home *** CD-ROM | disk | FTP | other *** search
- SHAREWARE NOTICE
-
-
- All programs and accompanying files which constitute PC Padlock are
- copyrighted software, to which Del Mar Software retains all ownership and
- rights.
-
- You may freely distribute this software, as long as all files are included and
- free of modification. All copyright notices must remain intact.
-
- It is being distributed here as shareware, and Del Mar Software grants you the
- right to freely use it for a period of thirty (30) days. If after this trial
- period you find it to be of value and wish to continue using it, you must
- purchase a copy by registering your shareware.
-
- Failure to abide by the above criteria is a violation of 17 United States Code
- sections 101 through 810.
-
- There are several additional benefits gained from registering. These include:
-
- * A professionally printed and bound User's Manual.
-
- * Free automatic updates for a period of six months on minor releases, with
- reduced prices on major releases.
-
- * Advance notice and reduced prices on new products.
-
- * Unlimited free technical support via a toll-free telephone number.
-
-
-
- Del Mar Software makes no warranties of any kind with regard to the program
- or printed matter comprising the product. This includes, but is not limited
- to, implied warranties of merchantability, fitness for a particular purpose,
- and any damages arising from the use of this product, whether consequential or
- incidental.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC PADLOCK REGISTRATION FORM
-
-
-
-
- Your name : _________________________________________________________________
-
-
- Company name : ______________________________________________________________
-
-
- Address : ___________________________________________________________________
-
-
- City : _____________________________ State : __________ Zip : _______________
-
-
- Please specify which media you prefer :
-
- [] 5 1/4" DD (360K)
-
- [] 3 1/2" HD (1.44 Meg)
-
-
-
- Please send $30.00 in cash, check, or money order to :
-
-
- Del Mar Software
- 1551 Old Mill Crossing
- Marietta, GA 30062
-
-
- You may also register through Public (software) Library, using your MC, Visa,
- AmEx, or Discover card if desired. Del Mar Software does not accept these
- cards directly. To contact PsL :
-
- In USA.....(800) 242-4PsL
- Overseas...(713) 524-6394
- FAX........(713) 524-6398
- CIS........71355,470
-
- Ask for PsL product number 10767.
-
- THESE NUMBERS ARE FOR ORDERING ONLY. Del Mar Software can NOT be reached at
- those numbers. For information on dealer pricing, volume discounts, site
- licensing, shipment status of your order, latest version number, technical
- information, or returns, please write to Del Mar Software directly at the
- above address or call (404) 977-0419.
-
- Also, you may register online through CompuServe, by typing "GO SWREG" and
- using registration ID #695.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC PADLOCK (TM)
-
-
- Copyright (c) 1992,1993 Del Mar Software
-
-
- USER'S MANUAL
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC PADLOCK (TM) is a trademark of Del Mar Software
-
-
-
-
- CONTENTS
-
-
- INTRODUCTION 1
-
- SYSTEM REQUIREMENTS 2
-
- INSTALLATION PROCEDURE 3
- Installation directory 3
- File copying 3
- Autoexec.bat modification 3
-
- RUNNING PC PADLOCK 4
- The PC Padlock screen 4
- Lock 5
- Unlock 6
- Clear 6
- Encrypt 6
- Decrypt 7
- Purge 8
- Quit 8
-
- APPLYING PC PADLOCK 9
- Maximum protection 9
- Medium protection 9
- Minimum protection 9
- Special cases 9
- Automatic padlock 9
- Other uses 10
-
- IN CASE OF DIFFICULTY 11
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- INTRODUCTION
-
-
- Thank you for your purchase of PC Padlock from Del Mar Software. PC Padlock
- provides the user with a floppy disk security system for DOS-based computers.
- Once locked with a password, a disk's contents cannot be viewed, edited,
- deleted, or even listed by any DOS command or application program. This is
- especially useful in protecting data disks used for word processors,
- spreadsheets, desktop publishers, financial software, or any other application
- that writes data to a floppy. Any confidential information is safe from
- prying eyes with PC Padlock.
-
- In addition to locking, disks may also be encrypted, protecting them from all
- disk repair utilities should they be lost or stolen. Disk encryption renders
- every active file data area of a disk indecipherable. Would-be thiefs and
- snoops with your disk, the expertise, and time on their hands will never see
- your confidential data.
-
- Disk clearing is also offered, to handle all inactive file data areas, such as
- those left behind when a file is deleted or shortened through editing or
- overwriting. The data in these areas is destroyed, and all evidence of any
- old files is removed.
-
- PC Padlock also includes individual file encryption, which makes text files
- unreadable and program files unexecutable. Wildcards are accepted to allow
- encrypting multiple files in a single pass.
-
- And lastly, file purging is available as a secure alternative to the DOS
- "delete" command. This works like disk clearing, destroying all the file's
- data and removing all traces of it's former existence. Purged files cannot be
- undeleted by any DOS command or third party utility.
-
- As part of the total security package, all failed attempts to unlock a disk or
- decrypt a file are stored for later notification of the user. The date, time,
- drive, and file name (if applicable) are displayed for each attempt.
-
- If you own PC Padlock's companion program, Menu Pro, it will install itself in
- Menu Pro's "Setup" pulldown, so it is always available when you need it.
-
- All these features are presented in a full-screen application which offers
- mouse support and on-line help. Scrollable file lists and disk information
- areas make PC Padlock extremely user-friendly.
-
- Although PC Padlock is a DOS application, it may be run as such from within
- Microsoft Windows V3.0 or higher.
-
- You will find many uses for PC Padlock, whether you are carrying disks back
- and forth from the office, storing personal information, or protecting
- confidential company data.
-
-
-
-
-
-
-
-
- -1-
-
- SYSTEM REQUIREMENTS
-
-
- * Any IBM or 100% compatible machine.
-
- * MS-DOS version 2.1 or higher.
-
- * At least 90K of available (free) RAM memory.
-
- * Any monitor, although color is supported if available.
-
- * A hard drive with at least 90K of free disk space.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -2-
-
- INSTALLATION PROCEDURE
-
-
- INSTALLATION DIRECTORY
-
- First, decide in which directory you want to place the program file. It can
- be an existing directory you have already set up for miscellaneous utility
- files, or an entirely new one. If you decide to place the file in a new
- directory, it is advisable to place it directly under root. For example, if
- the name of this new directory is "pcpl", simply enter "mkdir \pcpl" from the
- DOS command line.
-
- FILE COPYING
-
- You now need to copy the ".exe" file into the chosen directory. To do this,
- first change to the drive and/or directory where the program file is now.
- Then, use the copy command from DOS to place it in the proper directory. For
- example, let's say the program file is currently in a directory called
- "c:\download", and you wish to copy it to the "c:\pcpl" directory. First,
- enter "chdir c:\download" from DOS to change to the directory containing the
- file. Next, enter "copy padlock.exe c:\pcpl" to copy the file.
-
- AUTOEXEC.BAT MODIFICATION
-
- The path is a list of directories which tells DOS where to search for programs
- that aren't contained in the current directory. The path is usually defined
- in your autoexec.bat file, which activates it every time you boot your
- computer. Including the installation directory in your path enables you to
- run the programs regardless of what directory you are currently in. If your
- chosen installation directory is not in your current path, you will need to
- add it to the path statement in your autoexec.bat file. Using your favorite
- text editor, find the line in the file that begins with "path" or "path=".
- Then, add ";c:\pcpl" to the end of this line. If no such line appears in your
- file, or you have no such file in your root directory, insert the line
- "path c:\pcpl", creating the file to hold it if necessary. If your chosen
- installation directory is not "pcpl", substitute the correct name in the above
- examples.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -3-
-
- RUNNING PC PADLOCK
-
-
- You may only use PC Padlock on disks that have the same density as the drive
- itself. In other words, 360K floppies may not be secured in a 1.2 meg drive,
- nor can 720K floppies be secured in a 1.44 meg drive. Attempts to use PC
- Padlock on low density disks in a high density drive may result in a loss of
- disk contents and integrity.
-
- For a brief description of the command, type "padlock /?" at the DOS prompt
- for a help message.
-
- The normal way to start PC Padlock is to simply enter "padlock a:" from the
- DOS command line. If the drive containing the disk to be secured is not in
- the A drive, replace the "a:" with the appropriate drive letter followed by a
- colon. If you enter a non-existent or hard drive letter, you will be informed
- that securing this disk is not possible.
-
- If you get a "Bad command or file name" error from DOS, it probably means that
- you did not let the installation program modify your path to include the
- installation directory, or you have not rebooted your computer since
- installation to let the new path take effect. Refer to the INSTALLATION
- PROCEDURE chapter preceding this one for the importance of doing these things
- and the consequences of not. If you find that you need to modify your path
- now, edit your autoexec.bat file located in the hard disk's root directory.
- Find the line that begins with "path " or "path=" and then add ";c:\pcpl" to
- the end of the line. If no such line exists, add the line "path c:\pcpl" at
- the top of the file. (If your installation directory is not "pcpl", enter the
- correct directory in the preceding examples.)
-
- THE PC PADLOCK SCREEN
-
- The PC Padlock screen is divided into four main areas - the menu strip, the
- file list area, the user interface, and the disk information area. The menu
- strip is a row of colored blocks across the top of the screen, displaying the
- different functions available. They are Lock, Unlock, Clear, Encrypt,
- Decrypt, Purge, and Quit. To use these functions, simply position the mouse
- cursor over the desired block and click the left button. Or, you may hit the
- keyboard key corresponding to the highlighted capital letter in the block.
-
- Below this, the left half of the screen comprises the file list area. Files
- are listed here if the disk is unlocked; otherwise, this area is blank. You
- may scroll through the file list a page at a time by clicking left on the
- PageUp or PageDn blocks, or hitting the corresponding key on the keyboard.
- The Specify block, however, is only active during the Encrypt, Decrypt, and
- Purge functions. It will be explained later.
-
- Across from the file list area, the upper right side of the screen is called
- the user interface area. The top two lines are usually blank, but display
- prompts for user input and error messages when necessary. The next line
- displays the disk status, which will either be unlocked, locked, or locked &
- encrypted. The last line in this area reminds you the F1 key may be used to
- obtain on-line help screens.
-
- Beneath the user interface is the disk information area. For unlocked disks,
-
-
- -4-
-
- this displays the disk volume label (if present), total disk space, number of
- encrypted files on the disk, encrypted file bytes, number of normal files,
- normal file bytes, number of deleted files, total number of files, total file
- bytes, and the free space left on the disk. For locked disks, the values for
- these items are blank.
-
- LOCK
-
- Disk locking is accessed by clicking the left mouse button over the Lock
- block, or hitting the L key on the keyboard. Locking prevents a disk's
- contents from being viewed, edited, deleted, or even listed by any DOS command
- or application. You will be asked for a locking password which cannot exceed
- twelve characters in length, and is case sensitive. This means that lower
- case letters (such as "abcd") are considered different than upper case ones
- (such as "ABCD"). Please be aware of the status of your Caps Lock key as you
- enter your password, as the characters you type will not be echoed to the
- screen, but displayed as asterisks. You will then be asked to re-enter the
- password, to make sure you typed correctly the first time.
-
- NOTE
-
- It is extremely important to remember all passwords used in PC Padlock. If
- there is any possibility of forgetting a password, you may want to write it
- down somewhere in a safe place away from the computer. Once used, there is no
- way of determining PC Padlock passwords. If you should forget one, your only
- recourse is to send the floppy disk to Del Mar Software. We will unprotect
- the disk and return it to you for a ten dollar service charge.
-
- After locking, you will be asked for permission to encrypt the disk. For
- disks containing large or numerous files, this may take a while, but is
- absolute protection should the disk be lost or stolen. Why? An expert data
- thief with enough private time may be able to use disk repair or sector editor
- utilities to bypass DOS and view raw file data. Disk encryption ensures that
- if a would-be snoop has the time, expertise, and resources to get that far,
- the data he views will be indecipherable.
-
- Disk encryption may not be run on a disk that contains individually encrypted
- files (see the "Encrypt" section later in this chapter). If the disk contains
- any encrypted files, you will be informed that disk encryption is not
- possible.
-
- The entire disk is scanned, and all active file areas are encrypted. This may
- take anywhere from a few seconds for one or two small files up to several
- minutes for a full high-density disk.
-
- Before this process begins, you are also asked permission to clear the disk.
- In contrast, clearing takes care of all inactive file areas, and takes longer
- on disks with a lot of free space. These inactive areas contain data left
- behind when a file is deleted, shortened through editing, or copied over with
- a shorter file of the same name. This abandoned data is completely destroyed,
- and all evidence of it's former existence and file names is removed. The
- "undelete" command of DOS V5.x, or any other third-party utility, will not be
- able to recover these files. Because of this clearing process, you must be
- sure there are no deleted files you may want to undelete later. If there are,
- you must undelete the files before starting disk clearing.
-
-
- -5-
-
- As a possible time-saver, you need not run clearing during locking if you are
- sure no deleted or shortened files have been added to the disk since the last
- clear. As an aid to deciding when to use clearing, check the "Deleted files"
- line of the disk information area. If there is just one deleted file on the
- disk, you should run clearing to destroy this old data. Be advised, however,
- that although a disk may contain no deleted files, it may still contain
- inactive file areas from files that were edited or copied. When in doubt, use
- clearing for maximum protection.
-
- As the disk is encrypted and/or cleared, a meter will appear in the user
- interface area to show you the completion percentage of the process. When
- done, the new disk status is displayed, and you are returned to DOS.
-
- UNLOCK
-
- You may unlock a disk by clicking the Unlock block or hitting the U key. This
- function returns a disk to it's original condition, just as if PC Padlock had
- never been run. You will be asked to enter the same password used to lock the
- disk originally. If you are successful, the disk will be unlocked and
- automatically decrypted if needed. If not, an entry will be made in the
- intrusion file denoting the date, time, and drive of the failed attempt. The
- next time you run PC Padlock, you will be notified of these failed attempts.
-
- If you own Menu Pro and have installed PC Padlock in the same directory, these
- attempts will instead go into Menu Pro's intrusion file. They will then be
- viewed the next time you run Menu Pro.
-
- After unlocking and any needed decryption, the file list and disk information
- area will fill with the appropriate data, and you may work further on the disk
- if desired.
-
- CLEAR
-
- This function is accessed by clicking the Clear block or hitting the C key on
- the keyboard. It operates identically to the clearing offered when locking a
- disk, but is offered separately for such jobs as processing old disks. Disks
- that have been previously used may contain old data in inactive file data
- areas. If you wish to only encrypt files already on these disks, you should
- run clearing first to remove this old data. Then individual files may be
- encrypted and the disk locked, if desired (clearing during locking is then not
- necessary). This ensures no old confidential data will be discovered should
- the disk be lost or stolen.
-
- Even reformatting these used disks is no safeguard, as DOS doesn't touch the
- file data area when reformatting. When reusing an old disk, you should always
- clear the disk after formatting. This can be done either during locking or
- separately.
-
- ENCRYPT
-
- Encrypt may be accessed by clicking the Encrypt block or hitting the E key on
- the keyboard. Encrypting causes a text file to become unreadable, and a
- program file unexecutable. It is safe from prying eyes until decrypted with
- the correct password.
-
-
-
- -6-
-
- When you choose encryption, a blue bar will highlight the first file in the
- file list area. You may use the PageUp or PageDn blocks or keyboard keys as
- described earlier until the desired file appears in the list. Then, using the
- mouse, you may ignore the bar and click the left button when the cursor is
- over the desired file entry. Or, using the keyboard, you may move the bar
- with the Up and Down Arrow keys until the desired file is highlighted and then
- hit Return.
-
- As an alternative, you can click the Specify block at the top of the file
- list, or hit the S key. You will then be asked to enter a file name. This
- file name may contain wildcards, to allow encrypting more than one file at a
- time. For example, if you wish to encrypt all files with an extension of
- ".txt", you should enter "*.txt" for the file name. Consult your DOS manual
- if you need further assistance using wildcards in file names. As each file is
- found that matches your specification, it is moved to the top of the list and
- highlighted.
-
- For each file processed by any of the above methods, you will be asked to
- enter a password. It cannot exceed eight characters in length, and like a
- disk locking password, is case sensitive. You are required to enter the
- password again, to confirm you typed correctly the first time.
-
- As the file is processed, a meter in the user interface area will inform you
- of the encryption progress. When done, the meter will disappear and the
- letter "E" will appear at the end of the file's entry in the file list area.
- This lets you look at the file list and instantly know which files are
- encrypted.
-
- To stop selecting files for encryption, you may click the right mouse button
- or hit the Escape key. This will cause the blue highlight bar to disappear,
- and you are then free to choose another function or quit PC Padlock.
-
- Note that individual file encryption does not work like disk locking - the
- file may still be viewed, edited, or even deleted. Viewing or editing will do
- little good, however, as the data will be indecipherable to the user. For
- maximum protection, however, you should lock a disk to prevent file deletion.
-
- You may use standard DOS commands to rename, delete, or change attributes on
- an encrypted file. However, you should never copy an encrypted file. If you
- do copy one to another name or location, PC Padlock will not identify or
- process the file correctly.
-
- DECRYPT
-
- You select decryption by clicking the Decrypt block or hitting the D key.
- When doing so, a cyan highlight bar will appear, and file selection is handled
- as explained previously in the encryption section. Entry of the correct
- password causes the appearance of the progress meter and the decryption of the
- file. When done, the letter "E" disappears from the end of the file's entry
- in the file list area.
-
- You will be given two chances to input the correct password. After that, the
- program records the failed attempt and returns to DOS. The next time you run
- PC Padlock, you will be notified of all such intrusion attempts. However, if
- you have Menu Pro installed in the same directory as PC Padlock, these failed
-
-
- -7-
-
- attempts will instead be stored in Menu Pro's intrusion file. In this case,
- you will then be notified the next time you run Menu Pro.
-
- PURGE
-
- You may purge a file by clicking on the Purge block or hitting the P keyboard
- key. File selection is handled with a brown highlight bar as described
- previously. It is the secure alternative to the DOS "delete" or "erase"
- command. When DOS deletes a file, it merely marks the space it occupied as
- reusable, and flags the file so DOS ignores it. All the file's data remains
- on the disk until written over. Purging a file destroys all this data and
- completely removes all traces of the file's former existence. It is then
- marked with the letter P in the file list area. Purged files cannot be
- undeleted.
-
- QUIT
-
- You may quit PC Padlock by clicking the Quit block, or by hitting the Q key on
- the keyboard. The Escape key will also end the program.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -8-
-
- APPLYING PC PADLOCK
-
-
- PC Padlock's features may be used individually or combined, tailoring it's use
- to your particular needs. Here are a few suggestions :
-
- MAXIMUM PROTECTION
-
- You have a data disk which contains confidential company information - trade
- secrets, formulas, patent information, software source code, or other such
- proprietary data. It is not accessed on a daily basis, and therefore stored
- somewhere. If not starting with a new, unformatted disk from the box, you
- should clear the disk first. Then, keep it locked and encrypted when not in
- use, updating the clearing when any files are shortened through editing or
- copying. While in use, do not delete files from DOS, but use PC Padlock's
- Purge function instead. Your data will be totally safe.
-
- MEDIUM PROTECTION
-
- You have a disk which contains company data - projections, sales, new product
- information, or other similar data. It is accessed several times a day, but
- never leaves your office. No unauthorized personnel will have access to the
- disk for extended periods during the day. You should keep the disk locked and
- encrypted overnight, with clearing as needed. During the day while it is
- being used, however, you may only opt for locking alone.
-
- MINIMUM PROTECTION
-
- You have personal data on a disk at work or home which you wish to keep
- private. It is accessed many times during the day, so you need a protection
- scheme that is quick and easy. You only wish to keep the data safe from any
- casual users who may inadvertently place the disk in your drive. In this
- case, locking only should meet your needs.
-
- SPECIAL CASES
-
- You use a data disk that is used by others, and wish to keep your files on
- that disk private. You should individually encrypt the desired files.
-
- You are giving someone a test via floppy disk. The disk contains reference
- material, the test itself, and the answers. You need to make sure the user
- cannot read the file containing the answers until he has completed the test.
- You should encrypt the answer file, and give the user the password to decrypt
- the answers when you deem appropriate.
-
- AUTOMATIC PADLOCK
-
- Many users will want to unlock their disk and/or decrypt files, run an
- application, and re-secure the disk when done. Instead of entering three
- commands from DOS to do this, you may create a batch file to accomplish the
- task. Let's say your drive containing the data disk is the A drive, and you
- normally type in "spreadsheet info.doc" to run your application. You may
- create the following batch file called "spread" with any text editor :
-
-
-
-
- -9-
-
- padlock a:
- spreadsheet info.doc
- padlock a:
-
- Now all you have to do is enter "spread" from DOS to unprotect your disk, use
- your application, and secure the disk again.
-
- If the name of the data file you work on changes periodically, you may replace
- the second line of the batch file with "spreadsheet %1". This allows you to
- enter "spread filename" from DOS, where "filename" is the name of the desired
- data file.
-
- OTHER USES
-
- With a little imagination, the uses for PC Padlock can be limitless. Always
- bear in mind, though, that any disk that may fall into unfriendly hands for
- extended periods of time needs to be encrypted for maximum protection.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -10-
-
- IN CASE OF DIFFICULTY
-
-
- DOS GIVES A "Bad command or file name" ERROR WHEN I TRY TO RUN PC PADLOCK.
-
- The directory which contains the program (the installation directory) is
- probably not in your current path. To check this, type "path" from the DOS
- prompt. If the installation directory does not appear in the list DOS
- responds with, you need to add it to your path. Refer to the note at the
- beginning of the RUNNING PC PADLOCK chapter on how to do this.
-
- PC PADLOCK DOES NOT RUN, GIVING AN "Abnormal program termination" ERROR.
-
- You may have entered an invalid path name or have a DOS version earlier than
- V2.1.
-
- PC PADLOCK WILL NOT RECOGNIZE MY PASSWORD ALTHOUGH I AM SURE IT IS CORRECT.
-
- All passwords used in PC Padlock are case sensitive. That means that lower
- case letters, such as "abcdef", are considered different characters from upper
- case ones, such as "ABCDEF". Hit the Caps Lock key and try your password
- again. If this does not work, it is either the incorrect password, or you may
- have mixed lower and upper case letters in the password (although this is
- unlikely).
-
- There is absolutely no method to view, edit, or delete the password. Please
- refer to the note in the "Lock" section of the RUNNING PC PADLOCK chapter for
- more information.
-
- PC PADLOCK GIVES A "cannot read disk" ERROR, BUT I AM SURE IT IS FORMATTED, IN
- THE DRIVE, AND THE DRIVE DOOR IS CLOSED.
-
- The floppy disk is probably not the correct density - double density drives
- can only secure double density disks, and high density drives can only secure
- high density disks. Attempts to secure low density disks in a high density
- drive may result in a loss of disk contents and integrity.
-
- I COPIED AN ENCRYPTED FILE AND PC PADLOCK SAYS THE COPY IS NOT ENCRYPTED, BUT
- WHEN I VIEW THE FILE, IT IS. HOW MAY I STRAIGHTEN IT OUT?
-
- You should never copy an encrypted file to another name, directory, or drive.
- Doing so destroys internal flags that tell PC Padlock the file is encrypted.
- The simplest solution is to decrypt the original source file, copy the source
- file again to overwrite the damaged file, then encrypt both the original and
- the copy.
-
- If this is not feasible (the original source file has been purged, etc.), you
- must encrypt the copy of the encrypted file (which will actually decrypt the
- file), then copy it to another name. Copying must be used - renaming will not
- work. This will return the file to normal, and you can manipulate it with DOS
- and/or encrypt it as you wish.
-
-
-
-
-
-
- -11-
-
- I CANNOT ACCESS ANY FILES IN SUBDIRECTORIES I HAVE ON MY FLOPPY DISK.
-
- This is normal, as PC Padlock was designed to work on data disks used in word
- processors, spreadsheets, and other such applications which don't normally use
- subdirectories on their data disks. Although you can use PC Padlock on any
- floppy disk, it is not set up to descend the directory structure. You can
- protect files in subdirectories, however, by encrypting the entire disk during
- locking. This is as safe and secure as individual file encryption.
-
- I AM STILL UNABLE TO SOLVE MY PROBLEM. HOW MAY I RECEIVE TECHNICAL
- ASSISTANCE?
-
- Simply call Del Mar Software. In local Atlanta, dial 977-0419. Outside of
- the 404 area code, call 1-800-845-9752. Or, you may leave mail on CompuServe
- to user ID # 76570,3342.
-
- IS THIS VERSION OF PC PADLOCK COMPATIBLE WITH EARLIER VERSIONS?
-
- Yes and no. This version will unlock and decrypt disks protected with any
- earlier version. However, disks secured with V2.1 cannot be unlocked or
- decrypted by these earlier versions.
-
- Your conversion from an earlier version is simple - merely unprotect the old
- disks with V2.1 and continue to use this new version.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -12-
-
-