Home » Recent acquisitions » Acorn ADFS disks » adfs_ArchimedesWorld_199403.adf » Disk1Mar94 » !AWMar94/Goodies/Protect/!Protector/!Help
!AWMar94/Goodies/Protect/!Protector/!Help
This website contains an archive of files for the Acorn Electron, BBC Micro, Acorn Archimedes, Commodore 16 and Commodore 64 computers, which Dominic Ford has rescued from his private collection of floppy disks and cassettes.
Some of these files were originally commercial releases in the 1980s and 1990s, but they are now widely available online. I assume that copyright over them is no longer being asserted. If you own the copyright and would like files to be removed, please contact me.
Tape/disk: | Home » Recent acquisitions » Acorn ADFS disks » adfs_ArchimedesWorld_199403.adf » Disk1Mar94 |
Filename: | !AWMar94/Goodies/Protect/!Protector/!Help |
Read OK: | ✔ |
File size: | 0EB0 bytes |
Load address: | 0000 |
Exec address: | 0000 |
Duplicates
There is 1 duplicate copy of this file in the archive:
- Recent acquisitions » Acorn ADFS disks » adfs_ArchimedesWorld_199403.adf » Disk1Mar94 » !AWMar94/Goodies/Protect/!Help
- Recent acquisitions » Acorn ADFS disks » adfs_ArchimedesWorld_199403.adf » Disk1Mar94 » !AWMar94/Goodies/Protect/!Protector/!Help
File contents
Protector V1.03 (29-Sep-1993) ������������������������������� by Peter Reeves-Hall �������������������� The protector suite of applications are designed to offer an easy to use yet secure method of password protecting files and desktop applications. This is of great use when your machine and/or personal files are in an open environment such as an office or school. It is also useful for home users taking their machine somewhere public or wanting piece of mind when leaving it somewhere. The main part of the system is the !Protector application, double click on it icon to load it onto the icon bar. To encrypt a file simply drag it's filer icon onto the padlock icon on the icon bar and a window will open. At the top of the window the word 'Encrypt' will be displayed to inform you that the file will be encypted. Under this is the icon of the file dragged on and its name. To start the encryption process enter a password into the writable icon at the bottom of the icon. The letters will not appear (*) but instead a row of asterisk to prevent prying eyes from seeing what you are entering. Press return when the password has been entered (up to 24 characters are allowed), you will then be prompted to renter the password, this is to check you have made no mistakes the first time. Be careful the protection system is Case sensitive, eg. the password 'test' , 'TEST' and 'Test' are all treated differently. If the two passwords match then the window will close and a save box will appear. The save box contains the file name of the original file. When saving the encrypted file you will be warned if it means overwriting the existing file. Once the file has been saved out an hourglass will appear while the encryption takes place. To abort the encrytion procedure before the file has been saved out simple close the main window or the save box using the close window icon. The file is now encrypted and bears the protector lock icon. The encryption system does not store the password inside the file so it cannot be loaded into an editor and found. Since this is the case there is no way for the program to know when unencrypting a file whether the correct password has been supplied, therefore supplying the wrong password for unencryption will result in an even more garbled file. (This is why you are warned if you are going to overwrite an existing file). To unencrypt a file simply drag it back onto the protector icon and repeat the process by supplying the correct password and save out the new file. Applications can also be encrypted by protector. Since encrypting and unencrypting an entire program such as 'Impression' or 'Revelation' would be time consuming protector simply encryptes the !RunImage file inside the application directory since this is usually where the bulk of the program is stored and the application will not usually run without it. To encrypt and unencrypt an application simply drag it onto the protector icon as with a file. If a !runimage file can be found then you will be able to encrypt it. So far so good!, you can now encrypt file and applications, but at the moment it may appear a bit cumbersome having to drag the files onto the icon bar, wouldn't it be nice to be able to double click them as if they were their original normal files? or run an encrypted application by double clicking on it? well read on to the next section documented in the 'Unlock' applications !Help file....... N.B. Both Protector and Unlock have to have seen a copy of your !System or !Scrap (*) folder before they will load, this is because they temporarily need to store scrap files while performing (un) encryption. (*) - RISC OS 3 only
00000000 20 20 0a 20 20 20 50 72 6f 74 65 63 74 6f 72 20 | . Protector | 00000010 20 20 56 31 2e 30 33 20 28 32 39 2d 53 65 70 2d | V1.03 (29-Sep-| 00000020 31 39 39 33 29 0a 20 20 20 8f 8f 8f 8f 8f 8f 8f |1993). .......| 00000030 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f |................| 00000040 8f 8f 8f 8f 8f 8f 8f 8f 0a 20 20 20 20 20 20 20 |......... | 00000050 20 62 79 20 50 65 74 65 72 20 52 65 65 76 65 73 | by Peter Reeves| 00000060 2d 48 61 6c 6c 0a 20 20 20 20 20 20 20 20 8f 8f |-Hall. ..| 00000070 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f |................| 00000080 8f 8f 0a 0a 0a 20 20 20 20 20 20 20 20 54 68 65 |..... The| 00000090 20 70 72 6f 74 65 63 74 6f 72 20 73 75 69 74 65 | protector suite| 000000a0 20 6f 66 20 61 70 70 6c 69 63 61 74 69 6f 6e 73 | of applications| 000000b0 20 61 72 65 20 64 65 73 69 67 6e 65 64 20 74 6f | are designed to| 000000c0 20 6f 66 66 65 72 20 61 6e 20 65 61 73 79 20 74 | offer an easy t| 000000d0 6f 0a 75 73 65 20 79 65 74 20 73 65 63 75 72 65 |o.use yet secure| 000000e0 20 6d 65 74 68 6f 64 20 6f 66 20 70 61 73 73 77 | method of passw| 000000f0 6f 72 64 20 70 72 6f 74 65 63 74 69 6e 67 20 66 |ord protecting f| 00000100 69 6c 65 73 20 61 6e 64 20 64 65 73 6b 74 6f 70 |iles and desktop| 00000110 20 61 70 70 6c 69 63 61 74 69 6f 6e 73 2e 0a 54 | applications..T| 00000120 68 69 73 20 69 73 20 6f 66 20 67 72 65 61 74 20 |his is of great | 00000130 75 73 65 20 77 68 65 6e 20 79 6f 75 72 20 6d 61 |use when your ma| 00000140 63 68 69 6e 65 20 61 6e 64 2f 6f 72 20 70 65 72 |chine and/or per| 00000150 73 6f 6e 61 6c 20 66 69 6c 65 73 20 61 72 65 20 |sonal files are | 00000160 69 6e 20 61 6e 20 6f 70 65 6e 0a 65 6e 76 69 72 |in an open.envir| 00000170 6f 6e 6d 65 6e 74 20 73 75 63 68 20 61 73 20 61 |onment such as a| 00000180 6e 20 6f 66 66 69 63 65 20 6f 72 20 73 63 68 6f |n office or scho| 00000190 6f 6c 2e 20 49 74 20 69 73 20 61 6c 73 6f 20 75 |ol. It is also u| 000001a0 73 65 66 75 6c 20 66 6f 72 20 68 6f 6d 65 20 75 |seful for home u| 000001b0 73 65 72 73 0a 74 61 6b 69 6e 67 20 74 68 65 69 |sers.taking thei| 000001c0 72 20 6d 61 63 68 69 6e 65 20 73 6f 6d 65 77 68 |r machine somewh| 000001d0 65 72 65 20 70 75 62 6c 69 63 20 6f 72 20 77 61 |ere public or wa| 000001e0 6e 74 69 6e 67 20 70 69 65 63 65 20 6f 66 20 6d |nting piece of m| 000001f0 69 6e 64 20 77 68 65 6e 20 6c 65 61 76 69 6e 67 |ind when leaving| 00000200 0a 69 74 20 73 6f 6d 65 77 68 65 72 65 2e 0a 20 |.it somewhere.. | 00000210 20 20 20 20 20 20 20 54 68 65 20 6d 61 69 6e 20 | The main | 00000220 70 61 72 74 20 6f 66 20 74 68 65 20 73 79 73 74 |part of the syst| 00000230 65 6d 20 69 73 20 74 68 65 20 21 50 72 6f 74 65 |em is the !Prote| 00000240 63 74 6f 72 20 61 70 70 6c 69 63 61 74 69 6f 6e |ctor application| 00000250 2c 20 64 6f 75 62 6c 65 0a 63 6c 69 63 6b 20 6f |, double.click o| 00000260 6e 20 69 74 20 69 63 6f 6e 20 74 6f 20 6c 6f 61 |n it icon to loa| 00000270 64 20 69 74 20 6f 6e 74 6f 20 74 68 65 20 69 63 |d it onto the ic| 00000280 6f 6e 20 62 61 72 2e 20 54 6f 20 65 6e 63 72 79 |on bar. To encry| 00000290 70 74 20 61 20 66 69 6c 65 20 73 69 6d 70 6c 79 |pt a file simply| 000002a0 20 64 72 61 67 0a 69 74 27 73 20 66 69 6c 65 72 | drag.it's filer| 000002b0 20 69 63 6f 6e 20 6f 6e 74 6f 20 74 68 65 20 70 | icon onto the p| 000002c0 61 64 6c 6f 63 6b 20 69 63 6f 6e 20 6f 6e 20 74 |adlock icon on t| 000002d0 68 65 20 69 63 6f 6e 20 62 61 72 20 61 6e 64 20 |he icon bar and | 000002e0 61 20 77 69 6e 64 6f 77 20 77 69 6c 6c 0a 6f 70 |a window will.op| 000002f0 65 6e 2e 20 41 74 20 74 68 65 20 74 6f 70 20 6f |en. At the top o| 00000300 66 20 74 68 65 20 77 69 6e 64 6f 77 20 74 68 65 |f the window the| 00000310 20 77 6f 72 64 20 27 45 6e 63 72 79 70 74 27 20 | word 'Encrypt' | 00000320 77 69 6c 6c 20 62 65 20 64 69 73 70 6c 61 79 65 |will be displaye| 00000330 64 20 74 6f 0a 69 6e 66 6f 72 6d 20 79 6f 75 20 |d to.inform you | 00000340 74 68 61 74 20 74 68 65 20 66 69 6c 65 20 77 69 |that the file wi| 00000350 6c 6c 20 62 65 20 65 6e 63 79 70 74 65 64 2e 20 |ll be encypted. | 00000360 55 6e 64 65 72 20 74 68 69 73 20 69 73 20 74 68 |Under this is th| 00000370 65 20 69 63 6f 6e 20 6f 66 20 74 68 65 0a 66 69 |e icon of the.fi| 00000380 6c 65 20 64 72 61 67 67 65 64 20 6f 6e 20 61 6e |le dragged on an| 00000390 64 20 69 74 73 20 6e 61 6d 65 2e 20 54 6f 20 73 |d its name. To s| 000003a0 74 61 72 74 20 74 68 65 20 65 6e 63 72 79 70 74 |tart the encrypt| 000003b0 69 6f 6e 20 70 72 6f 63 65 73 73 20 65 6e 74 65 |ion process ente| 000003c0 72 20 61 0a 70 61 73 73 77 6f 72 64 20 69 6e 74 |r a.password int| 000003d0 6f 20 74 68 65 20 77 72 69 74 61 62 6c 65 20 69 |o the writable i| 000003e0 63 6f 6e 20 61 74 20 74 68 65 20 62 6f 74 74 6f |con at the botto| 000003f0 6d 20 6f 66 20 74 68 65 20 69 63 6f 6e 2e 20 54 |m of the icon. T| 00000400 68 65 20 6c 65 74 74 65 72 73 20 77 69 6c 6c 0a |he letters will.| 00000410 6e 6f 74 20 61 70 70 65 61 72 20 28 2a 29 20 62 |not appear (*) b| 00000420 75 74 20 69 6e 73 74 65 61 64 20 61 20 72 6f 77 |ut instead a row| 00000430 20 6f 66 20 61 73 74 65 72 69 73 6b 20 74 6f 20 | of asterisk to | 00000440 70 72 65 76 65 6e 74 20 70 72 79 69 6e 67 20 65 |prevent prying e| 00000450 79 65 73 20 66 72 6f 6d 0a 73 65 65 69 6e 67 20 |yes from.seeing | 00000460 77 68 61 74 20 79 6f 75 20 61 72 65 20 65 6e 74 |what you are ent| 00000470 65 72 69 6e 67 2e 20 50 72 65 73 73 20 72 65 74 |ering. Press ret| 00000480 75 72 6e 20 77 68 65 6e 20 74 68 65 20 70 61 73 |urn when the pas| 00000490 73 77 6f 72 64 20 68 61 73 20 62 65 65 6e 0a 65 |sword has been.e| 000004a0 6e 74 65 72 65 64 20 28 75 70 20 74 6f 20 32 34 |ntered (up to 24| 000004b0 20 63 68 61 72 61 63 74 65 72 73 20 61 72 65 20 | characters are | 000004c0 61 6c 6c 6f 77 65 64 29 2c 20 79 6f 75 20 77 69 |allowed), you wi| 000004d0 6c 6c 20 74 68 65 6e 20 62 65 20 70 72 6f 6d 70 |ll then be promp| 000004e0 74 65 64 20 74 6f 0a 72 65 6e 74 65 72 20 74 68 |ted to.renter th| 000004f0 65 20 70 61 73 73 77 6f 72 64 2c 20 74 68 69 73 |e password, this| 00000500 20 69 73 20 74 6f 20 63 68 65 63 6b 20 79 6f 75 | is to check you| 00000510 20 68 61 76 65 20 6d 61 64 65 20 6e 6f 20 6d 69 | have made no mi| 00000520 73 74 61 6b 65 73 20 74 68 65 20 66 69 72 73 74 |stakes the first| 00000530 0a 74 69 6d 65 2e 20 42 65 20 63 61 72 65 66 75 |.time. Be carefu| 00000540 6c 20 74 68 65 20 70 72 6f 74 65 63 74 69 6f 6e |l the protection| 00000550 20 73 79 73 74 65 6d 20 69 73 20 43 61 73 65 20 | system is Case | 00000560 73 65 6e 73 69 74 69 76 65 2c 20 65 67 2e 20 74 |sensitive, eg. t| 00000570 68 65 20 70 61 73 73 77 6f 72 64 0a 27 74 65 73 |he password.'tes| 00000580 74 27 20 2c 20 27 54 45 53 54 27 20 61 6e 64 20 |t' , 'TEST' and | 00000590 27 54 65 73 74 27 20 61 72 65 20 61 6c 6c 20 74 |'Test' are all t| 000005a0 72 65 61 74 65 64 20 64 69 66 66 65 72 65 6e 74 |reated different| 000005b0 6c 79 2e 20 49 66 20 74 68 65 20 74 77 6f 20 70 |ly. If the two p| 000005c0 61 73 73 77 6f 72 64 73 0a 6d 61 74 63 68 20 74 |asswords.match t| 000005d0 68 65 6e 20 74 68 65 20 77 69 6e 64 6f 77 20 77 |hen the window w| 000005e0 69 6c 6c 20 63 6c 6f 73 65 20 61 6e 64 20 61 20 |ill close and a | 000005f0 73 61 76 65 20 62 6f 78 20 77 69 6c 6c 20 61 70 |save box will ap| 00000600 70 65 61 72 2e 20 54 68 65 20 73 61 76 65 20 62 |pear. The save b| 00000610 6f 78 0a 63 6f 6e 74 61 69 6e 73 20 74 68 65 20 |ox.contains the | 00000620 66 69 6c 65 20 6e 61 6d 65 20 6f 66 20 74 68 65 |file name of the| 00000630 20 6f 72 69 67 69 6e 61 6c 20 66 69 6c 65 2e 20 | original file. | 00000640 57 68 65 6e 20 73 61 76 69 6e 67 20 74 68 65 20 |When saving the | 00000650 65 6e 63 72 79 70 74 65 64 20 66 69 6c 65 0a 79 |encrypted file.y| 00000660 6f 75 20 77 69 6c 6c 20 62 65 20 77 61 72 6e 65 |ou will be warne| 00000670 64 20 69 66 20 69 74 20 6d 65 61 6e 73 20 6f 76 |d if it means ov| 00000680 65 72 77 72 69 74 69 6e 67 20 74 68 65 20 65 78 |erwriting the ex| 00000690 69 73 74 69 6e 67 20 66 69 6c 65 2e 20 4f 6e 63 |isting file. Onc| 000006a0 65 20 74 68 65 20 66 69 6c 65 0a 68 61 73 20 62 |e the file.has b| 000006b0 65 65 6e 20 73 61 76 65 64 20 6f 75 74 20 61 6e |een saved out an| 000006c0 20 68 6f 75 72 67 6c 61 73 73 20 77 69 6c 6c 20 | hourglass will | 000006d0 61 70 70 65 61 72 20 77 68 69 6c 65 20 74 68 65 |appear while the| 000006e0 20 65 6e 63 72 79 70 74 69 6f 6e 20 74 61 6b 65 | encryption take| 000006f0 73 0a 70 6c 61 63 65 2e 20 54 6f 20 61 62 6f 72 |s.place. To abor| 00000700 74 20 74 68 65 20 65 6e 63 72 79 74 69 6f 6e 20 |t the encrytion | 00000710 70 72 6f 63 65 64 75 72 65 20 62 65 66 6f 72 65 |procedure before| 00000720 20 74 68 65 20 66 69 6c 65 20 68 61 73 20 62 65 | the file has be| 00000730 65 6e 20 73 61 76 65 64 20 6f 75 74 0a 73 69 6d |en saved out.sim| 00000740 70 6c 65 20 63 6c 6f 73 65 20 74 68 65 20 6d 61 |ple close the ma| 00000750 69 6e 20 77 69 6e 64 6f 77 20 6f 72 20 74 68 65 |in window or the| 00000760 20 73 61 76 65 20 62 6f 78 20 75 73 69 6e 67 20 | save box using | 00000770 74 68 65 20 63 6c 6f 73 65 20 77 69 6e 64 6f 77 |the close window| 00000780 20 69 63 6f 6e 2e 0a 20 20 20 20 20 20 20 20 54 | icon.. T| 00000790 68 65 20 66 69 6c 65 20 69 73 20 6e 6f 77 20 65 |he file is now e| 000007a0 6e 63 72 79 70 74 65 64 20 61 6e 64 20 62 65 61 |ncrypted and bea| 000007b0 72 73 20 74 68 65 20 70 72 6f 74 65 63 74 6f 72 |rs the protector| 000007c0 20 6c 6f 63 6b 20 69 63 6f 6e 2e 20 54 68 65 0a | lock icon. The.| 000007d0 65 6e 63 72 79 70 74 69 6f 6e 20 73 79 73 74 65 |encryption syste| 000007e0 6d 20 64 6f 65 73 20 6e 6f 74 20 73 74 6f 72 65 |m does not store| 000007f0 20 74 68 65 20 70 61 73 73 77 6f 72 64 20 69 6e | the password in| 00000800 73 69 64 65 20 74 68 65 20 66 69 6c 65 20 73 6f |side the file so| 00000810 20 69 74 20 63 61 6e 6e 6f 74 0a 62 65 20 6c 6f | it cannot.be lo| 00000820 61 64 65 64 20 69 6e 74 6f 20 61 6e 20 65 64 69 |aded into an edi| 00000830 74 6f 72 20 61 6e 64 20 66 6f 75 6e 64 2e 20 53 |tor and found. S| 00000840 69 6e 63 65 20 74 68 69 73 20 69 73 20 74 68 65 |ince this is the| 00000850 20 63 61 73 65 20 74 68 65 72 65 20 69 73 20 6e | case there is n| 00000860 6f 20 77 61 79 0a 66 6f 72 20 74 68 65 20 70 72 |o way.for the pr| 00000870 6f 67 72 61 6d 20 74 6f 20 6b 6e 6f 77 20 77 68 |ogram to know wh| 00000880 65 6e 20 75 6e 65 6e 63 72 79 70 74 69 6e 67 20 |en unencrypting | 00000890 61 20 66 69 6c 65 20 77 68 65 74 68 65 72 20 74 |a file whether t| 000008a0 68 65 20 63 6f 72 72 65 63 74 0a 70 61 73 73 77 |he correct.passw| 000008b0 6f 72 64 20 68 61 73 20 62 65 65 6e 20 73 75 70 |ord has been sup| 000008c0 70 6c 69 65 64 2c 20 74 68 65 72 65 66 6f 72 65 |plied, therefore| 000008d0 20 73 75 70 70 6c 79 69 6e 67 20 74 68 65 20 77 | supplying the w| 000008e0 72 6f 6e 67 20 70 61 73 73 77 6f 72 64 20 66 6f |rong password fo| 000008f0 72 0a 75 6e 65 6e 63 72 79 70 74 69 6f 6e 20 77 |r.unencryption w| 00000900 69 6c 6c 20 72 65 73 75 6c 74 20 69 6e 20 61 6e |ill result in an| 00000910 20 65 76 65 6e 20 6d 6f 72 65 20 67 61 72 62 6c | even more garbl| 00000920 65 64 20 66 69 6c 65 2e 20 28 54 68 69 73 20 69 |ed file. (This i| 00000930 73 20 77 68 79 20 79 6f 75 20 61 72 65 0a 77 61 |s why you are.wa| 00000940 72 6e 65 64 20 69 66 20 79 6f 75 20 61 72 65 20 |rned if you are | 00000950 67 6f 69 6e 67 20 74 6f 20 6f 76 65 72 77 72 69 |going to overwri| 00000960 74 65 20 61 6e 20 65 78 69 73 74 69 6e 67 20 66 |te an existing f| 00000970 69 6c 65 29 2e 0a 20 20 20 20 20 20 20 20 54 6f |ile).. To| 00000980 20 75 6e 65 6e 63 72 79 70 74 20 61 20 66 69 6c | unencrypt a fil| 00000990 65 20 73 69 6d 70 6c 79 20 64 72 61 67 20 69 74 |e simply drag it| 000009a0 20 62 61 63 6b 20 6f 6e 74 6f 20 74 68 65 20 70 | back onto the p| 000009b0 72 6f 74 65 63 74 6f 72 20 69 63 6f 6e 20 61 6e |rotector icon an| 000009c0 64 0a 72 65 70 65 61 74 20 74 68 65 20 70 72 6f |d.repeat the pro| 000009d0 63 65 73 73 20 62 79 20 73 75 70 70 6c 79 69 6e |cess by supplyin| 000009e0 67 20 74 68 65 20 63 6f 72 72 65 63 74 20 70 61 |g the correct pa| 000009f0 73 73 77 6f 72 64 20 61 6e 64 20 73 61 76 65 20 |ssword and save | 00000a00 6f 75 74 20 74 68 65 20 6e 65 77 0a 66 69 6c 65 |out the new.file| 00000a10 2e 0a 0a 20 20 20 20 20 20 20 20 41 70 70 6c 69 |... Appli| 00000a20 63 61 74 69 6f 6e 73 20 63 61 6e 20 61 6c 73 6f |cations can also| 00000a30 20 62 65 20 65 6e 63 72 79 70 74 65 64 20 62 79 | be encrypted by| 00000a40 20 70 72 6f 74 65 63 74 6f 72 2e 20 53 69 6e 63 | protector. Sinc| 00000a50 65 20 65 6e 63 72 79 70 74 69 6e 67 0a 61 6e 64 |e encrypting.and| 00000a60 20 75 6e 65 6e 63 72 79 70 74 69 6e 67 20 61 6e | unencrypting an| 00000a70 20 65 6e 74 69 72 65 20 70 72 6f 67 72 61 6d 20 | entire program | 00000a80 73 75 63 68 20 61 73 20 27 49 6d 70 72 65 73 73 |such as 'Impress| 00000a90 69 6f 6e 27 20 6f 72 20 27 52 65 76 65 6c 61 74 |ion' or 'Revelat| 00000aa0 69 6f 6e 27 0a 77 6f 75 6c 64 20 62 65 20 74 69 |ion'.would be ti| 00000ab0 6d 65 20 63 6f 6e 73 75 6d 69 6e 67 20 70 72 6f |me consuming pro| 00000ac0 74 65 63 74 6f 72 20 73 69 6d 70 6c 79 20 65 6e |tector simply en| 00000ad0 63 72 79 70 74 65 73 20 74 68 65 20 21 52 75 6e |cryptes the !Run| 00000ae0 49 6d 61 67 65 20 66 69 6c 65 20 69 6e 73 69 64 |Image file insid| 00000af0 65 0a 74 68 65 20 61 70 70 6c 69 63 61 74 69 6f |e.the applicatio| 00000b00 6e 20 64 69 72 65 63 74 6f 72 79 20 73 69 6e 63 |n directory sinc| 00000b10 65 20 74 68 69 73 20 69 73 20 75 73 75 61 6c 6c |e this is usuall| 00000b20 79 20 77 68 65 72 65 20 74 68 65 20 62 75 6c 6b |y where the bulk| 00000b30 20 6f 66 20 74 68 65 0a 70 72 6f 67 72 61 6d 20 | of the.program | 00000b40 69 73 20 73 74 6f 72 65 64 20 61 6e 64 20 74 68 |is stored and th| 00000b50 65 20 61 70 70 6c 69 63 61 74 69 6f 6e 20 77 69 |e application wi| 00000b60 6c 6c 20 6e 6f 74 20 75 73 75 61 6c 6c 79 20 72 |ll not usually r| 00000b70 75 6e 20 77 69 74 68 6f 75 74 20 69 74 2e 20 54 |un without it. T| 00000b80 6f 0a 65 6e 63 72 79 70 74 20 61 6e 64 20 75 6e |o.encrypt and un| 00000b90 65 6e 63 72 79 70 74 20 61 6e 20 61 70 70 6c 69 |encrypt an appli| 00000ba0 63 61 74 69 6f 6e 20 73 69 6d 70 6c 79 20 64 72 |cation simply dr| 00000bb0 61 67 20 69 74 20 6f 6e 74 6f 20 74 68 65 20 70 |ag it onto the p| 00000bc0 72 6f 74 65 63 74 6f 72 20 69 63 6f 6e 0a 61 73 |rotector icon.as| 00000bd0 20 77 69 74 68 20 61 20 66 69 6c 65 2e 20 49 66 | with a file. If| 00000be0 20 61 20 21 72 75 6e 69 6d 61 67 65 20 66 69 6c | a !runimage fil| 00000bf0 65 20 63 61 6e 20 62 65 20 66 6f 75 6e 64 20 74 |e can be found t| 00000c00 68 65 6e 20 79 6f 75 20 77 69 6c 6c 20 62 65 20 |hen you will be | 00000c10 61 62 6c 65 20 74 6f 0a 65 6e 63 72 79 70 74 20 |able to.encrypt | 00000c20 69 74 2e 0a 20 20 20 20 20 20 20 20 0a 20 20 20 |it.. . | 00000c30 20 20 20 20 20 53 6f 20 66 61 72 20 73 6f 20 67 | So far so g| 00000c40 6f 6f 64 21 2c 20 79 6f 75 20 63 61 6e 20 6e 6f |ood!, you can no| 00000c50 77 20 65 6e 63 72 79 70 74 20 66 69 6c 65 20 61 |w encrypt file a| 00000c60 6e 64 20 61 70 70 6c 69 63 61 74 69 6f 6e 73 2c |nd applications,| 00000c70 20 62 75 74 20 61 74 0a 74 68 65 20 6d 6f 6d 65 | but at.the mome| 00000c80 6e 74 20 69 74 20 6d 61 79 20 61 70 70 65 61 72 |nt it may appear| 00000c90 20 61 20 62 69 74 20 63 75 6d 62 65 72 73 6f 6d | a bit cumbersom| 00000ca0 65 20 68 61 76 69 6e 67 20 74 6f 20 64 72 61 67 |e having to drag| 00000cb0 20 74 68 65 20 66 69 6c 65 73 20 6f 6e 74 6f 20 | the files onto | 00000cc0 74 68 65 0a 69 63 6f 6e 20 62 61 72 2c 20 77 6f |the.icon bar, wo| 00000cd0 75 6c 64 6e 27 74 20 69 74 20 62 65 20 6e 69 63 |uldn't it be nic| 00000ce0 65 20 74 6f 20 62 65 20 61 62 6c 65 20 74 6f 20 |e to be able to | 00000cf0 64 6f 75 62 6c 65 20 63 6c 69 63 6b 20 74 68 65 |double click the| 00000d00 6d 20 61 73 20 69 66 20 74 68 65 79 0a 77 65 72 |m as if they.wer| 00000d10 65 20 74 68 65 69 72 20 6f 72 69 67 69 6e 61 6c |e their original| 00000d20 20 6e 6f 72 6d 61 6c 20 66 69 6c 65 73 3f 20 6f | normal files? o| 00000d30 72 20 72 75 6e 20 61 6e 20 65 6e 63 72 79 70 74 |r run an encrypt| 00000d40 65 64 20 61 70 70 6c 69 63 61 74 69 6f 6e 20 62 |ed application b| 00000d50 79 20 64 6f 75 62 6c 65 0a 63 6c 69 63 6b 69 6e |y double.clickin| 00000d60 67 20 6f 6e 20 69 74 3f 20 77 65 6c 6c 20 72 65 |g on it? well re| 00000d70 61 64 20 6f 6e 20 74 6f 20 74 68 65 20 6e 65 78 |ad on to the nex| 00000d80 74 20 73 65 63 74 69 6f 6e 20 64 6f 63 75 6d 65 |t section docume| 00000d90 6e 74 65 64 20 69 6e 20 74 68 65 20 27 55 6e 6c |nted in the 'Unl| 00000da0 6f 63 6b 27 0a 61 70 70 6c 69 63 61 74 69 6f 6e |ock'.application| 00000db0 73 20 21 48 65 6c 70 20 66 69 6c 65 2e 2e 2e 2e |s !Help file....| 00000dc0 2e 2e 2e 0a 0a 0a 4e 2e 42 2e 20 42 6f 74 68 20 |......N.B. Both | 00000dd0 50 72 6f 74 65 63 74 6f 72 20 61 6e 64 20 55 6e |Protector and Un| 00000de0 6c 6f 63 6b 20 68 61 76 65 20 74 6f 20 68 61 76 |lock have to hav| 00000df0 65 20 73 65 65 6e 20 61 20 63 6f 70 79 20 6f 66 |e seen a copy of| 00000e00 20 79 6f 75 72 20 21 53 79 73 74 65 6d 20 6f 72 | your !System or| 00000e10 0a 21 53 63 72 61 70 20 28 2a 29 20 66 6f 6c 64 |.!Scrap (*) fold| 00000e20 65 72 20 62 65 66 6f 72 65 20 74 68 65 79 20 77 |er before they w| 00000e30 69 6c 6c 20 6c 6f 61 64 2c 20 74 68 69 73 20 69 |ill load, this i| 00000e40 73 20 62 65 63 61 75 73 65 20 74 68 65 79 20 74 |s because they t| 00000e50 65 6d 70 6f 72 61 72 69 6c 79 0a 6e 65 65 64 20 |emporarily.need | 00000e60 74 6f 20 73 74 6f 72 65 20 73 63 72 61 70 20 66 |to store scrap f| 00000e70 69 6c 65 73 20 77 68 69 6c 65 20 70 65 72 66 6f |iles while perfo| 00000e80 72 6d 69 6e 67 20 28 75 6e 29 20 65 6e 63 72 79 |rming (un) encry| 00000e90 70 74 69 6f 6e 2e 0a 0a 28 2a 29 20 20 2d 20 20 |ption...(*) - | 00000ea0 52 49 53 43 20 4f 53 20 33 20 6f 6e 6c 79 0a 0a |RISC OS 3 only..| 00000eb0