home *** CD-ROM | disk | FTP | other *** search
-
- ÷ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒ∑
- ∫ ∫
- ∫ €€flflflfl ∫
- ∫ €€‹‹‹‹ flfl€€flfl €€flflfl €€flfl€ €€ flfl€€flfl €€ € ∫
- ∫ Õ ÕÕ ÕÕ ÕÕÕ ÕÕ ÕÕ ÕÕÕ ∫
- ∫ ‹‹‹‹‹€ €€ €€‹‹‹ €€ € €€‹‹ €€ €€ € ∫
- ∫ 5.0 (c) 1995 David Smith All rights reserved ∫
- ∫ ∫
- ∫ -= A complete code re-write =- ∫
- ∫ -= OFFICIAL RELEASE =- ∫
- ∫ ∫
- ”ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒΩ
-
-
- The Beta version got absolutely 0% response from all the testers
- (thanks a lot), so I have independently tested it on my own.
- It works just fine.
-
-
-
- IMPORTANT: Due to the recent hacking of Stealth, and the spreading
- around of illegally registered copies (it wasn't that
- hard to hack, guys), ALL REGISTERED USERS MUST WRITE ME
- A NOTE TO GET AN UPDATED REGISTERED VERSION.
-
-
- If you are a registered user, mail a note to:
- David Smith
- 1104 Mason Drive
- Hurst TX 76053
-
- and I will send you a new copy of the current version. Your old
- registration keys will NOT work with this and future versions.
- Hackers should note that I have included some antidebugging techniques
- and complicated algorithms within several parts of the program.
- Good luck and enjoyment trying to plow your way through the interrupt
- and randomized internal mess!
-
-
-
- Stealth 5.0 adds a WHOLE LOT of new stuff that makes it more convenient,
- and gives it an easier interface:
-
-
-
-
- 1) You can now specify a different CONFIG file on the command
- line! That means you can have 35 or 100 different config
- files, all of which are designed to fit your different needs.
- This eliminates the need to change your entire STEALTH.CFG
- everytime you have just a minor feature you want altered.
- It's quicker, easier, and allows FULL customization.
-
- 2) Added /GETCOM for 'capturing' the comment from a .ZIP or .ARJ archive,
- and placing in a file for later viewing or editing.
-
- 3) Stealth can create a LHA self-extractor as the "target"
- archive. Therefore, you can convert several hundred .ZIP
- files into LHA .EXE files, that can be distributed without
- the need for including a unarchiver!
- Specify: Archiver = LHASFX in your config file.
-
- 4) Stealth now has its own ENVIRONMENTAL VARIABLE that can be
- used to change various settings. The size of logfile, virus
- scanners, listing files, stripping comments, adding comments,
- expanding executables, deletion, recursion of subdirs, breaking
- of -AV seals, and normal-2-extra compression can be controlled
- easily through the DOS environment.
-
- 5) Added the ability to truncate the STEALTH.LOG when it gets
- over 40K.
-
- 6) Added /M to the LHA switches, to allow unattended operation of
- LHA's features.
-
- 7) Added /LIST to list contents of archives without doing any conversion
- on them.
-
- 8) /EVAL switch now 'backs up and erases the command line' if no valid
- archive is found. This allows the screen to contain vital information,
- rather than the whole directory scrolling by so fast that you cannot
- see what was found.
-
- 9) Now supports VENDINFO.DIZ, the new standard in vendor and BBS
- information. Stealth is the FIRST utility that supports this
- great, new format.
-
- 10) Added ERRORLEVEL specifications, so you can judge how Stealth
- exited from within a batch file.
-
- 11) Added 'back up and erase command line' when Stealth is paused.
- Looks much cooler!
-
- 12) The ending 'PROCESSED' information is extremely specific now,
- and can be quickly looked at and accessed to determine EXACTLY
- what was found, and what Stealth did.
-
- 13) I included the file QCOM.EXE that will only re-comment files
- that NEED the comment. This save tons of time and wasted
- file processing.
-
- 14) The /ID switch was optimized so it scans the file quicker.
-
- 15) Now supports the LIMIT archiver.
-
-
-
-
-
- ============================================================================
-
- I will now address all the questions that have been asked about
- Stealth, and the complaints as well:
-
-
- a) Have Stealth remove BBS advertisements!
-
- Hell no. There are a TON of BBS advertisements hidden in a
- million different file formats. Even if I allowed you to
- list the different offending files in a separate file, you
- still would miss the utils that tag the ad on the end of
- FILE_ID.DIZ, or the end of the .DOC files (P.S.L. does that).
- The only 100% way to eliminate those pesky files is to manually
- scrounge through it yourself (sorry!).
-
- b) Stealth should SCAN for virii using 2 or 3 different scanners!
-
- If you're THAT paranoid about virii, get a better scanner!
- Clearly, if you gotta use 6 or 100 scanners at once, then you
- are anal retentive, and have absolutely NO KNOWLEDGE of virii.
- If a virus writer wants to get one on your system, he'll just
- use PROTECT EXE/COM or NOLITE, or another .EXE/COM encryptor
- to hide it. You ain't gonna find it!
- The BEST virus protection is a GOOD BACKUP!
-
- c) Stealth sucks as an upload processor!
-
- That's because it ain't meant to be an upload processor!!!!!
- Stealth is a RUTHLESS and FAST! archive converter. That's
- why I gave birth to it last year, and it has skyrocketed
- ever since.
-
- d) Stealth should support archives within archives.
-
- Naaaa. That would botch up most installation programs (Apogee,
- Epic Megagames, etc use their own unarchivers. If Stealth
- were to convert them, the installation program would fail).
-
- e) There are several archivers that Stealth does not convert!
-
- Because no one has SENT THEM TO ME! If you send me the new
- archivers, I will modify Stealth to accomodate them. Upload
- them to my BBS! We love the new stuff!
-
- f)
-