all of your programs and files as you always have.
- Your control over the encryption and decryption of your data can
- and should be automated by means of batch files, so that all you
- have to remember is your password.
-
- And what if you forget your password? Use GUARDSET on your product
- diskette (ALWAYS kept in a safe place) to view or change the
- password, and you're on your way again.
-
- Last, but certainly not least, GUARDSET is safe. Even in the event
- of power failure or other interruption, your valuable data will
- never be left in "limbo".
-
- Interested? Then help yourself to this shareware program. If you
- intend to keep using GUARDSET, I ask for a registration fee in
- the spirit of shareware. $30 is probably about right. The standard
- sharware version of the GUARDSET program as distributed is not
- crippled in any way, nor copy-protected... you may continue to
- use it as is. For better security, however, I recommend a full
- registration in the amount of $64. This will qualify you for a
- printed manual, and more importantly, I will create a custom
- version of GUARDET for you, containing unique encryption sequences.
- This will mean that any other GUARDSETs will be unable to tamper
- with your security system.
-
- NOTE: If you downloaded the shareware version from a BBS, I
- recommend removing GUARDSET.EXE from your hard disk onto a floppy
- diskette and running it from there, for security reasons. (When
- you upgrade to a customized copy, you will upgrade this diskette.)
-
- In either case, your registration entitles you to technical phone
- assistance, and to free or reduced upgrades and any bug fixes
- that may happen. You may make as many copies of GUARDSET as you
- want for backup purposes, etc. If you give GUARDSET to someone,
- I ask that you present it as shareware, not freeware. And think
- about what you are giving, especially if you have a customized
- GUARDSET. Would you install a lock on your front door, and then
- pass out copies of your master key?
-
-
- Requirements:
- MS-DOS or PC-DOS 3.0 or higher
- 88K RAM to run GUARDSET
- 5K - 10K to run the SENTRY encryption programs
-
-
- Disclaimer:
-
- GUARDSET has been tested thoroughly and used in many systems since
- 1989 with no reported failures or major bugs. Its design ensures
- that your data is safe, even in the event of interruption during
- processing. This, however, is not meant as a warranty, either
- expressed or implicit, and I hereby disclaim any responsibility
- for hardware or software problems that may be allegedly traced
- to the use of GUARDSET and its children encryption modules.
-
-
-
- For a better overview of GUARDSET, its capabilities and basic
- how-to answers, take the brief self-paced demo by typing:
-
- GSDEMO [Enter]
-
-
- For assistance in placing an order, you may print an order form
- with this command:
- PRINT ORDER.FRM [Enter]
-
- You may also print this readme file at any time by pressing
- 'Alt-P'. For more detailed information, you may want to browse
- and/or print the instruction manual, MANUAL.COM, by ESCaping
- from this readme file and typing:
-
- MANUAL [Enter]
-
-
- I am an independent home programmer. Please feel free to contact
- me at:
- Gerald J. DePyper
- 901 W. Argyle, #5A
- Chicago, Illinois 60640
-
- CompuServe ID: 71041,703
- Phone: 3l2/907-8935
-
- But please remember that this is our home...don't call at crazy
- hours. (The best times are 7-10 pm central time, or weekends.)
-
-
- The improvements from GUARDSET version 1.1 to 2.0 are as follows:
-
- - Data encryption/decryption logic was tightened.
-
- - Support files now record (on the GUARDSET diskette) all
- information necessary to rebuild your security system
- in the event of a catastrophe. These files also provide
- the mechanism for comparing encryption modules in a
- multi-module system to prevent conflicts.
-
- - You may now alter the password or other non-crucial
- switch settings in a SENTRY whose protected data items
- are in an encrypted state. (You may not, of course,
- change the protection rules until you run SENTRY /O
- to decrypt the protected items.)
-
- - Enhanced support for single-floppy systems, and for
- creating SENTRY programs on a floppy separate from the
- GUARDSET floppy.
-
- - Cross-version compatibility was maintained (i.e, a
- SENTRY program created under 1.1 can be read and updated
- to version 2.0). Also, as before, a non-customized system
- can be easily converted to a customized one.
-
-
-
-
- P.S. (A Note from the Author)
- Please don't be a computer-holic. A computer is, after all, only
- a machine. Jesus is Lord. Keep everything else in perspective.
- Have fun!
-