Category : Utilities for DOS and Windows Machines
Archive   : STLTH65.ZIP
Filename : STEALTH.DOC

 
Output of file : STEALTH.DOC contained in archive : STLTH65.ZIP







ÛÛßßßß
ÛÛÜÜÜÜ ßßÛÛßß ÛÛßßß ÛÛßßÛ ÛÛ ßßÛÛßß ÛÛ Û
Í ÍÍ ÍÍðð ÍÍððÍ ÍÍ ÍÍ ÍÍððÍ
ÜÜÜÜÜÛ ÛÛ ÛÛÜÜÜ ÛÛ Û ÛÛÜÜ ÛÛ ÛÛ Û
6.5 (c) 1995 David Smith All rights reserved

For David Buckert, who Originated the Idea


You can order Stealth using your Visa/MasterCard!
Call 1-800-242-4775 and specify order #11241






========= THIS IS SHAREWARE =====================================

The shareware version is A DEMO of the full blown version!

It has the following disadvantages:

1. When using the /TAG option, the Shareware version only allows
processing ONE file. You can tag all you want.. but Stealth only
does ONE.
The REGISTERED version allows tagging unlimited files!

2. There's an ugly message and a beep at the end.

3. It STILL changes the date/time every 3 files (see further down
in this document for details)







========== QUICK START ! ==================================================


Put STEALTH.EXE in a "test" directory containing some archives.

Make sure STEALTH.EXE is in your "PATH=" statement.

Type: STEALTH.EXE

Now watch as all the archives are converted to your favorite
compressor! This program finds them all: PAK ZIP HAP SQZ LZH
plus tons more, then converts them to your 'favorite' archiver.

Now type: CD\

Notice that STEALTH.LOG has been written there. Use EDIT.COM
from DOS 5+ and look at it. Just type: EDIT STEALTH.LOG

All action from Stealth has been written, including dates, times
and DOS commands that it used.

Type: STEALTH /? for a quick help screen!



=============================================================================



Advanced users: Welcome to the world of Stealth. This program
is quite unique, because it will convert ANY archive to ANY
other archive. The advantages of this over other competition
programs (like ZZAP, SHEZ, etc...) is:


þ It supports every major archiver available! ARJ, ARC, LHA,
HAP, SQZ, DWC, PAK, ZIP 1.1 and 2.0, ICE, LHARC, LARC, UC2,
HYPER, SDN, FCOMPACT, LIMIT, RAR, COMPRESS, GZIP,
UUENCODE, UUDECODE and ZOO.

þ Allows tagging files! Just point and shoot the files you
want converted. No directory making, copying files, etc.

þ Lets you use your RAM disk or other faster drives as
a "work drive" for PKZIP or ARJ. This significantly speeds
up the compression process!

þ It can recognize PKZIP 1.1 files and PKZIP 2.0 "normal"
compressed files, then convert them to PKZIP -EX "extra"
compression. This will save you a ton of hard disk
space!

þ INTERNAL UUENCODE/UUDECODE support. When you get those
E-Mail files, just uncompress them with STEALTH! No extra
programs needed.

þ SYSOPS: Convert your PKZIP 1.1 .QWK packets with STEALTH.
Automatically tighten them to PKZIP 2.0 and save
a LOT of hard disk space.

þ Did you download some weird file off the Internet? Don't know
what in the world it's compressed with? Stealth will identify
it, AND uncompress it for ya.

þ Launch a "customized" file during conversion, which allows you UNLIMITED
possibilities for adding files/running a program during the conversion, plus MORE.

þ Use a DOZEN different virus scanners, and see EXACTLY what the scanner
reports back to Stealth

þ Tons of command line switches, allowing you to do EXACTLY
what you want. No guessing, no hassles.

þ Allows using LHA SFX self-extracting archives to be the
"target" archiver. That makes distribution of your
archives easy, since the recipient does not need a
program to un-archive your files!

þ Use ENVIRONMENTAL variables to "customize" your version.

þ Allows REMOVAL of a file's comment to a separate file.

þ Supports VENDINFO.DIZ: The new standard in vendor and BBS
information. The FIRST util to support this.

þ Uses MULTIPLE config files, so you can completely change
Stealth's operation from a batch file.

þ Leave PKZIP and ARJ -AV files alone, plus virus scanning
using any of the three most popular scanners!

þ Recognizes embedded directories, and can include them with
the conversion.

þ Is perfect for SYSOPS, since it can be run as an "event" to
update all .ZIP files, or be used as an upload processor.
Even add comments or strip them from the files...

þ You can "customize" STEALTH to almost any configuration.
Include some archives, but not others, recurse subdirectories,
leave SFX files alone, delete files after processing,
plus MORE.

þ Keeps an accurate log of all activity.

þ Lists archived files using its own 'internal' compression
viewer (super-fast!).

þ Allows overriding Stealth.cfg options on the command-line.

þ You can add extra BBS advertisements, add only your comments,
or evaluate the current files.

þ Re-comment your entire BBS file area with ONE command.

þ You can NOW pause, shell to DOS, or stop the program
by just pressing a key.

þ Search archives for FILE_ID.DIZ, DESC.SDI, *.SDA
{SDA.ID} or VENDINFO.DIZ

þ Configuration file for DOS and WINDOWS!






No other utility can do this! Plus STEALTH recognizes even
DWC, SQZ, and LARC self-extracting files. Please notice
that NO OTHER ARCHIVE program can do that.

Is hard disk space important? That PKZIP file you downloaded
yesterday... it is probably in 1.1 format. In fact, most of
your PKZIP'ed files are 1.1 or else 2.0 "normal" compressed.

Use STEALTH to maximize their compression. You can save 60,000
bytes of disk space on a few files, and several megabytes if
you re-archive every downloaded file. Doing that manually will
take FOREVER. And even batch files are no good, since they are
so slow. But, you can be assured of accuracy and speed with STEALTH!




STEALTH is extrememly simple:

1. Edit STEALTH.CFG to your satisfaction (see below for details)
(or just use STL_CFG.EXE to create your OWN stealth.cfg)

2. Include STEALTH.EXE and STEALTH.CFG in your path

3. Go to a directory containing some old archives.

4. Type: STEALTH.EXE (or STEALTH *.*)


Now note that Stealth processes the entire directory! The
only filespec you need (optional) is *.*. Stealth ruthlessly
converts everything it can find using your .CFG file.

NOTE: You can use STEALTH *.* or STEALTH *.ZIP .....

And wala, you are all done.

If you change your mind on archives, or want to change something,
STEALTH.CFG is easy to edit.

Take your favorite editor and change it around.
NOTE: If Stealth cannot locate STEALTH.CFG file, it will use
its own defaults.



=======================================================================

NEW! Stealth now has a variety of command line options
that will override the Stealth.cfg defaults.

USAGE: STEALTH [filespec] [options]


[altfile.CFG] can specify alternate .CFG file

[drive] A ram drive or faster disk you want PKZIP or ARJ
to use as their "work drive" when compressing.
/TAG Tag files to process
/X Give exact details in log file
/COMM Add the COMMENT file only (no conversion)
/EVAL Evaluation archive only (no conversion)
/+ Debug STEALTH process (messy output, but detailed!)
/ID Show files having FILE_ID.DIZ, DESC.SDI *.SDA
{SDA.ID} or VENDINFO.DIZ (new vendor info file)
/LIST List contents of archive file(s)
/GETCOM Get comment: Save into COMMENT.1
/SHORTLOG Keep Stealth's LOGfile under 40K

/RECURSE Recurse subdirectories when processing
/BREAKAV Break -AV sealed files
/2EXTRA Convert PKZIP 'normal' archive to -EXTRA compressed
/NODEL Do not delete files after processing
/EXPEXE Expand .EXE files
/ADDCOM Add comment to processed files
/STRCOM Strip comment from all files
/NOLOG Do not log activity
/SCAN Virus check and use McAfee's SCAN
/TBAV Virus check and use TBAV's TBSCAN
/F-PROT Virus check and use Frisk's F-PROT
/ENCODE UUencodes file(s) specified
/DECODE UUdecodes file(s) specified
/COMP Compresses file(s) using Internet/Unix .Z algorithm
/UNCOMP Uncompresses file(s) with Internet/Unix .Z algorithm
/GZIP Compresses file(s) using Internet/Unix .gz algorithm
/UNGZIP Uncompresses file(s) with Internet/Unix .gz algorithm
/CHECKALL Checks for viruses in ALL files, whether converted or not
/SLOW Stop after every major operation, in order to see what has transpired










ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ IMPORTANT NOTE: While Stealth is running, you can pause it, ³
³ shell to DOS, or do an emergency exit. ³
³ ³
³ Pressing the [spacebar] pauses Stealth. Any other key resumes. ³
³ Pressing the 'D' key shells to DOS. Just type: 'exit' to resume. ³
³ Pressing the [ESC] key exits Stealth immediately. ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ




You can NOW USE YOUR RAM DRIVES!
That's right. You can specify a ram drive, or a larger hard disk
to perform the compression on. This works with ARJ and PKZIP only.

To use: STEALTH *.* D:

Whereas D: is the drive you want PKZIP or ARJ to use as their
"work drives" when compressing files. This will significantly speed
things up. Valid examples of using a ram drive/or other disk:
REMEMBER: NO trailing backslash!

STEALTH *.ZIP /CHECKALL D:
STEALTH D:
STEALTH *.ARJ /SLOW D:
STEALTH *.ARJ F:





[altconfigfile.CFG] Stealth now can take multiple config files
on the command line! Now, instead of changing
STEALTH.CFG every five minutes, you can create
several different ones.

Examples: STEALTH C:\PCB\GEN\UPLOAD.CFG
Will force Stealth to use the UPLOAD.CFG config
file located in \PCB\GEN.
STEALTH E:\STLCFG\STEALTH5.CFG
Will use Stealth5.cfg file on the E: drive.

Valid Usage: STEALTH *.ZIP C:\STEALTH\PROCESS.CFG
STEALTH *.ARJ D:\TEMP\MY.CFG
STEALTH *.LZH C:\STEALTH\DAVE$S.CFG
STEALTH E:\UPL\UPLOAD8.CFG

IMPORTANT NOTE: The alternate config file MUST have a .CFG
extension. The filename can be anything,
but must have a .CFG ending!
If no config file is specified on the command
line, then Stealth still searches the DOS
path for STEALTH.CFG




/TAG This HOT new feature allows you to "tag" files you want
to convert/list/evaluate, etc.
Make SURE you specify /TAG before any other command line
options, so that STEALTH knows you want to TAG AND GO!

Cool usages:

STEALTH /TAG *.* /EVAL
STEALTH /TAG
STEALTH /TAG /ENCODE *.ZIP
STEALTH /TAG /LIST *.LZH



/X will provide a little more detailed information in STEALTH.LOG


/COMM if you are a SYSOP, and want to add a "comment" file to your
PKZIP and ARJ files, this is great!
Using the /COMM switch, you can quickly comment ALL YOUR
FILES in minutes.
For an extra bonus, turn on RECURSE SUBDIRECTORIES in the
config file, and watch as Stealth updates the comments on
every file you got!
*** NO OTHER ARCHIVE CONVERTER CAN DO THAT! ***


/EVAL if you wonder what kind of files you have, then run:
STEALTH *.* /EVAL then Stealth will show what the archive
types are without converting them.
This is kinda like a "preprocessor" for Stealth.


/+ will show a large amount of messy information on the screen,
detailing exactly how STEALTH is thinking, and what part of
the program it is in. That way, you can debug where a problem
is in case of a serious crash or lockup.


/ID Searches files for FILE_ID.DIZ, DESC.SDI *.SDA or {SDA.ID}
This is ideal for SySops, since many BBS programs require
a "description file" to update the main file listing.
Using:
STEALTH *.* /ID

allows quickly identifying files with no description!


/LIST List a single archive's contents.
This works on only ONE file at a time. Wildcards are
not allowed here. If you want to list a large number
of files, use the LIST environmental variable instead.

Usage: STEALTH test.zip /LIST
STEALTH shez.arj /LIST

*** NO OTHER ARCHIVE CONVERTER CAN DO THAT! ***


/GETCOM Get the comment from a .ZIP or .ARJ file, then
write it to COMMENT.1
This is useful if you see a really cool comment on
a compressed file, and would like to "leech" it, and
customize it with your OWN information!


/SHORTLOG The Stealth LOG file can get rather large, real
quick. Using /SHORTLOG will truncate the Stealth
log file when it gets over 40K.


/RECURSE Recurse subdirectories when processing. This is the
same as RECURSE SUBDIRECTORIES in Stealth.cfg. NOTE:
pathnames will not be uncompressed when recursing,
because of the recursion, endless loop that will get
involved.


/BREAKAV Break -AV sealed files. Some sysops or other people
put their own -AV stamp on files, which causes a problem
when you want to add a file, etc. This switch allows
processing files, and breaking that stamp.


/2EXTRA Convert PKZIP 'normal' archive to -EXTRA compressed.
NOTE: Your default archiver will be changed to PKZIP 2.0
if you use this switch. Be sure to include
PKZIP2 = convert in your config file, so to catch
all the older 2.0 -NORMAL compressed.


/NODEL Do not delete files after processing. Be sure to use this
if you're playing around with Internet files, so not to
erase something you wanted to keep!

/EXPEXE Expand .EXE files. Stealth analyses .EXE files and
recognizes ALL SELF-EXTRACTING compressed files.


/ADDCOM Add comment to processed files. Your COMMENT file must
be specified in your config file.


/STRCOM Strip comment from all files. If you ADD a comment, be
sure to not STRIP it also. That's a waste, since most
archivers automatically remove the current comment when
it adds one.


/NOLOG Do not log activity in STEALTH's LOG file.


/SCAN Virus check and use McAfee's SCAN. Make sure that SCAN.EXE
is somewhere in your path.


/TBAV Virus check and use TBAV's TBSCAN Make sure that TBSCAN.EXE
is somewhere in your path.


/F-PROT Virus check and use Frisk's F-PROT Make sure that F-PROT.EXE
is somewhere in your path.


/ENCODE UUencodes file(s) specified. UUENCODE allows transmitting
binary files over the Internet, or other E-MAIL channels.
Usage: STEALTH /ENCODE file(s)
So valid command lines would be:

STEALTH /ENCODE *.ZIP UUencodes all .ZIP files
STEALTH /TAG /ENCODE *.* Allows tagging files


/DECODE UUdecodes file(s) specified. UUENCODE allows transmitting
binary files over the Internet, or other E-MAIL channels.
Usage: STEALTH /ENCODE file(s)
So valid command lines would be:

STEALTH /DECODE *.UUE UUdecodes all .UUE files
STEALTH /TAG /DECODE *.* Allows tagging files


/COMP Compresses file(s) using Internet/Unix .Z algorithm
These are single files.. not multiple ones. You cannot
compress 100 files into one archive with COMPRESS, you
can only compress single files.
Usage: STEALTH /COMP file
You can easily use /TAG, etc to compress multiple single
filenames.

STEALTH /COMP *.ZIP Compresses all .ZIP files
STEALTH /TAG /COMP *.* Allows tagging files


/UNCOMP Uncompresses file(s) with Internet/Unix .Z algorithm
These are single files.. not multiple ones. You cannot
compress 100 files into one archive with COMPRESS, you
can only compress single files.
If you download a file from the Internet with a .Z
extension, use this to uncompress it!
Usage: STEALTH /UNCOMP file
You can easily use /TAG, etc to compress multiple single
filenames.

STEALTH /UNCOMP *.Z UUdecodes all .UUE files
STEALTH /TAG /UNCOMP *.* Allows tagging files


/GZIP Compresses file(s) using Internet/Unix .gz algorithm
These are single files.. not multiple ones. You cannot
compress 100 files into one archive with GZIP, you
can only compress single files.
Usage: STEALTH /GZIP file
You can easily use /TAG, etc to compress multiple single
filenames.

STEALTH /GZIP *.ZIP Gzip's all .ZIP files
STEALTH /TAG /GZIP *.* Allows tagging files


/UNGZIP Uncompresses file(s) with Internet/Unix .gz algorithm
These are single files.. not multiple ones. You cannot
compress 100 files into one archive with GZIP, you
can only compress single files.
If you download a file from the Internet with a .GZ
extension, use this to uncompress it!
Usage: STEALTH /UNGZIP file
You can easily use /TAG, etc to compress multiple single
filenames.

STEALTH /UNGZIP *.gz un-Gzip's all .gz files
STEALTH /TAG /UNGZIP *.* Allows tagging files


/CHECKALL Checks all compressed files in the current directory, whether they are converted or not.
This is FANTASTIC if you are preparing a CD-ROM, or distributing diskettes to
vendors/users. You can ensure no viruses are present before sending the programs
to thousands of people.

/SLOW Pauses after every major operation during Stealth so you can see what has transpired.
Many people asked for this switch, because Stealth is just TOO DAMN FAST!
Everything was scrolling by so quick, that no one could tell what was happening.
Don't use this if you want to run Stealth in a batch file! You'll have to keep pressing
keys every few seconds











===== EXAMPLES: ====================================================
STEALTH *.ZIP /X
STEALTH /LIST *.ARJ
STEALTH TEST.ZIP /GETCOM
STEALTH /TAG *.ZIP /COMM
STEALTH *.ZIP /X
STEALTH /TAG *.* /+ /NOLOG
STEALTH *.ARJ /NODEL /F-PROT /NOLOG /X
STEALTH /EVAL (the *.* is assumed)
STEALTH /ID (the *.* is assumed)
STEALTH /TAG /NODEL (the *.* is assumed)
======================================================================


Any command line options can be given in ANY order. The only rule is:

ALWAYS SPECIFY /TAG before any other options (if you want to /TAG files)

IE: The following are treated the same ->

STEALTH *.ZIP /NOLOG /X /NODEL /TBAV
Stealth /nolog /nodel /tbav *.zip /x
Stealth /x/tbav/nodel/nolog *.zip


========================================================================










IMPORTANT NOTE: PKZIP 2.0 "stored" files are identical to PKZIP 1.1
format. Therefore, all 2.0 "stored" archives are
flagged as version 1.1.










========= The New STEALTH Environmental Variable =============================

Starting in v5.0, Stealth has a new environmental variable.

You can set it by using: SET STEALTH=option;option;option;option

on the command line, or from within a batch file. Note that each
option is separated by a ';', which is similar to the DOS PATH.

Valid Options:

SHORTLOG - Truncate Stealth's logfile when it
becomes longer than 40K

F-PROT - Turn on virus scanning, and use
F-PROT as the scanner

TBAV - Turn on virus scanning, and use
TBSCAN as the scanner

SCAN - Turn on virus scanning, and use
McAfee's VIRUSCAN as the scanner

NOLOG - Do not use a log file
(Default: Use a log file)

LIST - List files before processing

STRCOM - Strip comment

ADDCOM - Add comment (a COMMENT file must
be specified in STEALTH.CFG)

EXPEXE - Expand EXE files (self-extracting
compressors)

NODEL - Do not delete original files
(Default: Delete original archives)

2EXTRA - Make .ZIPs to extra-compression
(PKZIP2 must be the default compressor
in STEALTH.CFG)

BREAKAV - Break -AV seal on .ZIP and .ARJ files
(Default: Never break -AV files)

RECURSE - Recurse subdirectories
(Default: Do not recurse subdirs)

CHECKALL - Checks all compressed files in current directory, whether they are
converted or not.

SLOW - Pauses Stealth after every major operation.



Valid Usage: SET STEALTH=2EXTRA;LIST;BREAKAV
SET STEALTH=RECURSE;NOLOG;ADDCOM;SHORTLOG

Explained Usage: SET STEALTH=RECURSE;NOLOG;ADDCOM;SHORTLOG
   
³ ³ ³ ³
Recurse subdirs ÄÄÄÄÄÄÄÄÄÙ ³ ³ ³
Don't use a logfile ÄÄÄÄÄÄÄÄÙ ³ ³
Add a comment file ÄÄÄÄÄÄÄÄÄÄÄÙ ³
Truncate log when over 40K ÄÄÄÄÄÄÄÄÙ



ÖÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ·
º IMPORTANT NOTE: Anything in the STEALTH environmental variable º
º will over-ride the settings in Stealth's º
º CONFIG file. º
º IE: If BREAKAV is set to OFF in Stealth.Cfg, º
º and BREAKAV is in STEALTH's variable, then º
º -AV files will be broken. º
ÓÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĽ







================ WHAT IS STLAUNCH.BAT? ================================

Starting with version 6.2, Stealth now has the capability to do
ANYTHING during processing!

After the compressed file is expanded, Stealth looks for a file
named STLAUNCH.BAT in your path. If it finds it, it runs it!

BE CAREFUL: Make sure you erase it after you have no more use for it!
The last thing you want is to be surprised by it
adding/deleting/moving files.

The parameters passed to STLAUNCH.BAT are:

1. The full path+filename of the ORIGINAL file.

ie: C:\UTILS\LIST90.ARJ

2. The full path of the expanded files.

ie: C:\UTILS\DAVETMP



The things you can do are unlimited!

Here are a few ideas:

1. Virus scan your the expanded files with 20 other virus scanners.
This is great for you paranoid people:

STLAUNCH.BAT would consist of: @echo off
c:\tbav\tbscan %2\*.*
if errorlevel == 2 goto BAD
goto STOPME
:BAD
beep
@echo FILES ARE INFECTED
pause
move %1 c:\BADFILES
exit
:STOPME

2. If you run a bulletin board, or are a Shareware author
(like myself 🙂 ), add an advertisement file to your archives!

STLAUNCH.BAT would consist of: @echo off
copy C:\ADS\COOL_AD.TXT %2


3. If some jerk from a competing bbs put his advertisement in
EVERY SINGLE ARCHIVE you downloaded, delete them!

STLAUNCH.BAT would consist of: @echo off
delete %2\BBS.AD

4. If you want to format your hard drive before every conversion:

(just kidding!)




















========= WHAT IS THE STLWCFG.EXE FILE? =====================================

Stlwcfg stands for Stealth for Windows CONFIG editor.

You can crank up Windows 3.x and edit STEALTH.CFG using
this great, colorful Windows configuration editor!


You must have VBRUN300.DLL in your Window's SYSTEM directory
to run it.

To use this editor, choose FILE/NEW from your Program Manager,
then add STLWCFG.EXE to any group you choose. The pretty icon
should be on your desktop.

Then, double click on it to pull up the neat editor.
Click on your favorite options, or import any current STEALTH.CFG
file. Then, go to the second page, and save your config.

If you used Stealth before, it should be REAL simple to learn.











========= USING STEALTH.CFG FILE ============================================

Included here is STEALTH.CFG, a configuration file for this program.

Use the enclosed STL_CFG.EXE program for a quick and easy way
to create Stealth.cfg. Just fill in the blanks, and change
the values to what you like best.

Press [F10] to save Stealth.cfg and exit.





Now you can change it by using a text editor, and type out
which options you want to use. The format is:

---------------------------------------------------------------------
Put the archiver you want everything converted to.

[archiver] = archiver

Whereas archiver could be:
PKZIP1 ARJ LHA DWC QWKZIP
PKZIP2 PAK ZOO ARC6 LHASFX
SQUEEZE ICE HAP LARC LIMIT
HYPER FCOMPACT LHARC UC2 RAR
---------------------------------------------------------------------
Next, put all the archives you want converted to YOUR archiver.
For instance, if you put LHA here, all .LZH files will be
converted.

[archiver] = convert

Whereas archiver could be:
PKZIP1 ARJ LHA DWC
PKZIP2 PAK ZOO ARC6
SQUEEZE ICE HAP LARC QWKZIP
HYPER UC2 LIMIT LHARC RAR
---------------------------------------------------------------------
Now, do you want to strip all comment files in the archivers
found?

NO = strip comment
---------------------------------------------------------------------
And do you want to add your own comment file to the archives
that are converted?

NO = add comment
---------------------------------------------------------------------
Then, what comment file do you want added? (leave this line
out if you want to comment added)
NOTE: Make sure that the filename is left justified! No spaces
should be on the left of the filename!

B:\COMMENT.DAV = comment file
---------------------------------------------------------------------
When .EXE self-extracting archives are found, do you want
them extracted?

NO = executables
---------------------------------------------------------------------
If PKZIP 2.0 files are found that have been compressed using
"normal" compression, do you want them to be re-compressed
using "EXTRA" compression?
NOTE: This will immediately change your ARCHIVER to PKZIP 2.0

NO = make ZIPs -EX
---------------------------------------------------------------------
Do you want to recurse the subdirectories? If YES, then all
directories beneath the current one will be processed also!

NO = recurse subdirs
---------------------------------------------------------------------
As a default, STEALTH logs all activity into \STEALTH.LOG.
This makes it easy to see what happened, and keep track of
what went where.

yes = create log file
\STEALTH.LOG = log file location
---------------------------------------------------------------------
Also as default, STEALTH deletes the old archives, so that
your hard disk is not cluttered with old and new versions.
That would make it extremely difficult to sort through them!

yes = delete files
---------------------------------------------------------------------
If you want to scan your archives for viruses, you can utilize
any of the three most popular virus scanners avaiable. Just
include the "check for viruses" line, then choose one of the
scanners listed below (NOTE: You can only specify one)

yes = CHECK FOR VIRUS

VIRUSCAN = VIRUS PROGRAM /* McAfee's */
F-PROT = VIRUS PROGRAM
TBSCAN = VIRUS PROGRAM
AVPRO = VIRUS PROGRAM
---------------------------------------------------------------------
Many PKZIP and ARJ files have a -AV seal attached to them.
Most people (including SYSOPS) may not want to break those
sealed files, since a "sealed file is a safe file".
If a PKZIP or ARJ is -AVed, then you can be pretty sure no
one has tampered with it.

no = break AV files
---------------------------------------------------------------------
STEALTH has an internal "archive viewer" that allows you to
see what's inside an archive before/as it is processed. This
will allow a clear representation of the file. Actually,
the viewer is FASTER than any other I have found. Try it out!

yes = list files before processing



















============ ATTENTION SYSOPS ===========================================

STEALTH 6.5 HAS LOADS OF NEW OPTIONS DESIGNED FOR YOU!

Great additions:

Try out the STLAUNCH.BAT to perform your own customized actions
during the archive conversions!

Use /CHECKALL to check all your uploads, no matter whether they
need converting or not!




1. SYSOPS: Compress all your .QWK files into PKZIP 2.0 tighter
compression. Just specify
QWKZIP = archiver
and QWKZIP = convert

Leave out all other '=archiver' and '=convert' lines, so not
to convert EVERYTHING to a .QWK packet!

Just use: STEALTH *.QWK to convert all of them!


2. Full Internet support. Everything you download, you can
convert via STEALTH. Don't worry about which is which, just
use STEALTH /EVAL to find out what the archiver is!


3. Use the NEW /TAG feature to tag and go! No more sorting, copying,
moving files, etc. in order to get the files you want converted.



STEALTH can save you tons of hard disk space, and serve as a
processor for uploads.

If some new member uploads you an ancient archive (PAK or ZOO),
or some unknown self-extracting .EXE archive, how do you
find out what it is?

It could be a cool game that everybody likes, but the lamer has
given you a useless file.

STEALTH will instantly recognize the .EXE file as DWC, ZOO, PAK,
ARJ, PKZIP 1.1, PKZIP 2.0, ARC, LHA, etc.
Then it will convert it to your BBS's archiver, with no problem.
Even embedded paths are saved!

**** Included is UPLOAD.CFG configuration for upload processing ****


Is your BBS's hard disk getting full? Run STEALTH as an event
once a week and convert all of your PKZIP 1.1 and 2.0 "normal"
compressed files to PKZIP 2.0 "EXTRA" compression!
That will save MEGABYTES of space (a friend of mine saved over
2 megabytes on one directory of uploads)

**** Included is EVENT.CFG configuration for event processing ****


Plus you can comment all the processed files with your own
BBS comment file, or simply strip the old comments from
them.








========= PLEASE READ THIS! ===============================================

Please think about what you put into STEALTH.CFG before starting
the program.

1. If your "Archiver" and "convert" file types are the same, then
all files will be processed twice:

PKZIP2 = Archiver
PKZIP2 = convert
PAK = convert
ARJ = convert

because STEALTH will convert all the .ARJ and .PAK files, then
convert them again because they are now PKZIP 2.0 files!


IMPORTANT NOTE: If you specify MAKE ZIPS -EX, then Stealth assumes
you want to use PKZIP 2.0 as your default archiver.
It will process files as such!


2. If you have 20 archives with the same name:

ANOTHER.PAK
ANOTHER.ARJ
ANOTHER.ZIP
ANOTHER.SDN
ANOTHER.ZOO
ANOTHER.ARC

all of the contents of ALL THE ARCHIVES will be converted into
your new file. So, if you said: PKZIP2 = Archiver
then ANOTHER.PAK's contents will be stuffed into ANOTHER.ZIP,
and ANOTHER.ARJ's contents will be also. And you will lose
the original files. So please don't name several archives
the same file name, then include all those types in your
STEALTH.CFG file!

3. Embedded directories are NOT processed if you use:

yes = recurse subdirs

Why? Because when you re-compress the file, then you will include
all subdirectories under the current one. And if you are in
the root directory, your whole hard drive will be sucked up into
the new compressed file!

4. Please don't STRIP a file's comments, then ADD a comment. If you
ADD a comment, then the old one is automatically deleted.

5. Please make sure ALL FILENAMES IN STEALTH.CFG are left justified!
For example, your comment file should look like:

º
ºC:\PCBOARD\COMMENT.FIL
º
instead of:

º
º C:\PCBOARD\COMMENT.FIL
º

Because to get the filename, an ASCII 'zero' is placed wherever
a 'space' character is. And the filename won't register unless
it's left justified.



NOTE: PKZIP 2.0 "stored" files are identical to PKZIP 1.1
format. Therefore, all 2.0 "stored" archives are
flagged as version 1.1.



7. Due to the "human" nature of my C++ compiler, if you have
a THICK layer of subdirectories (more than 10), and each have
the exact same filenames, one or two files may be skipped.
This is because the Data Transfer Area of DOS thinks that it
already processed that file. This should also be fixed in the
next version.

8. Also NOTE: Any unsuccessful de-compression of a file will
result in the original not being erased. So if STEALTH does
not get an errorlevel of 0, then it aborts the erasure process.

9. If you're using QWKZIP, make sure you ONLY have QWKZIP = ARCHIVER
and QWKZIP = CONVERT in your config file. If you include any
more '= CONVERT' lines, then it will screw everything up, and you'll
end up converting files you don't want!










=================== WHERE IS DWC? =========================================

UC2, ARJ, PKZIP, DWC, PAK and all the other archivers can be found at:

LIMIT is also a GREAT archiver (download LIMIT10.ZIP)


ÖÄÄÄÄÄ¿ Ò Â
º ³ º ³
ÇÄÄÄÄÄ´ ÖÄÄ¿ ÖÄÒÄ¿ ÄÒÄ Ó· ÚÙ ÄÒÄ ÒÄÄ¿ Ò Â ÖÄ¿
º ³ º ³ º º º ³ º ÇÄÂÙ º ³ ÓÄ¿
Ð Á Ð Á Ð ÄÐÄ ÓÄÄÄÙ ÄÐÄ Ð Á ÓÄÄÙ ÓÄÄÙ
ÜÛÛÛÛÛÛÛÛÜ ÜÛÛÛÛÛÛÛÜ ÜÛÛÛÛÛÛÛÜ ÜÛÛÜ ÜÛÛÜ
(214) 606-1485 ÛÛÛß ßÛÛÛ ÛÛÛÛßßßÛÛÛÛ ÛÛÛÛß ßÛÛÛ ÛÛÛÛ ÜÛÛÛÛß
ÛÛÛÜ ÜÛÛÛ ÛÛÛ ÛÛÛ ÛÛÛÛ ÛÛÛÛÛÛÛÛß
ÛÛÛÛÛÛÛÛÛß ÛÛÛ ÛÛÛ ÛÛÛÛ ÛÛÛÛÛÛÛÛÜ
1.2 GIG online ÛÛÛÛ ßÛÛÛÛÜ ÛÛÛÛÜÜÜÛÛÛÛ ÛÛÛÛÜ ÜÛÛÛ ÛÛÛÛ ßÛÛÛÛÜ
Thousands of Files ßÛÛß ßÛÛß ßÛÛÛÛÛÛÛß ßÛÛÛÛÛÛÛß ßÛÛß ßÛÛß


The ONLY antivirus Board in DFW

We have: Boot disks for DOS versions 3.0 - 6.2 (IBM and Microsoft)
Up to-the-minute new virus information
The hottest and newest games (Apogee, Epic, + others)
Download every COMM protocol imaginable - we got them all!
We have more compression programs than all DFW boards, combined!
More antivirus text files than you can read
We are the HUB in Dallas/Fort Worth for Virus Researchers -
nowhere else can you obtain more information



þ 100 AntiVirus programs (the newest SCAN, TBAV, F-PROT -> -AV sealed)
þ FidoNet, RIMENet, WildNet, USNetmail virus echos + VIRUS_NFO

þ Hundreds of compression programs þ Unlimited free downloads!
þ Download 2 MEG on your first call þ The Fastest LogOn in DFW
þ 10 protocols þ 14.4 Zoom v32bis
þ 100 FILE areas þ Only twenty bucks a year!
þ We add 2,000+ NEW files each month

þ The OFFICIAL support BBS for Stealth, Ultra Toolbox, Exe Master,
Protect EXE/COM, Sound Effects 6.1 and Auto-Net
þ Distribution site for HyperDisk, ExtraDos, NameBase and Dave Utils


24 hours / 7 days --> (214) 606-1485



The SysOp is a great guy, and has all of these files available
for immediate download! Come and get them!






ÖÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ·
º WHO IS DAVID BUCKERT? º
º º
º David Buckert is a BBS fanatic that regularly uses ROBOCOMM to º
º download the newer files from all Dallas BBS's and upload them º
º to all other Dallas BBS's. This is fantastic! All the boards º
º in town have new and updated files because of his generosity. º
º º
º Do you have a "David Buckert" in your area? If not, I suggest º
º becoming one. Uploading new stuff to all the BBS's helps º
º everybody, and enhances an "area" of town. More people will º
º hop on their terminals and call around, because there's great º
º stuff everywhere! º
º º
º Come on guys, boring subscription services like CompuServe, º
º Delphi, Prodigy, etc are leeching subscribers and costing º
º too many people too much money. KEEP IT LOCAL! Make new º
º friends and get to know the people computing in your area. º
º º
º Have some parties, enjoy the "TERMINAL" experience. º
ÓÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĽ










============= REGISTRATION ================================================


ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ ³
³ Registration is only $25.00 + $5.00 shipping ³
³ ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

For technical support:

BBS (817) 606-1485
E-MAIL [email protected]



You can order Stealth using your Visa/MasterCard!
Call 1-800-242-4775 and specify order #11241


NOTE: Technical support is for a limited amount of time
to unregistered users. Once registered, you get
all the technical support you want.
If you have any substantial problems, let me know.


*** PERSONALLY CONFIGURED VERSIONS OF STEALTH ARE AVAILABLE ***

*** Leave a note on one of the technical support numbers ***
*** to arrange the configuration and price ***















============= TECHNICAL STUFF =============================================

Because of the complicated nature of Stealth, problems may arise.
Here is a list of common difficulties people have written me with:


1. Stealth does not process ARJ files properly.

You need at least version 2.39 of ARJ in order to process the switches
I use. Of course, the registered Stealth offers customized switches!


2. I use STEALTH D:\FILES\*.* and nothing happens.

Of course not. You must be in the directory with your archivers in
order to convert them. If you want to do the above, try:
D:
CD\FILES
STEALTH *.*


3. I used Stealth on several PKZIP 2.0 files to make them -EXTRA
compressed, but nothing happened.

In cases where it could be ANYTHING gone wrong, use the following
special switch:

STEALTH *.* /X/+ > LOGIT

This will run Stealth, show technical debugging information that I
need, and pipe the output into a new file called "LOGIT".
Now just send the file "LOGIT" to me, along with your STEALTH.LOG,
and I can sort out what the problem is.

Just upload the files for me at the AntiVirus ROCK BBS, on CompuServe,
or simply mail them to me at my home address on a disk (any size).


4. To extract the COMMENT.1 file when using the /GETCOM
switch, Stealth 'tests' the file using the needed
archiver, then strips the comment from the captured
text. This may take a while when 'testing' larger
archives.





============ ERRORLEVELS ==================================================

When Stealth exits, it returns the following errorlevels:



Errorlevel = 0 success
1 virus found
2 no files found
3 ONLY help screen printed
4 DAVETMP directory was not deleted
5 STEALTH.CFG had problems..
6 Spawn Error
7 aborted!














ÛÛÛÛÛÛÛ» ÛÛ» ÛÛ» ÛÛÛÛÛÛ» ÛÛÛÛÛÛ» ÛÛÛÛÛÛ» ÛÛÛÛÛÛ» ÛÛÛÛÛÛÛÛ» ÛÛÛÛÛÛ»
ÛÛÉÍÍÍͼ ÛÛº ÛÛº ÛÛÉÍÍÛÛ» ÛÛÉÍÍÛÛ» ÛÛÉÍÍÍÛÛ» ÛÛÉÍÍÛÛ» ÈÍÍÛÛÉÍͼ ÈÍÍÍÍÛÛ»
ÖÄÄÛÛÛÛÛÛÛ» ÛÛº ÛÛº ÛÛÛÛÛÛɼ ÛÛÛÛÛÛɼ ÛÛº ÛÛº ÛÛÛÛÛÛɼ ÛÛº ÜÛÛÛÉÐÄ·
º ÈÍÍÍÍÛÛº ÛÛº ÛÛº ÛÛÉÍÍͼ ÛÛÉÍÍͼ ÛÛº ÛÛº ÛÛÉÍÍÛÛ» ÛÛº ßßÍͼ º
º ÛÛÛÛÛÛÛº ÈÛÛÛÛÛÛɼ ÛÛº ÛÛº ÈÛÛÛÛÛÛɼ ÛÛº ÛÛº ÛÛº ÛÛ» º
º ÈÍÍÍÍÍͼ ÈÍÍÍÍͼ Èͼ Èͼ ÈÍÍÍÍͼ Èͼ Èͼ Èͼ Èͼ º
º º
º º
º Support for this program is available in the following ways: º
º º
º º
º ÖÄÄ¿ ÖÄÄ¿ ÖÄÒÄ¿ ÒÄÄ¿ Ò Â ÖÄ¿ ÒÄÄ¿ ÒÄÄ¿ Ò Â ÒÄÄ¿ º
º º º ³ º º ³ ÇÄÄÙ º ³ ÓÄ¿ ÇÄ ÇÄÂÙ Ó·ÚÙ ÇÄ º
º ÓÄÄÙ ÓÄÄÙ Ð Ð Á Ð ÓÄÄÙ ÓÄÄÙ ÐÄÄÙ Ð Á ÓÙ ÐÄÄÙ º
º User ID: 71441,2723 º
º I usually log on every other day and check my mail. º
º º
º º
º INTERNET: [email protected] º
º º
º º
º ÜÜÜÜÜÜ ÜÜÜÜÜÜ ÜÜÜÜÜÜÜ º
º Û ÜÜ ÛÜ Û ÜÜ ÛÜ Û ÜÜÜÜÛ º
º Û ÜÜÜ Û Û ÜÜÜ Û ÛÜÜÜÜ Û º
º ÛÜÜÜÜÜÛ ÛÜÜÜÜÜÛ ÛÜÜÜÜÜÛ º
º Drop me a line on the AntiVirus ROCK Bulletin Board º
º David Smith (214) 606-1485 º
º º
º º
º ÜÛÛÜ ÜÛÛÜ ÜÛÛÛÛÛÛÛÜ ÜÛÜ ÜÛÛÜ º
º ÛÛÛÛÛÜÛÛÛÛÛ ÛÛÛÛßßßÛÛÛÛ ÛÛÛÛÛ ÛÛÛÛ º
º ÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛÛÜÜÜÛÛÛÛ ÛÛÛÛÛ ÛÛÛÛ º
º ÛÛÛÛ ÛÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛ ÛÛÛÛ º
º ÛÛÛÛ ÛÛÛÛ ÛÛÛÛ ÛÛÛÛ ÛÛÛÛÛ ÛÛÛÛÜÜÜÜÜÜÜ º
º ßÛÛß ßÛÛß ßÛÛß ßÛÛß ßÛß ßÛÛÛÛÛÛÛÛß º
º Write to: º
º º
º David Smith º
º 1104 Mason Dr. º
º Hurst TX 76053 º
º º
ÓÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĽ







  3 Responses to “Category : Utilities for DOS and Windows Machines
Archive   : STLTH65.ZIP
Filename : STEALTH.DOC

  1. Very nice! Thank you for this wonderful archive. I wonder why I found it only now. Long live the BBS file archives!

  2. This is so awesome! 😀 I’d be cool if you could download an entire archive of this at once, though.

  3. But one thing that puzzles me is the “mtswslnkmcjklsdlsbdmMICROSOFT” string. There is an article about it here. It is definitely worth a read: http://www.os2museum.com/wp/mtswslnk/