|Aͻͻ
|A |DHelpware |A ^1PC-Cypher^0 |Aͺ |DHelpware |A 
|Aͼͼ
^Cby
^CHubert C. Borrmann

    We read and hear so much about damage done by the infamous computer virus 
 that we often forget we can be just as hurt when sensitive data or programs 
 are taken without our permission.  ^1FluShot Plus^0, published in BBD #27, 
 immunizes your computer from most viruses.  How can we protect ourselves from 
 theft?  ^1PC-Cypher^0 allows you to encrypt the important information contained in 
 your system based on a password you provide.  Once the files are encrypted, 
 you can copy the original data to floppy disks and store them in a secure 
 location.  Remove the unencrypted files from your PC and only a person that 
 knows your password can ever decipher them. 

 ^1ENCRYPTING A FILE^0 

    The program starts by prompting you for both source and destination 
 filenames (you may include a valid path as part of the name.)  If the 
 destination file you have chosen should already exist, you will be prompted 
 for permission to overwrite the file.   Next, the program will prompt you for 
 a password, which can be up to 70 characters long, to use for the encrypted 
 file. Check this keyphrase very carefully, you will have to enter it again the 
 exact same way when you wish to decode the file.  Anytime prior to encrypting 
 the data, you may press the <ESC> key to exit the program.   Once the process 
 is complete, the destination file you specified will contain your encrypted 
 data. 

 ^1DECIPHERING A FILE^0 

    You will again be prompted for source and destination files.  However, this 
 time you should specify the encrypted file as your source.  The destination 
 file will contain your decoded information.  The password you input must be 
 exactly the same as the one used to encrypt the file originally. 

 ^1NOTES AND WARNINGS^0 

    Choose your password carefully and don't forget it!!!!  This technique of 
 encryption is so good we currently have no way of deciphering a file without 
 the password.  Actually you should always keep a backup copy of the original 
 information in a secure location on floppy disks or magnetic tape.   Taking 
 this precaution will always insure that you can recover the information should 
 you forget the password. 
    Though you can specify the same filename for both the source and 
 destination files we do not recommend this technique.  Should you decide to do 
 this anyway, make backup copies prior to encrypting the information.  This 
 will guarantee that if you have a brown-out, power outage, flood, or other 
 inconvenient event occur (don't they always seem to happen when we are most 
 vulnerable?) you will always be able to recover the original information. 
    

    To run this program outside Big Blue Disk, type ^1Cypher^0. 

DISK FILES THIS PROGRAM USES:
^FCYPHER.COM
