Security Software.

This version is at a version compleation level.

Read the help file for more information.

Disclaimer

I might say to you at this point I have done as much as possible to make this program as safe as possible for a user to use the powerful encryption and lockout features, for example you may not encrypt your Windows directory directly,uninstalling and discovering that you have encrypted data still is not a problem as you just reinstall the system and the files are able to be decrypted. Smart key tracking techniques have been incorperated so when a file is encrypted on a removeable drive, useing the removeable encryption key, then later dragged to the harddrive, it decrypts useing the correct key. 
In creating this program, I have used this program to safeguard the data from unwanted eyes, protect my operating system from lower level users changeing my settings, terminating malicious tasks like netbus666, that otherwise do not offer a close procedure, thus makeing it much easier to remove (netbus666 or winipx is a remote control trojan virus), and i have also used the mapper feature to gain insight to the vast list of files, both on my system and on my removeable cdroms, iomega zip disks, and floppies.

Installation:

This program requires installation in order to run properly, but befor you do install it is advisable to read both this text file and the security.hlp file. This program is built to offer strong keyboard side security to the PC. 
Read the instructions, as sone as you install! Be sure to read the installation section so you may clearly understand what the emergency and mouse passwords are. 
Your epass is 195200 (default user #1)
Your mouse pass is dbl click right    slide downright   right click
Your admin pass is 130233 default
These are set in the Users menu from Disk.exe (found in windows)
I can't stress enough how important it is to read the help before putting the program into action, and knowing this I have also made the setup process call up the help file. 

Uninstallation:
To uninstall you must be authorized at the User#1 (administration) Level, if you are not logged on at the current time as User#1 you will be at the time of calling the uninstallation program from the Add/Remove Programs in the control panal, or the running of Und.exe found in the windows directory. Minimize all windows to find the uninstall dialogs. You will also have to "bump" the 2 tasks Watcher and Disk (in that order), a window will tell you of this, and the password screen will come up one last time, otherwise the system WILL NOT uninstall. After bumping these tasks choose to continue uninstallation by pressing OK on the dialog window that awaits you, at that point the you may choose to remove essential files (note below).

Note that if you have Uninstalled and you have found that you still have data left encrypted, simply reinstalling the system will allow you to decrypt your data, provideing you did not change your encryption keys, or uninstallled the essential files, as in this case the keys that you used at the time of the uninstallation are left intact, in fact, all data used is left intact, just to avoid this real concern! The files that contain this information are contained in c:\map and your windows directory. You should also write down on paper what your 3 keys are and what you have marked for Deep Encryption.


Notes:
Internally the program contains many tricks to avoid hacking, and certain executables have been flagged to bring up security checks. Users added by the administrator can be flagged to allow passworded files or not (read section on user levels in help file) Read the help file now!!!

The Deep Encryption List should only be set once. This list is a list of extentions that will be internally encrypted. If you encrypt data then add to this list an extention before decrypting the data and the extention you added is contained in the data (ie. a .BMP file .BMP was not in list when you encrypt, then you add .BMP to the list and decrypt) the data is then decrypted BUT internally the .BMP file (in this case) becomed reverse encrypted. If this happens, reencrypt, remove .BMP from the list, then decrypt, at that point your .BMP will be back.

Above is really the only concern that I have with the program, and because of it I a may just make it a fixed list of extentions, or do all extentions. The reason for it is this, If i make a file called xxx.xxx and i associate .xxx with notepad and put data in that I want encrypted internally then i add .XXX to the list, otherwise only the name of the file becomes encrypted and thus i can just open the name it becomes with notepad and voila i may read the note, but in the case of adding it to the list, when i open it all i get is encrypted mumbo jumbo.
Be sure to keep the above note in mind, but if you do make an error with this feature just re-encrypt make the logical change, (ie if your .BMP files upon decryption are garbled, reencrypt and remove .BMP from the list then decrypt, and they should be back, if the encryption keys are correct.

Changing of keys:
When changing keys one should be sure that there are no encrypted files on the media that the key is for. The easiest way tho find you encrypted folders is by useing the windows Find files and folders routine located on the start bar. Look for file gnork.fil, it will appear in every encrypted folder of the media. these folders should be decrypted before the changing of the key.
When you drag encrypted data from a removeable to a fixed disd (or the other way fixed to removeable) you should immediately decrypt and reencrypt the data as the keys used for encryption on the removeable and fixed disks are separate keys and if the keys are changed.

Above all else:
Do not shut the computer off during encryption or decryption processes as this will destroy the data, though with a good brain on your shoulders, even this can be recovered from. 

Issues:
Some programs useing a method of running and closeing themselves throughout the windows session will fill up the log file FAST, ie Netzip, if you run a program like Netzip, it opens and closes over and over again, I would suggest not useing it while running this system, but the log file is the only reason i say this.

Parting:
I really would like to take this time to thank you for trying out the system, I am very proud of what it has become, and belive it to be the one of the best of security systems availiable. Feedback, Questions, and Orders may be made to   Grimm@iFreedom.com   