LOOKUP(TM) and RCROSREF(TM) are part of FWKCS(TM) Contents_Signature System, Ver. 2.05, 1996 Apr 26. (C)Copyright Frederick W. Kantor 1989, 1996. All rights reserved. Kit for remote Lookup and Rcrosref. Current release: 1996 Apr 26. For resource material re protecting against software piracy, download FWKCS205.ZIP and the current release of FWKCXnnn.ZIP. New in FWKLU205.ZIP: This provides current code for the "remote lookup" functions supporting also Rcrosref, in a relatively small kit, for use by those who have not yet downloaded the larger FWKCS(TM) system package (current FWKCS release: FWKCS205.ZIP). The version of FWKCS.EXE contained in this kit has been revised since the last major prior release. All FWKCS.EXE functions are enabled in the unregistered copy. On the basis of experimental tests, the contents_signature ("cs") originally introduced in this software in the 1980's, would appear to carry a typical pairwise statistical error rate of less than about one part in ten trillion (1/(10,000,000,000,000)) -- more than 1000 times as good as the 32_bit CRC. This additional statistical resolution has been important in serving the needs of electronic bulletin boards, because they often contain more files than can be reliably distinguished by the 32_bit CRC. This has been important in the automatic recognition of duplicate files with changed names. However, in the years since the original cs was introduced, the number of files in file collections has grown beyond where the original cs could provide sufficient safety margin against statistical error. For this reason, starting in 1995 with version 2.04, FWKCS has supported an enhanced cs ("long cs"), and has continued to support the original cs, now called the "short cs". The long cs has an estimated typical statistical pairwise error rate of less than about one part in 1,000,000,000,000,000,000,000,000,000,000,000, 000,000,000,000,000,000. The short cs and the long cs are generated using assembly_language code, in a conveniently short time. The long cs includes the short cs. The two cs's can be used in the same data base: FWKCS uses a set of rules to automatically handle the combination. This enhanced statistical resolution has made the FWKCS cs a more powerful tool for identifying and protecting intellectual property, including applications in legal enforcement; and can assist in bringing FWKCS to bear on matters involving larger statistical bases. With this enhanced statistical resolution, FWKCS has continued to provide split_second lookup for finding matching contents_signatures. To run an unregistered copy, keep a copy of REGISTER.FRM in the same directory with FWKCS.EXE. You can put the whole set of files on your PATH, and call LOOKUP from anywhere on your system. Suggested test time is up to 30 days, before registering. If this software is used in a public, commercial, school, institutional, or governmental environment, then the test period is restricted to no more than 45 days. When an unregistered copy of FWKCS is run, a notice appears on the screen above the program identification: "This is an unregistered copy. After evaluation day 45, if you do not register, a delay of about 1 second will be added for each additional day. The suggested test time is up to 30 days, to allow time for your registration to normally reach you by mail before those delays start. You are now at Evaluation Day 0. To register, see instructions in D:\PATH\REGISTER.FRM." The Evaluation Day is updated, counting the first day of use as day 0, and D:\PATH gives the drive and path for the registration form. Registration suppresses that message and those potential delays. The registration form, REGISTER.FRM, is a plain ASCII text file which can be copied to a standard printer. Do not modify REGISTER.FRM: it is used as a key to let you run FWKCS before you receive a registration key. You can use the remote Lookup to help find the missing files that go with a single file you have, by doing a remote Lookup and calling the giant electronic bulletin board systems that run FWKCS(TM). For example, if you want to find the .DOCs that go with a program, there's a good chance that Lookup and a call to one of those giant boards will find for you the name of the zipfile which contains that whole set of files. Even if the name of the file you have was changed, Lookup can still be used. Then, just download that whole zipfile... If you are a bulletin board system operator, Lookup helps you use tens of Gigabytes of collected files on giant boards to support your users's special requests. Your board's users can call you locally -- you use your high_speed modem or Internet connection to get what they need -- letting you devote more of your resources to the kinds of files you're specially interested in. Then, if you run FWKCS(TM), you could become a preferred resource for that special area of work that you like. As a specialist in your own area, you can prepare automatic FWKCS cross references to help guide users in finding conceptually related files. ------------------------- To keep FWKCS.EXE relatively small, some help is provided via a text file, FWKCS205.H00. FWKCS.EXE can search for it in the current directory and on your path. So, if you put FWKCS.EXE on your path, preferably keep this text file in the same directory with it. FWKCS brings up a list of commands for further help. The extended help (option /** ) uses FWKCS205.REF, which, for reasons of size, is not included in this kit. Note: FWKCS(TM) has many features not supported in this kit -- this kit is intentionally kept small to serve your special needs in using remote Lookup. Note: The longer form of FWKCS contents_signature includes the 32_bit CRC, the uncompressed file length, and the "MD5" hash: Thanks, to R. Rivest, of MIT Laboratory for Computer Science and RSA Data Security, Inc., for introducing the MD5 algorithm and placing it in the public domain. (see RFC1321, April 1992, including the statement, "The MD5 algorithm is being placed in the public domain for review and possible adoption as a standard."). FWKCS uses an algorithm which generates the 128_bit "MD5" hash. Noting also the work of Colin Plumb (1993), there are at least four different logical sequences which satisfy the truth table for generating an MD5 hash; the one used here is different from, and faster than, the one provided by Rivest. Note is made also of work by Ray Gwinn (1995). The high_speed 32_bit and 16_bit embodiment for the algorithm used in this application is by Fred Kantor. To the extent that the code used in FWKCS.EXE may, directly or indirectly, be derivative of the C program copyrighted (1991) by RSA Data Security, Inc. ("RSA"), please note RSA's public statement, 'License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.' 'License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.'