home *** CD-ROM | disk | FTP | other *** search
/ Shareware Super Platinum 8 / Shareware Super Platinum 8.iso / mac / PROGTOOL / FIP21.ZIP;1 / FIP.TXT < prev    next >
Encoding:
Text File  |  1992-10-09  |  9.2 KB  |  123 lines

  1.  
  2.  
  3.  
  4.                             FIP (File Protect.)
  5.  
  6.                                 Version 2.01
  7.  
  8. …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
  9. ∫                                                                              
  10. ∫                                                                              
  11. ∫              Password Encryption Utility for Executable Files                
  12. ∫              ------------------------------------------------                
  13. ∫                                                                              
  14. ∫              Version 2.1 - (c) Western SoftWare WorkShops 1992               
  15. ∫                                                                              
  16. ∫            This "SoftWare." is Not "ShareWare." You Must Register Your       
  17. ∫       copy of FIP (File Pro.)   Should  you  find  FIP  useful  please       
  18. ∫       contribute $10 to the author at the following address:                 
  19. ∫                                                                              
  20. ∫                 Vince Butera.                                                
  21. ∫                 22740 San Vicente Way.                                       
  22. ∫                 San Jose Ca 95116                                            
  23. ∫                                                                              
  24. ∫            Source  code is available for $35.  This also places you on       
  25. ∫       the mailing list and you will receive all future updates to this       
  26. ∫       program (including new source code) whenever such updates occur.       
  27. ∫            Orders for Source Code Must Include A Sighned Non-Disclosure      
  28. ∫       Agreement with return Self addressed envelope.                         
  29. ∫       --                                                                     
  30. ∫                                                                              
  31. …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
  32. ∫                                                                              
  33. ∫                                                                              
  34. ∫              Password Encryption Utility for Executable Files                
  35. ∫              ------------------------------------------------                
  36. ∫                                                                              
  37. ∫              Version 2.1 - (c) Western SoftWare WorkShops 1992               
  38. ∫                                                                              
  39. ∫                                                                              
  40. ∫                                                                              
  41. ∫       FIP  is a password-security utility which modifies an executable       
  42. ∫       file (.EXE or .COM) in the following way:                              
  43. ∫                                                                              
  44. ∫       (1)  A password is requested which is then convoluted to form  a       
  45. ∫       starting encrypt/decrypt key.                                          
  46. ∫       (2) The named file is loaded into memory and encrypted.                
  47. ∫       (3) Non-encrypted code is added so that it will execute first.         
  48. ∫       (4)  This  combination  is  written  to  disk,  overwriting  the       
  49. ∫       original file.                                                         
  50. ∫                                                                              
  51. ∫                                                                              
  52. ∫                                                                              
  53. ∫                                                                              
  54. …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
  55. ∫                                                                              
  56. ∫       The result of this is as follows:                                      
  57. ∫       Any file which has been processed by FIP,  when executed,  first       
  58. ∫       places the prompt "Enter password:" on the screen. The user must       
  59. ∫       then  enter  the exact password used in the encryption  process.       
  60. ∫       The encrypted portion of the file (corresponding to the original       
  61. ∫       file) is then decrypted using the entered password,  arranged in       
  62. ∫       memory  just  as if a "clean" copy of it had  been  loaded,  and       
  63. ∫       executed normally.                                                     
  64. ∫                                                                              
  65. ∫       The syntax of FIP is:                                                  
  66. ∫                                                                              
  67. ∫               FIP [/A /R] filename                                           
  68. ∫                                                                              
  69. ∫       Explanations:                                                          
  70. ∫                                                                              
  71. ∫       /A and /R :  "Add password" or "Remove password".  These two are       
  72. ∫       mutually exclusive.                                                    
  73. ∫                                                                              
  74. ∫       filename  :  The executable file to be processed.                      
  75. ∫                                                                              
  76. ∫                                                                              
  77. …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
  78. ∫                                                                              
  79. ∫       Notes:                                                                 
  80. ∫                                                                              
  81. ∫       FIP  works  on both COM and EXE files.  The resulting  protected       
  82. ∫       file  will have the same loader type  and  extension.  Different       
  83. ∫       procedures  are  used for the two types but usage  is  identical       
  84. ∫       from the user standpoint.                                              
  85. ∫                                                                              
  86. ∫                                                                              
  87. ∫       FIP   now  supports  "incorrect  password"  warnings.  This   is       
  88. ∫       accomplished  by  the  use of a 4-byte  CRC  inserted  near  the       
  89. ∫       beginning of the encrypted file. The CRC does not contain enough       
  90. ∫       information  to  allow a "safecracker" to be  written  for  this       
  91. ∫       program,  but  for  the  same  reason  it  does  not  absolutely       
  92. ∫       guarantee  that there is not some incorrect password which  will       
  93. ∫       be  erroneously accepted as "correct". The probability  of  this       
  94. ∫       occuring in any given instance is 1/4294967296, which should  be       
  95. ∫       low enough for most purposes.                                          
  96. ∫                                                                              
  97. ∫                                                                              
  98. ∫                                                                              
  99. ∫                                                                              
  100. …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
  101. ∫                                                                              
  102. ∫                                                                              
  103. ∫                                                                              
  104. ∫       And   a   final  note:   Upper  and  lower  case   letters   ARE       
  105. ∫       distinguishable by FIP. Remember your exact password.                  
  106. ∫                                                                              
  107. ∫                                                                              
  108. ∫                                                                              
  109. ∫                                                                              
  110. ∫                                                                              
  111. ∫                                                                              
  112. ∫                                                                              
  113. ∫                                                                              
  114. ∫                                                                              
  115. ∫                                                                              
  116. ∫                                                                              
  117. ∫                                                                              
  118. ∫                                                                              
  119. ∫                                                                              
  120. ∫                                                                              
  121. ∫                                                                              
  122. ∫                                                                              
  123.