home *** CD-ROM | disk | FTP | other *** search
-
- ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
- ███████ ███████ ██████
- ██ ██ ██ ██
- ███████ ██████ ██ ██
- ██ ██ ██ ██
- ██ ███████ ██████
-
- ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
- F.E.D. - File Encryptor & Decryptor
-
- SHAREWARE Version 1.1 (14/01/96)
-
- Copyright (c) by Jorge Ferreira
-
- E-Mail : i17879@caravela.di.fc.ul.pt
-
- ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
-
-
-
- [ FAQ'S ]
- *******
-
-
- >> What is F.E.D. ?
-
- F.E.D. is a DOS program to encrypt and decrypt all kind of data files (*.txt,
- *.exe, *.zip, ...), based on a single private key (password). So if you want
- to safe guard any files, and have an exclusive access to them, then this
- program is a good solution to that problem !
-
-
- >> What is encryption ?
-
- Encryption is the transformation of data into a form unreadable by anyone
- without a secret decryption key (password).Its purpose is to ensure privacy by
- keeping the information hidden from anyone for whom it is not intended, even
- those who can see the encrypted data. For example, one may wish to encrypt
- files on a hard disk to prevent an intruder from reading them.
-
-
- >> How does F.E.D. works ?
-
- F.E.D. uses the best and oldest known form of encryption : encryption with
- a private key (password) - that is used to conceal data with a set of
- mathematical transformations. This method of encryption is "almost" unbreakable,
- because there are enormous combinations for building a private password, and
- the mathematical formulas for the data transformations are not to be in public
- knowledge.
-
- "The longer is the password the most secure is the encryption !"
-
-
- |----------------------------------->» * «<------------------------------------|
-
-
- [ How To Use F.E.D. ]
- *******************
-
-
- To use F.E.D. the user has two possible ways: as a command line, or as a menu
- driven utility. The first way (command line) is only recommended for testing
- the program or something else associated to it, because if there is installed
- any TSR program as the "DOSKEY", the password used will be available to other
- persons, before the computer is turned off !
-
-
- >> F.E.D. as a command line utility :
-
-
- Usage : "FED <option> <algorithm> <-i file1> <-o file2> <-p password>"
-
- <option> : "e" to encrypt file1 to file2
- "d" to decrypt file1 to file2
-
- <algorithm>: "a" to use algorithm A
- "b" to use algorithm B
-
-
- The user as to take in consideration that the Spaces are considered as
- separators of arguments, so if Spaces are used in the "password" field, that
- field only will have the next imediate word. So if the user wiches to have
- Spaces in the "password" field, it must use F.E.D. as a menu driven utility !
-
-
- To get help in the DOS prompt type "FED -h".
-
-
- Note: the algorithm B is a lot slower than the algorithm A because of the
- ~~~~ method used that is much more secure, but the "price" is the slower
- speed of processing the file !
-
-
- >> F.E.D. as a menu driven utility :
-
-
- After executing "FED.EXE", you have tree options to choose from :
-
- [e] -> option to encrypt a file
- [d] -> option to decrypt a file
- [q] -> to quit to DOS
-
-
- Then when choosing [e] or [d], you have to choose the algorithm to be used
- for the encyption or decryption :
-
- [a] -> uses algorithm A
- [b] -> uses algorithm B
-
-
- Finally you just have to answer the four questions that are used to inform the
- program which is:
-
-
- (1) The file to be encrypted/decrypted :
-
- It's the path+name of the file that you want to encrypt or decrypt.
-
-
- (2) The output file name to contain the result of the chosen operation :
-
- For safety reasons the output filename can't be the same as the input
- filename, in any situation.
-
-
- (3) The password to encrypt/decrypt the file :
-
- The password used in this program, can have at most 20 ASCII characters,
- and is case sensitive.
-
- Don't use obvious passwords like your name, your birthday, or anything
- that may be related with you. Try to use passwords that have more than
- one word, and never write in paper that password.
-
-
- (4) The confirmation of the password :
-
- During the encryption of a file, the password needs to be confirmed
- because once a file is encrypted with a certain password, it can only
- be restored back (decrypted to it's original form), if the password
- given at decryption time is the same that was used to encrypt it. If
- the password's on the encryption and decryption of a file don't match,
- then the file can not be restored to the original form !
-
- So it is very important that you NEVER forget the encryption password.
-
-
- Note: the algorithm B is a lot slower than the algorithm A because of the
- ~~~~ method used that is much more secure, but the "price" is the slower
- speed of processing the file !
-
-
- * WARNING * : if the output file name already exists, but is different
- ~~~~~~~~~~~ then the input file name, F.E.D. will overwrite it !
-
-
-
- "Then the magic occurs !"
-
- |----------------------------------->» * «<------------------------------------|
-
-
- [ Files Included ]
- ****************
-
-
- F.E.D. version 1.1 includes:
-
-
-
- Filename Description
- ------------ ----------------------------
-
- FED.DOC This text file;
- FED.EXE F.E.D. executable file;
- FILE_ID.DIZ Program description file;
- WHATSNEW.DOC Changes since the launch of F.E.D.;
- TEST_A.BAT Makes a test by encrypting "FED11.ARJ" (with the
- algorithm A), decrypting "FED11_A.CPT" and testing
- the output file "FED11_A.ARJ";
- TEST_B.BAT Same as TEST_A.BAT but with the algorithm B.
-
-
- |----------------------------------->» * «<------------------------------------|
-
-
- [ Safety of The Program ]
- ***********************
-
-
- This program was fairly tested with success with all kind of files: text
- and binary files, big and small files, ..., but it isn't to be trusted 100% !
-
- If the wrong use of this program on any data files produces some damage to
- them, then the author is not to be blamed for ! ( See the disclaimer agreement
- in the end of this file ).
-
-
- * WARNING * : if the output file name already exists, but is different
- ~~~~~~~~~~~ then the input file name, F.E.D. will overwrite it !
-
-
- |----------------------------------->» * «<------------------------------------|
-
-
- [ Shareware License ]
- *******************
-
-
- Shareware distribution gives users a chance to try software before buying it.
-
- If you try a Shareware program and continue using it (generally for more than
- one month), you are required to register it ( or purchase the licensed version
- as in the case of F.E.D. ).
-
- Copyright laws apply to both Shareware and retail software, and the copyright
- holder retains all rights, with a few specific exceptions as stated below.
- Shareware authors are accomplished programmers, just like retail authors, and
- the programs are of comparable quality (in both cases, there are good programs
- and bad ones!). The main difference is in the method of distribution. The
- author specifically grants the right to copy and distribute the software,
- either to all and sundry or to a specific group. For example, some authors
- require written permission before a commercial disk vendor may copy their
- Shareware.
-
- Shareware is a distribution method, not a type of software. You should find
- software that suits your needs and pocketbook, whether it's retail or Shareware.
- The Shareware system makes fitting your needs easier, because you can try
- before you buy. And because the overhead is lower, prices are lower also.
- Shareware has the ultimate money-back guarantee -- if you don't use the product,
- you don't pay for it.
-
-
- |----------------------------------->» * «<------------------------------------|
-
-
- [ Distribution Requirements ]
- ***************************
-
-
- The shareware version of F.E.D. may be freely distributed, with the following
- restrictions: written permission must be received to distribute F.E.D. on
- retail racks, on CD Rom's, or bundled with any other product.
-
- You are encouraged to pass a copy of the shareware version of F.E.D along to
- your friends for evaluation. If you do so, you must provide them with the
- entire set of F.E.D. shareware version files.
-
-
- |----------------------------------->» * «<------------------------------------|
-
-
- [ Registration Information ]
- **************************
-
-
- "Why should I register ?" ( are you thinking )
-
- First of all, if you like this program and have some use for it, then don't
- think twice, make you registration now !
-
- The second reason is because this shareware version only encrypts files with
- a maximum of 30 Kbytes !
-
- The third and the most strong reason, is if you are using this shareware
- version of F.E.D. for more than 30 days, then you are VIOLATING the shareware
- license that is conceded to you for the only purpose of knowing the program !
-
- To register this program and to get a registered version of F.E.D. you just
- have to send $10 ( American dollars ) to the following address :
-
- Jorge M. P. Ferreira
- R. Alfredo Roque Gameiro Nº3 - 3º ESQ.
- 1600 Lisboa
- PORTUGAL
-
- Send also your address so I can send you a disk with F.E.D., or your E-Mail
- address, if you prefer to receive the program via Internet.
-
-
- |----------------------------------->» * «<------------------------------------|
-
-
- [ DISCLAIMER OF WARRANTY ]
- *************************
-
-
- F.E.D. IS SUPPLIED "AS IS". THE AUTHOR HEREBY DISCLAIMS ALL
- WARRANTIES RELATING TO THIS SOFTWARE, EXPRESS OR IMPLIED,
- INCLUDING BUT NOT LIMITED TO DAMAGE TO HARDWARE, SOFTWARE AND/OR
- DATA FILES FROM USE OF THIS PRODUCT. IN NO EVENT WILL THE AUTHOR
- OF THIS SOFTWARE BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY DAMAGES.
-
- YOUR USE OF THIS SOFTWARE INDICATES THAT YOU HAVE READ AND AGREE TO
- THESE TERMS AND OTHER WARNINGS INCLUDED IN THIS DOCUMENTATION FILE.
-
- IT IS UNDERSTOOD THAT OCCASIONAL "BUGS" OR UNFITNESS MAY ARISE.
- THE USER SHOULD ALWAYS TEST THIS SOFTWARE THOROUGHLY WITH NON-CRITICAL
- DATA FILES BEFORE RELYING ON IT.
-
-
-
- |------------------------------------------------------------------------------|
-
-
- "Thank you for using this product ..."