home *** CD-ROM | disk | FTP | other *** search
-
-
-
-
-
-
- C R Y P T O R
-
- Version 1.2
-
-
- by
-
- Paul Troiano
-
- on
-
- January 27, 1985
-
-
-
-
-
-
-
-
-
- DISCLAIMER:
-
- THE PROGRAM CRYPTOR AND THIS MANUAL ARE PROVIDED ON AN "AS
- IS" BASIS WITHOUT WARRANTY OF ANY KIND. THE ENTIRE RISK AS
- TO QUALITY AND PERFORMANCE OF THE PROGRAM AND THIS MANUAL
- RESTS SOLELY WITH THE USER. SHOULD ANY PART OF THIS PROGRAM
- OR THIS MANUAL PROVE DEFECTIVE, THE USER WILL ASSUME THE
- ENTIRE COST OF ALL NECESSARY REPAIR, SERVICING, AND
- CORRECTION. IN NO EVENT WILL PAUL TROIANO BE LIABLE TO YOU
- FOR ANY DAMAGES EVEN IF PAUL TROIANO HAS BEEN ADVISED OF THE
- POSSIBILITY OF SUCH DAMAGES. THIS WARRANTY GIVES YOU
- SPECIFIC LEGAL RIGHTS, AND YOU MAY HAVE OTHER RIGHTS WHICH
- MAY VARY FROM STATE TO STATE. SOME STATES DO NOT ALLOW THE
- EXCLUSION OF IMPLIED OR CONSEQUENTIAL DAMAGES SO PARTS OF
- THE ABOVE MAY NOT APPLY TO YOU. BY OPERATING ANY OF THE
- ABOVE PROGRAM OR USING ANY PART OF THIS MANUAL, YOU
- ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, UNDERSTAND
- IT, AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS.
-
- - - -
-
- GENERAL INFORMATION AND USAGE
-
- CRYPTOR.COM is a data encryption program for the IBM
- PC. It works with any kind of files, ASCII, COM, BAS,
- EXE, WKS, etc. It is extremely fast. CRYPTOR can encrypt
- a 133K file in less than 50 seconds! It will decrypt just
- as fast.
-
- When executed, it displays a brief title page which can
- be cut short be pressing a key. After that it will ask
- for an Input File. That's the file to be en/de-crypted.
- Type in the complete filename, including the extension and
- drive name if it's not the default. The input file name
- cannot contain any number signs, "#", in it except for one
- in the extension which signifies that the file must be
- decrypted.
-
- CRYPTOR will then proceed to check to see if your
- specified input file exists, if not, CRYPTOR will prompt
- you to reenter it. CRYPTOR will then display the name of
- the file that the output will be sent to. The name of
- that file depends on whether you are decrypting or
- encrypting.
-
- Files that have been encrypted, have a file extension
- of ?#? That means if your file was called INFO.DOC,
- CRYPTOR will make the output file called INFO.D#C. If your
- file has no extension (README for example), its extension
- will be !#! (in the README example: README.!#!) When
- decrypting, the output name is the name that the file was
- called when encrypted. This information is stored in the
- file itself. That's why when you encrypt a file it is 128
- bytes longer than the original.
-
- Finally, you enter the key for the en/de-cryption.
- This key is extremely important. You must remember it
- exactly, character for character (upper and lower case ARE
- different), or you will not be able decrypt the file. The
- key can be any character that you can type from the PCs
- keyboard.
-
- The longer the key, the better. But don't go
- overboard. Some example keys are: "It slices, it dices,
- but sorry no windows," "CUSTOMER DATA FILE 8345 10/85,"
- "Super Fast Secure Data Encryption." Remember "Paul,"
- "PAUL," "paul," "pAul," are all different keys and would
- result in different output!
-
- After you enter the key, CRYPTOR will begin the
- en/de-cryption. CRYPTOR uses a 16k memory buffer to
- increase its speed. If your file is larger than 16,384
- bytes, it will do it in as many 16k parts that are
- necessary. Thus, a file of any size can be en/de-crypted
- using CRYPTOR.
-
- When finished, CRYPTOR will ask if you want to en/de-
- crypt another file. Press "Y" if so, otherwise press "N"
- When decrypting a file, the procedure remains the same,
- but you MUST use the EXACT key that was used to encrypt
- it.
-
- If you forget your key, you can pretty much forget the
- file. Unless your willing to sit at your PC's keyboard
- for ten years pounding out all the possible letter,
- number, and funny graphic characters that the IBM will do,
- the file is lost forever. Writing down your keys is not
- really a good idea unless you keep it in a different
- location. For example if you use this at work, you could
- write it down at home. But if you make your keys
- sentences, they should be pretty easy to remember. As
- stated above, I am not responsible for damages done by
- this program. It's your responsibility to remember the
- keys.
-
- CRYPTOR WITH THE DOS COMMAND LINE
-
- CRYPTOR also uses the DOS command line to enter the
- input file name, and the key. It uses the form of:
- CRYPTOR [Input File] [Key]
- The braces, "[" and "]", mean that the information inside
- is optional. The braces should not appear in the command
- line. You cannot enter only the key using the command
- line; CRYPTOR will think that the key is the input
- file name. Here are several examples of using the DOS
- command line with CRYPTOR:
-
- A>cryptor report2a.d#c
- ++++++++++++
-
- A>cryptor tetech.wks This is a sample KEY, see?
- ++++++++++ **************************
-
- The parts the are underlined with pluses, "+", are the
- input file names. The part underlined with asterisks,
- "*", is the key to be used. The first one will be
- decrypted since there is a number sign, "#", in the second
- position of its extension, while the second one will be
- encrypted. The first one only contains a file name so
- CRYPTOR will ask you to enter the key by hand. Trailing
- spaces after the key, will be considered to be part of the
- key, so type in your key very carefully. Upper and lower
- case ARE also DIFFERENT using the command line!
-
- REDIRECTING OUTPUT TO A DIFFERENT DRIVE
-
- CRYPTOR can be coaxed to use a different drive for the
- output file. This is done while in DOS, before executing
- CRYPTOR. If you have a file on drive A called
- EMPLOYEE.DAT and you want it encrypted onto drive B, you
- first log into drive B. Do this by typing B: at the A>
- prompt. Then you execute CRYPTOR with:
-
- B>a:cryptor a:employee.dat And here is your key!!!
-
- Or, you could just type:
-
- B>a:cryptor
-
- then enter the input file name (employee.dat) and the
- key. Output will then go to drive B. So, you first log
- DOS into the drive you want the output to go under, then
- you execute CRYPTOR giving it the drive name of where to
- find the input file. An easier way to do this would be to
- have the input file on drive B, and be logged under drive
- A. Typing
-
- A>cryptor b:compgrph.p#c 343-45-0923 -- 201/623-1385
-
- will send the decrypted version on to drive A.
-
- ADDITIONAL INFORMATION
-
- Comments/questions can be sent to me at the following
- address, but I do not guarantee that I will answer them
- all, but I'll try my best. The more feedback, the
- better this program will become.
-
- If you find this program of value, and use it often, a
- contribution of $15 is encouraged. Doing so will result
- in my personal good will towards you, and the strong
- possibility of more good, fast, low priced public domain
- software written by me if I get the encouragement and
- time.
-
- Paul Troiano
- 531 Village Rd. West
- Princeton Jct, NJ 08550
-
-
-
-
- G·░ δ2└ó4ë1