home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World Komputer 1999 January
/
pcwk_01_1999_B.iso
/
PcwkTxt
/
Deszyfr2
/
progs
/
FSecure
/
README.TXT
< prev
next >
Wrap
Text File
|
1997-07-14
|
17KB
|
343 lines
==========================================================================
F-Secure Desktop Release 2.0 for Home&Educational Use
==========================================================================
F-Secure Desktop 2.0 Home&Educational Version is subject to the terms
detailed in the Home&Educational license agreement below.
==========================================================================
Protecting Your Information Assets
==========================================================================
How are your company information assets protected?
Today's technology makes it possible to store a copy of your company's
sales database on every salesperson's laptop. The copy contains the same
confidential data as the actual company database that is protected by
firewalls and locked cabinets. What about the copy on the laptop? Isn't it
entitled to the same level of protection, or even more as it travels in a
more vulnerable environment? All previously closed sales, quotes, and
pending cases that your competition would kill to see are unprotected.
Introducing F-Secure Desktop for Windows, Windows 95 and Windows NT 4.0
There are many access control and security packages on the market, but
none of them is so easy to use that your people would trust it and
install it on their computers. F-Secure Desktop removes the complexity
and provides an easy, flexible, low-cost, but strong-encryption solution
that will effectively protect your company's information
assets. With Desktop, you can encrypt/decrypt files, directories, and
Windows 95 and NT 4.0 folders automatically during the starting and
closing of Windows. Desktop is by far the easiest and strongest way
to protect the sensitive information on your laptops and PCs.
F-Secure Desktop is an add-on for your Windows File Manager, providing you
a user-interface that you already know how to use. The only change you'll
notice is three added buttons on the tool bar and a new "F-Secure" menu.
On your Windows 95 and NT 4.0, F-Secure Desktop is integrated with the
Windows shell. You can drag and drop files to folders that will be
encrypted automatically or you can encrypt/decrypt any object by just
clicking the right mouse button on the object and selecting encrypt or
decrypt. Nothing could be simpler to use.
You can define sets of Secret files, directories, and Windows folders
that will be automatically encrypted and decrypted every time you
close or start Windows. TopSecret files are never decrypted
automatically. Desktop does not create special files or
directories on your system. You select which files, directories, and
folders are encrypted, quickly and easily, anywhere. This means that
you do not have to make any changes to your system structure when
adding Desktop strong encryption technology to your PC or laptop.
Easy to Use, Easy to Setup
F-Secure Desktop comes with a setup Wizard that is used to create your
keys, select the files to encrypt, backup your master key, and to setup
other options in F-Secure Desktop. We have made F-Secure Desktop so simple
to setup and use that you'll never have to go back to the settings after
you have finished the setup.
You can easily manage your Secret and TopSecret files using the new
Desktop Explorer. If you have files that you never want to encrypt,
you can simply exclude them from encryption.
Each user can choose to select an existing key that has been created to be
used by a workgroup of people sharing private data, or to create a personal
key that will keep personal data private.
NOTE: For more information on the products features, see "Release Notes".
Commercial licenses are available from:
Data Fellows Ltd.
PΣivΣntaite 8
FIN-02210 ESPOO
FINLAND
Sales: F-Secure-Desktop-Sales@DataFellows.com
WWW: http://www.datafellows.com/
http://www.europe.datafellows.com/
==========================================================================
Installation Instructions
==========================================================================
* Installation
Select Windows Program Manager's File|Run... menu and run SETUP.EXE
If you are using the Windows 95/NT 4.0 shell select Run from the
Start Menu and run SETUP.EXE.
Setup installs all files and creates an F-Secure Desktop Program Manager
group for the installed applications.
See section "Running F-Secure Desktop" for more information on how to
use F-Secure Desktop.
==========================================================================
Running F-Secure Desktop
==========================================================================
F-Secure Desktop Wizard will help you create a new security profile
and a new private encryption key, or to select a previously
created key. You can also configure your Secret and TopSecret file
lists and an exclusion list for files, directories, and folders to be
secured automatically.
The File Manager Extension contains a new add-on menu that allows you
to access all F-Secure Desktop features from File manager. You can
perform encryption, decryption, and update your Secret and TopSecret
file lists from File Manager.
The Windows 95/NT 4.0 Shell Extension adds a new entry to encrypt or
decrypt any file, directory, or folder on your Windows system. To
access the menu click the right mouse button on a file. The same menu
also allows you to create self-extracting encrypted packages to send
to others by e-mail. They do not even need Desktop to decrypt the
packages -- the passphrase is enough.
The Control Panel Application contains most of the F-Secure Desktop
settings that you can change. If you have Web Browser software you can
connect to Data Fellows Ltd's WWW server directly from the control
panel. The Desktop Web Club contains information on new versions and
answers to Frequently Asked Questions.
Below is a list of common tasks and how to perform them.
HOW TO ENCRYPT OR DECRYPT A FILE
================================
Windows 3.1
-----------
Start File Manager, browse for the file you want to encrypt, then select
F-Secure|Encrypt... from the menu.
Type in your passphrase and click OK to encrypt the file.
To decrypt a file with an .FFF extension, double click the file and
type in your passphrase and click OK.
NOTE: All decrypted Secret and TopSecret files will be automatically
encrypted when you close Windows!
Windows 95 and NT 4.0
---------------------
Select a file, directory, or a folder with the Windows Explorer.
Click the right mouse button on your selection to see a menu, select
Encrypt...
Type in your passphrase and click OK to encrypt the file.
To decrypt a file with an .FFF extension, double click the file and
type in your passphrase and click OK.
NOTE: All decrypted Secret and TopSecret files will be automatically
encrypted when you close Windows!
HOW TO ENCRYPT OR DECRYPT FILES QUICKLY
=======================================
To encrypt all decrypted files, open the F-Secure Desktop group from the
file manager or from the Windows 95/NT 4.0 Programs Menu. Next double
click the "Encrypt All Files" icon, type in your passphrase and click
OK.
To decrypt all Secret files, open the F-Secure Desktop group from the
file manager or from the Windows 95/NT 4.0 Programs Menu. Next double
click the "Decrypt All Files" icon, type in your passphrase and click
OK.
On Windows 95/NT 4.0 these choices are also available on the "My
Computer" popup menu.
HOW TO ADD OR REMOVE SECRET AND TOPSECRET FILES
===============================================
The Desktop Explorer is available in the F-Secure Desktop program
group and also in the F-Secure Desktop control panel. You can add and
remove files to the lists by drag-and-drop.
HOW TO CHANGE YOUR PASSPHRASE
=============================
We recommend that you select a passphrase rather than a password to be
used with F-Secure Desktop. The passphrase will be used to protect your
encryption key. Where a normal password would be something like "qw79lp0",
a passphrase is something a bit longer, like "this is something for me
to remember!" Well-selected passphrases are almost impossible to break.
To change your passphrase the F-Secure Desktop control panel
application, select the "User" tab, click "Change Passphrase..." and
type in the requested information. You can change your passphrase as
often as you like, and still be able to access all your encrypted files.
NOTE: Your passphrase is the weakest link in this product, so select it
with care!
HOW TO USE A COMMON WORKGROUP KEY TO SHARE INFORMATION
======================================================
A workgroup key is just an ordinary encryption key created with the
F-Secure Desktop Wizard. Take the backup disk for the key that you are
using and distribute it to the persons that you want to share
information with. Ask them to install that key when they set up their
copy of F-Secure Desktop. This way you can share encrypted files with
each other.
==========================================================================
For More Information Contact
==========================================================================
* For more information on the commercial version of F-Secure Desktop
contact one of the addresses below:
Sales: F-Secure-Desktop-Sales@DataFellows.com
WWW: http://www.datafellows.com/
http://www.europe.datafellows.com/
==========================================================================
Copyrights
==========================================================================
* F-Secure Desktop
Copyright (c) 1996-97 Data Fellows Ltd.
Portions (c) 1995-97 SSH Communications Security Ltd.
==========================================================================
Home&Educational License Agreement
==========================================================================
F-SECURE DESKTOP FOR WINDOWS, WINDOWS 95 AND WINDOWS NT 4.0
LICENSE AGREEMENT
(Version 1, September 10, 1996)
BY EXERCISING YOUR RIGHTS TO MAKE AND USE COPIES OF THIS SOFTWARE YOU
AGREE TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE
TERMS OF THIS AGREEMENT, DO NOT COPY OR USE THE SOFTWARE.
GRANT. Data Fellows Ltd. grants you a non-exclusive license to use
this Home&Educational version of the F-Secure Desktop software (the
"Software") free of charge at home or at an educational institution.
Educational use is restricted for use by students i.e. for
non-administration use.
Data Fellows Ltd. also grants you the right to make identical copies of the
distribution file available for other users. You may also distribute copies
of the software on CD-ROMs, but you may not charge more than a nominal fee
for the CD.
You may not ship the software with any commercial product or in other ways
encourage the purchaser of any product to think that the software is in any
way included in the purchase. This includes, but is not limited to, preloading
or bundling the software on computers or with other software.
This License does not entitle you to hard-copy documentation, support or
telephone assistance. While Data Fellows intends to distribute a
commercial release of the Software, Data Fellows reserves the right at any
time not to release a commercial release of the Software or, if released,
to alter prices, features, specifications, capabilities, functions,
licensing terms or other characteristics of the commercial release. You
may not publish or provide any results of benchmark tests run on the
Software to a third party without Data Fellows' prior written consent. You
may make a sufficient number of copies of the Software for archival
purposes, provided such copies contain all of the original Software's
proprietary notices.
ENCRYPTION. As the Software contains cryptographic features, you are
responsible for ensuring that your use of the Software does not contradict
any local legislation or other requirements and rules. In no situation
does Data Fellows assume any responsibility for your use of the Software.
DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED ON AN "AS IS" BASIS,
WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION THE WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-
INFRINGEMENT. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
SOFTWARE IS BORNE BY YOU. SHOULD THE SOFTWARE PROVE DEFECTIVE, YOU AND
NOT DATA FELLOWS ASSUME THE ENTIRE COST OF ANY SERVICE AND REPAIR. THIS
DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THE AGREEMENT.
SOME JURISDICTIONS DO NOT ALLOW EXCLUSIONS OF AN IMPLIED WARRANTY, SO THIS
DISCLAIMER MAY NOT APPLY TO YOU AND YOU MAY HAVE OTHER LEGAL RIGHTS THAT
VARY BY JURISDICTION.
LIMITATIONS. You may not: - permit other individuals to use the Software
except under the terms listed above; modify, translate, reverse engineer,
decompile, disassemble (except to the extent applicable laws specifically
allow such restriction), or create derivative works based on the Software;
- copy the Software other than as specified above; rent, lease, grant a
security interest in, or otherwise transfer rights to the Software; or -
remove any proprietary notices or labels on the Software.
TITLE. Title, ownership rights, and intellectual property rights in the
Software shall remain in Data Fellows, and/or its suppliers. The Software
is protected by the copyright laws of the United States and international
copyright treaties. This license does not grant you any right to any
enhancement or update to the Software.
TERMINATION. The license will terminate automatically if you fail to
comply with the limitations described herein. Upon termination of this
License, you agree to destroy all copies of the Software.
LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY,
TORT, CONTRACT, OR OTHERWISE, SHALL DATA FELLOWS OR ITS SUPPLIERS OR
RESELLERS BE LIABLE TO YOU OR ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL,
INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE
OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES. IN NO
EVENT WILL DATA FELLOWS OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES, EVEN
IF DATA FELLOWS AND/OR ITS SUPPLIERS SHALL HAVE BEEN INFORMED OF THE
POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY OTHER PARTY. THIS
LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL
INJURY TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION.
FURTHERMORE, SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION
OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION
MAY NOT APPLY TO YOU.
HIGH RISK ACTIVITIES. The Software is not fault-tolerant and is not
designed, manufactured or intended for use or resale as on-line control
equipment in hazardous environments requiring fail-safe performance, such
as in the operation of nuclear facilities, aircraft navigation or
communication systems, air traffic control, direct life support machines,
or weapons systems, in which the failure of the Software could lead
directly to death, personal injury, or severe physical or environmental
damage ("High Risk Activities"). Data Fellows and its suppliers
specifically disclaim any express or implied warranty of fitness for High
Risk Activities.
U.S. GOVERNMENT RIGHTS. If you are acquiring the Software (including the
related documentation) on behalf of any part of the United States
Government, the following provisions apply. The Software is deemed to be
"commercial software" and "commercial computer software documentation,"
respectively, pursuant to DFAR Section 227.7202 and FAR 12.212, as
applicable. Any use, modification, reproduction, release, performance,
display or disclosure of the Software (including the related documentation)
by the U.S. Government or any of its agencies shall be governed solely by
the terms of this Agreement and shall be prohibited except to the extent
expressly permitted by the terms of this Agreement.
MISCELLANEOUS. This Agreement represents the complete agreement concerning
this license and may amended only by a writing executed by both parties.
This license is personal to you and you agree not to assign your rights in
herein, and any attempted assignment by you shall be null and void. If
any provision of this Agreement is held to be unenforceable, such
provision shall be reformed only to the extent necessary to make it
enforceable.
This Agreement shall be governed by the laws of Finland.