Category : Utilities for DOS and Windows Machines
Archive   : STLTH65.ZIP
Filename : WHATS.NEW

Output of file : WHATS.NEW contained in archive : STLTH65.ZIP

º º
º ÛÛßßßß º
º ÛÛÜÜÜÜ ßßÛÛßß ÛÛßßß ÛÛßßÛ ÛÛ ßßÛÛßß ÛÛ Û º
º Í ÍÍ ÍÍðð ÍÍððÍ ÍÍ ÍÍ ÍÍððÍ º
º 6.5 (c) 1995 David Smith All rights reserved º
º º

ALSO: The null pointer assignment comes from how I delete files
when using /CHECKALL.

If you are a registered user, call (214) 606-1485 for a new copy.
Login as a new user, then drop me a line via the 'C' comment

If you have an Internet account, you may reach me at [email protected]
and I will E-MAIL you a new copy. COMPUSERVE members: E_MAIL me
on the Internet. Use INTERNET:[email protected] as my address, and
you can utilize regular mail functions.

Your old registration keys will NOT work with this and future versions.

Thanks to my greatest beta tester: David Buckert, who basically
designed this version of Stealth.

================= Version 6.5 ===================================

When virus scanning, Stealth now reports the EXACT file and EXACTLY
what scanner found it in your log file. Make sure your log files
are on !

When out of memory, or other errors occur, Stealth now reports this
to the log file, and keeps running. This allows running Stealth
in batch files, without worrying about it exiting suddenly if
it runs out of memory.

Updated .SDN extensions to reflect .ARJ instead of .PAK.

RAR 1.52 is now supported.

================= Version 6.2 ===================================


That's right. You can specify a ram drive, or a larger hard disk
to perform the compression on. This works with ARJ and PKZIP only.

To use: STEALTH *.* D:

Whereas D: is the drive you want PKZIP or ARJ to use as their "work drives"
when compressing files. This will significantly speed things up.
Valid examples of using a ram drive/or other disk:



After Stealth expands the archive, it searches your PATH
for STLAUNCH.BAT. If found, it will run it.

Parameters are: 1. Full path+filename of the old archive
2. Full path where the expanded files are

This allows doing UNLIMITED things during every conversion. Read
STEALTH.DOC for more ideas!

Added /CHECKALL, which allows you to check all archives, whether they
are compressed or not. This is great for people preparing a CD-ROM,
or distributing lots of archives.. because it lets you scan everything
in one step, and make SURE its clean.

Added /SLOW, which pauses Stealth after every major step. You can then
see what the hell's going on while its running (You should see it FLY
on my 486-66.. I use /SLOW quite a bit!)

Made the log file much more detailed, and to the point. No more expanding,
compressing crap.. it shows you EXACTLY what the file is, and what it's
converted to.

I added BIG TIME detail to the virus scanning options. If the scanner
finds something, Stealth will log EXACTLY what the virus scanner said:
Ie: No files found, suspicious files, scanner is corrupted, etc.

I eliminated the TIME/DATE changes in the unregistered version. You don't
have to worry about your archives being dated 01/01/2010 ANY MORE!

Added details to the final stat screen:

1. How many files were infected with a virus.
2. How many files had suspicious contents (the virus scanner tags this info)
3. Files that were -AV stamped.
4. Number of errors that occured while extracting the archives.
5. Number of errors that occured while compressing the archives.
6. Number of errors that occured while commenting the archives.

That way, if the info scrolls by too fast while it's converting,
you can look at the end to see how many files were infected,
suspicious, etc.

================= Version 6.1 ===================================

Added a TAGGING files option, that allows point and shoot operation
for Stealth. This makes life MUCH easier.
Use the /TAG command line switch.

Added UUENCODE/UUDECODE internal support. You can easily translate
all your files into UUENCODE form, for sending over E-MAIL channels,
or you can point and shoot convert your OWN e-mail files from the
Use the /ENCODE or the /DECODE command line switches.

Sysops can now re-compress old .QWK packets, compressed with PKZIP 1.1
and transform them into 2.0 -EXTRA. Many bulletin boards use PKZIP 1.1
to maintain compatibility with older boards. Re-compressing them will
save TONS of disk space for sysops.
NOTE: Make sure to specify QWKZIP = archiver
and QWKZIP = convert
in your .CFG file, and remove all other lines with "archiver"
or "convert". Otherwise, everything will become a .QWK packet 🙂

Added GZIP, COMPRESS, and RAR support. This will allow you to uncompress
just about every file you find off the Internet.
Use the /COMP /UNCOMP /GZIP /UNGZIP command line options.
If in doubt, what the archiver might be, use STEALTH /EVAL *.* to
evaluate the file type. It will correctly find all of these.

You can do about ANYTHING on the command line. Before, you had to
create an extra .CFG file, or set the environment variable. Now, you
can adjust anything on the command line. This makes it easier to
have sudden changes.
Also: You can mix/match switches, and put them in ANY order you choose.

More accurate logging, and better detail of what's going on when
Stealth is running.

================= Version 5.0 ===================================

1) You can now specify a different CONFIG file on the command
line! That means you can have 35 or 100 different config
files, all of which are designed to fit your different needs.
This eliminates the need to change your entire STEALTH.CFG
everytime you have just a minor feature you want altered.
It's quicker, easier, and allows FULL customization.

2) Added /GETCOM for 'capturing' the comment from a .ZIP or .ARJ archive,
and placing in a file for later viewing or editing.

3) Stealth can create a LHA self-extractor as the "target"
archive. Therefore, you can convert several hundred .ZIP
files into LHA .EXE files, that can be distributed without
the need for including a unarchiver!
Specify: Archiver = LHASFX in your config file.

4) Stealth now has its own ENVIRONMENTAL VARIABLE that can be
used to change various settings. The size of logfile, virus
scanners, listing files, stripping comments, adding comments,
expanding executables, deletion, recursion of subdirs, breaking
of -AV seals, and normal-2-extra compression can be controlled
easily through the DOS environment.

5) Added the ability to truncate the STEALTH.LOG when it gets
over 40K.

6) Added /M to the LHA switches, to allow unattended operation of
LHA's features.

7) Added /LIST to list contents of archives without doing any conversion
on them.

8) /EVAL switch now 'backs up and erases the command line' if no valid
archive is found. This allows the screen to contain vital information,
rather than the whole directory scrolling by so fast that you cannot
see what was found.

9) Now supports VENDINFO.DIZ, the new standard in vendor and BBS
information. Stealth is the FIRST utility that supports this
great, new format.

10) Added ERRORLEVEL specifications, so you can judge how Stealth
exited from within a batch file.

11) Added 'back up and erase command line' when Stealth is paused.
Looks much cooler!

12) The ending 'PROCESSED' information is extremely specific now,
and can be quickly looked at and accessed to determine EXACTLY
what was found, and what Stealth did.

13) I included the file QCOM.EXE that will only re-comment files
that NEED the comment. This save tons of time and wasted
file processing.

15) Now supports the LIMIT archiver.


I will now address all the questions that have been asked about
Stealth, and the complaints as well:

a) Have Stealth remove BBS advertisements!

Hell no. There are a TON of BBS advertisements hidden in a
million different file formats. Even if I allowed you to
list the different offending files in a separate file, you
still would miss the utils that tag the ad on the end of
FILE_ID.DIZ, or the end of the .DOC files (P.S.L. does that).
The only 100% way to eliminate those pesky files is to manually
scrounge through it yourself (sorry!).

b) Stealth should SCAN for virii using 2 or 3 different scanners!

If you're THAT paranoid about virii, get a better scanner!
Clearly, if you gotta use 6 or 100 scanners at once, then you
are anal retentive, and have absolutely NO KNOWLEDGE of virii.
If a virus writer wants to get one on your system, he'll just
use PROTECT EXE/COM or NOLITE, or another .EXE/COM encryptor
to hide it. You ain't gonna find it!
The BEST virus protection is a GOOD BACKUP!

c) Stealth sucks as an upload processor!

That's because it ain't meant to be an upload processor!!!!!
Stealth is a RUTHLESS and FAST! archive converter. That's
why I gave birth to it last year, and it has skyrocketed
ever since.

d) Stealth should support archives within archives.

Naaaa. That would botch up most installation programs (Apogee,
Epic Megagames, etc use their own unarchivers. If Stealth
were to convert them, the installation program would fail).

e) There are several archivers that Stealth does not convert!

Because no one has SENT THEM TO ME! If you send me the new
archivers, I will modify Stealth to accomodate them. Upload
them to my BBS! We love the new stuff!

  3 Responses to “Category : Utilities for DOS and Windows Machines
Archive   : STLTH65.ZIP
Filename : WHATS.NEW

  1. Very nice! Thank you for this wonderful archive. I wonder why I found it only now. Long live the BBS file archives!

  2. This is so awesome! 😀 I’d be cool if you could download an entire archive of this at once, though.

  3. But one thing that puzzles me is the “mtswslnkmcjklsdlsbdmMICROSOFT” string. There is an article about it here. It is definitely worth a read: