home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
back2roots/padua
/
padua.7z
/
padua
/
misc
/
encrypt.lzh
/
Encrypt.doc
< prev
Wrap
Text File
|
1990-03-07
|
3KB
|
59 lines
-----------------------------Encrypt V1.00-----------------------------
---------------------------by Dave Schreiber---------------------------
Encrypt V1.00 is Copyright (c)1990 by Dave Schreiber. All Rights Reserved.
Encrypt must by freely distributed, except for costs associated with
shipping, copying, media, labels, taxes, and other necessary costs.
Files in this release:
Encrypt (the binary program)
Encrypt.c (the source code to Encrypt)
Encrypt.doc (the documentation, this file)
Please keep all three files of this release together, if you can.
Encrypt secures your files against prying eyes. It will take any
file (a program, IFF picture, text, whatever) and convert it into an
unusable form using a password that you specify. When you want to
access the file, it will convert the file back to its original form,
assuming you give it the correct password.
Encrypt is called using the form:
1> Encrypt [options] -p<Password> <infile> [<outfile>]
where <infile> is the file you want to encrypt/decrypt, <outfile> is the
filename of the encrypted/decrypted file, and <Password> is the password
that you want to use. The options are:
-e -- Encrypt the file
-d -- Decrypt the file
-r -- Process <infile> and replace <infile> with the processed file.
This option will leave you without the original version of
the file, so use it with care. Note that the original file
is not deleted until the processed version has been created
sucessfully, so you won't end up with a half-processed version
and no original version (the original file is stored as
<infile> with a .tmp after it until the encrypted version is
completed). The -r flags works with both encryption and
decryption.
If a '?' is the only command line option, the options information is
displayed.
How secure is the encrypted file? Data encryption isn't really
my field, so I don't know (I got the algorithm idea from a program for
the Apple ][, published in Compute! magazine (1987?), that does the same
thing as Encrypt). The algorithm is layed out in the source code
(Encrypt.c, included with this release) if you want to take a look. You
can encrypt a file more than once, in which case you'll have to decrypt
it the same number of times. Decrypting an unencrypted file is another
way of securing it; encrypting it will then give you the original file
back.
Enjoy.
-Dave Schreiber
davids@slugmail.ucsc.edu (preferred, but flakey. If it doesn't work, try
davids@ucscb.ucsc.edu (school) or
davids@cup.portal.com (summer, vacations, etc)).