Home » Archimedes archive » Archimedes World » AW-1994-10-Disc1.adf » Disk1Oct94 » !AWOct94/Goodies/Protects/!Help
!AWOct94/Goodies/Protects/!Help
This website contains an archive of files for the Acorn Electron, BBC Micro, Acorn Archimedes, Commodore 16 and Commodore 64 computers, which Dominic Ford has rescued from his private collection of floppy disks and cassettes.
Some of these files were originally commercial releases in the 1980s and 1990s, but they are now widely available online. I assume that copyright over them is no longer being asserted. If you own the copyright and would like files to be removed, please contact me.
Tape/disk: | Home » Archimedes archive » Archimedes World » AW-1994-10-Disc1.adf » Disk1Oct94 |
Filename: | !AWOct94/Goodies/Protects/!Help |
Read OK: | ✔ |
File size: | 16DA bytes |
Load address: | 0000 |
Exec address: | 0000 |
Duplicates
There is 1 duplicate copy of this file in the archive:
- Archimedes archive » Archimedes World » AW-1994-10-Disc1.adf » Disk1Oct94 » !AWOct94/Goodies/Protects/!Help
- Archimedes archive » Archimedes World » AW-1994-10-Disc1.adf » Disk1Oct94 » !AWOct94/Goodies/Protects/!Protector/!Help
File contents
Protector V1.52 (01-Aug-1994) ������������������������������� by Peter Reeves-Hall �������������������� Introduction =-=-=-=-=-=- The protector suite of applications are designed to offer an easy to use, yet secure method of password protecting files and desktop applications. This is of great use when your machine and/or personal files are in an �open� environment such as an office or school. It is also useful for �home users� taking their machine somewhere public or wanting piece of mind when leaving it unattended. Guide =-=-= The main component of the system is the !Protector application. Double click on it�s icon to install it onto the icon bar. Protector allows files t be encrypted and unencrypted with a password supplied by the user. Every file can use a different password if the User so desires. To encrypt a file follow this procedure; 1) Drag the icon of the file to be encrypted onto the Protector icon on the icon bar. A window will open. At the top of the window the word 'Encrypt' will be displayed to inform you that the file will be encypted. Beneath is the icon of the file to be encrypted and its name. 2) A password should now be entered into the writable icon at the bottom of the window. The letters will not appear (*) but instead a row of asterisk to prevent prying eyes from seeing what you are entering. Press return when the password has been entered (a maximum of 24 characters are allowed, and a minimum of 1 !) 3) You will now be prompted to renter the password, this is to check you have made no mistakes the first time. Be careful, the protection system is Case sensitive, eg. the password 'test' , 'TEST' and 'Test' are all treated differently. 4) If the two passwords matched then the window will close and a save box will appear. The save box contains the file name of the original file. When saving the encrypted file you will be warned if it means overwriting the existing file. 5) Once the file has been �saved-out� an hourglass will appear while the encryption takes place. To abort the encryption procedure before the file has been saved-out simple close the main window or the save box using the close window icon. The file is now encrypted and bears the protector �lock� icon. The encryption system does not store the password inside the file so it cannot be loaded into an editor and found, Because of this there is no way for the program to know, when unencrypting a file, whether the correct password has been supplied, therefore supplying the wrong password for unencryption will result in an even more garbled file being output from the application. (This is why you are warned if you attempt to overwrite an existing file). To unencrypt a file simply drag it back onto the protector icon and repeat the above process by supplying the correct password and save out the new file. Applications can also be encrypted by Protector. Since encrypting and unencrypting an entire program such as 'Impression' or 'Revelation' might take a short time protector simply encrypt�s the !RunImage file inside the application directory since this is usually where the bulk of the program is stored and the application will not usually run without it. To encrypt and unencrypt an application simply drag it onto the protector icon as you would with a file. If a !RunImage file can be found then you will be able to encrypt it. Introducing Unlock =-=-=-=-=-=-=-=-=- So far so good!, you can now encrypt file and applications, but at the moment it may appear a bit cumbersome having to drag the files onto the icon bar, wouldn't it be nice to be able to double click them as if they were their original normal files? or run an encrypted application by double clicking on it? well read on to the next section documented in the 'Unlock' applications !Help file....... Speed Trials =-=-=-=-=-=- A Comparison of Protector and Unlock (Version 1.52) has been made with the earlier version that was published (Version 1.03) Since Version 1.03 Hand written ARM code has been introduced to greatly speed up the encryption process. To benchmark the improvements slightly modified copies of the two versions of unlock were used which indicated the exact times involved. The bench mark was performed on a RISC PC using a 30MHz ARM 610 processor (fitted with 1Mb of VRAM to stop any "slow-down" due to the screen display). The test involved De-encrypting a file held in RAM disc to form a second file also in RAM Disc. (A RAM disc was used to give a fair indication of speed without the effects associated with Harddisc "bottle-necks" restricting the data transfer) The file used was exactly 2Mb in size and was (de)encrypted with the password "AcornComputers" , the results are as follows; Version Of Unlock Time Taken/s MB/s Speed increase Factor ============================================================================= 1.03 (29-Sep-1993) 245.33 0.0082 1 (reference level) 1.52 (01-Aug-1994) 1.12 1.79 219 Not too bad is it? ;-> Points to Note =-=-=-=-=-=-=- N.B. Both Protector and Unlock have to have seen a copy of your !System or !Scrap (*) folder before they will load, this is because they temporarily need to store scrap files while performing (un) encryption. (*) - RISC OS 3 only About the Author =-=-=-=-=-=-=-=-=-= If you want to get in touch with the Author , concerning this program or any of the others he has written, wether to praise them or make POLITE criticisms, OR just to have a chat then you may reach him Electronically... Outside "Term-time"; Via Email: PeterRH@arcade.demon.co.uk Or Direct to Arcade BBS [Tel. +44 (0)81 654 2212 ] : Peter Reeves-Hall (user #1169) During "Term-time"; E-mail address "Pending" ;-)
00000000 20 20 0a 20 20 20 50 72 6f 74 65 63 74 6f 72 20 | . Protector | 00000010 20 20 56 31 2e 35 32 20 28 30 31 2d 41 75 67 2d | V1.52 (01-Aug-| 00000020 31 39 39 34 29 0a 20 20 20 8f 8f 8f 8f 8f 8f 8f |1994). .......| 00000030 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f |................| 00000040 8f 8f 8f 8f 8f 8f 8f 8f 0a 20 20 20 20 20 20 20 |......... | 00000050 20 62 79 20 50 65 74 65 72 20 52 65 65 76 65 73 | by Peter Reeves| 00000060 2d 48 61 6c 6c 0a 20 20 20 20 20 20 20 20 8f 8f |-Hall. ..| 00000070 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f 8f |................| 00000080 8f 8f 0a 0a 49 6e 74 72 6f 64 75 63 74 69 6f 6e |....Introduction| 00000090 0a 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d 0a 20 20 |.=-=-=-=-=-=-. | 000000a0 20 20 20 20 20 20 54 68 65 20 70 72 6f 74 65 63 | The protec| 000000b0 74 6f 72 20 73 75 69 74 65 20 6f 66 20 61 70 70 |tor suite of app| 000000c0 6c 69 63 61 74 69 6f 6e 73 20 61 72 65 20 64 65 |lications are de| 000000d0 73 69 67 6e 65 64 20 74 6f 20 6f 66 66 65 72 20 |signed to offer | 000000e0 61 6e 20 65 61 73 79 20 74 6f 0a 75 73 65 2c 20 |an easy to.use, | 000000f0 79 65 74 20 73 65 63 75 72 65 20 6d 65 74 68 6f |yet secure metho| 00000100 64 20 6f 66 20 70 61 73 73 77 6f 72 64 20 70 72 |d of password pr| 00000110 6f 74 65 63 74 69 6e 67 20 66 69 6c 65 73 20 61 |otecting files a| 00000120 6e 64 20 64 65 73 6b 74 6f 70 20 61 70 70 6c 69 |nd desktop appli| 00000130 63 61 74 69 6f 6e 73 2e 0a 0a 54 68 69 73 20 69 |cations...This i| 00000140 73 20 6f 66 20 67 72 65 61 74 20 75 73 65 20 77 |s of great use w| 00000150 68 65 6e 20 79 6f 75 72 20 6d 61 63 68 69 6e 65 |hen your machine| 00000160 20 61 6e 64 2f 6f 72 20 70 65 72 73 6f 6e 61 6c | and/or personal| 00000170 20 66 69 6c 65 73 20 61 72 65 20 69 6e 20 61 6e | files are in an| 00000180 20 94 6f 70 65 6e 95 0a 65 6e 76 69 72 6f 6e 6d | .open..environm| 00000190 65 6e 74 20 73 75 63 68 20 61 73 20 61 6e 20 6f |ent such as an o| 000001a0 66 66 69 63 65 20 6f 72 20 73 63 68 6f 6f 6c 2e |ffice or school.| 000001b0 20 49 74 20 69 73 20 61 6c 73 6f 20 75 73 65 66 | It is also usef| 000001c0 75 6c 20 66 6f 72 20 90 68 6f 6d 65 20 75 73 65 |ul for .home use| 000001d0 72 73 91 0a 74 61 6b 69 6e 67 20 74 68 65 69 72 |rs..taking their| 000001e0 20 6d 61 63 68 69 6e 65 20 73 6f 6d 65 77 68 65 | machine somewhe| 000001f0 72 65 20 70 75 62 6c 69 63 20 6f 72 20 77 61 6e |re public or wan| 00000200 74 69 6e 67 20 70 69 65 63 65 20 6f 66 20 6d 69 |ting piece of mi| 00000210 6e 64 20 77 68 65 6e 20 6c 65 61 76 69 6e 67 0a |nd when leaving.| 00000220 69 74 20 75 6e 61 74 74 65 6e 64 65 64 2e 0a 0a |it unattended...| 00000230 47 75 69 64 65 0a 3d 2d 3d 2d 3d 0a 20 20 20 20 |Guide.=-=-=. | 00000240 20 20 20 20 54 68 65 20 6d 61 69 6e 20 63 6f 6d | The main com| 00000250 70 6f 6e 65 6e 74 20 6f 66 20 74 68 65 20 73 79 |ponent of the sy| 00000260 73 74 65 6d 20 69 73 20 74 68 65 20 21 50 72 6f |stem is the !Pro| 00000270 74 65 63 74 6f 72 20 61 70 70 6c 69 63 61 74 69 |tector applicati| 00000280 6f 6e 2e 0a 44 6f 75 62 6c 65 20 63 6c 69 63 6b |on..Double click| 00000290 20 6f 6e 20 69 74 91 73 20 69 63 6f 6e 20 74 6f | on it.s icon to| 000002a0 20 69 6e 73 74 61 6c 6c 20 69 74 20 6f 6e 74 6f | install it onto| 000002b0 20 74 68 65 20 69 63 6f 6e 20 62 61 72 2e 20 50 | the icon bar. P| 000002c0 72 6f 74 65 63 74 6f 72 20 61 6c 6c 6f 77 73 0a |rotector allows.| 000002d0 66 69 6c 65 73 20 74 20 62 65 20 65 6e 63 72 79 |files t be encry| 000002e0 70 74 65 64 20 61 6e 64 20 75 6e 65 6e 63 72 79 |pted and unencry| 000002f0 70 74 65 64 20 77 69 74 68 20 61 20 70 61 73 73 |pted with a pass| 00000300 77 6f 72 64 20 73 75 70 70 6c 69 65 64 20 62 79 |word supplied by| 00000310 20 74 68 65 20 75 73 65 72 2e 0a 45 76 65 72 79 | the user..Every| 00000320 20 66 69 6c 65 20 63 61 6e 20 75 73 65 20 61 20 | file can use a | 00000330 64 69 66 66 65 72 65 6e 74 20 70 61 73 73 77 6f |different passwo| 00000340 72 64 20 69 66 20 74 68 65 20 55 73 65 72 20 73 |rd if the User s| 00000350 6f 20 64 65 73 69 72 65 73 2e 0a 0a 54 6f 20 65 |o desires...To e| 00000360 6e 63 72 79 70 74 20 61 20 66 69 6c 65 20 66 6f |ncrypt a file fo| 00000370 6c 6c 6f 77 20 74 68 69 73 20 70 72 6f 63 65 64 |llow this proced| 00000380 75 72 65 3b 0a 31 29 20 44 72 61 67 20 74 68 65 |ure;.1) Drag the| 00000390 20 69 63 6f 6e 20 6f 66 20 74 68 65 20 66 69 6c | icon of the fil| 000003a0 65 20 74 6f 20 62 65 20 65 6e 63 72 79 70 74 65 |e to be encrypte| 000003b0 64 20 6f 6e 74 6f 20 74 68 65 20 50 72 6f 74 65 |d onto the Prote| 000003c0 63 74 6f 72 20 69 63 6f 6e 20 6f 6e 20 74 68 65 |ctor icon on the| 000003d0 0a 69 63 6f 6e 20 62 61 72 2e 20 41 20 77 69 6e |.icon bar. A win| 000003e0 64 6f 77 20 77 69 6c 6c 20 6f 70 65 6e 2e 20 41 |dow will open. A| 000003f0 74 20 74 68 65 20 74 6f 70 20 6f 66 20 74 68 65 |t the top of the| 00000400 20 77 69 6e 64 6f 77 20 74 68 65 20 77 6f 72 64 | window the word| 00000410 20 27 45 6e 63 72 79 70 74 27 0a 77 69 6c 6c 20 | 'Encrypt'.will | 00000420 62 65 20 64 69 73 70 6c 61 79 65 64 20 74 6f 20 |be displayed to | 00000430 69 6e 66 6f 72 6d 20 79 6f 75 20 74 68 61 74 20 |inform you that | 00000440 74 68 65 20 66 69 6c 65 20 77 69 6c 6c 20 62 65 |the file will be| 00000450 20 65 6e 63 79 70 74 65 64 2e 20 42 65 6e 65 61 | encypted. Benea| 00000460 74 68 20 69 73 0a 74 68 65 20 69 63 6f 6e 20 6f |th is.the icon o| 00000470 66 20 74 68 65 20 66 69 6c 65 20 74 6f 20 62 65 |f the file to be| 00000480 20 65 6e 63 72 79 70 74 65 64 20 61 6e 64 20 69 | encrypted and i| 00000490 74 73 20 6e 61 6d 65 2e 0a 32 29 20 41 20 70 61 |ts name..2) A pa| 000004a0 73 73 77 6f 72 64 20 73 68 6f 75 6c 64 20 6e 6f |ssword should no| 000004b0 77 20 62 65 20 65 6e 74 65 72 65 64 20 69 6e 74 |w be entered int| 000004c0 6f 20 74 68 65 20 77 72 69 74 61 62 6c 65 20 69 |o the writable i| 000004d0 63 6f 6e 20 61 74 20 74 68 65 20 62 6f 74 74 6f |con at the botto| 000004e0 6d 20 6f 66 0a 74 68 65 20 77 69 6e 64 6f 77 2e |m of.the window.| 000004f0 20 54 68 65 20 6c 65 74 74 65 72 73 20 77 69 6c | The letters wil| 00000500 6c 20 6e 6f 74 20 61 70 70 65 61 72 20 28 2a 29 |l not appear (*)| 00000510 20 62 75 74 20 69 6e 73 74 65 61 64 20 61 20 72 | but instead a r| 00000520 6f 77 20 6f 66 20 61 73 74 65 72 69 73 6b 20 74 |ow of asterisk t| 00000530 6f 0a 70 72 65 76 65 6e 74 20 70 72 79 69 6e 67 |o.prevent prying| 00000540 20 65 79 65 73 20 66 72 6f 6d 20 73 65 65 69 6e | eyes from seein| 00000550 67 20 77 68 61 74 20 79 6f 75 20 61 72 65 20 65 |g what you are e| 00000560 6e 74 65 72 69 6e 67 2e 20 50 72 65 73 73 20 72 |ntering. Press r| 00000570 65 74 75 72 6e 20 77 68 65 6e 20 74 68 65 0a 70 |eturn when the.p| 00000580 61 73 73 77 6f 72 64 20 68 61 73 20 62 65 65 6e |assword has been| 00000590 20 65 6e 74 65 72 65 64 20 28 61 20 6d 61 78 69 | entered (a maxi| 000005a0 6d 75 6d 20 6f 66 20 32 34 20 63 68 61 72 61 63 |mum of 24 charac| 000005b0 74 65 72 73 20 61 72 65 20 61 6c 6c 6f 77 65 64 |ters are allowed| 000005c0 2c 20 61 6e 64 20 61 0a 6d 69 6e 69 6d 75 6d 20 |, and a.minimum | 000005d0 6f 66 20 31 20 21 29 0a 33 29 20 59 6f 75 20 77 |of 1 !).3) You w| 000005e0 69 6c 6c 20 6e 6f 77 20 62 65 20 70 72 6f 6d 70 |ill now be promp| 000005f0 74 65 64 20 74 6f 20 72 65 6e 74 65 72 20 74 68 |ted to renter th| 00000600 65 20 70 61 73 73 77 6f 72 64 2c 20 74 68 69 73 |e password, this| 00000610 20 69 73 20 74 6f 20 63 68 65 63 6b 20 79 6f 75 | is to check you| 00000620 0a 68 61 76 65 20 6d 61 64 65 20 6e 6f 20 6d 69 |.have made no mi| 00000630 73 74 61 6b 65 73 20 74 68 65 20 66 69 72 73 74 |stakes the first| 00000640 20 74 69 6d 65 2e 20 42 65 20 63 61 72 65 66 75 | time. Be carefu| 00000650 6c 2c 20 74 68 65 20 70 72 6f 74 65 63 74 69 6f |l, the protectio| 00000660 6e 20 73 79 73 74 65 6d 20 69 73 0a 43 61 73 65 |n system is.Case| 00000670 20 73 65 6e 73 69 74 69 76 65 2c 20 65 67 2e 20 | sensitive, eg. | 00000680 74 68 65 20 70 61 73 73 77 6f 72 64 20 27 74 65 |the password 'te| 00000690 73 74 27 20 2c 20 27 54 45 53 54 27 20 61 6e 64 |st' , 'TEST' and| 000006a0 20 27 54 65 73 74 27 20 61 72 65 20 61 6c 6c 20 | 'Test' are all | 000006b0 74 72 65 61 74 65 64 0a 64 69 66 66 65 72 65 6e |treated.differen| 000006c0 74 6c 79 2e 0a 34 29 20 49 66 20 74 68 65 20 74 |tly..4) If the t| 000006d0 77 6f 20 70 61 73 73 77 6f 72 64 73 20 6d 61 74 |wo passwords mat| 000006e0 63 68 65 64 20 74 68 65 6e 20 74 68 65 20 77 69 |ched then the wi| 000006f0 6e 64 6f 77 20 77 69 6c 6c 20 63 6c 6f 73 65 20 |ndow will close | 00000700 61 6e 64 20 61 20 73 61 76 65 20 62 6f 78 0a 77 |and a save box.w| 00000710 69 6c 6c 20 61 70 70 65 61 72 2e 20 54 68 65 20 |ill appear. The | 00000720 73 61 76 65 20 62 6f 78 20 63 6f 6e 74 61 69 6e |save box contain| 00000730 73 20 74 68 65 20 66 69 6c 65 20 6e 61 6d 65 20 |s the file name | 00000740 6f 66 20 74 68 65 20 6f 72 69 67 69 6e 61 6c 20 |of the original | 00000750 66 69 6c 65 2e 20 57 68 65 6e 0a 73 61 76 69 6e |file. When.savin| 00000760 67 20 74 68 65 20 65 6e 63 72 79 70 74 65 64 20 |g the encrypted | 00000770 66 69 6c 65 20 79 6f 75 20 77 69 6c 6c 20 62 65 |file you will be| 00000780 20 77 61 72 6e 65 64 20 69 66 20 69 74 20 6d 65 | warned if it me| 00000790 61 6e 73 20 6f 76 65 72 77 72 69 74 69 6e 67 20 |ans overwriting | 000007a0 74 68 65 0a 65 78 69 73 74 69 6e 67 20 66 69 6c |the.existing fil| 000007b0 65 2e 0a 35 29 20 4f 6e 63 65 20 74 68 65 20 66 |e..5) Once the f| 000007c0 69 6c 65 20 68 61 73 20 62 65 65 6e 20 90 73 61 |ile has been .sa| 000007d0 76 65 64 2d 6f 75 74 91 20 61 6e 20 68 6f 75 72 |ved-out. an hour| 000007e0 67 6c 61 73 73 20 77 69 6c 6c 20 61 70 70 65 61 |glass will appea| 000007f0 72 20 77 68 69 6c 65 20 74 68 65 0a 65 6e 63 72 |r while the.encr| 00000800 79 70 74 69 6f 6e 20 74 61 6b 65 73 20 70 6c 61 |yption takes pla| 00000810 63 65 2e 20 54 6f 20 61 62 6f 72 74 20 74 68 65 |ce. To abort the| 00000820 20 65 6e 63 72 79 70 74 69 6f 6e 20 70 72 6f 63 | encryption proc| 00000830 65 64 75 72 65 20 62 65 66 6f 72 65 20 74 68 65 |edure before the| 00000840 20 66 69 6c 65 0a 68 61 73 20 62 65 65 6e 20 73 | file.has been s| 00000850 61 76 65 64 2d 6f 75 74 20 73 69 6d 70 6c 65 20 |aved-out simple | 00000860 63 6c 6f 73 65 20 74 68 65 20 6d 61 69 6e 20 77 |close the main w| 00000870 69 6e 64 6f 77 20 6f 72 20 74 68 65 20 73 61 76 |indow or the sav| 00000880 65 20 62 6f 78 20 75 73 69 6e 67 20 74 68 65 0a |e box using the.| 00000890 63 6c 6f 73 65 20 77 69 6e 64 6f 77 20 69 63 6f |close window ico| 000008a0 6e 2e 0a 0a 20 20 20 20 20 20 20 54 68 65 20 66 |n... The f| 000008b0 69 6c 65 20 69 73 20 6e 6f 77 20 65 6e 63 72 79 |ile is now encry| 000008c0 70 74 65 64 20 61 6e 64 20 62 65 61 72 73 20 74 |pted and bears t| 000008d0 68 65 20 70 72 6f 74 65 63 74 6f 72 20 90 6c 6f |he protector .lo| 000008e0 63 6b 91 20 69 63 6f 6e 2e 20 54 68 65 0a 65 6e |ck. icon. The.en| 000008f0 63 72 79 70 74 69 6f 6e 20 73 79 73 74 65 6d 20 |cryption system | 00000900 64 6f 65 73 20 6e 6f 74 20 73 74 6f 72 65 20 74 |does not store t| 00000910 68 65 20 70 61 73 73 77 6f 72 64 20 69 6e 73 69 |he password insi| 00000920 64 65 20 74 68 65 20 66 69 6c 65 20 73 6f 20 69 |de the file so i| 00000930 74 20 63 61 6e 6e 6f 74 0a 62 65 20 6c 6f 61 64 |t cannot.be load| 00000940 65 64 20 69 6e 74 6f 20 61 6e 20 65 64 69 74 6f |ed into an edito| 00000950 72 20 61 6e 64 20 66 6f 75 6e 64 2c 20 42 65 63 |r and found, Bec| 00000960 61 75 73 65 20 6f 66 20 74 68 69 73 20 74 68 65 |ause of this the| 00000970 72 65 20 69 73 20 6e 6f 20 77 61 79 20 66 6f 72 |re is no way for| 00000980 20 74 68 65 0a 70 72 6f 67 72 61 6d 20 74 6f 20 | the.program to | 00000990 6b 6e 6f 77 2c 20 77 68 65 6e 20 75 6e 65 6e 63 |know, when unenc| 000009a0 72 79 70 74 69 6e 67 20 61 20 66 69 6c 65 2c 20 |rypting a file, | 000009b0 77 68 65 74 68 65 72 20 74 68 65 20 63 6f 72 72 |whether the corr| 000009c0 65 63 74 20 70 61 73 73 77 6f 72 64 20 68 61 73 |ect password has| 000009d0 0a 62 65 65 6e 20 73 75 70 70 6c 69 65 64 2c 20 |.been supplied, | 000009e0 74 68 65 72 65 66 6f 72 65 20 73 75 70 70 6c 79 |therefore supply| 000009f0 69 6e 67 20 74 68 65 20 77 72 6f 6e 67 20 70 61 |ing the wrong pa| 00000a00 73 73 77 6f 72 64 20 66 6f 72 20 75 6e 65 6e 63 |ssword for unenc| 00000a10 72 79 70 74 69 6f 6e 20 77 69 6c 6c 0a 72 65 73 |ryption will.res| 00000a20 75 6c 74 20 69 6e 20 61 6e 20 65 76 65 6e 20 6d |ult in an even m| 00000a30 6f 72 65 20 67 61 72 62 6c 65 64 20 66 69 6c 65 |ore garbled file| 00000a40 20 62 65 69 6e 67 20 6f 75 74 70 75 74 20 66 72 | being output fr| 00000a50 6f 6d 20 74 68 65 20 61 70 70 6c 69 63 61 74 69 |om the applicati| 00000a60 6f 6e 2e 0a 28 54 68 69 73 20 69 73 20 77 68 79 |on..(This is why| 00000a70 20 79 6f 75 20 61 72 65 20 77 61 72 6e 65 64 20 | you are warned | 00000a80 69 66 20 79 6f 75 20 61 74 74 65 6d 70 74 20 74 |if you attempt t| 00000a90 6f 20 6f 76 65 72 77 72 69 74 65 20 61 6e 20 65 |o overwrite an e| 00000aa0 78 69 73 74 69 6e 67 20 66 69 6c 65 29 2e 0a 0a |xisting file)...| 00000ab0 20 20 20 20 20 20 20 20 54 6f 20 75 6e 65 6e 63 | To unenc| 00000ac0 72 79 70 74 20 61 20 66 69 6c 65 20 73 69 6d 70 |rypt a file simp| 00000ad0 6c 79 20 64 72 61 67 20 69 74 20 62 61 63 6b 20 |ly drag it back | 00000ae0 6f 6e 74 6f 20 74 68 65 20 70 72 6f 74 65 63 74 |onto the protect| 00000af0 6f 72 20 69 63 6f 6e 20 61 6e 64 0a 72 65 70 65 |or icon and.repe| 00000b00 61 74 20 74 68 65 20 61 62 6f 76 65 20 70 72 6f |at the above pro| 00000b10 63 65 73 73 20 62 79 20 73 75 70 70 6c 79 69 6e |cess by supplyin| 00000b20 67 20 74 68 65 20 63 6f 72 72 65 63 74 20 70 61 |g the correct pa| 00000b30 73 73 77 6f 72 64 20 61 6e 64 20 73 61 76 65 20 |ssword and save | 00000b40 6f 75 74 20 74 68 65 0a 6e 65 77 20 66 69 6c 65 |out the.new file| 00000b50 2e 0a 0a 20 20 20 20 20 20 20 20 41 70 70 6c 69 |... Appli| 00000b60 63 61 74 69 6f 6e 73 20 63 61 6e 20 61 6c 73 6f |cations can also| 00000b70 20 62 65 20 65 6e 63 72 79 70 74 65 64 20 62 79 | be encrypted by| 00000b80 20 50 72 6f 74 65 63 74 6f 72 2e 20 53 69 6e 63 | Protector. Sinc| 00000b90 65 20 65 6e 63 72 79 70 74 69 6e 67 0a 61 6e 64 |e encrypting.and| 00000ba0 20 75 6e 65 6e 63 72 79 70 74 69 6e 67 20 61 6e | unencrypting an| 00000bb0 20 65 6e 74 69 72 65 20 70 72 6f 67 72 61 6d 20 | entire program | 00000bc0 73 75 63 68 20 61 73 20 27 49 6d 70 72 65 73 73 |such as 'Impress| 00000bd0 69 6f 6e 27 20 6f 72 20 27 52 65 76 65 6c 61 74 |ion' or 'Revelat| 00000be0 69 6f 6e 27 0a 6d 69 67 68 74 20 74 61 6b 65 20 |ion'.might take | 00000bf0 61 20 73 68 6f 72 74 20 74 69 6d 65 20 70 72 6f |a short time pro| 00000c00 74 65 63 74 6f 72 20 73 69 6d 70 6c 79 20 65 6e |tector simply en| 00000c10 63 72 79 70 74 91 73 20 74 68 65 20 21 52 75 6e |crypt.s the !Run| 00000c20 49 6d 61 67 65 20 66 69 6c 65 20 69 6e 73 69 64 |Image file insid| 00000c30 65 0a 74 68 65 20 61 70 70 6c 69 63 61 74 69 6f |e.the applicatio| 00000c40 6e 20 64 69 72 65 63 74 6f 72 79 20 73 69 6e 63 |n directory sinc| 00000c50 65 20 74 68 69 73 20 69 73 20 75 73 75 61 6c 6c |e this is usuall| 00000c60 79 20 77 68 65 72 65 20 74 68 65 20 62 75 6c 6b |y where the bulk| 00000c70 20 6f 66 20 74 68 65 0a 70 72 6f 67 72 61 6d 20 | of the.program | 00000c80 69 73 20 73 74 6f 72 65 64 20 61 6e 64 20 74 68 |is stored and th| 00000c90 65 20 61 70 70 6c 69 63 61 74 69 6f 6e 20 77 69 |e application wi| 00000ca0 6c 6c 20 6e 6f 74 20 75 73 75 61 6c 6c 79 20 72 |ll not usually r| 00000cb0 75 6e 20 77 69 74 68 6f 75 74 20 69 74 2e 20 54 |un without it. T| 00000cc0 6f 0a 65 6e 63 72 79 70 74 20 61 6e 64 20 75 6e |o.encrypt and un| 00000cd0 65 6e 63 72 79 70 74 20 61 6e 20 61 70 70 6c 69 |encrypt an appli| 00000ce0 63 61 74 69 6f 6e 20 73 69 6d 70 6c 79 20 64 72 |cation simply dr| 00000cf0 61 67 20 69 74 20 6f 6e 74 6f 20 74 68 65 20 70 |ag it onto the p| 00000d00 72 6f 74 65 63 74 6f 72 20 69 63 6f 6e 0a 61 73 |rotector icon.as| 00000d10 20 79 6f 75 20 77 6f 75 6c 64 20 77 69 74 68 20 | you would with | 00000d20 61 20 66 69 6c 65 2e 20 49 66 20 61 20 21 52 75 |a file. If a !Ru| 00000d30 6e 49 6d 61 67 65 20 66 69 6c 65 20 63 61 6e 20 |nImage file can | 00000d40 62 65 20 66 6f 75 6e 64 20 74 68 65 6e 20 79 6f |be found then yo| 00000d50 75 20 77 69 6c 6c 20 62 65 0a 61 62 6c 65 20 74 |u will be.able t| 00000d60 6f 20 65 6e 63 72 79 70 74 20 69 74 2e 0a 0a 49 |o encrypt it...I| 00000d70 6e 74 72 6f 64 75 63 69 6e 67 20 55 6e 6c 6f 63 |ntroducing Unloc| 00000d80 6b 0a 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d |k.=-=-=-=-=-=-=-| 00000d90 3d 2d 3d 2d 0a 20 20 20 20 20 20 20 20 53 6f 20 |=-=-. So | 00000da0 66 61 72 20 73 6f 20 67 6f 6f 64 21 2c 20 79 6f |far so good!, yo| 00000db0 75 20 63 61 6e 20 6e 6f 77 20 65 6e 63 72 79 70 |u can now encryp| 00000dc0 74 20 66 69 6c 65 20 61 6e 64 20 61 70 70 6c 69 |t file and appli| 00000dd0 63 61 74 69 6f 6e 73 2c 20 62 75 74 20 61 74 0a |cations, but at.| 00000de0 74 68 65 20 6d 6f 6d 65 6e 74 20 69 74 20 6d 61 |the moment it ma| 00000df0 79 20 61 70 70 65 61 72 20 61 20 62 69 74 20 63 |y appear a bit c| 00000e00 75 6d 62 65 72 73 6f 6d 65 20 68 61 76 69 6e 67 |umbersome having| 00000e10 20 74 6f 20 64 72 61 67 20 74 68 65 20 66 69 6c | to drag the fil| 00000e20 65 73 20 6f 6e 74 6f 20 74 68 65 0a 69 63 6f 6e |es onto the.icon| 00000e30 20 62 61 72 2c 20 77 6f 75 6c 64 6e 27 74 20 69 | bar, wouldn't i| 00000e40 74 20 62 65 20 6e 69 63 65 20 74 6f 20 62 65 20 |t be nice to be | 00000e50 61 62 6c 65 20 74 6f 20 64 6f 75 62 6c 65 20 63 |able to double c| 00000e60 6c 69 63 6b 20 74 68 65 6d 20 61 73 20 69 66 20 |lick them as if | 00000e70 74 68 65 79 0a 77 65 72 65 20 74 68 65 69 72 20 |they.were their | 00000e80 6f 72 69 67 69 6e 61 6c 20 6e 6f 72 6d 61 6c 20 |original normal | 00000e90 66 69 6c 65 73 3f 20 6f 72 20 72 75 6e 20 61 6e |files? or run an| 00000ea0 20 65 6e 63 72 79 70 74 65 64 20 61 70 70 6c 69 | encrypted appli| 00000eb0 63 61 74 69 6f 6e 20 62 79 20 64 6f 75 62 6c 65 |cation by double| 00000ec0 0a 63 6c 69 63 6b 69 6e 67 20 6f 6e 20 69 74 3f |.clicking on it?| 00000ed0 20 77 65 6c 6c 20 72 65 61 64 20 6f 6e 20 74 6f | well read on to| 00000ee0 20 74 68 65 20 6e 65 78 74 20 73 65 63 74 69 6f | the next sectio| 00000ef0 6e 20 64 6f 63 75 6d 65 6e 74 65 64 20 69 6e 20 |n documented in | 00000f00 74 68 65 20 27 55 6e 6c 6f 63 6b 27 0a 61 70 70 |the 'Unlock'.app| 00000f10 6c 69 63 61 74 69 6f 6e 73 20 21 48 65 6c 70 20 |lications !Help | 00000f20 66 69 6c 65 2e 2e 2e 2e 2e 2e 2e 0a 0a 53 70 65 |file.........Spe| 00000f30 65 64 20 54 72 69 61 6c 73 0a 3d 2d 3d 2d 3d 2d |ed Trials.=-=-=-| 00000f40 3d 2d 3d 2d 3d 2d 0a 41 20 43 6f 6d 70 61 72 69 |=-=-=-.A Compari| 00000f50 73 6f 6e 20 6f 66 20 50 72 6f 74 65 63 74 6f 72 |son of Protector| 00000f60 20 61 6e 64 20 55 6e 6c 6f 63 6b 20 28 56 65 72 | and Unlock (Ver| 00000f70 73 69 6f 6e 20 31 2e 35 32 29 20 68 61 73 20 62 |sion 1.52) has b| 00000f80 65 65 6e 20 6d 61 64 65 20 77 69 74 68 20 74 68 |een made with th| 00000f90 65 0a 65 61 72 6c 69 65 72 20 76 65 72 73 69 6f |e.earlier versio| 00000fa0 6e 20 74 68 61 74 20 77 61 73 20 70 75 62 6c 69 |n that was publi| 00000fb0 73 68 65 64 20 28 56 65 72 73 69 6f 6e 20 31 2e |shed (Version 1.| 00000fc0 30 33 29 20 53 69 6e 63 65 20 56 65 72 73 69 6f |03) Since Versio| 00000fd0 6e 20 31 2e 30 33 20 48 61 6e 64 0a 77 72 69 74 |n 1.03 Hand.writ| 00000fe0 74 65 6e 20 41 52 4d 20 63 6f 64 65 20 68 61 73 |ten ARM code has| 00000ff0 20 62 65 65 6e 20 69 6e 74 72 6f 64 75 63 65 64 | been introduced| 00001000 20 74 6f 20 67 72 65 61 74 6c 79 20 73 70 65 65 | to greatly spee| 00001010 64 20 75 70 20 74 68 65 20 65 6e 63 72 79 70 74 |d up the encrypt| 00001020 69 6f 6e 0a 70 72 6f 63 65 73 73 2e 20 54 6f 20 |ion.process. To | 00001030 62 65 6e 63 68 6d 61 72 6b 20 74 68 65 20 69 6d |benchmark the im| 00001040 70 72 6f 76 65 6d 65 6e 74 73 20 73 6c 69 67 68 |provements sligh| 00001050 74 6c 79 20 6d 6f 64 69 66 69 65 64 20 63 6f 70 |tly modified cop| 00001060 69 65 73 20 6f 66 20 74 68 65 20 74 77 6f 0a 76 |ies of the two.v| 00001070 65 72 73 69 6f 6e 73 20 6f 66 20 75 6e 6c 6f 63 |ersions of unloc| 00001080 6b 20 77 65 72 65 20 75 73 65 64 20 77 68 69 63 |k were used whic| 00001090 68 20 69 6e 64 69 63 61 74 65 64 20 74 68 65 20 |h indicated the | 000010a0 65 78 61 63 74 20 74 69 6d 65 73 20 69 6e 76 6f |exact times invo| 000010b0 6c 76 65 64 2e 20 54 68 65 0a 62 65 6e 63 68 20 |lved. The.bench | 000010c0 6d 61 72 6b 20 77 61 73 20 70 65 72 66 6f 72 6d |mark was perform| 000010d0 65 64 20 6f 6e 20 61 20 52 49 53 43 20 50 43 20 |ed on a RISC PC | 000010e0 75 73 69 6e 67 20 61 20 33 30 4d 48 7a 20 41 52 |using a 30MHz AR| 000010f0 4d 20 36 31 30 20 70 72 6f 63 65 73 73 6f 72 0a |M 610 processor.| 00001100 28 66 69 74 74 65 64 20 77 69 74 68 20 31 4d 62 |(fitted with 1Mb| 00001110 20 6f 66 20 56 52 41 4d 20 74 6f 20 73 74 6f 70 | of VRAM to stop| 00001120 20 61 6e 79 20 22 73 6c 6f 77 2d 64 6f 77 6e 22 | any "slow-down"| 00001130 20 64 75 65 20 74 6f 20 74 68 65 20 73 63 72 65 | due to the scre| 00001140 65 6e 20 64 69 73 70 6c 61 79 29 2e 0a 54 68 65 |en display)..The| 00001150 20 74 65 73 74 20 69 6e 76 6f 6c 76 65 64 20 44 | test involved D| 00001160 65 2d 65 6e 63 72 79 70 74 69 6e 67 20 61 20 66 |e-encrypting a f| 00001170 69 6c 65 20 68 65 6c 64 20 69 6e 20 52 41 4d 20 |ile held in RAM | 00001180 64 69 73 63 20 74 6f 20 66 6f 72 6d 20 61 20 73 |disc to form a s| 00001190 65 63 6f 6e 64 0a 66 69 6c 65 20 61 6c 73 6f 20 |econd.file also | 000011a0 69 6e 20 52 41 4d 20 44 69 73 63 2e 20 28 41 20 |in RAM Disc. (A | 000011b0 52 41 4d 20 64 69 73 63 20 77 61 73 20 75 73 65 |RAM disc was use| 000011c0 64 20 74 6f 20 67 69 76 65 20 61 20 66 61 69 72 |d to give a fair| 000011d0 20 69 6e 64 69 63 61 74 69 6f 6e 20 6f 66 0a 73 | indication of.s| 000011e0 70 65 65 64 20 77 69 74 68 6f 75 74 20 74 68 65 |peed without the| 000011f0 20 65 66 66 65 63 74 73 20 61 73 73 6f 63 69 61 | effects associa| 00001200 74 65 64 20 77 69 74 68 20 48 61 72 64 64 69 73 |ted with Harddis| 00001210 63 20 22 62 6f 74 74 6c 65 2d 6e 65 63 6b 73 22 |c "bottle-necks"| 00001220 0a 72 65 73 74 72 69 63 74 69 6e 67 20 74 68 65 |.restricting the| 00001230 20 64 61 74 61 20 74 72 61 6e 73 66 65 72 29 0a | data transfer).| 00001240 0a 54 68 65 20 66 69 6c 65 20 75 73 65 64 20 77 |.The file used w| 00001250 61 73 20 65 78 61 63 74 6c 79 20 32 4d 62 20 69 |as exactly 2Mb i| 00001260 6e 20 73 69 7a 65 20 61 6e 64 20 77 61 73 20 28 |n size and was (| 00001270 64 65 29 65 6e 63 72 79 70 74 65 64 20 77 69 74 |de)encrypted wit| 00001280 68 20 74 68 65 0a 70 61 73 73 77 6f 72 64 20 22 |h the.password "| 00001290 41 63 6f 72 6e 43 6f 6d 70 75 74 65 72 73 22 20 |AcornComputers" | 000012a0 2c 20 74 68 65 20 72 65 73 75 6c 74 73 20 61 72 |, the results ar| 000012b0 65 20 61 73 20 66 6f 6c 6c 6f 77 73 3b 0a 0a 56 |e as follows;..V| 000012c0 65 72 73 69 6f 6e 20 4f 66 20 55 6e 6c 6f 63 6b |ersion Of Unlock| 000012d0 20 20 20 20 20 20 20 54 69 6d 65 20 54 61 6b 65 | Time Take| 000012e0 6e 2f 73 20 20 20 20 4d 42 2f 73 20 20 20 20 20 |n/s MB/s | 000012f0 20 20 20 20 20 20 20 53 70 65 65 64 20 69 6e 63 | Speed inc| 00001300 72 65 61 73 65 20 46 61 63 74 6f 72 0a 3d 3d 3d |rease Factor.===| 00001310 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d |================| * 00001350 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 0a 31 2e 30 33 20 |==========.1.03 | 00001360 28 32 39 2d 53 65 70 2d 31 39 39 33 29 20 20 20 |(29-Sep-1993) | 00001370 20 20 20 32 34 35 2e 33 33 20 20 20 20 20 20 20 | 245.33 | 00001380 20 20 20 30 2e 30 30 38 32 20 20 20 20 20 20 20 | 0.0082 | 00001390 20 20 20 20 20 31 20 28 72 65 66 65 72 65 6e 63 | 1 (referenc| 000013a0 65 20 6c 65 76 65 6c 29 0a 31 2e 35 32 20 28 30 |e level).1.52 (0| 000013b0 31 2d 41 75 67 2d 31 39 39 34 29 20 20 20 20 20 |1-Aug-1994) | 000013c0 20 20 20 31 2e 31 32 20 20 20 20 20 20 20 20 20 | 1.12 | 000013d0 20 31 2e 37 39 20 20 20 20 20 20 20 20 20 20 20 | 1.79 | 000013e0 20 32 31 39 0a 0a 0a 4e 6f 74 20 74 6f 6f 20 62 | 219...Not too b| 000013f0 61 64 20 69 73 20 69 74 3f 20 3b 2d 3e 0a 0a 0a |ad is it? ;->...| 00001400 50 6f 69 6e 74 73 20 74 6f 20 4e 6f 74 65 0a 3d |Points to Note.=| 00001410 2d 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d 0a 0a 4e |-=-=-=-=-=-=-..N| 00001420 2e 42 2e 20 42 6f 74 68 20 50 72 6f 74 65 63 74 |.B. Both Protect| 00001430 6f 72 20 61 6e 64 20 55 6e 6c 6f 63 6b 20 68 61 |or and Unlock ha| 00001440 76 65 20 74 6f 20 68 61 76 65 20 73 65 65 6e 20 |ve to have seen | 00001450 61 20 63 6f 70 79 20 6f 66 20 79 6f 75 72 20 21 |a copy of your !| 00001460 53 79 73 74 65 6d 20 6f 72 0a 21 53 63 72 61 70 |System or.!Scrap| 00001470 20 28 2a 29 20 66 6f 6c 64 65 72 20 62 65 66 6f | (*) folder befo| 00001480 72 65 20 74 68 65 79 20 77 69 6c 6c 20 6c 6f 61 |re they will loa| 00001490 64 2c 20 74 68 69 73 20 69 73 20 62 65 63 61 75 |d, this is becau| 000014a0 73 65 20 74 68 65 79 20 74 65 6d 70 6f 72 61 72 |se they temporar| 000014b0 69 6c 79 0a 6e 65 65 64 20 74 6f 20 73 74 6f 72 |ily.need to stor| 000014c0 65 20 73 63 72 61 70 20 66 69 6c 65 73 20 77 68 |e scrap files wh| 000014d0 69 6c 65 20 70 65 72 66 6f 72 6d 69 6e 67 20 28 |ile performing (| 000014e0 75 6e 29 20 65 6e 63 72 79 70 74 69 6f 6e 2e 0a |un) encryption..| 000014f0 0a 28 2a 29 20 20 2d 20 20 52 49 53 43 20 4f 53 |.(*) - RISC OS| 00001500 20 33 20 6f 6e 6c 79 0a 0a 0a 20 20 41 62 6f 75 | 3 only... Abou| 00001510 74 20 74 68 65 20 41 75 74 68 6f 72 0a 3d 2d 3d |t the Author.=-=| 00001520 2d 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d 3d 2d 3d |-=-=-=-=-=-=-=-=| 00001530 0a 49 66 20 79 6f 75 20 77 61 6e 74 20 74 6f 20 |.If you want to | 00001540 67 65 74 20 69 6e 20 74 6f 75 63 68 20 77 69 74 |get in touch wit| 00001550 68 20 74 68 65 20 41 75 74 68 6f 72 20 2c 20 63 |h the Author , c| 00001560 6f 6e 63 65 72 6e 69 6e 67 20 74 68 69 73 20 70 |oncerning this p| 00001570 72 6f 67 72 61 6d 20 6f 72 0a 61 6e 79 20 6f 66 |rogram or.any of| 00001580 20 74 68 65 20 6f 74 68 65 72 73 20 68 65 20 68 | the others he h| 00001590 61 73 20 77 72 69 74 74 65 6e 2c 20 77 65 74 68 |as written, weth| 000015a0 65 72 20 74 6f 20 70 72 61 69 73 65 20 74 68 65 |er to praise the| 000015b0 6d 20 6f 72 20 6d 61 6b 65 20 50 4f 4c 49 54 45 |m or make POLITE| 000015c0 0a 63 72 69 74 69 63 69 73 6d 73 2c 20 4f 52 20 |.criticisms, OR | 000015d0 6a 75 73 74 20 74 6f 20 68 61 76 65 20 61 20 63 |just to have a c| 000015e0 68 61 74 20 74 68 65 6e 20 79 6f 75 20 6d 61 79 |hat then you may| 000015f0 20 72 65 61 63 68 20 68 69 6d 20 45 6c 65 63 74 | reach him Elect| 00001600 72 6f 6e 69 63 61 6c 6c 79 2e 2e 2e 0a 0a 4f 75 |ronically.....Ou| 00001610 74 73 69 64 65 20 22 54 65 72 6d 2d 74 69 6d 65 |tside "Term-time| 00001620 22 3b 0a 0a 56 69 61 20 45 6d 61 69 6c 3a 20 20 |";..Via Email: | 00001630 20 50 65 74 65 72 52 48 40 61 72 63 61 64 65 2e | PeterRH@arcade.| 00001640 64 65 6d 6f 6e 2e 63 6f 2e 75 6b 0a 4f 72 20 44 |demon.co.uk.Or D| 00001650 69 72 65 63 74 20 74 6f 20 41 72 63 61 64 65 20 |irect to Arcade | 00001660 42 42 53 20 20 5b 54 65 6c 2e 20 2b 34 34 20 28 |BBS [Tel. +44 (| 00001670 30 29 38 31 20 36 35 34 20 32 32 31 32 20 5d 20 |0)81 654 2212 ] | 00001680 3a 20 50 65 74 65 72 20 52 65 65 76 65 73 2d 48 |: Peter Reeves-H| 00001690 61 6c 6c 20 20 28 75 73 65 72 20 23 31 31 36 39 |all (user #1169| 000016a0 29 20 20 0a 0a 0a 44 75 72 69 6e 67 20 22 54 65 |) ...During "Te| 000016b0 72 6d 2d 74 69 6d 65 22 3b 0a 0a 45 2d 6d 61 69 |rm-time";..E-mai| 000016c0 6c 20 61 64 64 72 65 73 73 20 22 50 65 6e 64 69 |l address "Pendi| 000016d0 6e 67 22 20 20 3b 2d 29 0a 0a |ng" ;-)..| 000016da