Home » Archimedes archive » Archimedes World » AW-1994-10-Disc1.adf » Disk1Oct94 » !AWOct94/Goodies/Protects/!Protector/!Help

!AWOct94/Goodies/Protects/!Protector/!Help

This website contains an archive of files for the Acorn Electron, BBC Micro, Acorn Archimedes, Commodore 16 and Commodore 64 computers, which Dominic Ford has rescued from his private collection of floppy disks and cassettes.

Some of these files were originally commercial releases in the 1980s and 1990s, but they are now widely available online. I assume that copyright over them is no longer being asserted. If you own the copyright and would like files to be removed, please contact me.

Tape/disk: Home » Archimedes archive » Archimedes World » AW-1994-10-Disc1.adf » Disk1Oct94
Filename: !AWOct94/Goodies/Protects/!Protector/!Help
Read OK:
File size: 16DA bytes
Load address: 0000
Exec address: 0000
Duplicates

There is 1 duplicate copy of this file in the archive:

File contents
  
   Protector   V1.52 (01-Aug-1994)
   �������������������������������
        by Peter Reeves-Hall
        ��������������������

Introduction
=-=-=-=-=-=-
        The protector suite of applications are designed to offer an easy to
use, yet secure method of password protecting files and desktop applications.

This is of great use when your machine and/or personal files are in an �open�
environment such as an office or school. It is also useful for �home users�
taking their machine somewhere public or wanting piece of mind when leaving
it unattended.

Guide
=-=-=
        The main component of the system is the !Protector application.
Double click on it�s icon to install it onto the icon bar. Protector allows
files t be encrypted and unencrypted with a password supplied by the user.
Every file can use a different password if the User so desires.

To encrypt a file follow this procedure;
1) Drag the icon of the file to be encrypted onto the Protector icon on the
icon bar. A window will open. At the top of the window the word 'Encrypt'
will be displayed to inform you that the file will be encypted. Beneath is
the icon of the file to be encrypted and its name.
2) A password should now be entered into the writable icon at the bottom of
the window. The letters will not appear (*) but instead a row of asterisk to
prevent prying eyes from seeing what you are entering. Press return when the
password has been entered (a maximum of 24 characters are allowed, and a
minimum of 1 !)
3) You will now be prompted to renter the password, this is to check you
have made no mistakes the first time. Be careful, the protection system is
Case sensitive, eg. the password 'test' , 'TEST' and 'Test' are all treated
differently.
4) If the two passwords matched then the window will close and a save box
will appear. The save box contains the file name of the original file. When
saving the encrypted file you will be warned if it means overwriting the
existing file.
5) Once the file has been �saved-out� an hourglass will appear while the
encryption takes place. To abort the encryption procedure before the file
has been saved-out simple close the main window or the save box using the
close window icon.

       The file is now encrypted and bears the protector �lock� icon. The
encryption system does not store the password inside the file so it cannot
be loaded into an editor and found, Because of this there is no way for the
program to know, when unencrypting a file, whether the correct password has
been supplied, therefore supplying the wrong password for unencryption will
result in an even more garbled file being output from the application.
(This is why you are warned if you attempt to overwrite an existing file).

        To unencrypt a file simply drag it back onto the protector icon and
repeat the above process by supplying the correct password and save out the
new file.

        Applications can also be encrypted by Protector. Since encrypting
and unencrypting an entire program such as 'Impression' or 'Revelation'
might take a short time protector simply encrypt�s the !RunImage file inside
the application directory since this is usually where the bulk of the
program is stored and the application will not usually run without it. To
encrypt and unencrypt an application simply drag it onto the protector icon
as you would with a file. If a !RunImage file can be found then you will be
able to encrypt it.

Introducing Unlock
=-=-=-=-=-=-=-=-=-
        So far so good!, you can now encrypt file and applications, but at
the moment it may appear a bit cumbersome having to drag the files onto the
icon bar, wouldn't it be nice to be able to double click them as if they
were their original normal files? or run an encrypted application by double
clicking on it? well read on to the next section documented in the 'Unlock'
applications !Help file.......

Speed Trials
=-=-=-=-=-=-
A Comparison of Protector and Unlock (Version 1.52) has been made with the
earlier version that was published (Version 1.03) Since Version 1.03 Hand
written ARM code has been introduced to greatly speed up the encryption
process. To benchmark the improvements slightly modified copies of the two
versions of unlock were used which indicated the exact times involved. The
bench mark was performed on a RISC PC using a 30MHz ARM 610 processor
(fitted with 1Mb of VRAM to stop any "slow-down" due to the screen display).
The test involved De-encrypting a file held in RAM disc to form a second
file also in RAM Disc. (A RAM disc was used to give a fair indication of
speed without the effects associated with Harddisc "bottle-necks"
restricting the data transfer)

The file used was exactly 2Mb in size and was (de)encrypted with the
password "AcornComputers" , the results are as follows;

Version Of Unlock       Time Taken/s    MB/s            Speed increase Factor
=============================================================================
1.03 (29-Sep-1993)      245.33          0.0082            1 (reference level)
1.52 (01-Aug-1994)        1.12          1.79            219


Not too bad is it? ;->


Points to Note
=-=-=-=-=-=-=-

N.B. Both Protector and Unlock have to have seen a copy of your !System or
!Scrap (*) folder before they will load, this is because they temporarily
need to store scrap files while performing (un) encryption.

(*)  -  RISC OS 3 only


  About the Author
=-=-=-=-=-=-=-=-=-=
If you want to get in touch with the Author , concerning this program or
any of the others he has written, wether to praise them or make POLITE
criticisms, OR just to have a chat then you may reach him Electronically...

Outside "Term-time";

Via Email:   PeterRH@arcade.demon.co.uk
Or Direct to Arcade BBS  [Tel. +44 (0)81 654 2212 ] : Peter Reeves-Hall  (user #1169)  


During "Term-time";

E-mail address "Pending"  ;-)

00000000  20 20 0a 20 20 20 50 72  6f 74 65 63 74 6f 72 20  |  .   Protector |
00000010  20 20 56 31 2e 35 32 20  28 30 31 2d 41 75 67 2d  |  V1.52 (01-Aug-|
00000020  31 39 39 34 29 0a 20 20  20 8f 8f 8f 8f 8f 8f 8f  |1994).   .......|
00000030  8f 8f 8f 8f 8f 8f 8f 8f  8f 8f 8f 8f 8f 8f 8f 8f  |................|
00000040  8f 8f 8f 8f 8f 8f 8f 8f  0a 20 20 20 20 20 20 20  |.........       |
00000050  20 62 79 20 50 65 74 65  72 20 52 65 65 76 65 73  | by Peter Reeves|
00000060  2d 48 61 6c 6c 0a 20 20  20 20 20 20 20 20 8f 8f  |-Hall.        ..|
00000070  8f 8f 8f 8f 8f 8f 8f 8f  8f 8f 8f 8f 8f 8f 8f 8f  |................|
00000080  8f 8f 0a 0a 49 6e 74 72  6f 64 75 63 74 69 6f 6e  |....Introduction|
00000090  0a 3d 2d 3d 2d 3d 2d 3d  2d 3d 2d 3d 2d 0a 20 20  |.=-=-=-=-=-=-.  |
000000a0  20 20 20 20 20 20 54 68  65 20 70 72 6f 74 65 63  |      The protec|
000000b0  74 6f 72 20 73 75 69 74  65 20 6f 66 20 61 70 70  |tor suite of app|
000000c0  6c 69 63 61 74 69 6f 6e  73 20 61 72 65 20 64 65  |lications are de|
000000d0  73 69 67 6e 65 64 20 74  6f 20 6f 66 66 65 72 20  |signed to offer |
000000e0  61 6e 20 65 61 73 79 20  74 6f 0a 75 73 65 2c 20  |an easy to.use, |
000000f0  79 65 74 20 73 65 63 75  72 65 20 6d 65 74 68 6f  |yet secure metho|
00000100  64 20 6f 66 20 70 61 73  73 77 6f 72 64 20 70 72  |d of password pr|
00000110  6f 74 65 63 74 69 6e 67  20 66 69 6c 65 73 20 61  |otecting files a|
00000120  6e 64 20 64 65 73 6b 74  6f 70 20 61 70 70 6c 69  |nd desktop appli|
00000130  63 61 74 69 6f 6e 73 2e  0a 0a 54 68 69 73 20 69  |cations...This i|
00000140  73 20 6f 66 20 67 72 65  61 74 20 75 73 65 20 77  |s of great use w|
00000150  68 65 6e 20 79 6f 75 72  20 6d 61 63 68 69 6e 65  |hen your machine|
00000160  20 61 6e 64 2f 6f 72 20  70 65 72 73 6f 6e 61 6c  | and/or personal|
00000170  20 66 69 6c 65 73 20 61  72 65 20 69 6e 20 61 6e  | files are in an|
00000180  20 94 6f 70 65 6e 95 0a  65 6e 76 69 72 6f 6e 6d  | .open..environm|
00000190  65 6e 74 20 73 75 63 68  20 61 73 20 61 6e 20 6f  |ent such as an o|
000001a0  66 66 69 63 65 20 6f 72  20 73 63 68 6f 6f 6c 2e  |ffice or school.|
000001b0  20 49 74 20 69 73 20 61  6c 73 6f 20 75 73 65 66  | It is also usef|
000001c0  75 6c 20 66 6f 72 20 90  68 6f 6d 65 20 75 73 65  |ul for .home use|
000001d0  72 73 91 0a 74 61 6b 69  6e 67 20 74 68 65 69 72  |rs..taking their|
000001e0  20 6d 61 63 68 69 6e 65  20 73 6f 6d 65 77 68 65  | machine somewhe|
000001f0  72 65 20 70 75 62 6c 69  63 20 6f 72 20 77 61 6e  |re public or wan|
00000200  74 69 6e 67 20 70 69 65  63 65 20 6f 66 20 6d 69  |ting piece of mi|
00000210  6e 64 20 77 68 65 6e 20  6c 65 61 76 69 6e 67 0a  |nd when leaving.|
00000220  69 74 20 75 6e 61 74 74  65 6e 64 65 64 2e 0a 0a  |it unattended...|
00000230  47 75 69 64 65 0a 3d 2d  3d 2d 3d 0a 20 20 20 20  |Guide.=-=-=.    |
00000240  20 20 20 20 54 68 65 20  6d 61 69 6e 20 63 6f 6d  |    The main com|
00000250  70 6f 6e 65 6e 74 20 6f  66 20 74 68 65 20 73 79  |ponent of the sy|
00000260  73 74 65 6d 20 69 73 20  74 68 65 20 21 50 72 6f  |stem is the !Pro|
00000270  74 65 63 74 6f 72 20 61  70 70 6c 69 63 61 74 69  |tector applicati|
00000280  6f 6e 2e 0a 44 6f 75 62  6c 65 20 63 6c 69 63 6b  |on..Double click|
00000290  20 6f 6e 20 69 74 91 73  20 69 63 6f 6e 20 74 6f  | on it.s icon to|
000002a0  20 69 6e 73 74 61 6c 6c  20 69 74 20 6f 6e 74 6f  | install it onto|
000002b0  20 74 68 65 20 69 63 6f  6e 20 62 61 72 2e 20 50  | the icon bar. P|
000002c0  72 6f 74 65 63 74 6f 72  20 61 6c 6c 6f 77 73 0a  |rotector allows.|
000002d0  66 69 6c 65 73 20 74 20  62 65 20 65 6e 63 72 79  |files t be encry|
000002e0  70 74 65 64 20 61 6e 64  20 75 6e 65 6e 63 72 79  |pted and unencry|
000002f0  70 74 65 64 20 77 69 74  68 20 61 20 70 61 73 73  |pted with a pass|
00000300  77 6f 72 64 20 73 75 70  70 6c 69 65 64 20 62 79  |word supplied by|
00000310  20 74 68 65 20 75 73 65  72 2e 0a 45 76 65 72 79  | the user..Every|
00000320  20 66 69 6c 65 20 63 61  6e 20 75 73 65 20 61 20  | file can use a |
00000330  64 69 66 66 65 72 65 6e  74 20 70 61 73 73 77 6f  |different passwo|
00000340  72 64 20 69 66 20 74 68  65 20 55 73 65 72 20 73  |rd if the User s|
00000350  6f 20 64 65 73 69 72 65  73 2e 0a 0a 54 6f 20 65  |o desires...To e|
00000360  6e 63 72 79 70 74 20 61  20 66 69 6c 65 20 66 6f  |ncrypt a file fo|
00000370  6c 6c 6f 77 20 74 68 69  73 20 70 72 6f 63 65 64  |llow this proced|
00000380  75 72 65 3b 0a 31 29 20  44 72 61 67 20 74 68 65  |ure;.1) Drag the|
00000390  20 69 63 6f 6e 20 6f 66  20 74 68 65 20 66 69 6c  | icon of the fil|
000003a0  65 20 74 6f 20 62 65 20  65 6e 63 72 79 70 74 65  |e to be encrypte|
000003b0  64 20 6f 6e 74 6f 20 74  68 65 20 50 72 6f 74 65  |d onto the Prote|
000003c0  63 74 6f 72 20 69 63 6f  6e 20 6f 6e 20 74 68 65  |ctor icon on the|
000003d0  0a 69 63 6f 6e 20 62 61  72 2e 20 41 20 77 69 6e  |.icon bar. A win|
000003e0  64 6f 77 20 77 69 6c 6c  20 6f 70 65 6e 2e 20 41  |dow will open. A|
000003f0  74 20 74 68 65 20 74 6f  70 20 6f 66 20 74 68 65  |t the top of the|
00000400  20 77 69 6e 64 6f 77 20  74 68 65 20 77 6f 72 64  | window the word|
00000410  20 27 45 6e 63 72 79 70  74 27 0a 77 69 6c 6c 20  | 'Encrypt'.will |
00000420  62 65 20 64 69 73 70 6c  61 79 65 64 20 74 6f 20  |be displayed to |
00000430  69 6e 66 6f 72 6d 20 79  6f 75 20 74 68 61 74 20  |inform you that |
00000440  74 68 65 20 66 69 6c 65  20 77 69 6c 6c 20 62 65  |the file will be|
00000450  20 65 6e 63 79 70 74 65  64 2e 20 42 65 6e 65 61  | encypted. Benea|
00000460  74 68 20 69 73 0a 74 68  65 20 69 63 6f 6e 20 6f  |th is.the icon o|
00000470  66 20 74 68 65 20 66 69  6c 65 20 74 6f 20 62 65  |f the file to be|
00000480  20 65 6e 63 72 79 70 74  65 64 20 61 6e 64 20 69  | encrypted and i|
00000490  74 73 20 6e 61 6d 65 2e  0a 32 29 20 41 20 70 61  |ts name..2) A pa|
000004a0  73 73 77 6f 72 64 20 73  68 6f 75 6c 64 20 6e 6f  |ssword should no|
000004b0  77 20 62 65 20 65 6e 74  65 72 65 64 20 69 6e 74  |w be entered int|
000004c0  6f 20 74 68 65 20 77 72  69 74 61 62 6c 65 20 69  |o the writable i|
000004d0  63 6f 6e 20 61 74 20 74  68 65 20 62 6f 74 74 6f  |con at the botto|
000004e0  6d 20 6f 66 0a 74 68 65  20 77 69 6e 64 6f 77 2e  |m of.the window.|
000004f0  20 54 68 65 20 6c 65 74  74 65 72 73 20 77 69 6c  | The letters wil|
00000500  6c 20 6e 6f 74 20 61 70  70 65 61 72 20 28 2a 29  |l not appear (*)|
00000510  20 62 75 74 20 69 6e 73  74 65 61 64 20 61 20 72  | but instead a r|
00000520  6f 77 20 6f 66 20 61 73  74 65 72 69 73 6b 20 74  |ow of asterisk t|
00000530  6f 0a 70 72 65 76 65 6e  74 20 70 72 79 69 6e 67  |o.prevent prying|
00000540  20 65 79 65 73 20 66 72  6f 6d 20 73 65 65 69 6e  | eyes from seein|
00000550  67 20 77 68 61 74 20 79  6f 75 20 61 72 65 20 65  |g what you are e|
00000560  6e 74 65 72 69 6e 67 2e  20 50 72 65 73 73 20 72  |ntering. Press r|
00000570  65 74 75 72 6e 20 77 68  65 6e 20 74 68 65 0a 70  |eturn when the.p|
00000580  61 73 73 77 6f 72 64 20  68 61 73 20 62 65 65 6e  |assword has been|
00000590  20 65 6e 74 65 72 65 64  20 28 61 20 6d 61 78 69  | entered (a maxi|
000005a0  6d 75 6d 20 6f 66 20 32  34 20 63 68 61 72 61 63  |mum of 24 charac|
000005b0  74 65 72 73 20 61 72 65  20 61 6c 6c 6f 77 65 64  |ters are allowed|
000005c0  2c 20 61 6e 64 20 61 0a  6d 69 6e 69 6d 75 6d 20  |, and a.minimum |
000005d0  6f 66 20 31 20 21 29 0a  33 29 20 59 6f 75 20 77  |of 1 !).3) You w|
000005e0  69 6c 6c 20 6e 6f 77 20  62 65 20 70 72 6f 6d 70  |ill now be promp|
000005f0  74 65 64 20 74 6f 20 72  65 6e 74 65 72 20 74 68  |ted to renter th|
00000600  65 20 70 61 73 73 77 6f  72 64 2c 20 74 68 69 73  |e password, this|
00000610  20 69 73 20 74 6f 20 63  68 65 63 6b 20 79 6f 75  | is to check you|
00000620  0a 68 61 76 65 20 6d 61  64 65 20 6e 6f 20 6d 69  |.have made no mi|
00000630  73 74 61 6b 65 73 20 74  68 65 20 66 69 72 73 74  |stakes the first|
00000640  20 74 69 6d 65 2e 20 42  65 20 63 61 72 65 66 75  | time. Be carefu|
00000650  6c 2c 20 74 68 65 20 70  72 6f 74 65 63 74 69 6f  |l, the protectio|
00000660  6e 20 73 79 73 74 65 6d  20 69 73 0a 43 61 73 65  |n system is.Case|
00000670  20 73 65 6e 73 69 74 69  76 65 2c 20 65 67 2e 20  | sensitive, eg. |
00000680  74 68 65 20 70 61 73 73  77 6f 72 64 20 27 74 65  |the password 'te|
00000690  73 74 27 20 2c 20 27 54  45 53 54 27 20 61 6e 64  |st' , 'TEST' and|
000006a0  20 27 54 65 73 74 27 20  61 72 65 20 61 6c 6c 20  | 'Test' are all |
000006b0  74 72 65 61 74 65 64 0a  64 69 66 66 65 72 65 6e  |treated.differen|
000006c0  74 6c 79 2e 0a 34 29 20  49 66 20 74 68 65 20 74  |tly..4) If the t|
000006d0  77 6f 20 70 61 73 73 77  6f 72 64 73 20 6d 61 74  |wo passwords mat|
000006e0  63 68 65 64 20 74 68 65  6e 20 74 68 65 20 77 69  |ched then the wi|
000006f0  6e 64 6f 77 20 77 69 6c  6c 20 63 6c 6f 73 65 20  |ndow will close |
00000700  61 6e 64 20 61 20 73 61  76 65 20 62 6f 78 0a 77  |and a save box.w|
00000710  69 6c 6c 20 61 70 70 65  61 72 2e 20 54 68 65 20  |ill appear. The |
00000720  73 61 76 65 20 62 6f 78  20 63 6f 6e 74 61 69 6e  |save box contain|
00000730  73 20 74 68 65 20 66 69  6c 65 20 6e 61 6d 65 20  |s the file name |
00000740  6f 66 20 74 68 65 20 6f  72 69 67 69 6e 61 6c 20  |of the original |
00000750  66 69 6c 65 2e 20 57 68  65 6e 0a 73 61 76 69 6e  |file. When.savin|
00000760  67 20 74 68 65 20 65 6e  63 72 79 70 74 65 64 20  |g the encrypted |
00000770  66 69 6c 65 20 79 6f 75  20 77 69 6c 6c 20 62 65  |file you will be|
00000780  20 77 61 72 6e 65 64 20  69 66 20 69 74 20 6d 65  | warned if it me|
00000790  61 6e 73 20 6f 76 65 72  77 72 69 74 69 6e 67 20  |ans overwriting |
000007a0  74 68 65 0a 65 78 69 73  74 69 6e 67 20 66 69 6c  |the.existing fil|
000007b0  65 2e 0a 35 29 20 4f 6e  63 65 20 74 68 65 20 66  |e..5) Once the f|
000007c0  69 6c 65 20 68 61 73 20  62 65 65 6e 20 90 73 61  |ile has been .sa|
000007d0  76 65 64 2d 6f 75 74 91  20 61 6e 20 68 6f 75 72  |ved-out. an hour|
000007e0  67 6c 61 73 73 20 77 69  6c 6c 20 61 70 70 65 61  |glass will appea|
000007f0  72 20 77 68 69 6c 65 20  74 68 65 0a 65 6e 63 72  |r while the.encr|
00000800  79 70 74 69 6f 6e 20 74  61 6b 65 73 20 70 6c 61  |yption takes pla|
00000810  63 65 2e 20 54 6f 20 61  62 6f 72 74 20 74 68 65  |ce. To abort the|
00000820  20 65 6e 63 72 79 70 74  69 6f 6e 20 70 72 6f 63  | encryption proc|
00000830  65 64 75 72 65 20 62 65  66 6f 72 65 20 74 68 65  |edure before the|
00000840  20 66 69 6c 65 0a 68 61  73 20 62 65 65 6e 20 73  | file.has been s|
00000850  61 76 65 64 2d 6f 75 74  20 73 69 6d 70 6c 65 20  |aved-out simple |
00000860  63 6c 6f 73 65 20 74 68  65 20 6d 61 69 6e 20 77  |close the main w|
00000870  69 6e 64 6f 77 20 6f 72  20 74 68 65 20 73 61 76  |indow or the sav|
00000880  65 20 62 6f 78 20 75 73  69 6e 67 20 74 68 65 0a  |e box using the.|
00000890  63 6c 6f 73 65 20 77 69  6e 64 6f 77 20 69 63 6f  |close window ico|
000008a0  6e 2e 0a 0a 20 20 20 20  20 20 20 54 68 65 20 66  |n...       The f|
000008b0  69 6c 65 20 69 73 20 6e  6f 77 20 65 6e 63 72 79  |ile is now encry|
000008c0  70 74 65 64 20 61 6e 64  20 62 65 61 72 73 20 74  |pted and bears t|
000008d0  68 65 20 70 72 6f 74 65  63 74 6f 72 20 90 6c 6f  |he protector .lo|
000008e0  63 6b 91 20 69 63 6f 6e  2e 20 54 68 65 0a 65 6e  |ck. icon. The.en|
000008f0  63 72 79 70 74 69 6f 6e  20 73 79 73 74 65 6d 20  |cryption system |
00000900  64 6f 65 73 20 6e 6f 74  20 73 74 6f 72 65 20 74  |does not store t|
00000910  68 65 20 70 61 73 73 77  6f 72 64 20 69 6e 73 69  |he password insi|
00000920  64 65 20 74 68 65 20 66  69 6c 65 20 73 6f 20 69  |de the file so i|
00000930  74 20 63 61 6e 6e 6f 74  0a 62 65 20 6c 6f 61 64  |t cannot.be load|
00000940  65 64 20 69 6e 74 6f 20  61 6e 20 65 64 69 74 6f  |ed into an edito|
00000950  72 20 61 6e 64 20 66 6f  75 6e 64 2c 20 42 65 63  |r and found, Bec|
00000960  61 75 73 65 20 6f 66 20  74 68 69 73 20 74 68 65  |ause of this the|
00000970  72 65 20 69 73 20 6e 6f  20 77 61 79 20 66 6f 72  |re is no way for|
00000980  20 74 68 65 0a 70 72 6f  67 72 61 6d 20 74 6f 20  | the.program to |
00000990  6b 6e 6f 77 2c 20 77 68  65 6e 20 75 6e 65 6e 63  |know, when unenc|
000009a0  72 79 70 74 69 6e 67 20  61 20 66 69 6c 65 2c 20  |rypting a file, |
000009b0  77 68 65 74 68 65 72 20  74 68 65 20 63 6f 72 72  |whether the corr|
000009c0  65 63 74 20 70 61 73 73  77 6f 72 64 20 68 61 73  |ect password has|
000009d0  0a 62 65 65 6e 20 73 75  70 70 6c 69 65 64 2c 20  |.been supplied, |
000009e0  74 68 65 72 65 66 6f 72  65 20 73 75 70 70 6c 79  |therefore supply|
000009f0  69 6e 67 20 74 68 65 20  77 72 6f 6e 67 20 70 61  |ing the wrong pa|
00000a00  73 73 77 6f 72 64 20 66  6f 72 20 75 6e 65 6e 63  |ssword for unenc|
00000a10  72 79 70 74 69 6f 6e 20  77 69 6c 6c 0a 72 65 73  |ryption will.res|
00000a20  75 6c 74 20 69 6e 20 61  6e 20 65 76 65 6e 20 6d  |ult in an even m|
00000a30  6f 72 65 20 67 61 72 62  6c 65 64 20 66 69 6c 65  |ore garbled file|
00000a40  20 62 65 69 6e 67 20 6f  75 74 70 75 74 20 66 72  | being output fr|
00000a50  6f 6d 20 74 68 65 20 61  70 70 6c 69 63 61 74 69  |om the applicati|
00000a60  6f 6e 2e 0a 28 54 68 69  73 20 69 73 20 77 68 79  |on..(This is why|
00000a70  20 79 6f 75 20 61 72 65  20 77 61 72 6e 65 64 20  | you are warned |
00000a80  69 66 20 79 6f 75 20 61  74 74 65 6d 70 74 20 74  |if you attempt t|
00000a90  6f 20 6f 76 65 72 77 72  69 74 65 20 61 6e 20 65  |o overwrite an e|
00000aa0  78 69 73 74 69 6e 67 20  66 69 6c 65 29 2e 0a 0a  |xisting file)...|
00000ab0  20 20 20 20 20 20 20 20  54 6f 20 75 6e 65 6e 63  |        To unenc|
00000ac0  72 79 70 74 20 61 20 66  69 6c 65 20 73 69 6d 70  |rypt a file simp|
00000ad0  6c 79 20 64 72 61 67 20  69 74 20 62 61 63 6b 20  |ly drag it back |
00000ae0  6f 6e 74 6f 20 74 68 65  20 70 72 6f 74 65 63 74  |onto the protect|
00000af0  6f 72 20 69 63 6f 6e 20  61 6e 64 0a 72 65 70 65  |or icon and.repe|
00000b00  61 74 20 74 68 65 20 61  62 6f 76 65 20 70 72 6f  |at the above pro|
00000b10  63 65 73 73 20 62 79 20  73 75 70 70 6c 79 69 6e  |cess by supplyin|
00000b20  67 20 74 68 65 20 63 6f  72 72 65 63 74 20 70 61  |g the correct pa|
00000b30  73 73 77 6f 72 64 20 61  6e 64 20 73 61 76 65 20  |ssword and save |
00000b40  6f 75 74 20 74 68 65 0a  6e 65 77 20 66 69 6c 65  |out the.new file|
00000b50  2e 0a 0a 20 20 20 20 20  20 20 20 41 70 70 6c 69  |...        Appli|
00000b60  63 61 74 69 6f 6e 73 20  63 61 6e 20 61 6c 73 6f  |cations can also|
00000b70  20 62 65 20 65 6e 63 72  79 70 74 65 64 20 62 79  | be encrypted by|
00000b80  20 50 72 6f 74 65 63 74  6f 72 2e 20 53 69 6e 63  | Protector. Sinc|
00000b90  65 20 65 6e 63 72 79 70  74 69 6e 67 0a 61 6e 64  |e encrypting.and|
00000ba0  20 75 6e 65 6e 63 72 79  70 74 69 6e 67 20 61 6e  | unencrypting an|
00000bb0  20 65 6e 74 69 72 65 20  70 72 6f 67 72 61 6d 20  | entire program |
00000bc0  73 75 63 68 20 61 73 20  27 49 6d 70 72 65 73 73  |such as 'Impress|
00000bd0  69 6f 6e 27 20 6f 72 20  27 52 65 76 65 6c 61 74  |ion' or 'Revelat|
00000be0  69 6f 6e 27 0a 6d 69 67  68 74 20 74 61 6b 65 20  |ion'.might take |
00000bf0  61 20 73 68 6f 72 74 20  74 69 6d 65 20 70 72 6f  |a short time pro|
00000c00  74 65 63 74 6f 72 20 73  69 6d 70 6c 79 20 65 6e  |tector simply en|
00000c10  63 72 79 70 74 91 73 20  74 68 65 20 21 52 75 6e  |crypt.s the !Run|
00000c20  49 6d 61 67 65 20 66 69  6c 65 20 69 6e 73 69 64  |Image file insid|
00000c30  65 0a 74 68 65 20 61 70  70 6c 69 63 61 74 69 6f  |e.the applicatio|
00000c40  6e 20 64 69 72 65 63 74  6f 72 79 20 73 69 6e 63  |n directory sinc|
00000c50  65 20 74 68 69 73 20 69  73 20 75 73 75 61 6c 6c  |e this is usuall|
00000c60  79 20 77 68 65 72 65 20  74 68 65 20 62 75 6c 6b  |y where the bulk|
00000c70  20 6f 66 20 74 68 65 0a  70 72 6f 67 72 61 6d 20  | of the.program |
00000c80  69 73 20 73 74 6f 72 65  64 20 61 6e 64 20 74 68  |is stored and th|
00000c90  65 20 61 70 70 6c 69 63  61 74 69 6f 6e 20 77 69  |e application wi|
00000ca0  6c 6c 20 6e 6f 74 20 75  73 75 61 6c 6c 79 20 72  |ll not usually r|
00000cb0  75 6e 20 77 69 74 68 6f  75 74 20 69 74 2e 20 54  |un without it. T|
00000cc0  6f 0a 65 6e 63 72 79 70  74 20 61 6e 64 20 75 6e  |o.encrypt and un|
00000cd0  65 6e 63 72 79 70 74 20  61 6e 20 61 70 70 6c 69  |encrypt an appli|
00000ce0  63 61 74 69 6f 6e 20 73  69 6d 70 6c 79 20 64 72  |cation simply dr|
00000cf0  61 67 20 69 74 20 6f 6e  74 6f 20 74 68 65 20 70  |ag it onto the p|
00000d00  72 6f 74 65 63 74 6f 72  20 69 63 6f 6e 0a 61 73  |rotector icon.as|
00000d10  20 79 6f 75 20 77 6f 75  6c 64 20 77 69 74 68 20  | you would with |
00000d20  61 20 66 69 6c 65 2e 20  49 66 20 61 20 21 52 75  |a file. If a !Ru|
00000d30  6e 49 6d 61 67 65 20 66  69 6c 65 20 63 61 6e 20  |nImage file can |
00000d40  62 65 20 66 6f 75 6e 64  20 74 68 65 6e 20 79 6f  |be found then yo|
00000d50  75 20 77 69 6c 6c 20 62  65 0a 61 62 6c 65 20 74  |u will be.able t|
00000d60  6f 20 65 6e 63 72 79 70  74 20 69 74 2e 0a 0a 49  |o encrypt it...I|
00000d70  6e 74 72 6f 64 75 63 69  6e 67 20 55 6e 6c 6f 63  |ntroducing Unloc|
00000d80  6b 0a 3d 2d 3d 2d 3d 2d  3d 2d 3d 2d 3d 2d 3d 2d  |k.=-=-=-=-=-=-=-|
00000d90  3d 2d 3d 2d 0a 20 20 20  20 20 20 20 20 53 6f 20  |=-=-.        So |
00000da0  66 61 72 20 73 6f 20 67  6f 6f 64 21 2c 20 79 6f  |far so good!, yo|
00000db0  75 20 63 61 6e 20 6e 6f  77 20 65 6e 63 72 79 70  |u can now encryp|
00000dc0  74 20 66 69 6c 65 20 61  6e 64 20 61 70 70 6c 69  |t file and appli|
00000dd0  63 61 74 69 6f 6e 73 2c  20 62 75 74 20 61 74 0a  |cations, but at.|
00000de0  74 68 65 20 6d 6f 6d 65  6e 74 20 69 74 20 6d 61  |the moment it ma|
00000df0  79 20 61 70 70 65 61 72  20 61 20 62 69 74 20 63  |y appear a bit c|
00000e00  75 6d 62 65 72 73 6f 6d  65 20 68 61 76 69 6e 67  |umbersome having|
00000e10  20 74 6f 20 64 72 61 67  20 74 68 65 20 66 69 6c  | to drag the fil|
00000e20  65 73 20 6f 6e 74 6f 20  74 68 65 0a 69 63 6f 6e  |es onto the.icon|
00000e30  20 62 61 72 2c 20 77 6f  75 6c 64 6e 27 74 20 69  | bar, wouldn't i|
00000e40  74 20 62 65 20 6e 69 63  65 20 74 6f 20 62 65 20  |t be nice to be |
00000e50  61 62 6c 65 20 74 6f 20  64 6f 75 62 6c 65 20 63  |able to double c|
00000e60  6c 69 63 6b 20 74 68 65  6d 20 61 73 20 69 66 20  |lick them as if |
00000e70  74 68 65 79 0a 77 65 72  65 20 74 68 65 69 72 20  |they.were their |
00000e80  6f 72 69 67 69 6e 61 6c  20 6e 6f 72 6d 61 6c 20  |original normal |
00000e90  66 69 6c 65 73 3f 20 6f  72 20 72 75 6e 20 61 6e  |files? or run an|
00000ea0  20 65 6e 63 72 79 70 74  65 64 20 61 70 70 6c 69  | encrypted appli|
00000eb0  63 61 74 69 6f 6e 20 62  79 20 64 6f 75 62 6c 65  |cation by double|
00000ec0  0a 63 6c 69 63 6b 69 6e  67 20 6f 6e 20 69 74 3f  |.clicking on it?|
00000ed0  20 77 65 6c 6c 20 72 65  61 64 20 6f 6e 20 74 6f  | well read on to|
00000ee0  20 74 68 65 20 6e 65 78  74 20 73 65 63 74 69 6f  | the next sectio|
00000ef0  6e 20 64 6f 63 75 6d 65  6e 74 65 64 20 69 6e 20  |n documented in |
00000f00  74 68 65 20 27 55 6e 6c  6f 63 6b 27 0a 61 70 70  |the 'Unlock'.app|
00000f10  6c 69 63 61 74 69 6f 6e  73 20 21 48 65 6c 70 20  |lications !Help |
00000f20  66 69 6c 65 2e 2e 2e 2e  2e 2e 2e 0a 0a 53 70 65  |file.........Spe|
00000f30  65 64 20 54 72 69 61 6c  73 0a 3d 2d 3d 2d 3d 2d  |ed Trials.=-=-=-|
00000f40  3d 2d 3d 2d 3d 2d 0a 41  20 43 6f 6d 70 61 72 69  |=-=-=-.A Compari|
00000f50  73 6f 6e 20 6f 66 20 50  72 6f 74 65 63 74 6f 72  |son of Protector|
00000f60  20 61 6e 64 20 55 6e 6c  6f 63 6b 20 28 56 65 72  | and Unlock (Ver|
00000f70  73 69 6f 6e 20 31 2e 35  32 29 20 68 61 73 20 62  |sion 1.52) has b|
00000f80  65 65 6e 20 6d 61 64 65  20 77 69 74 68 20 74 68  |een made with th|
00000f90  65 0a 65 61 72 6c 69 65  72 20 76 65 72 73 69 6f  |e.earlier versio|
00000fa0  6e 20 74 68 61 74 20 77  61 73 20 70 75 62 6c 69  |n that was publi|
00000fb0  73 68 65 64 20 28 56 65  72 73 69 6f 6e 20 31 2e  |shed (Version 1.|
00000fc0  30 33 29 20 53 69 6e 63  65 20 56 65 72 73 69 6f  |03) Since Versio|
00000fd0  6e 20 31 2e 30 33 20 48  61 6e 64 0a 77 72 69 74  |n 1.03 Hand.writ|
00000fe0  74 65 6e 20 41 52 4d 20  63 6f 64 65 20 68 61 73  |ten ARM code has|
00000ff0  20 62 65 65 6e 20 69 6e  74 72 6f 64 75 63 65 64  | been introduced|
00001000  20 74 6f 20 67 72 65 61  74 6c 79 20 73 70 65 65  | to greatly spee|
00001010  64 20 75 70 20 74 68 65  20 65 6e 63 72 79 70 74  |d up the encrypt|
00001020  69 6f 6e 0a 70 72 6f 63  65 73 73 2e 20 54 6f 20  |ion.process. To |
00001030  62 65 6e 63 68 6d 61 72  6b 20 74 68 65 20 69 6d  |benchmark the im|
00001040  70 72 6f 76 65 6d 65 6e  74 73 20 73 6c 69 67 68  |provements sligh|
00001050  74 6c 79 20 6d 6f 64 69  66 69 65 64 20 63 6f 70  |tly modified cop|
00001060  69 65 73 20 6f 66 20 74  68 65 20 74 77 6f 0a 76  |ies of the two.v|
00001070  65 72 73 69 6f 6e 73 20  6f 66 20 75 6e 6c 6f 63  |ersions of unloc|
00001080  6b 20 77 65 72 65 20 75  73 65 64 20 77 68 69 63  |k were used whic|
00001090  68 20 69 6e 64 69 63 61  74 65 64 20 74 68 65 20  |h indicated the |
000010a0  65 78 61 63 74 20 74 69  6d 65 73 20 69 6e 76 6f  |exact times invo|
000010b0  6c 76 65 64 2e 20 54 68  65 0a 62 65 6e 63 68 20  |lved. The.bench |
000010c0  6d 61 72 6b 20 77 61 73  20 70 65 72 66 6f 72 6d  |mark was perform|
000010d0  65 64 20 6f 6e 20 61 20  52 49 53 43 20 50 43 20  |ed on a RISC PC |
000010e0  75 73 69 6e 67 20 61 20  33 30 4d 48 7a 20 41 52  |using a 30MHz AR|
000010f0  4d 20 36 31 30 20 70 72  6f 63 65 73 73 6f 72 0a  |M 610 processor.|
00001100  28 66 69 74 74 65 64 20  77 69 74 68 20 31 4d 62  |(fitted with 1Mb|
00001110  20 6f 66 20 56 52 41 4d  20 74 6f 20 73 74 6f 70  | of VRAM to stop|
00001120  20 61 6e 79 20 22 73 6c  6f 77 2d 64 6f 77 6e 22  | any "slow-down"|
00001130  20 64 75 65 20 74 6f 20  74 68 65 20 73 63 72 65  | due to the scre|
00001140  65 6e 20 64 69 73 70 6c  61 79 29 2e 0a 54 68 65  |en display)..The|
00001150  20 74 65 73 74 20 69 6e  76 6f 6c 76 65 64 20 44  | test involved D|
00001160  65 2d 65 6e 63 72 79 70  74 69 6e 67 20 61 20 66  |e-encrypting a f|
00001170  69 6c 65 20 68 65 6c 64  20 69 6e 20 52 41 4d 20  |ile held in RAM |
00001180  64 69 73 63 20 74 6f 20  66 6f 72 6d 20 61 20 73  |disc to form a s|
00001190  65 63 6f 6e 64 0a 66 69  6c 65 20 61 6c 73 6f 20  |econd.file also |
000011a0  69 6e 20 52 41 4d 20 44  69 73 63 2e 20 28 41 20  |in RAM Disc. (A |
000011b0  52 41 4d 20 64 69 73 63  20 77 61 73 20 75 73 65  |RAM disc was use|
000011c0  64 20 74 6f 20 67 69 76  65 20 61 20 66 61 69 72  |d to give a fair|
000011d0  20 69 6e 64 69 63 61 74  69 6f 6e 20 6f 66 0a 73  | indication of.s|
000011e0  70 65 65 64 20 77 69 74  68 6f 75 74 20 74 68 65  |peed without the|
000011f0  20 65 66 66 65 63 74 73  20 61 73 73 6f 63 69 61  | effects associa|
00001200  74 65 64 20 77 69 74 68  20 48 61 72 64 64 69 73  |ted with Harddis|
00001210  63 20 22 62 6f 74 74 6c  65 2d 6e 65 63 6b 73 22  |c "bottle-necks"|
00001220  0a 72 65 73 74 72 69 63  74 69 6e 67 20 74 68 65  |.restricting the|
00001230  20 64 61 74 61 20 74 72  61 6e 73 66 65 72 29 0a  | data transfer).|
00001240  0a 54 68 65 20 66 69 6c  65 20 75 73 65 64 20 77  |.The file used w|
00001250  61 73 20 65 78 61 63 74  6c 79 20 32 4d 62 20 69  |as exactly 2Mb i|
00001260  6e 20 73 69 7a 65 20 61  6e 64 20 77 61 73 20 28  |n size and was (|
00001270  64 65 29 65 6e 63 72 79  70 74 65 64 20 77 69 74  |de)encrypted wit|
00001280  68 20 74 68 65 0a 70 61  73 73 77 6f 72 64 20 22  |h the.password "|
00001290  41 63 6f 72 6e 43 6f 6d  70 75 74 65 72 73 22 20  |AcornComputers" |
000012a0  2c 20 74 68 65 20 72 65  73 75 6c 74 73 20 61 72  |, the results ar|
000012b0  65 20 61 73 20 66 6f 6c  6c 6f 77 73 3b 0a 0a 56  |e as follows;..V|
000012c0  65 72 73 69 6f 6e 20 4f  66 20 55 6e 6c 6f 63 6b  |ersion Of Unlock|
000012d0  20 20 20 20 20 20 20 54  69 6d 65 20 54 61 6b 65  |       Time Take|
000012e0  6e 2f 73 20 20 20 20 4d  42 2f 73 20 20 20 20 20  |n/s    MB/s     |
000012f0  20 20 20 20 20 20 20 53  70 65 65 64 20 69 6e 63  |       Speed inc|
00001300  72 65 61 73 65 20 46 61  63 74 6f 72 0a 3d 3d 3d  |rease Factor.===|
00001310  3d 3d 3d 3d 3d 3d 3d 3d  3d 3d 3d 3d 3d 3d 3d 3d  |================|
*
00001350  3d 3d 3d 3d 3d 3d 3d 3d  3d 3d 0a 31 2e 30 33 20  |==========.1.03 |
00001360  28 32 39 2d 53 65 70 2d  31 39 39 33 29 20 20 20  |(29-Sep-1993)   |
00001370  20 20 20 32 34 35 2e 33  33 20 20 20 20 20 20 20  |   245.33       |
00001380  20 20 20 30 2e 30 30 38  32 20 20 20 20 20 20 20  |   0.0082       |
00001390  20 20 20 20 20 31 20 28  72 65 66 65 72 65 6e 63  |     1 (referenc|
000013a0  65 20 6c 65 76 65 6c 29  0a 31 2e 35 32 20 28 30  |e level).1.52 (0|
000013b0  31 2d 41 75 67 2d 31 39  39 34 29 20 20 20 20 20  |1-Aug-1994)     |
000013c0  20 20 20 31 2e 31 32 20  20 20 20 20 20 20 20 20  |   1.12         |
000013d0  20 31 2e 37 39 20 20 20  20 20 20 20 20 20 20 20  | 1.79           |
000013e0  20 32 31 39 0a 0a 0a 4e  6f 74 20 74 6f 6f 20 62  | 219...Not too b|
000013f0  61 64 20 69 73 20 69 74  3f 20 3b 2d 3e 0a 0a 0a  |ad is it? ;->...|
00001400  50 6f 69 6e 74 73 20 74  6f 20 4e 6f 74 65 0a 3d  |Points to Note.=|
00001410  2d 3d 2d 3d 2d 3d 2d 3d  2d 3d 2d 3d 2d 0a 0a 4e  |-=-=-=-=-=-=-..N|
00001420  2e 42 2e 20 42 6f 74 68  20 50 72 6f 74 65 63 74  |.B. Both Protect|
00001430  6f 72 20 61 6e 64 20 55  6e 6c 6f 63 6b 20 68 61  |or and Unlock ha|
00001440  76 65 20 74 6f 20 68 61  76 65 20 73 65 65 6e 20  |ve to have seen |
00001450  61 20 63 6f 70 79 20 6f  66 20 79 6f 75 72 20 21  |a copy of your !|
00001460  53 79 73 74 65 6d 20 6f  72 0a 21 53 63 72 61 70  |System or.!Scrap|
00001470  20 28 2a 29 20 66 6f 6c  64 65 72 20 62 65 66 6f  | (*) folder befo|
00001480  72 65 20 74 68 65 79 20  77 69 6c 6c 20 6c 6f 61  |re they will loa|
00001490  64 2c 20 74 68 69 73 20  69 73 20 62 65 63 61 75  |d, this is becau|
000014a0  73 65 20 74 68 65 79 20  74 65 6d 70 6f 72 61 72  |se they temporar|
000014b0  69 6c 79 0a 6e 65 65 64  20 74 6f 20 73 74 6f 72  |ily.need to stor|
000014c0  65 20 73 63 72 61 70 20  66 69 6c 65 73 20 77 68  |e scrap files wh|
000014d0  69 6c 65 20 70 65 72 66  6f 72 6d 69 6e 67 20 28  |ile performing (|
000014e0  75 6e 29 20 65 6e 63 72  79 70 74 69 6f 6e 2e 0a  |un) encryption..|
000014f0  0a 28 2a 29 20 20 2d 20  20 52 49 53 43 20 4f 53  |.(*)  -  RISC OS|
00001500  20 33 20 6f 6e 6c 79 0a  0a 0a 20 20 41 62 6f 75  | 3 only...  Abou|
00001510  74 20 74 68 65 20 41 75  74 68 6f 72 0a 3d 2d 3d  |t the Author.=-=|
00001520  2d 3d 2d 3d 2d 3d 2d 3d  2d 3d 2d 3d 2d 3d 2d 3d  |-=-=-=-=-=-=-=-=|
00001530  0a 49 66 20 79 6f 75 20  77 61 6e 74 20 74 6f 20  |.If you want to |
00001540  67 65 74 20 69 6e 20 74  6f 75 63 68 20 77 69 74  |get in touch wit|
00001550  68 20 74 68 65 20 41 75  74 68 6f 72 20 2c 20 63  |h the Author , c|
00001560  6f 6e 63 65 72 6e 69 6e  67 20 74 68 69 73 20 70  |oncerning this p|
00001570  72 6f 67 72 61 6d 20 6f  72 0a 61 6e 79 20 6f 66  |rogram or.any of|
00001580  20 74 68 65 20 6f 74 68  65 72 73 20 68 65 20 68  | the others he h|
00001590  61 73 20 77 72 69 74 74  65 6e 2c 20 77 65 74 68  |as written, weth|
000015a0  65 72 20 74 6f 20 70 72  61 69 73 65 20 74 68 65  |er to praise the|
000015b0  6d 20 6f 72 20 6d 61 6b  65 20 50 4f 4c 49 54 45  |m or make POLITE|
000015c0  0a 63 72 69 74 69 63 69  73 6d 73 2c 20 4f 52 20  |.criticisms, OR |
000015d0  6a 75 73 74 20 74 6f 20  68 61 76 65 20 61 20 63  |just to have a c|
000015e0  68 61 74 20 74 68 65 6e  20 79 6f 75 20 6d 61 79  |hat then you may|
000015f0  20 72 65 61 63 68 20 68  69 6d 20 45 6c 65 63 74  | reach him Elect|
00001600  72 6f 6e 69 63 61 6c 6c  79 2e 2e 2e 0a 0a 4f 75  |ronically.....Ou|
00001610  74 73 69 64 65 20 22 54  65 72 6d 2d 74 69 6d 65  |tside "Term-time|
00001620  22 3b 0a 0a 56 69 61 20  45 6d 61 69 6c 3a 20 20  |";..Via Email:  |
00001630  20 50 65 74 65 72 52 48  40 61 72 63 61 64 65 2e  | PeterRH@arcade.|
00001640  64 65 6d 6f 6e 2e 63 6f  2e 75 6b 0a 4f 72 20 44  |demon.co.uk.Or D|
00001650  69 72 65 63 74 20 74 6f  20 41 72 63 61 64 65 20  |irect to Arcade |
00001660  42 42 53 20 20 5b 54 65  6c 2e 20 2b 34 34 20 28  |BBS  [Tel. +44 (|
00001670  30 29 38 31 20 36 35 34  20 32 32 31 32 20 5d 20  |0)81 654 2212 ] |
00001680  3a 20 50 65 74 65 72 20  52 65 65 76 65 73 2d 48  |: Peter Reeves-H|
00001690  61 6c 6c 20 20 28 75 73  65 72 20 23 31 31 36 39  |all  (user #1169|
000016a0  29 20 20 0a 0a 0a 44 75  72 69 6e 67 20 22 54 65  |)  ...During "Te|
000016b0  72 6d 2d 74 69 6d 65 22  3b 0a 0a 45 2d 6d 61 69  |rm-time";..E-mai|
000016c0  6c 20 61 64 64 72 65 73  73 20 22 50 65 6e 64 69  |l address "Pendi|
000016d0  6e 67 22 20 20 3b 2d 29  0a 0a                    |ng"  ;-)..|
000016da