Home » Recent acquisitions » Acorn ADFS disks » adfs_ArchimedesWorld_199403.adf » Disk1Mar94 » !AWMar94/Goodies/Protect/!Protector/!Help

!AWMar94/Goodies/Protect/!Protector/!Help

This website contains an archive of files for the Acorn Electron, BBC Micro, Acorn Archimedes, Commodore 16 and Commodore 64 computers, which Dominic Ford has rescued from his private collection of floppy disks and cassettes.

Some of these files were originally commercial releases in the 1980s and 1990s, but they are now widely available online. I assume that copyright over them is no longer being asserted. If you own the copyright and would like files to be removed, please contact me.

Tape/disk: Home » Recent acquisitions » Acorn ADFS disks » adfs_ArchimedesWorld_199403.adf » Disk1Mar94
Filename: !AWMar94/Goodies/Protect/!Protector/!Help
Read OK:
File size: 0EB0 bytes
Load address: 0000
Exec address: 0000
Duplicates

There is 1 duplicate copy of this file in the archive:

File contents
  
   Protector   V1.03 (29-Sep-1993)
   �������������������������������
        by Peter Reeves-Hall
        ��������������������


        The protector suite of applications are designed to offer an easy to
use yet secure method of password protecting files and desktop applications.
This is of great use when your machine and/or personal files are in an open
environment such as an office or school. It is also useful for home users
taking their machine somewhere public or wanting piece of mind when leaving
it somewhere.
        The main part of the system is the !Protector application, double
click on it icon to load it onto the icon bar. To encrypt a file simply drag
it's filer icon onto the padlock icon on the icon bar and a window will
open. At the top of the window the word 'Encrypt' will be displayed to
inform you that the file will be encypted. Under this is the icon of the
file dragged on and its name. To start the encryption process enter a
password into the writable icon at the bottom of the icon. The letters will
not appear (*) but instead a row of asterisk to prevent prying eyes from
seeing what you are entering. Press return when the password has been
entered (up to 24 characters are allowed), you will then be prompted to
renter the password, this is to check you have made no mistakes the first
time. Be careful the protection system is Case sensitive, eg. the password
'test' , 'TEST' and 'Test' are all treated differently. If the two passwords
match then the window will close and a save box will appear. The save box
contains the file name of the original file. When saving the encrypted file
you will be warned if it means overwriting the existing file. Once the file
has been saved out an hourglass will appear while the encryption takes
place. To abort the encrytion procedure before the file has been saved out
simple close the main window or the save box using the close window icon.
        The file is now encrypted and bears the protector lock icon. The
encryption system does not store the password inside the file so it cannot
be loaded into an editor and found. Since this is the case there is no way
for the program to know when unencrypting a file whether the correct
password has been supplied, therefore supplying the wrong password for
unencryption will result in an even more garbled file. (This is why you are
warned if you are going to overwrite an existing file).
        To unencrypt a file simply drag it back onto the protector icon and
repeat the process by supplying the correct password and save out the new
file.

        Applications can also be encrypted by protector. Since encrypting
and unencrypting an entire program such as 'Impression' or 'Revelation'
would be time consuming protector simply encryptes the !RunImage file inside
the application directory since this is usually where the bulk of the
program is stored and the application will not usually run without it. To
encrypt and unencrypt an application simply drag it onto the protector icon
as with a file. If a !runimage file can be found then you will be able to
encrypt it.
        
        So far so good!, you can now encrypt file and applications, but at
the moment it may appear a bit cumbersome having to drag the files onto the
icon bar, wouldn't it be nice to be able to double click them as if they
were their original normal files? or run an encrypted application by double
clicking on it? well read on to the next section documented in the 'Unlock'
applications !Help file.......


N.B. Both Protector and Unlock have to have seen a copy of your !System or
!Scrap (*) folder before they will load, this is because they temporarily
need to store scrap files while performing (un) encryption.

(*)  -  RISC OS 3 only

00000000  20 20 0a 20 20 20 50 72  6f 74 65 63 74 6f 72 20  |  .   Protector |
00000010  20 20 56 31 2e 30 33 20  28 32 39 2d 53 65 70 2d  |  V1.03 (29-Sep-|
00000020  31 39 39 33 29 0a 20 20  20 8f 8f 8f 8f 8f 8f 8f  |1993).   .......|
00000030  8f 8f 8f 8f 8f 8f 8f 8f  8f 8f 8f 8f 8f 8f 8f 8f  |................|
00000040  8f 8f 8f 8f 8f 8f 8f 8f  0a 20 20 20 20 20 20 20  |.........       |
00000050  20 62 79 20 50 65 74 65  72 20 52 65 65 76 65 73  | by Peter Reeves|
00000060  2d 48 61 6c 6c 0a 20 20  20 20 20 20 20 20 8f 8f  |-Hall.        ..|
00000070  8f 8f 8f 8f 8f 8f 8f 8f  8f 8f 8f 8f 8f 8f 8f 8f  |................|
00000080  8f 8f 0a 0a 0a 20 20 20  20 20 20 20 20 54 68 65  |.....        The|
00000090  20 70 72 6f 74 65 63 74  6f 72 20 73 75 69 74 65  | protector suite|
000000a0  20 6f 66 20 61 70 70 6c  69 63 61 74 69 6f 6e 73  | of applications|
000000b0  20 61 72 65 20 64 65 73  69 67 6e 65 64 20 74 6f  | are designed to|
000000c0  20 6f 66 66 65 72 20 61  6e 20 65 61 73 79 20 74  | offer an easy t|
000000d0  6f 0a 75 73 65 20 79 65  74 20 73 65 63 75 72 65  |o.use yet secure|
000000e0  20 6d 65 74 68 6f 64 20  6f 66 20 70 61 73 73 77  | method of passw|
000000f0  6f 72 64 20 70 72 6f 74  65 63 74 69 6e 67 20 66  |ord protecting f|
00000100  69 6c 65 73 20 61 6e 64  20 64 65 73 6b 74 6f 70  |iles and desktop|
00000110  20 61 70 70 6c 69 63 61  74 69 6f 6e 73 2e 0a 54  | applications..T|
00000120  68 69 73 20 69 73 20 6f  66 20 67 72 65 61 74 20  |his is of great |
00000130  75 73 65 20 77 68 65 6e  20 79 6f 75 72 20 6d 61  |use when your ma|
00000140  63 68 69 6e 65 20 61 6e  64 2f 6f 72 20 70 65 72  |chine and/or per|
00000150  73 6f 6e 61 6c 20 66 69  6c 65 73 20 61 72 65 20  |sonal files are |
00000160  69 6e 20 61 6e 20 6f 70  65 6e 0a 65 6e 76 69 72  |in an open.envir|
00000170  6f 6e 6d 65 6e 74 20 73  75 63 68 20 61 73 20 61  |onment such as a|
00000180  6e 20 6f 66 66 69 63 65  20 6f 72 20 73 63 68 6f  |n office or scho|
00000190  6f 6c 2e 20 49 74 20 69  73 20 61 6c 73 6f 20 75  |ol. It is also u|
000001a0  73 65 66 75 6c 20 66 6f  72 20 68 6f 6d 65 20 75  |seful for home u|
000001b0  73 65 72 73 0a 74 61 6b  69 6e 67 20 74 68 65 69  |sers.taking thei|
000001c0  72 20 6d 61 63 68 69 6e  65 20 73 6f 6d 65 77 68  |r machine somewh|
000001d0  65 72 65 20 70 75 62 6c  69 63 20 6f 72 20 77 61  |ere public or wa|
000001e0  6e 74 69 6e 67 20 70 69  65 63 65 20 6f 66 20 6d  |nting piece of m|
000001f0  69 6e 64 20 77 68 65 6e  20 6c 65 61 76 69 6e 67  |ind when leaving|
00000200  0a 69 74 20 73 6f 6d 65  77 68 65 72 65 2e 0a 20  |.it somewhere.. |
00000210  20 20 20 20 20 20 20 54  68 65 20 6d 61 69 6e 20  |       The main |
00000220  70 61 72 74 20 6f 66 20  74 68 65 20 73 79 73 74  |part of the syst|
00000230  65 6d 20 69 73 20 74 68  65 20 21 50 72 6f 74 65  |em is the !Prote|
00000240  63 74 6f 72 20 61 70 70  6c 69 63 61 74 69 6f 6e  |ctor application|
00000250  2c 20 64 6f 75 62 6c 65  0a 63 6c 69 63 6b 20 6f  |, double.click o|
00000260  6e 20 69 74 20 69 63 6f  6e 20 74 6f 20 6c 6f 61  |n it icon to loa|
00000270  64 20 69 74 20 6f 6e 74  6f 20 74 68 65 20 69 63  |d it onto the ic|
00000280  6f 6e 20 62 61 72 2e 20  54 6f 20 65 6e 63 72 79  |on bar. To encry|
00000290  70 74 20 61 20 66 69 6c  65 20 73 69 6d 70 6c 79  |pt a file simply|
000002a0  20 64 72 61 67 0a 69 74  27 73 20 66 69 6c 65 72  | drag.it's filer|
000002b0  20 69 63 6f 6e 20 6f 6e  74 6f 20 74 68 65 20 70  | icon onto the p|
000002c0  61 64 6c 6f 63 6b 20 69  63 6f 6e 20 6f 6e 20 74  |adlock icon on t|
000002d0  68 65 20 69 63 6f 6e 20  62 61 72 20 61 6e 64 20  |he icon bar and |
000002e0  61 20 77 69 6e 64 6f 77  20 77 69 6c 6c 0a 6f 70  |a window will.op|
000002f0  65 6e 2e 20 41 74 20 74  68 65 20 74 6f 70 20 6f  |en. At the top o|
00000300  66 20 74 68 65 20 77 69  6e 64 6f 77 20 74 68 65  |f the window the|
00000310  20 77 6f 72 64 20 27 45  6e 63 72 79 70 74 27 20  | word 'Encrypt' |
00000320  77 69 6c 6c 20 62 65 20  64 69 73 70 6c 61 79 65  |will be displaye|
00000330  64 20 74 6f 0a 69 6e 66  6f 72 6d 20 79 6f 75 20  |d to.inform you |
00000340  74 68 61 74 20 74 68 65  20 66 69 6c 65 20 77 69  |that the file wi|
00000350  6c 6c 20 62 65 20 65 6e  63 79 70 74 65 64 2e 20  |ll be encypted. |
00000360  55 6e 64 65 72 20 74 68  69 73 20 69 73 20 74 68  |Under this is th|
00000370  65 20 69 63 6f 6e 20 6f  66 20 74 68 65 0a 66 69  |e icon of the.fi|
00000380  6c 65 20 64 72 61 67 67  65 64 20 6f 6e 20 61 6e  |le dragged on an|
00000390  64 20 69 74 73 20 6e 61  6d 65 2e 20 54 6f 20 73  |d its name. To s|
000003a0  74 61 72 74 20 74 68 65  20 65 6e 63 72 79 70 74  |tart the encrypt|
000003b0  69 6f 6e 20 70 72 6f 63  65 73 73 20 65 6e 74 65  |ion process ente|
000003c0  72 20 61 0a 70 61 73 73  77 6f 72 64 20 69 6e 74  |r a.password int|
000003d0  6f 20 74 68 65 20 77 72  69 74 61 62 6c 65 20 69  |o the writable i|
000003e0  63 6f 6e 20 61 74 20 74  68 65 20 62 6f 74 74 6f  |con at the botto|
000003f0  6d 20 6f 66 20 74 68 65  20 69 63 6f 6e 2e 20 54  |m of the icon. T|
00000400  68 65 20 6c 65 74 74 65  72 73 20 77 69 6c 6c 0a  |he letters will.|
00000410  6e 6f 74 20 61 70 70 65  61 72 20 28 2a 29 20 62  |not appear (*) b|
00000420  75 74 20 69 6e 73 74 65  61 64 20 61 20 72 6f 77  |ut instead a row|
00000430  20 6f 66 20 61 73 74 65  72 69 73 6b 20 74 6f 20  | of asterisk to |
00000440  70 72 65 76 65 6e 74 20  70 72 79 69 6e 67 20 65  |prevent prying e|
00000450  79 65 73 20 66 72 6f 6d  0a 73 65 65 69 6e 67 20  |yes from.seeing |
00000460  77 68 61 74 20 79 6f 75  20 61 72 65 20 65 6e 74  |what you are ent|
00000470  65 72 69 6e 67 2e 20 50  72 65 73 73 20 72 65 74  |ering. Press ret|
00000480  75 72 6e 20 77 68 65 6e  20 74 68 65 20 70 61 73  |urn when the pas|
00000490  73 77 6f 72 64 20 68 61  73 20 62 65 65 6e 0a 65  |sword has been.e|
000004a0  6e 74 65 72 65 64 20 28  75 70 20 74 6f 20 32 34  |ntered (up to 24|
000004b0  20 63 68 61 72 61 63 74  65 72 73 20 61 72 65 20  | characters are |
000004c0  61 6c 6c 6f 77 65 64 29  2c 20 79 6f 75 20 77 69  |allowed), you wi|
000004d0  6c 6c 20 74 68 65 6e 20  62 65 20 70 72 6f 6d 70  |ll then be promp|
000004e0  74 65 64 20 74 6f 0a 72  65 6e 74 65 72 20 74 68  |ted to.renter th|
000004f0  65 20 70 61 73 73 77 6f  72 64 2c 20 74 68 69 73  |e password, this|
00000500  20 69 73 20 74 6f 20 63  68 65 63 6b 20 79 6f 75  | is to check you|
00000510  20 68 61 76 65 20 6d 61  64 65 20 6e 6f 20 6d 69  | have made no mi|
00000520  73 74 61 6b 65 73 20 74  68 65 20 66 69 72 73 74  |stakes the first|
00000530  0a 74 69 6d 65 2e 20 42  65 20 63 61 72 65 66 75  |.time. Be carefu|
00000540  6c 20 74 68 65 20 70 72  6f 74 65 63 74 69 6f 6e  |l the protection|
00000550  20 73 79 73 74 65 6d 20  69 73 20 43 61 73 65 20  | system is Case |
00000560  73 65 6e 73 69 74 69 76  65 2c 20 65 67 2e 20 74  |sensitive, eg. t|
00000570  68 65 20 70 61 73 73 77  6f 72 64 0a 27 74 65 73  |he password.'tes|
00000580  74 27 20 2c 20 27 54 45  53 54 27 20 61 6e 64 20  |t' , 'TEST' and |
00000590  27 54 65 73 74 27 20 61  72 65 20 61 6c 6c 20 74  |'Test' are all t|
000005a0  72 65 61 74 65 64 20 64  69 66 66 65 72 65 6e 74  |reated different|
000005b0  6c 79 2e 20 49 66 20 74  68 65 20 74 77 6f 20 70  |ly. If the two p|
000005c0  61 73 73 77 6f 72 64 73  0a 6d 61 74 63 68 20 74  |asswords.match t|
000005d0  68 65 6e 20 74 68 65 20  77 69 6e 64 6f 77 20 77  |hen the window w|
000005e0  69 6c 6c 20 63 6c 6f 73  65 20 61 6e 64 20 61 20  |ill close and a |
000005f0  73 61 76 65 20 62 6f 78  20 77 69 6c 6c 20 61 70  |save box will ap|
00000600  70 65 61 72 2e 20 54 68  65 20 73 61 76 65 20 62  |pear. The save b|
00000610  6f 78 0a 63 6f 6e 74 61  69 6e 73 20 74 68 65 20  |ox.contains the |
00000620  66 69 6c 65 20 6e 61 6d  65 20 6f 66 20 74 68 65  |file name of the|
00000630  20 6f 72 69 67 69 6e 61  6c 20 66 69 6c 65 2e 20  | original file. |
00000640  57 68 65 6e 20 73 61 76  69 6e 67 20 74 68 65 20  |When saving the |
00000650  65 6e 63 72 79 70 74 65  64 20 66 69 6c 65 0a 79  |encrypted file.y|
00000660  6f 75 20 77 69 6c 6c 20  62 65 20 77 61 72 6e 65  |ou will be warne|
00000670  64 20 69 66 20 69 74 20  6d 65 61 6e 73 20 6f 76  |d if it means ov|
00000680  65 72 77 72 69 74 69 6e  67 20 74 68 65 20 65 78  |erwriting the ex|
00000690  69 73 74 69 6e 67 20 66  69 6c 65 2e 20 4f 6e 63  |isting file. Onc|
000006a0  65 20 74 68 65 20 66 69  6c 65 0a 68 61 73 20 62  |e the file.has b|
000006b0  65 65 6e 20 73 61 76 65  64 20 6f 75 74 20 61 6e  |een saved out an|
000006c0  20 68 6f 75 72 67 6c 61  73 73 20 77 69 6c 6c 20  | hourglass will |
000006d0  61 70 70 65 61 72 20 77  68 69 6c 65 20 74 68 65  |appear while the|
000006e0  20 65 6e 63 72 79 70 74  69 6f 6e 20 74 61 6b 65  | encryption take|
000006f0  73 0a 70 6c 61 63 65 2e  20 54 6f 20 61 62 6f 72  |s.place. To abor|
00000700  74 20 74 68 65 20 65 6e  63 72 79 74 69 6f 6e 20  |t the encrytion |
00000710  70 72 6f 63 65 64 75 72  65 20 62 65 66 6f 72 65  |procedure before|
00000720  20 74 68 65 20 66 69 6c  65 20 68 61 73 20 62 65  | the file has be|
00000730  65 6e 20 73 61 76 65 64  20 6f 75 74 0a 73 69 6d  |en saved out.sim|
00000740  70 6c 65 20 63 6c 6f 73  65 20 74 68 65 20 6d 61  |ple close the ma|
00000750  69 6e 20 77 69 6e 64 6f  77 20 6f 72 20 74 68 65  |in window or the|
00000760  20 73 61 76 65 20 62 6f  78 20 75 73 69 6e 67 20  | save box using |
00000770  74 68 65 20 63 6c 6f 73  65 20 77 69 6e 64 6f 77  |the close window|
00000780  20 69 63 6f 6e 2e 0a 20  20 20 20 20 20 20 20 54  | icon..        T|
00000790  68 65 20 66 69 6c 65 20  69 73 20 6e 6f 77 20 65  |he file is now e|
000007a0  6e 63 72 79 70 74 65 64  20 61 6e 64 20 62 65 61  |ncrypted and bea|
000007b0  72 73 20 74 68 65 20 70  72 6f 74 65 63 74 6f 72  |rs the protector|
000007c0  20 6c 6f 63 6b 20 69 63  6f 6e 2e 20 54 68 65 0a  | lock icon. The.|
000007d0  65 6e 63 72 79 70 74 69  6f 6e 20 73 79 73 74 65  |encryption syste|
000007e0  6d 20 64 6f 65 73 20 6e  6f 74 20 73 74 6f 72 65  |m does not store|
000007f0  20 74 68 65 20 70 61 73  73 77 6f 72 64 20 69 6e  | the password in|
00000800  73 69 64 65 20 74 68 65  20 66 69 6c 65 20 73 6f  |side the file so|
00000810  20 69 74 20 63 61 6e 6e  6f 74 0a 62 65 20 6c 6f  | it cannot.be lo|
00000820  61 64 65 64 20 69 6e 74  6f 20 61 6e 20 65 64 69  |aded into an edi|
00000830  74 6f 72 20 61 6e 64 20  66 6f 75 6e 64 2e 20 53  |tor and found. S|
00000840  69 6e 63 65 20 74 68 69  73 20 69 73 20 74 68 65  |ince this is the|
00000850  20 63 61 73 65 20 74 68  65 72 65 20 69 73 20 6e  | case there is n|
00000860  6f 20 77 61 79 0a 66 6f  72 20 74 68 65 20 70 72  |o way.for the pr|
00000870  6f 67 72 61 6d 20 74 6f  20 6b 6e 6f 77 20 77 68  |ogram to know wh|
00000880  65 6e 20 75 6e 65 6e 63  72 79 70 74 69 6e 67 20  |en unencrypting |
00000890  61 20 66 69 6c 65 20 77  68 65 74 68 65 72 20 74  |a file whether t|
000008a0  68 65 20 63 6f 72 72 65  63 74 0a 70 61 73 73 77  |he correct.passw|
000008b0  6f 72 64 20 68 61 73 20  62 65 65 6e 20 73 75 70  |ord has been sup|
000008c0  70 6c 69 65 64 2c 20 74  68 65 72 65 66 6f 72 65  |plied, therefore|
000008d0  20 73 75 70 70 6c 79 69  6e 67 20 74 68 65 20 77  | supplying the w|
000008e0  72 6f 6e 67 20 70 61 73  73 77 6f 72 64 20 66 6f  |rong password fo|
000008f0  72 0a 75 6e 65 6e 63 72  79 70 74 69 6f 6e 20 77  |r.unencryption w|
00000900  69 6c 6c 20 72 65 73 75  6c 74 20 69 6e 20 61 6e  |ill result in an|
00000910  20 65 76 65 6e 20 6d 6f  72 65 20 67 61 72 62 6c  | even more garbl|
00000920  65 64 20 66 69 6c 65 2e  20 28 54 68 69 73 20 69  |ed file. (This i|
00000930  73 20 77 68 79 20 79 6f  75 20 61 72 65 0a 77 61  |s why you are.wa|
00000940  72 6e 65 64 20 69 66 20  79 6f 75 20 61 72 65 20  |rned if you are |
00000950  67 6f 69 6e 67 20 74 6f  20 6f 76 65 72 77 72 69  |going to overwri|
00000960  74 65 20 61 6e 20 65 78  69 73 74 69 6e 67 20 66  |te an existing f|
00000970  69 6c 65 29 2e 0a 20 20  20 20 20 20 20 20 54 6f  |ile)..        To|
00000980  20 75 6e 65 6e 63 72 79  70 74 20 61 20 66 69 6c  | unencrypt a fil|
00000990  65 20 73 69 6d 70 6c 79  20 64 72 61 67 20 69 74  |e simply drag it|
000009a0  20 62 61 63 6b 20 6f 6e  74 6f 20 74 68 65 20 70  | back onto the p|
000009b0  72 6f 74 65 63 74 6f 72  20 69 63 6f 6e 20 61 6e  |rotector icon an|
000009c0  64 0a 72 65 70 65 61 74  20 74 68 65 20 70 72 6f  |d.repeat the pro|
000009d0  63 65 73 73 20 62 79 20  73 75 70 70 6c 79 69 6e  |cess by supplyin|
000009e0  67 20 74 68 65 20 63 6f  72 72 65 63 74 20 70 61  |g the correct pa|
000009f0  73 73 77 6f 72 64 20 61  6e 64 20 73 61 76 65 20  |ssword and save |
00000a00  6f 75 74 20 74 68 65 20  6e 65 77 0a 66 69 6c 65  |out the new.file|
00000a10  2e 0a 0a 20 20 20 20 20  20 20 20 41 70 70 6c 69  |...        Appli|
00000a20  63 61 74 69 6f 6e 73 20  63 61 6e 20 61 6c 73 6f  |cations can also|
00000a30  20 62 65 20 65 6e 63 72  79 70 74 65 64 20 62 79  | be encrypted by|
00000a40  20 70 72 6f 74 65 63 74  6f 72 2e 20 53 69 6e 63  | protector. Sinc|
00000a50  65 20 65 6e 63 72 79 70  74 69 6e 67 0a 61 6e 64  |e encrypting.and|
00000a60  20 75 6e 65 6e 63 72 79  70 74 69 6e 67 20 61 6e  | unencrypting an|
00000a70  20 65 6e 74 69 72 65 20  70 72 6f 67 72 61 6d 20  | entire program |
00000a80  73 75 63 68 20 61 73 20  27 49 6d 70 72 65 73 73  |such as 'Impress|
00000a90  69 6f 6e 27 20 6f 72 20  27 52 65 76 65 6c 61 74  |ion' or 'Revelat|
00000aa0  69 6f 6e 27 0a 77 6f 75  6c 64 20 62 65 20 74 69  |ion'.would be ti|
00000ab0  6d 65 20 63 6f 6e 73 75  6d 69 6e 67 20 70 72 6f  |me consuming pro|
00000ac0  74 65 63 74 6f 72 20 73  69 6d 70 6c 79 20 65 6e  |tector simply en|
00000ad0  63 72 79 70 74 65 73 20  74 68 65 20 21 52 75 6e  |cryptes the !Run|
00000ae0  49 6d 61 67 65 20 66 69  6c 65 20 69 6e 73 69 64  |Image file insid|
00000af0  65 0a 74 68 65 20 61 70  70 6c 69 63 61 74 69 6f  |e.the applicatio|
00000b00  6e 20 64 69 72 65 63 74  6f 72 79 20 73 69 6e 63  |n directory sinc|
00000b10  65 20 74 68 69 73 20 69  73 20 75 73 75 61 6c 6c  |e this is usuall|
00000b20  79 20 77 68 65 72 65 20  74 68 65 20 62 75 6c 6b  |y where the bulk|
00000b30  20 6f 66 20 74 68 65 0a  70 72 6f 67 72 61 6d 20  | of the.program |
00000b40  69 73 20 73 74 6f 72 65  64 20 61 6e 64 20 74 68  |is stored and th|
00000b50  65 20 61 70 70 6c 69 63  61 74 69 6f 6e 20 77 69  |e application wi|
00000b60  6c 6c 20 6e 6f 74 20 75  73 75 61 6c 6c 79 20 72  |ll not usually r|
00000b70  75 6e 20 77 69 74 68 6f  75 74 20 69 74 2e 20 54  |un without it. T|
00000b80  6f 0a 65 6e 63 72 79 70  74 20 61 6e 64 20 75 6e  |o.encrypt and un|
00000b90  65 6e 63 72 79 70 74 20  61 6e 20 61 70 70 6c 69  |encrypt an appli|
00000ba0  63 61 74 69 6f 6e 20 73  69 6d 70 6c 79 20 64 72  |cation simply dr|
00000bb0  61 67 20 69 74 20 6f 6e  74 6f 20 74 68 65 20 70  |ag it onto the p|
00000bc0  72 6f 74 65 63 74 6f 72  20 69 63 6f 6e 0a 61 73  |rotector icon.as|
00000bd0  20 77 69 74 68 20 61 20  66 69 6c 65 2e 20 49 66  | with a file. If|
00000be0  20 61 20 21 72 75 6e 69  6d 61 67 65 20 66 69 6c  | a !runimage fil|
00000bf0  65 20 63 61 6e 20 62 65  20 66 6f 75 6e 64 20 74  |e can be found t|
00000c00  68 65 6e 20 79 6f 75 20  77 69 6c 6c 20 62 65 20  |hen you will be |
00000c10  61 62 6c 65 20 74 6f 0a  65 6e 63 72 79 70 74 20  |able to.encrypt |
00000c20  69 74 2e 0a 20 20 20 20  20 20 20 20 0a 20 20 20  |it..        .   |
00000c30  20 20 20 20 20 53 6f 20  66 61 72 20 73 6f 20 67  |     So far so g|
00000c40  6f 6f 64 21 2c 20 79 6f  75 20 63 61 6e 20 6e 6f  |ood!, you can no|
00000c50  77 20 65 6e 63 72 79 70  74 20 66 69 6c 65 20 61  |w encrypt file a|
00000c60  6e 64 20 61 70 70 6c 69  63 61 74 69 6f 6e 73 2c  |nd applications,|
00000c70  20 62 75 74 20 61 74 0a  74 68 65 20 6d 6f 6d 65  | but at.the mome|
00000c80  6e 74 20 69 74 20 6d 61  79 20 61 70 70 65 61 72  |nt it may appear|
00000c90  20 61 20 62 69 74 20 63  75 6d 62 65 72 73 6f 6d  | a bit cumbersom|
00000ca0  65 20 68 61 76 69 6e 67  20 74 6f 20 64 72 61 67  |e having to drag|
00000cb0  20 74 68 65 20 66 69 6c  65 73 20 6f 6e 74 6f 20  | the files onto |
00000cc0  74 68 65 0a 69 63 6f 6e  20 62 61 72 2c 20 77 6f  |the.icon bar, wo|
00000cd0  75 6c 64 6e 27 74 20 69  74 20 62 65 20 6e 69 63  |uldn't it be nic|
00000ce0  65 20 74 6f 20 62 65 20  61 62 6c 65 20 74 6f 20  |e to be able to |
00000cf0  64 6f 75 62 6c 65 20 63  6c 69 63 6b 20 74 68 65  |double click the|
00000d00  6d 20 61 73 20 69 66 20  74 68 65 79 0a 77 65 72  |m as if they.wer|
00000d10  65 20 74 68 65 69 72 20  6f 72 69 67 69 6e 61 6c  |e their original|
00000d20  20 6e 6f 72 6d 61 6c 20  66 69 6c 65 73 3f 20 6f  | normal files? o|
00000d30  72 20 72 75 6e 20 61 6e  20 65 6e 63 72 79 70 74  |r run an encrypt|
00000d40  65 64 20 61 70 70 6c 69  63 61 74 69 6f 6e 20 62  |ed application b|
00000d50  79 20 64 6f 75 62 6c 65  0a 63 6c 69 63 6b 69 6e  |y double.clickin|
00000d60  67 20 6f 6e 20 69 74 3f  20 77 65 6c 6c 20 72 65  |g on it? well re|
00000d70  61 64 20 6f 6e 20 74 6f  20 74 68 65 20 6e 65 78  |ad on to the nex|
00000d80  74 20 73 65 63 74 69 6f  6e 20 64 6f 63 75 6d 65  |t section docume|
00000d90  6e 74 65 64 20 69 6e 20  74 68 65 20 27 55 6e 6c  |nted in the 'Unl|
00000da0  6f 63 6b 27 0a 61 70 70  6c 69 63 61 74 69 6f 6e  |ock'.application|
00000db0  73 20 21 48 65 6c 70 20  66 69 6c 65 2e 2e 2e 2e  |s !Help file....|
00000dc0  2e 2e 2e 0a 0a 0a 4e 2e  42 2e 20 42 6f 74 68 20  |......N.B. Both |
00000dd0  50 72 6f 74 65 63 74 6f  72 20 61 6e 64 20 55 6e  |Protector and Un|
00000de0  6c 6f 63 6b 20 68 61 76  65 20 74 6f 20 68 61 76  |lock have to hav|
00000df0  65 20 73 65 65 6e 20 61  20 63 6f 70 79 20 6f 66  |e seen a copy of|
00000e00  20 79 6f 75 72 20 21 53  79 73 74 65 6d 20 6f 72  | your !System or|
00000e10  0a 21 53 63 72 61 70 20  28 2a 29 20 66 6f 6c 64  |.!Scrap (*) fold|
00000e20  65 72 20 62 65 66 6f 72  65 20 74 68 65 79 20 77  |er before they w|
00000e30  69 6c 6c 20 6c 6f 61 64  2c 20 74 68 69 73 20 69  |ill load, this i|
00000e40  73 20 62 65 63 61 75 73  65 20 74 68 65 79 20 74  |s because they t|
00000e50  65 6d 70 6f 72 61 72 69  6c 79 0a 6e 65 65 64 20  |emporarily.need |
00000e60  74 6f 20 73 74 6f 72 65  20 73 63 72 61 70 20 66  |to store scrap f|
00000e70  69 6c 65 73 20 77 68 69  6c 65 20 70 65 72 66 6f  |iles while perfo|
00000e80  72 6d 69 6e 67 20 28 75  6e 29 20 65 6e 63 72 79  |rming (un) encry|
00000e90  70 74 69 6f 6e 2e 0a 0a  28 2a 29 20 20 2d 20 20  |ption...(*)  -  |
00000ea0  52 49 53 43 20 4f 53 20  33 20 6f 6e 6c 79 0a 0a  |RISC OS 3 only..|
00000eb0