Jan 042018
 
CRYPTOR is a data encryption program for the PC. It works with any kind of files, ASCII, COM, BAS, EXE, WKS, etc, and is extremely fast.
File CRYPTOR.ZIP from The Programmer’s Corner in
Category Utilities for DOS and Windows Machines
CRYPTOR is a data encryption program for the PC. It works with any kind of files, ASCII, COM, BAS, EXE, WKS, etc, and is extremely fast.
File Name File Size Zip Size Zip Type
CRYPTOR.COM 12672 9393 deflated
CRYPTOR.DOC 6016 2416 deflated

Download File CRYPTOR.ZIP Here

Contents of the CRYPTOR.DOC file








C R Y P T O R




by

Paul
Troiano

on

January 27, 1985







DISCLAIMER:

THE PROGRAM CRYPTOR AND THIS MANUAL ARE PROVIDED ON AN "AS IS"
BASIS WITHOUT WARRANTY OF ANY KIND, EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
ENTIRE RISK AS TO QUALITY AND PERFORMANCE OF THE PROGRAM AND
THIS MANUAL RESTS SOLELY WITH THE USER. SHOULD ANY PART OF THIS
PROGRAM OR THIS MANUAL PROVE DEFECTIVE, THE USER WILL ASSUME THE
ENTIRE COST OF ALL NECESSARY REPAIR, SERVICING, AND CORRECTION.
IN NO EVENT WILL PAUL TROIANO BE LIABLE TO YOU FOR ANY DAMAGES,
INCLUDING ANY LOST PROFITS, LOST SAVINGS, OR OTHER INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE
THESE PROGRAMS OR THIS MANUAL, EVEN IF PAUL TROIANO HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS WARRANTY GIVES
YOU SPECIFIC LEGAL RIGHTS, AND YOU MAY HAVE OTHER RIGHTS WHICH
MAY VARY FROM STATE TO STATE. SOME STATES DO NOT ALLOW THE
EXCLUSION OF IMPLIED OR CONSEQUENTIAL DAMAGES SO PARTS OF THE
ABOVE MAY NOT APPLY TO YOU. BY OPERATING ANY OF THE ABOVE
PROGRAMS OR USING ANY PART OF THIS MANUAL, YOU ACKNOWLEDGE THAT
YOU HAVE READ THIS AGREEMENT, UNDERSTAND IT, AND AGREE TO BE
BOUND BY ITS TERMS AND CONDITIONS.

- - -

CRYPTOR.COM is a data encryption program for the IBM
PC. It works with any kind of files, ASCII, COM, BAS, EXE,
WKS, etc. It is extremely fast. CRYPTOR can encrypt a
133K file in less than 50 seconds! It will decrypt just as
fast.

When executed, it displays a brief title page which can
be cut short be pressing any key. After that it will ask
for an Input File. That's the file to be en/de-crypted.
Type in the complete filename, including the extension and
drive name if it's not the default.

CRYPTOR will then ask for an Output file. This is
where the en/de-crypted version of the file will go. Type
in a filename as in above. The one restriction is that it
CANNOT be the same as the input filename. CRYPTOR will
warn you if you try to do this. One addition to the
output is that it does not have to be a file. If you type
CON: instead of a filename, the output will go to the
screen.

CRYPTOR will then proceed to check to see if your
specified input file exists, if not, CRYPTOR will prompt
you to reenter it. Otherwise you will be asked to enter a
key. This key is extremely important. You must remember
it exactly, character for character (upper and lower case
ARE different), or you will not be able decrypt the file.

The longer the key, the better. But don't go
overboard. Some example keys are: "It slices, it dices,
but sorry no windows," "CUSTOMER DATA FILE 8345 10/84,"
"Super Fast Secure Data Encryption." Remember "Paul,"
"PAUL," "paul," "pAul," are all different keys and would
result in different output!

CRYPTOR will then ask whether you want to encrypt the
file or decrypt the file. Press "E" to encrypt it, or "D"
to decrypt it. Now the en/de-cryption will begin. CRYPTOR
uses a 16k memory buffer which increases its speed. If
your file is greater than 16k, it will do it in as many
16k parts as necessary.

When finished, CRYPTOR will ask if you want to en/de-
crypt another file. Press "Y" if so, otherwise press "N"
When decrypting a file, the procedure remains the same,
but you MUST use the EXACT key as when you encrypted it.
If you decrypt it with the wrong key, you must do the
reverse, encrypt it with the key you just tried to decrypt
it with, then use the correct one.

If you forget your key, forget the file. Unless your
willing to sit at your PC's keyboard for ten years
pounding out all the possible letter, number, and funny
graphic characters that the IBM will do, the file is lost
forever. Writing down your keys is not really a good idea
unless you keep it in a different location. For example
if you use this at work, you could write it down at home.
But if you make your keys sentences, they should be pretty
easy to remember. As stated above, I am not responsible
for damages done by this program. It's your responsibil-
ity to remember the keys.

Comments/questions can be sent to me at the following
address, but I do not guarantee that I will answer them
all, but I'll try my best. But the more feedback, the
better this program will become.

If you find this program of value, and use it often, a
contribution of $15 is encouraged. Doing so will result in
my personal good will towards you, and the strong possiblity
of more good, fast, low priced public domain software written
by me if I get the encouragment.

Paul Troiano
531 Village Rd. W.
Princeton Jct, NJ 08550






 January 4, 2018  Add comments

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)