|Aͻͻ
|A |6Helpware |A ^1PC-Cypher |Aͺ |6Helpware |A 
|Aͼͼ
^Cby
^CHubert C. Borrmann

   We read and hear so much about damage done by the infamous computer virus 
that we often forget we can be just as hurt when sensitive data or programs are 
taken without our permission.  ^1FluShot Plus^0, published in BBD #27, immunizes 
your computer from most viruses.  How can we protect ourselves from theft?  
^1PC-Cypher^0 allows you to encrypt the important information contained in your 
system based on a password you provide.  Once the files are encrypted, you can 
copy the original data to floppy disks and store them in a secure location.  
Remove the unencrypted files from your PC and only a person that knows your 
password can ever decipher them. 

^1ENCRYPTING A FILE^0

   The program starts by prompting you for both source and destination 
filenames (you may include a valid path as part of the name.)  If the 
destination file you have chosen should already exist, you will be prompted for 
permission to overwrite the file.   Next, the program will prompt you for a 
password, which can be up to 70 characters long, to use for the encrypted file. 
Check this keyphrase very carefully, you will have to enter it again the exact 
same way when you wish to decode the file.  Anytime prior to encrypting the 
data, you may press the <ESC> key to exit the program.   Once the process is 
complete, the destination file you specified will contain your encrypted data.

^1DECIPHERING A FILE^0

   You will again be prompted for source and destination files.  However, this 
time you should specify the encrypted file as your source.  The destination 
file will contain your decoded information.  The password you input must be 
exactly the same as the one used to encrypt the file originally.

^1NOTES AND WARNINGS^0

   Choose your password carefully and don't forget it!!!!  This technique of 
encryption is so good we currently have no way of deciphering a file without 
the password.  Actually you should always keep a backup copy of the original 
information in a secure location on floppy disks or magnetic tape.   Taking 
this precaution will always insure that you can recover the information should 
you forget the password.
   Though you can specify the same filename for both the source and destination 
files we do not recommend this technique.  Should you decide to do this anyway, 
make backup copies prior to encrypting the information.  This will guarantee 
that if you have a brown-out, power outage, flood, or other inconvenient event 
occur (don't they always seem to happen when we are most vulnerable?) you will 
always be able to recover the original information. 
   

   To run this program outside Big Blue Disk, type ^1Cypher^0.

DISK FILES THIS PROGRAM USES:
^FCYPHER.COM
