home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Fujiology Archive
/
fujiology_archive_v1_0.iso
/
!MAGS
/
!BONUS
/
COVERDSK
/
STFORMAT
/
STF36.ZIP
/
STF36A.MSA
/
CYPHERII
/
README.DOC
< prev
Wrap
Text File
|
1990-05-28
|
3KB
|
77 lines
CYPHER-II (C) Patrick Mallows 1992
Cypher-II is a security utility, which will scramble any ST file, turning it
into a sticky mess. Scrambled files really are sticky, PRG/TOS files cannot be
executed, text, graphic, data files etc. are completely unreadable and useless.
Scrambled files though, can be easily and rapidly unscrambled.
This is the sequel to Cypher, a program which appeared on ST Format coverdisk
25. The main difference now being that Cypher-II will now encode and decode
any standard ST file, not just Degas and Neochrome files.
This enhancement makes it possible to scramble TOS and PRG files or your top
secret program listings, in fact, anything you want, as long as it is in ST
readable disk format.
I have now designed a faster scrambling routine (PHASENCRYPTION) which is,
until someone proved otherwise, impossible to crack. Cypher-II runs in any
screen resolution and should run on all ST's.
How to use it:
To encode a file, you must first decide on a 4 digit identification number
which you should use all of the time. Use a sequence that you will remember
and that is unique or personal to you, such as your bank card PIN number or
something similar. To enter it, select the CYPHER-II menu heading and click on
PASSWORD. If you don't enter the number now, you will be asked to enter it when
you try to cypher or decypher a file.
Now goto ENCODE FILE and select the file you want to scramble. This will
now be chewed, munched, swallowed and spat out and it's postfix (.PRG,.BAS etc)
will be replaced with .CPH then written to disk, replacing the original file.
To decypher a .CPH file, select DECODE FILE and load the cyphered file. When
unscrambled, the file, now with it's original postfix restored is written to
disk and then the scrambled .CPH file is erased.
**CYPHER-II IS SHAREWARE**
CYPHER-II and all other files in the CYPHER-II folder may be freely copied
and distributed, but must remain together and may not be altered, peeked,
poked, sniffed or tasted.
If you find "CYPHER-II" useful then please register as a user. You can do this
by sending your name and address along with any suggestions etc. to me,
Patrick Mallows, 25 Turpington close, Bromley, kent, BR2 8JP. along with the
registration fee, of five pounds. Please make cheques payable to P.Mallows.
For this you will be receive the instructions and decyphering code to
PERPLEX.CPH. This is a 100 level puzzle game, previously unavailable
and in it's decyphered form, is not public domain.
If you should notice any bugs or find an intersting use for the program, then
please let me know, but if you Cypher your only copy of "TT emulator.PRG" and
forget the code, then don't !!
DISCLAIMER: (or: Don't blame me)
CYPHER-II has been thoroughly tested, and so far has faithfully coded and
decoded all files successfully, the only risk to you is forgetting your
personal code number. If you don't trust your own memory, write it down
somewhere or keep a back-up of any files you should scramble (but that does
defeat the object a bit doesn't it!).
Patrick Mallows Jan 1992.