home *** CD-ROM | disk | FTP | other *** search
-
-
-
- FIP (File Protect.)
-
- Version 2.01
-
- …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
- ∫
- ∫
- ∫ Password Encryption Utility for Executable Files
- ∫ ------------------------------------------------
- ∫
- ∫ Version 2.1 - (c) Western SoftWare WorkShops 1992
- ∫
- ∫ This "SoftWare." is Not "ShareWare." You Must Register Your
- ∫ copy of FIP (File Pro.) Should you find FIP useful please
- ∫ contribute $10 to the author at the following address:
- ∫
- ∫ Vince Butera.
- ∫ 22740 San Vicente Way.
- ∫ San Jose Ca 95116
- ∫
- ∫ Source code is available for $35. This also places you on
- ∫ the mailing list and you will receive all future updates to this
- ∫ program (including new source code) whenever such updates occur.
- ∫ Orders for Source Code Must Include A Sighned Non-Disclosure
- ∫ Agreement with return Self addressed envelope.
- ∫ --
- ∫
- …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
- ∫
- ∫
- ∫ Password Encryption Utility for Executable Files
- ∫ ------------------------------------------------
- ∫
- ∫ Version 2.1 - (c) Western SoftWare WorkShops 1992
- ∫
- ∫
- ∫
- ∫ FIP is a password-security utility which modifies an executable
- ∫ file (.EXE or .COM) in the following way:
- ∫
- ∫ (1) A password is requested which is then convoluted to form a
- ∫ starting encrypt/decrypt key.
- ∫ (2) The named file is loaded into memory and encrypted.
- ∫ (3) Non-encrypted code is added so that it will execute first.
- ∫ (4) This combination is written to disk, overwriting the
- ∫ original file.
- ∫
- ∫
- ∫
- ∫
- …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
- ∫
- ∫ The result of this is as follows:
- ∫ Any file which has been processed by FIP, when executed, first
- ∫ places the prompt "Enter password:" on the screen. The user must
- ∫ then enter the exact password used in the encryption process.
- ∫ The encrypted portion of the file (corresponding to the original
- ∫ file) is then decrypted using the entered password, arranged in
- ∫ memory just as if a "clean" copy of it had been loaded, and
- ∫ executed normally.
- ∫
- ∫ The syntax of FIP is:
- ∫
- ∫ FIP [/A /R] filename
- ∫
- ∫ Explanations:
- ∫
- ∫ /A and /R : "Add password" or "Remove password". These two are
- ∫ mutually exclusive.
- ∫
- ∫ filename : The executable file to be processed.
- ∫
- ∫
- …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
- ∫
- ∫ Notes:
- ∫
- ∫ FIP works on both COM and EXE files. The resulting protected
- ∫ file will have the same loader type and extension. Different
- ∫ procedures are used for the two types but usage is identical
- ∫ from the user standpoint.
- ∫
- ∫
- ∫ FIP now supports "incorrect password" warnings. This is
- ∫ accomplished by the use of a 4-byte CRC inserted near the
- ∫ beginning of the encrypted file. The CRC does not contain enough
- ∫ information to allow a "safecracker" to be written for this
- ∫ program, but for the same reason it does not absolutely
- ∫ guarantee that there is not some incorrect password which will
- ∫ be erroneously accepted as "correct". The probability of this
- ∫ occuring in any given instance is 1/4294967296, which should be
- ∫ low enough for most purposes.
- ∫
- ∫
- ∫
- ∫
- …Õ (c) WSW 1992 ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ
- ∫
- ∫
- ∫
- ∫ And a final note: Upper and lower case letters ARE
- ∫ distinguishable by FIP. Remember your exact password.
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫
- ∫