home *** CD-ROM | disk | FTP | other *** search
- DOCUMENTAION FOR LOCK.COM , UNLOCK.COM , MKEY.COM
-
- The programs LOCK, UNLOCK and MKEY are for the protection of
- those very private files you might leave in a shared system,
- or that other people might get a chance to copy off your disks.
-
- 1. TO LOCK A FILE.....issue the following command from A>
-
- LOCK (FILENAME or FILEMATCH) (KEYWORD)
-
- This command will lock one or more files (up to 32). The keyword
- can be up to eight characters (no distinction between upper/lower
- case). Once a file is locked, any attempt to read it with TYPE,
- or ED, or a word processor, or to execute it as a .COM file,
- will result in the following message:
-
- ==<Locked file>==
-
- And if your local spooks get out a debugger such as DDT, or what-
- ever, to look into the file itself, they'll find that the contents
- have been fairly thoroughly scrambled.
-
- 2. TO UNLOCK A FILE...the command is:
-
- UNLOCK (FILENAME or FILEMATCH) (KEYWORD)
- using the same keyword you used to lock it with in the first place.
-
- 3. IF YOU FORGET YOUR KEYWORD...
-
- you are not lost! Use MKEY (My Key). The command is:
-
- MKEY (FILENAME)
-
- The program will give you your keyword. SO...OBVIOUSLY...do not leave
- copies of MKEY lying around or anyone can get back in your file. If
- MKEY must be left in a public area, use LOCK to lock MKEY.COM with a
- keyword THAT YOU WILL NOT FORGET!! And no one else can guess,either.
- You are not protected from people assiduous enough to disassemble the
- programs and break the code. But they'll have to work to do it!
-
- CUSTOMIZING YOUR COPIES. Near the end of each of the three listings
- is a table of "mush" -- random bytes used in the coding process. You
- can customize your copies by altering this table. It will usually be
- sufficient to alter the eight bytes at the address "nmush", which are
- used in coding the keyword. But alter all of it if you wish. Make the
- same alterations in all 3 programs.
-
- M/PM NOTE: The lock-unlock system is more flexible in use (and more
- secure) than M/PM password facilities. Note that for your benefit,
- LOCK alters a .PRL extension to .LRL, and UNLOCK alters it back.
-
- 4/24/84 /\ Author Unknown
- Documentation re-typed and re-worded
- in part by Larry Webb [CIS 70376,1121]