home *** CD-ROM | disk | FTP | other *** search
-
- February 21, 1992
- Encrypt.exe
- Copyright (c) 1988 thru 1992 G. K. Pace
- All Rights Reserved!
-
- Encrypt is a files encryption utility which features an alterable
- Code Key. By changing the Code Key you modify the encryption key used
- to encrypt files. This utility can be used for securing your files on
- a system accessible to others, and for the transfer of secured files to
- others, by using a common Code Key. It is especially useful for those
- transferring files via a network, and wish the files to be accessible only
- by the intended recipient.
-
- The encryption technique is simple but not easy to crack. It uses
- multiple keys, which contribute to the encryption key. Thus there is not
- any one key, especially the alterable Code Key which will provide a clue
- to crack the encryption code. The period of repeat is very long, and
- this too make the decoding of the cipher very difficult. Thus it highly
- unlikely that anyone desiring to intercept a file you are sending, would
- be successful in deciphering it, unless they were to use Encrypt, AND had
- the Code Key you were using.
-
- Encrypt uses a command-line argument of the form: <path\filename>
- to tell it what file it is to act upon... the file must be a SPECIFIC
- EXISTING file... DO NOT USE "WILD CARDS"!.
-
- The Code-Key is one of the components of the encrypting key... and
- it can be changed to suit. The Code-Key is an ASCII String of characters
- including spaces (but not control characters or extended-ASCII
- characters) up to twenty (20) characters in length. To change the
- Code-Key run Encrypt without an argument, and follow the instructions.
-
- Encrypt TOGGLES a file... if the file is readable, it will encrypt
- it and if it is encrypted it will make it readable IF the Code Key
- matches that which was used to encrypt it. If you attempt to decode a
- file that you previously encrypted with a different Code Key, the file
- will be encrypted further, and YOU MUST TOGGLE IT BACK, THEN CHANGE THE
- CODE KEY to that which was originally used to encrypt the file and decode
- it. WARNING If you encrypt a file, change Code Key, and forget what the
- Code Key was for the file, you will not be able to retrieve the file. IF
- YOU DO NOT KNOW THE CODE KEY USED TO ENCRYPT A FILE, YOU CANNOT DECODE
- IT! Use caution when changing Code Keys... keep in mind what the old
- Code Key was in case you find a file encrypted with it that you need to
- decode! (this can be kept in a log, as explained below...)
-
- Encrypt creates a log file to help you remember what you've done
- with it. This file can help you by showing you what Code Key was used on
- what files, and when the Code Key was changed. It also can help a person
- figure out how to decode your stuff... so you may want to keep it secure!
- The log-file will be located in the directory with Encrypt.exe. When
- you set the Code Key, you have the option of turning file use logging off
- or on (Encrypt is shipped with it ON, but default when setting is OFF) if
- you do not turn it on, Encrypt will only log the changes you make to the
- Code Key. If you turn file usage logging ON, it will log every usage of
- Encrypt.
-
- For FidoNet Sysops operating NetInfo as a Host, the following
- example of a batch file is offered:
-
- NetInfo c:\FidoNet\NetMail c:\FidoNet\NetFile
- if errorlevel 10 goto codeboth
- if errorlevel 8 goto codeshort
- if errorlevel 2 goto codelong
- if errorlevel 0 goto main
- :codeboth
- Encrypt c:\FidoNet\NetFile\NetInfo.lst
- :codeshort
- Encrypt c:\FidoNet\NetFile\NetInfo.txt
- goto main
- :codelong
- Encrypt c:\FidoNet\NetFile\NetInfo.lst
- goto main
-
- Keep in mind that once you setup to use Encrypt with NetInfo you
- will have to distribute Encrypt to each Sysop using NetInfo off of your
- system, and you will have to use the same Code-Key! The Code-Key can be
- altered at any time it is required and the new Code-Key given to the
- appropriate Sysops who will be using it.
-
- About Licensing... Encrypt is copyrighted material, and all rights
- to it are reserved. You can use it for a limited time to try it out...
- but must register it for continued use. License fees are reasonable, and
- FidoNet Sysops operating a Public accessible, non-fee, Bulletin Board
- System, or FidoNet Sysops operating a "Host" mail-only system which is
- operated on a non-fee basis serving others in the FidoNet, will find the
- registration fee to be very reasonable... commercial users, Government
- users, and anyone who charges users a fee will pay a little more for the
- use of Encrypt. <This is my policy on all of my FidoNet utilities>
- Also those who register NetInfo, will receive the use of Encrypt as a
- bonus...
-
- For further information, comments, criticism, or to register the use
- of Encrypt, please contact me at:
-
- G. K. Pace
- 3935 Baker Ave.
- Titusville, Fl. 32796
- (407)269-3088 (voice)
- (407)269-9844 (BBS)
- FidoNet @ 1:374/26
-
- PS: Have a good day!
-
-