"TOPSECRET",a shareware program to encrypt your sensitive files.This program does not use RSA type algorithms which are restricted for export. This program can use the aid of a "Catalyst" file (which can be any file) to encrypt another file(any file).(Using a fairly random and changing Catalyst gives you the most protection).The Catalyst acts as a key to code and decode your sensitive files.Ofcourse you can even make your own catalyst by encrypting one file with another.A periodically changing Catalyst can be made by combining 1-Registered mail file 2-Courier file 3-Last message file;This would ensure high security for the transmission of your sensitive files.I am sure you will come up with your own methods.You will find the program SIMPLE to operate,try it! This program is freely distributable.For program questions and current registration address contact author at (nomad01@bright.net) or (nomad01@southeast.net) -------------------------------------------------------------------------- For programmers:ts.exe V2.0 is 24736 bytes.It is fully data compatible with the original(21824 bytes) release.But this version is faster and can be run by command line inputs. 1 2 3 4 5 6 c:\>tops onefile.dat 1 twofile.enc catfile.dat mycodegoeshere | | | | | inputfile 1=encrypt| Catalyst Personal key 2=decode | | new output file In this example "onefile.dat" is encrypted(option-1) with the aid of a catalyst file "catfile.dat" and the output is named "twofile.enc". "mycodegoeshere" is the personal key. - A "2" in field 3 would decode a program when all other data is valid. - A "0" in field 5 would indicate no catalyst file to be used. - Fields 2,4,5,6 can be a maximum of 64 characters each,however the the Operating System will restrict the length of your entire command line input to 128 characters. Note:"tops.exe" should not be renamed(upper and lower case ok) since the program searches from cursor to the top of screen for the five trigger characters "tops ". Since command input batch programs may contain sensitive information, the batch programs and the associated files/data should not be compromised. If all the field parameters are not valid,the program runs in default mode where all the data is taken manually.The command line input is ideal for time critical operations.It can be used in conjunction with RAM drives and batch programs for real time network data encryption.