SUPERCRYPT 1.2 FOR WINDOWS HELP TEXT COPYRIGHT 1995 NAILLONWORKS PROGRAMMING DO NOT ALTER THIS FILE! This file is used for your online help. ABOUT NAILLONWORKS PROGRAMMING Naillonworks programming specializes in data encryption and security routines for IBM compatible MS-DOS and WINDOWS machines. You will find our programs easy to use, productivity oriented, and extremely secure. If you have questions you would like to ask us, our AMERICA ONLINE E-MAIL address is NAILPROG, Compuserve address 75240,1746. You can mail us your questions at: NAILLONWORKS PROGRAMMING, ROUTE 1, BOX F-19 OROVILLE, WASH. 98844 You can reach the programmer by phone at 509-476-2872. INTRODUCTION TO SUPERCRYPT 1.2 SUPERCRYPT FOR WINDOWS brings unbreakable encryption to the Windows desk top at a very reasonable price. Multiple file capabilities, background processing, clipboard encryption, selected text encryption, the new TEXT MODE engine, the ability to completely remove sensitive data from your system, and the integrated note pad make this a complete file encryption solution. SYSTEM REQUIREMENTS This program requires MICROSOFT WINDOWS 3.1, MICROSOFT DOS 4.0 or greater, 286 IBM COMPATIBLE, 2mb RAM, color monitor, hard drive with 2mb free space. It also requires the presence of the microsoft run time module VBRUN300.DLL , COMMDLG.DLL, CMDIALOG.VBX and the THREED.VBX (latest version) control file to be located in your windows\system directory or the same directory as scrptwin.exe. INSTALLATION This evaluation version can be installed in the directory of your choice. Make sure that all of the distribution files are copied to the same directory on your hard drive. This includes SCRPTWIN.EXE, SUPCRPT.TXT, READFRST.TXT and VENDOR.TXT. This is easily accomplished by placing the compressed distribution archive SC11WIN.ZIP in the selected directory and expanding it there. After installation is complete, You can run SUPERCRYPT FOR WINDOWS by clicking on the SCRPTWIN.EXE filename in the new directory, or by setting up a program item for it in the WINDOWS PROGRAM MANAGER. Make sure that your windows system directory contains copies of these Microsoft support files : VBRUN300.DLL, COMMDLG.DLL, CMDIALOG.VBX and the THREED.VBX (latest version) control file. Check your distribution archive for these files, most are included in the sc12win.zip file. You can get the VBRUN300.DLL file from most major on-line services. METHODS OF ENCRYPTION SUPERCRYPT 1.2 FOR WINDOWS offers two types of file encryption. The advantages and disadvantages of each are listed below. TEXT ENCRYPTION Text encryption was designed for the encryption of legible text. It utilizes only legible, printable, scanable characters when it encrypts a file. When it encounters a non printable character in a file during encryption, that character is ignored. It also leaves the structure of the document intact, with reference to line length and paragraphs, so that the file can be completely recognized by optical character recognition systems. Spaces between individual words are eliminated, and turned into encrypted text. ADVANTAGES Allows a text file to be encrypted, and printed to paper for physical delivery to another person, who may then scan the text into their system and decrypt it with the valid password. Allows for the encryption of electronic mail for delivery to windows interfaces that don't support the full range of ASCII characters. They can then be saved to a file at the other end with accurate character translation, making decryption possible. Text encrypted with the TEXT method can be spliced into documents created by word processors that don't support the full range of characters as so many WINDOWS products don't. They can then at any time be cut from the host document, pasted to an empty file, and then decrypted. This facilitates the embedding of privileged information into otherwise legible files. DISADVANTAGES Fewer characters are available to the encryption engine during encoding. In graphic and executable files that contain mostly non printable characters, the majority of the file will remain in its' original form, as those characters will be ignored during encryption. FULL ENCRYPTION This is ideal for files of all types that are not intended to be printed, scanned, or fully viewed after encryption. Encrypted files of this type may be sent in file form to any user with a copy of SUPERCRYPT and the proper password. FULL encryption utilizes the full range of ascii characters during encryption, and no characters are ignored. The structure of a file encrypted with this method is completely demolished, with no similarity to the original file. ADVANTAGES Extremely secure. Unbreakable. Even files that consist of one long string of the same character come out patternless, even with the utilization of very simple passwords. Ideal for text, graphic and executable files. DISADVANTAGES Fully encrypted text cannot be printed or viewed by text editors that don't support the full range of ascii characters. Also, scanning of this type of file is impossible. FILE SELECTION (OPENING FILES) Supercrypt provides single and multiple file selection capability in the encryption interface. Operation of the file selection system is quite simple, with procedures as follows: SINGLE FILE SELECTION This is the mode you will use most often with SUPERCRYPT. It allows you the greatest control over the operations performed on each file. Files opened individually may be viewed with the integrated text editor, providing they are under 32,000 bytes in length. Also, if you have chosen to back up this file during processing, you can pick any valid filename as the backup file. When using the multiple selection mode, the default backup file naming scheme is implemented. To select a single file for processing or editing, Use the OPEN selection in the FILE menu of the SUPERCRYPT interface, or press the OPEN command button. The OPEN dialog box will appear, with a drive, directory, and file list boxes to help you make your selection. Pick a file by opening the drive list box with a click on the arrow, double clicking on the desired drive, the directory, and then the filename in the file list box. The text box at the top of the dialog will reflect the selected filename, and the directories label at the top center of the dialog will reflect the selected path. You can alternately type the desired filename into the text box. You can type in a complete path/filename, or if the directories label already reflects the correct path, just type the filename. You can also open a file while the text editor is active by using the OPEN selection in the FILE menu of the editor. The OPEN dialog will appear, and file selection follows the same procedure as when you are opening a file with the SUPERCRYPT interface. MULTIPLE FILE SELECTION You can use this mode to greatly increase productivity when you need to process more than one file. Multiple file selection works with the ENCRYPT, DECRYPT, DELETE, and DATA WIPE functions of supercrypt. The convenient file tagging procedure of this program allows you to select entire directories in seconds, initiate the desired function, and let SUPERCRYPT go to work until all of the files have been processed. When tagging multiple files for any ENCRYPTION or DECRYPTION operation, you must remember that the same configuration settings are used on all the selected files. This means that if you are encrypting, they will all be encrypted with either the FULL METHOD or TEXT METHOD depending on your selection, the same password will be used on all the files, and backup files will be created for each file processed if the have chosen the BACKUP FILE option. Make absolutely sure that all of the files that you are tagging for any DECRYPTION operation were encrypted with the same password, or the file may not be decrypted properly. The default backup naming procedure during multiple file operations is as follows. As each file is processed, a new file is created, with the same name as the original file, except that the extension is replaced with .NSC. Therefore, the filename private.txt would be backed up with the file private.nsc. If there is another file with the name private.nsc in the same directory, you will be notified that the filename already exists, and you may choose to overwrite the file if you wish. If you choose not to overwrite, you will be given an opportunity to select a filename. The filename must include a full path, and must indicate the same drive that contains the file being processed. If at this time you fail to provide a viable backup filename, SUPERCRYPT will revert to the default filename of private.nsc, and overwrite the existing file. Any difficulty can easily be avoided by examining the directories that contain the files you want to encrypt or decrypt, making sure they do not contain backup files with the extension .NSC that may interfere with the multiple operation. To select multiple files, activate the OPEN dialog by using the FILE menu or the OPEN button on the main SUPERCRYPT interface. You can not open multiple files with the text editor. When the dialog appears, select multiple files by holing down the Ctrl key while clicking on the desired filenames. To open multiple files that are in succession in the file list box, hold down the Shift key, click the file at the top of the group of files, then while still holding the Shift key, click the file at the bottom of the group. All files between those two selections will be included in the selection. You will notice that as a file is selected, it becomes highlighted. If you wish to deselect any highlighted file, hold down the Ctrl key and click it again. It will be removed from the current selection. Once you are satisfied with files you have chosen, you may choose to encrypt, decrypt, delete, or use the DATA WIPE function on them. PASSWORD SELECTION The password selection form of SUPERCRYPT for WINDOWS offers three different options for password entry. You can choose to mask the characters upon entry, display them, or paste a password to the password entry form from the clipboard. All characters must be within the ascii character range of 32 to 126. This means any printable key on your keyboard will do. Upper and lower case letters, numeric keys, punctuation, etc. Password length is limited to 501 characters. Passwords that are over length will be trimmed or may be reselected. The three methods are described in closer detail below. MASK CHARACTERS OPTION By pressing the MASK CHARACTERS option button on the password entry form before you type in the password, you will instruct the password entry form not to display the actual characters as they are typed. To assure that the password you typed is the one that you intended, (because you will not be able to verify it visually), the form will ask you to retype the password to confirm it with you. DISPLAY CHARACTERS OPTION This is the default password selection mode. It is indicated by a checked condition of the DISPLAY CHARACTERS option button. Each character that you type will be displayed on the screen as you type. You must confirm the accuracy of the password visually, because the interface will not ask you to validate the spelling while in this mode. PASTING TEXT INTO THE FORM You may opt to use the windows clipboard to paste password strings into the interface. This will allow you to use text stored in other documents as the password string. This can eliminate the tedious manual typing and possible misspelling of long passwords. To use this mode, you should first open the file that contains the string that you wish to use as the password in any windows text editor that supports clipboard operations. You can use the integrated SUPERCRYPT NOTEPAD if the file is under 32,000 bytes. Copy the desired text string into the clipboard. Now use the SUPERCRYPT interface to open the file that you wish to encrypt, select the encryption options, and press the ENCRYPT button. The password entry form will appear, and you can at that time press the PASTE TEXT button to copy the text in the clipboard into the password entry form. Make sure that you only paste printable characters into the password form, and that the length of the password string is 501 characters or less. MAKE SURE THAT YOU ARE QUITE POSITIVE ABOUT ANY PASSWORD THAT YOU MAY USE TO ENCRYPT OR DECRYPT A FILE. THE USE OF AN INCORRECT PASSWORD CAN DESTROY A FILE. MAKE SURE THAT YOU KNOW WHAT YOU TYPED. ENCRYPTING/DECRYPTING FILES DO NOT ENCRYPT ANY FILE THAT YOU CANNOT AFFORD TO LOSE, WITHOUT KEEPING A BACKUP COPY OFF-LINE. ALL IT TAKES IS ONE WRONG PASSWORD TO DESTROY YOUR DATA. File encryption/decryption is a very simple procedure with SUPERCRYPT for WINDOWS. The convenient interface make it very easy to specify single or multiple filenames for the encryption/decryption operation. See the help topic FILE SELECTION(OPENING FILES) for information on opening the file or files you wish to encrypt or decrypt. If you are encrypting files, you should now choose the encryption method you wish to employ. You can choose either the TEXT METHOD or FULL method from the right of the SUPERCRYPT for WINDOWS INTERFACE by clicking on the appropriate option button. You may also select the method from the OPTIONS menu of the SUPERCRYPT interface. See the help topic METHODS OF ENCRYPTION for a detailed explanation of the differences between the two types. If you are decrypting files, it is unnecessary to select a method because SUPERCRYPT will recognize the encryption type used on the file automatically, and make the appropriate adjustments during processing. Now you must decide if you wish to create a backup copy of the file in the state it was in before the encryption or decryption operation. Click the BACKUP FILE option button or select it in the OPTIONS menu of the SUPERCRYPT interface to select this procedure. Creating a backup file is a good idea, especially if you are decrypting files. If you mistype a password, the file may be ruined and you may need to turn to this backup file. See the help topic BACKUP FILE PROCEDURE for details regarding usage and naming convention of the backup files. The last option available that you may select is the SHARE CPU option. This option will configure SUPERCRYPT to run in the background, freeing you to work in another windows application, or even in SUPERCRYPT, while the processing of your file or files is taking place. See the help topic SHARING YOUR CPU for advantages, disadvantages, precautions, and a definition of this option. Now your files have been selected, and your options have been set, and you are ready to initiate the encryption or decryption operation. Press the ENCRYPT or DECRYPT command button, or select ENCRYPT OR DECRYPT from the OPERATIONS menu of the SUPERCRYPT interface. The password form will appear, ready to accept the password to use during the operation. see the help topic PASSWORD SELECTION for the options available to you during the entering of your password. When the desired password has been entered into the password forms' text box, click the button titled ENTER PASSWORD. The password will be fed to the encryption engine, and the process will begin. When the file or files have been completely processed, you will be presented with a message box stating that the encryption or decryption of the selected file or files has been completed. ENCRYPTING/DECRYPTING THE CLIPBOARD. SUPERCRYPT FOR WINDOWS has the ability to encrypt or decrypt text that is contained in the windows system clipboard. This gives this program the ability to encrypt/decrypt portions of documents created in any windows editor or word processor, while leaving the remainder unaltered. The following example describes the steps necessary for SUPERCRYPT to work in conjunction with the clipboard and the windows WRITE editor. In the program manager, start the SUPERCRYPT program by clicking on the ICON you have created for it or by clicking on the scrptwin.exe filename in the file manager. Once the SUPERCRYPT FOR WINDOWS interface is loaded, press Ctrl-Esc to activate the task manager. Then use the task manager to switch to the program manager, and from there start WINDOWS WRITE. Once in WRITE, type the following line: Bill, I have spoken to my broker and he indicated that I should pass you the following information . >>Sell all of your apple stock now!<<. You will notice that I used the delimiters >> and << around the text that I wish to cut, encrypt and place back into the file. This is so that the recipient of the document will know what text to cut into the clipboard for their copy of SUPERCRYPT to process. Now select the phrase Sell all of your apple stock now! with the curser, and use the WRITE edit menu to cut the phrase from the document. The line in WRITE will now appear as follows: Bill, I have spoken to my broker and he indicated that I should pass you the following information .>><< Use the WRITE Ctrl-Esc again to switch to the windows task manager, then from there switch to SUPERCRYPT. Once in SUPERCRYPT, open the OPERATIONS menu, then select ENCRYPT CLIPBOARD. You will be asked for a password, and the contents of the clipboard will be encrypted. Use the task manager to return to WRITE, and with the curser between the two delimiters, select paste from the edit menu. The result, encrypted with my password looks like: Bill, I have spoken to my broker and he indicated that I should pass you the following information . >>6]-W?^OKp~E2gD89`hR1t^qu>Sell all of your apple stock now!<<. You can also use the clipboard encryption option to encrypt portions of documents created in the SUPERCRYPT NOTEPAD. The choice of delimiter characters is up to you, just make sure the recipient of any message is aware of your choice. ENCRYPTING SELECTED TEXT. With documents that are being viewed in the integrated notepad, you may wish to encrypt selected text only. This is similar in effect to encrypting the clipboard, except that it is faster and simpler to do. The restriction is that only selected text in the integrated notepad is recognized. To use this feature, open any text file under 32000 bytes long and activate the integrated notepad. Use the mouse to highlight the text that you wish to encrypt, then with the text highlighted, choose ENCRYPT SELECTED TEXT in the OPERATIONS menu of the main SUPERCRYPT interface. Provide a password and the selected text will be replaced with encrypted code. You may wish to use delimiter characters to help identify the text that needs to be selected in order to be decrypted properly. See the help topic ENCRYPTING\ DECRYPTING THE CLIPBOARD for an example using delimiters. SHARING YOUR CPU Supercrypt can be instructed to encrypt in the background while you work in another windows program or the SUPERCRYPT editor. A few precautions should be taken when processing files in the background. Do not attempt to open, close save to, delete, or data wipe a file that is currently being processed by Supercrypt. ADVANTAGES When processing large or large numbers of files, it allows you to remain productive in another WINDOWS application while SUPERCRYPT is busy. DISADVANTAGES The processing speed of SUPERCRYPT does diminish when sharing the CPU with other applications. The exact amount of performance loss depends on the processing requirements of the competing application. BACKUP FILE PROCEDURE SUPERCRYPT contains a system that allows you to generate copies of files that are being processed by the encryption engine, in their condition prior to processing. When encrypting files, unencrypted copies are generated, and when decrypting, encrypted copies are maintained. Activating this system requires a click on the BACKUP FILE option button on the right of the SUPERCRYPT interface, or select BACKUP FILE from the OPTIONS menu. This option must be selected AFTER the file or files have been opened, because the system needs to know if you are planning to process single or multiple files. If you have a single file selected when you select the BACKUP FILE option, a dialog box will appear, asking you to provide a filename for the backup file. This dialog displays the default name for the backup file, that you may use by pressing O.K. if you wish. Or you may enter a different filename and then press O.K. SUPERCRYPT will check to see if the indicated filename already exists on your system, and if it does, you will be asked if you would like this file to be overwritten. If you choose NO, then you will be given an opportunity to select a different one. If you have selected multiple files and have chosen the BACKUP FILE MODE, A dialog box will appear, indicating that the default backup file naming scheme will be used. The reason for this is so that you will not be interrupted by a dialog box each time SUPERCRYPT begins processing a different file in your selection. The default backup naming procedure during multiple file operations is as follows. As each file is processed, a new file is created, with the same name as the original file, except that the extension is replaced with .NSC. Therefore, the filename private.txt would be backed up with the file private.nsc. If there is another file with the name private.nsc in the same directory, you will be notified that the filename already exists, and you may choose to overwrite the file if you wish. If you choose not to overwrite, you will be given an opportunity to select a filename. The filename must include a full path, and must indicate the same drive that contains the file being processed. If at this time you fail to provide a viable backup filename, SUPERCRYPT will revert to the default filename of private.nsc, and overwrite the existing file. DATA WIPE SYSTEM Supercrypt incorporates the technology of one of my earlier utilities, NAILLONWORKS DATA-WIPE. The essence of this program has been assigned to the DATA WIPE command button. DATA WIPE is a method in which sensitive data can be completely scrubbed from your hard drive, making it impossible for others to restore the file with undelete utilities. This operation may be performed on single as well as multiple files. You may open the file or files with either the main SUPERCRYPT or the SUPERCRYPT NOTEPAD interface, but in order to select multiple files you must use the prior. File selection is handled in the identical manner as described in the help topic FILE SELECTION(OPENING FILES). Once your file or files have been selected, press the DATA WIPE button or select Data Wipe from the Operations menu of the main SUPERCRYPT interface. You will be asked for confirmation and given the opportunity to cancel the procedure. If you continue, the DATA WIPE engine will begin to totally remove your selection from your drive. DELETING FILES You are able to delete any file or files currently selected (listed in the file box of the main SUPERCRYPT interface), by selecting Delete File from the File menu of SUPERCRYPT. You will be asked for confirmation before any files are removed from your system. The trash can is nothing more than a quick delete facility. It allows you to select the filename or names contained in the file box with a mouse click on the filename or filenames listed in the file box, and then with the mouse button depressed, drag it into the trash can. Deletion is not the same as DATA WIPE, where files are rendered unrecoverable by undelete utilities. REGISTRATION (CANNOT BE FILLED OUT WHILE IN SUPERCRYPT HELP. PRESS THE PRINT ORDER FORM BUTTON TO PRINT A COPY, OR PROVIDE THE FOLLOWING INFORMATION IF YOU DO NOT HAVE A PRINTER. THE INTRODUCTION SCREEN ALSO PROVIDES A CONVENIENT WAY TO FILL OUT THE ORDER FORM ON SCREEN AND PRINT IT OUT WHEN COMPLETED ). SUPERCRYPT 1.2 FOR WINDOWS REGISTRATION FORM NAME _________________________________________________ COMPANY _________________________________________________ ADDRESS _________________________________________________ CITY/STATE ________________________________________________ PHONE _________________________________________________ COMPUTER_________________________________________________ WINDOWS VERSION_________________________________________ COPIES OF SUPERCRYPT 1.2 FOR WINDOWS ___x$39.95 = ______ COMMENTS_________________________________________________ ____________________________________________________________ Send completed order form and registration fee to: NAILLONWORKS PROGRAMMING ROUTE 1 BOX F 19 OROVILLE, WASHINGTON 98844 ORDERS SHIPPED IMMEDIATELY. Registered users will recieve the registered version of SUPERCRYPT 1.2 FOR WINDOWS with a TWO site license. RIGHTS AND LIMITATIONS You have the right to distribute this evaluation version of Naillonworks Supercrypt royalty free and in unlimited supply, providing the files READFRST.TXT, VENDOR.TXT, SUPRCRPT.EXE, SUPCRPT.TXT are all included, unaltered and in their entirety, on any distribution diskette, in any compressed distribution archive, or any other distribution method. It is also advisable to include the microsoft files VBRUN300.DLL, THREED.VBX (latest version), COMMDLG.DLL, and CMDIALOG.VBX in any distribution, or make sure that the files are readily available to the user, as they are required for SUPERCRYPT to run. DISCLAIMER NAILLONWORKS PROGRAMMING is in no way responsible for any loss, including but not limited to lost time, profits, data, or equipment failure resulting from the use, improper use or inability to use SUPERCRYPT 1.2 FOR WINDOWS.