LOOKUP(TM) and RCROSREF(TM) are part of
FWKCS(TM) Contents_Signature System, Ver. 2.04, 1995 Aug 30.
(C)Copyright Frederick W. Kantor 1989, 1995. All rights reserved.

Kit for remote Lookup and Rcrosref.   Current release: 1995 Aug 30.

For resource material re protecting against software piracy, download
FWKCS204.ZIP and the current release of FWKCXnnn.ZIP.

New in FWKLU204.ZIP:

This provides current code for the "remote lookup" functions supporting also
Rcrosref, in a relatively small kit, for use by those who have not yet
downloaded the larger FWKCS(TM) system package (current FWKCS release:
FWKCS204.ZIP).  The version of FWKCS.EXE contained in this kit has been
revised since the last major prior release. All FWKCS.EXE functions are
enabled in the unregistered copy.

On the basis of experimental tests, the contents_signature ("cs") originally
introduced in this software in the 1980's, would appear to carry a typical
pairwise statistical error rate of less than one part in ten trillion
(1/(10,000,000,000,000)) -- more than 1000 times as good as the 32_bit CRC.
This additional statistical resolution is important in serving the needs of
electronic bulletin boards, because they often contain more files than can be
reliably distinguished by the 32_bit CRC.  This has been important in the
automatic recognition of duplicate files with changed names.

Starting with version 2.04, FWKCS supports the original cs, now called the
"short cs", and also supports a new, enhanced cs ("long cs"). The long cs has
an estimated typical statistical pairwise error rate of less than one part in
1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000.  The
short cs and the long cs are generated using assembly_language code, in a
conveniently short time. The long cs includes the short cs. The two cs's can
be used in the same data base: FWKCS uses a set of rules to automatically
handle the combination.

This enhanced statistical resolution makes the FWKCS cs an even more powerful
tool for identifying and protecting intellectual property, including
applications in legal enforcement; and can assist in bringing FWKCS to bear
on matters involving larger statistical bases.

With this enhanced statistical resolution, FWKCS continues to provide
split_second lookup for finding matching contents_signatures.

To run an unregistered copy, keep a copy of REGISTER.FRM in the same
directory with FWKCS.EXE. You can put the whole set of files on your PATH,
and call LOOKUP from anywhere on your system. Suggested test time is up to 30
days, before registering.

If this software is used in a public, commercial, school, institutional, or
governmental environment, then the test period is restricted to no more
than 45 days.

When an unregistered copy of FWKCS is run, a notice appears on the screen 
above the program identification:

  "This is an unregistered copy. After evaluation day 45, if you do not
   register, a delay of about 1 second will be added for each additional
   day. The suggested test time is up to 30 days, to allow time for your
   registration to normally reach you by mail before those delays start.

   You are now at Evaluation Day    0.

   To register, see instructions in D:\PATH\REGISTER.FRM."

The Evaluation Day is updated, counting the first day of use as day 0, and
D:\PATH gives the drive and path for the registration form.  Registration
suppresses that message and those potential delays.

The registration form, REGISTER.FRM, is a plain ASCII text file which can
be copied to a standard printer. Do not modify REGISTER.FRM: it is used as a 
key to let you run FWKCS before you receive a registration key.

You can use the remote Lookup to help find the missing files that go with a
single file you have, by doing a remote Lookup and calling the giant
electronic bulletin board systems that run FWKCS(TM). For example, if you
want to find the .DOCs that go with a program, there's a good chance that
Lookup and a call to one of those giant boards will find for you the name of
the zipfile which contains that whole set of files.  Even if the name of the
file you have was changed, Lookup can still be used.  Then, just download
that whole zipfile...

If you are a bulletin board system operator, Lookup helps you use tens of
Gigabytes of collected files on giant boards to support your users's special
requests.  Your board's users can call you locally at low speed -- you use
your high_speed modem to get what they needed -- letting you devote more of
your resources to the kinds of files you're specially interested in.  Then,
if you run FWKCS(TM), you could become a preferred resource for that special
area of work that you like. As a specialist in your own area, you can
prepare automatic FWKCS cross references to help guide users in finding
conceptually related files.

-------------------------

To keep FWKCS.EXE relatively small, some help is provided via a text file,
FWKCS204.H00.  FWKCS.EXE can search for it in the current directory and on
your path. So, if you put FWKCS.EXE on your path, preferably keep this
text file in the same directory with it.  FWKCS <enter> brings up a list
of commands for further help.

The extended help (option /** ) uses FWKCS204.REF, which, for reasons of
size, is not included in this kit.

Note:  FWKCS(TM) has many features not supported in this kit -- this kit is
intentionally kept small to serve your special needs in using remote Lookup.

Note:  The longer form of FWKCS contents_signature includes the 32_bit CRC,
       the uncompressed file length, and the "MD5" hash:

       Thanks, to   R. Rivest, of MIT Laboratory for Computer Science
                    and RSA Data Security, Inc., for introducing the MD5
                    algorithm and placing it in the public domain. (see
                    RFC1321, April 1992, including the statement, "The MD5
                    algorithm is being placed in the public domain for
                    review and possible adoption as a standard.").

                    FWKCS uses an algorithm which generates the 128_bit
                    "MD5" hash. Noting also the work of Colin Plumb (1993),
                    there are at least four different logical sequences
                    which satisfy the truth table for generating an MD5
                    hash; the one used here is different from, and faster
                    than, the one provided by Rivest. Note is made also of
                    work by Ray Gwinn (1995). The high_speed 32_bit and
                    16_bit embodiment for the algorithm used in this
                    application is by Fred Kantor.

                    To the extent that the code used in FWKCS.EXE may,
                    directly or indirectly, be derivative of the C program
                    copyrighted (1991) by RSA Data Security, Inc. ("RSA"),
                    please note RSA's public statement,

                      'License to copy and use this software is granted
                       provided that it is identified as the "RSA Data
                       Security, Inc. MD5 Message-Digest Algorithm" in all
                       material mentioning or referencing this software or
                       this function.'

                      'License is also granted to make and use derivative
                       works provided that such works are identified as
                       "derived from the RSA Data Security, Inc. MD5
                       Message-Digest Algorithm" in all material mentioning
                       or referencing the derived work.'
