              SUPERCRYPT 1.2 FOR WINDOWS HELP TEXT
              COPYRIGHT 1995 NAILLONWORKS PROGRAMMING
              DO NOT ALTER THIS FILE!  This file is used for
              your online help. 

ABOUT NAILLONWORKS PROGRAMMING

 Naillonworks programming specializes in data encryption and security routines
 for IBM compatible MS-DOS and WINDOWS machines.
 
 You will find our programs easy to use, productivity oriented, and  extremely
 secure.

 If you have questions you would like to ask us, our AMERICA ONLINE  E-MAIL
 address is NAILPROG, Compuserve address 75240,1746. You can mail us your 
 questions at:

 NAILLONWORKS PROGRAMMING,
 ROUTE 1, BOX F-19
 OROVILLE, WASH. 98844

  You can reach the programmer by phone at 509-476-2872.

INTRODUCTION TO SUPERCRYPT 1.2

  SUPERCRYPT FOR WINDOWS brings unbreakable encryption to the 
 Windows desk top at a very reasonable price. Multiple file capabilities, 
 background processing, clipboard encryption, selected text encryption,
 the new TEXT MODE engine, the ability to completely remove sensitive 
 data from your system,  and the integrated note pad make this 
 a complete  file encryption solution. 


SYSTEM REQUIREMENTS

 This program requires MICROSOFT WINDOWS 3.1, MICROSOFT DOS 4.0 or
 greater, 286 IBM COMPATIBLE, 2mb RAM, color monitor, hard drive with 2mb
 free space. It also requires the presence of the microsoft run time module
 VBRUN300.DLL , COMMDLG.DLL, CMDIALOG.VBX and the THREED.VBX 
 (latest version) control file to be located in your windows\system directory or
 the same directory as scrptwin.exe.


INSTALLATION
 
 This evaluation version can be installed in the directory of your choice. 
 Make sure that all of the distribution files are copied to the same directory
 on your hard drive.  This includes SCRPTWIN.EXE, SUPCRPT.TXT, 
 READFRST.TXT and VENDOR.TXT. This is easily accomplished by 
 placing the compressed distribution archive SC11WIN.ZIP in the 
 selected directory and expanding it there.

 After installation is complete, You can run SUPERCRYPT FOR WINDOWS by
 clicking on the SCRPTWIN.EXE filename in the new directory, or by setting up
 a program item for it in the WINDOWS PROGRAM MANAGER.
 
 Make sure that your windows system directory contains copies  of  these 
 Microsoft support files :
 VBRUN300.DLL, COMMDLG.DLL, CMDIALOG.VBX  and the  THREED.VBX 
 (latest version) control file.
 Check your distribution archive for these files, most are included in the
 sc12win.zip file. You can get the VBRUN300.DLL file from most major on-line
 services.


METHODS OF ENCRYPTION

 SUPERCRYPT 1.2 FOR WINDOWS offers two types of file encryption. The
 advantages and disadvantages  of each are listed below.


 TEXT ENCRYPTION
 
 Text encryption was designed for the encryption of legible text. It utilizes only
 legible, printable, scanable characters when it encrypts a file. When it
 encounters a non printable character in a file during encryption, that
 character is ignored. It also leaves the structure of the document intact, with
 reference to line length and paragraphs, so  that the file can be completely 
 recognized by optical character recognition systems. Spaces between
 individual words are eliminated, and  turned into encrypted text.

 ADVANTAGES

 Allows a text file to be encrypted, and printed to paper for physical delivery to
 another person, who may then scan the text into their system and decrypt it 
 with the valid password.

 Allows for the encryption of electronic mail for delivery to windows interfaces
 that don't support the full range of ASCII characters. They can then be saved
 to a file at the other end with accurate character translation, making
 decryption possible.

 Text encrypted with the TEXT method can be spliced into documents created
 by word processors that don't support the full range of characters as so many
 WINDOWS products don't. They can then at any time be cut from the host
 document, pasted to an empty file, and then decrypted. This facilitates the 
 embedding of privileged information into otherwise legible files.

 DISADVANTAGES
 
 Fewer characters are available to the encryption engine during encoding. 

 In graphic and executable files that contain mostly non printable characters,
 the majority of the file will remain in its' original form, as those characters will
 be ignored during encryption. 

 FULL ENCRYPTION 
 
 This is ideal for files of all types that are not intended to be printed, scanned,
 or fully viewed after encryption. Encrypted files of this type may be sent in file
 form to any user with a copy of SUPERCRYPT and the proper password. 
  
 FULL encryption utilizes the full range of ascii characters during encryption, 
 and no characters are ignored. The structure of a file encrypted with this 
 method is completely demolished, with no  similarity to the original file. 

 ADVANTAGES

 Extremely secure. Unbreakable. Even files that consist of one long string of 
 the same character come out patternless, even with the utilization of very 
 simple passwords. Ideal for text, graphic and executable files.

 DISADVANTAGES

 Fully encrypted text cannot be printed or viewed by text editors that don't 
 support the full range of ascii characters. Also, scanning  of this type of  file 
 is impossible. 


FILE SELECTION (OPENING FILES)
 
 Supercrypt  provides single and multiple file selection capability  in  the 
 encryption interface.
 
 Operation of the file selection system is quite simple, with procedures as 
 follows:

 SINGLE FILE SELECTION

 This is the mode you will use most often with SUPERCRYPT.  It allows you the
 greatest control over the  operations performed  on each file. Files opened
 individually may be viewed with the integrated text editor, providing they are
 under 32,000 bytes in length. Also, if you have chosen to back up this file 
 during processing, you can pick any valid filename as the backup file.  When 
 using the multiple selection mode, the default backup file naming scheme is
 implemented.

 To select a single file for processing or editing, Use the OPEN selection in the
 FILE menu of the SUPERCRYPT interface, or  press the OPEN command
 button.  The OPEN dialog box will appear, with a drive, directory, and file list 
 boxes to help you make your selection.  Pick a file by opening the drive list
 box with a click on the arrow, double clicking  on the desired drive, the
 directory, and then the filename in the file list box. The text box at the top of 
 the dialog  will reflect the selected filename,  and the directories label at the 
 top center of the dialog will reflect  the selected path.
 

 You can alternately type the desired filename into the text box. You can type
 in a complete path/filename, or if the directories label already reflects the 
 correct path, just type the filename.


 You can also open a file while the text editor is active by using the OPEN
 selection in the FILE menu of the editor. The OPEN dialog  will appear, and 
 file selection follows the same procedure as when you are opening a file with
 the SUPERCRYPT interface.
 

 MULTIPLE FILE SELECTION 

 You can use this mode to greatly increase productivity when you need to
 process more than one file. 

 Multiple file selection works with the ENCRYPT, DECRYPT, DELETE, and 
 DATA WIPE functions of supercrypt. 
 
 The convenient file tagging procedure of this program allows you to select 
 entire directories in seconds, initiate the desired function, and let 
 SUPERCRYPT go to work until all of the files have been processed.


                                         <NOTE>
 When tagging multiple files for any ENCRYPTION or  DECRYPTION operation,
 you must remember that the same configuration settings are used on all the
 selected files. This means that if you are encrypting, they will all be encrypted
 with either the FULL METHOD or TEXT METHOD depending on your selection,
 the same password will be used on all the files, and backup files will be
 created for each file processed if the have chosen the  BACKUP FILE option.
  
 Make absolutely  sure that all of the files that you are tagging for any
 DECRYPTION operation were encrypted with the same password, or the file
 may not be decrypted properly.
 
 The default backup naming procedure during multiple file operations is as
 follows. As each file is processed, a new file is created, with the same name
 as the original file, except that the extension is replaced with .NSC. Therefore,
 the filename private.txt would be backed up with the file private.nsc. If there
 is another file with the name  private.nsc in the same directory, you will be 
 notified that the filename already exists, and you may choose to overwrite the
 file if you wish. If you choose not to overwrite,  you will be given an opportunity
 to select a filename. The filename  must include a full path, and must indicate
 the same drive that contains the file being processed. If at this time you fail to
 provide a viable backup filename, SUPERCRYPT will revert to the default 
 filename of private.nsc, and overwrite the existing file.

 Any difficulty can easily be avoided by examining  the directories that contain 
 the files you want to  encrypt or decrypt, making sure they do not  contain
 backup files with the extension .NSC that may interfere with the multiple
 operation.
 
 To select multiple files, activate the OPEN dialog by using the FILE menu or
 the OPEN button on the main SUPERCRYPT interface. You can not open
 multiple files with the text editor.

 When the dialog appears, select multiple files by holing down the Ctrl key while
 clicking on the desired filenames. To open multiple files that are in succession
 in the file list box, hold down the Shift key, click the file at the top of the 
 group of files, then while still holding the Shift key, click the file at the bottom
 of the group. All files between those two selections will be included in the 
 selection. 

 You will notice that as a file is selected, it becomes highlighted. If you wish to
 deselect any highlighted file, hold down the Ctrl key and click it again. It will
 be removed from the current selection. 
 
 
 Once you are satisfied with files you have chosen, you may choose to encrypt,
 decrypt, delete, or use the DATA WIPE function on them.

PASSWORD SELECTION 

 The password selection form of SUPERCRYPT for WINDOWS offers three 
 different options for password entry.  You can choose to mask the characters
 upon entry, display them, or paste a password to the  password entry form from
 the clipboard.

 All characters must be within the ascii character range of 32 to 126. This
 means any printable key on your keyboard will do. Upper and lower case
 letters, numeric keys, punctuation, etc.

 Password length is limited to 501 characters. Passwords that are over length
 will be trimmed or may be reselected.

 The three methods are described in closer detail below.

 MASK CHARACTERS OPTION
 
 By pressing the MASK CHARACTERS option button on the password entry 
 form before you type in the password, you will instruct the password  entry 
 form  not to display the actual characters as they are typed. To  assure that
 the password you typed is the one that you intended, (because you will not be
 able to verify it visually), the form will ask you to retype the password to 
 confirm it with you. 

 DISPLAY CHARACTERS OPTION

 This is the default password selection mode. It is indicated by a checked 
 condition of the DISPLAY CHARACTERS option button. Each character that 
 you type will be displayed on the screen as you type. You must confirm the
 accuracy of the password visually, because the interface will not ask you to
 validate the spelling  while in this mode.

 PASTING TEXT INTO THE FORM

 You may opt to use the windows clipboard to paste password strings into  the 
 interface. This will allow you to use text stored in other documents as the 
 password string.  This can eliminate the tedious manual typing and possible  
 misspelling of long passwords. 

 To use this mode, you should first open the file that contains the string  that 
 you wish to use as the password in any windows text editor that supports
 clipboard operations. You can use the integrated SUPERCRYPT NOTEPAD
 if the file is under 32,000 bytes.

 Copy the desired text string into the clipboard. 

 Now use the SUPERCRYPT interface to open the file that you wish to encrypt,
 select the encryption options, and press the ENCRYPT button. The password 
 entry form will appear, and you can at that time press the PASTE TEXT button
 to copy the text in the clipboard into the password entry form. 


 Make sure that you only paste printable characters into the password  form, 
 and that the length of the password string  is 501 characters or less.
 
 MAKE SURE THAT YOU ARE QUITE POSITIVE ABOUT ANY PASSWORD 
 THAT YOU MAY USE TO ENCRYPT OR DECRYPT A FILE.  THE USE OF
 AN INCORRECT PASSWORD CAN DESTROY A FILE. MAKE SURE THAT 
 YOU KNOW WHAT YOU TYPED. 
 

ENCRYPTING/DECRYPTING FILES

 DO NOT ENCRYPT ANY FILE THAT YOU CANNOT AFFORD TO LOSE,
 WITHOUT KEEPING A BACKUP COPY OFF-LINE. ALL IT TAKES IS ONE 
 WRONG PASSWORD TO DESTROY YOUR DATA.

 File encryption/decryption is a very simple procedure with SUPERCRYPT for 
 WINDOWS. The convenient interface make it very easy to specify single or 
 multiple filenames for the encryption/decryption operation. See  the help topic
 FILE SELECTION(OPENING FILES) for information on opening  the file or files
 you wish to encrypt or decrypt.

 If you are encrypting files, you should now choose the encryption  method you
 wish to employ. You can choose either the TEXT METHOD  or FULL method 
 from the right of the SUPERCRYPT for WINDOWS  INTERFACE by clicking on
 the appropriate option button. You may also select the method from the
 OPTIONS menu of the SUPERCRYPT interface. See the help topic METHODS
 OF ENCRYPTION for a detailed explanation of the differences between the 
 two types. 

 If you are decrypting files, it is unnecessary to select a method because
 SUPERCRYPT will recognize the encryption type used on the file automatically,
 and make the appropriate adjustments during processing.

 Now you must decide if you wish to create a backup copy of the file in the 
 state it was in before the encryption or decryption operation. Click the
 BACKUP FILE option button or select it in the OPTIONS menu of the 
 SUPERCRYPT interface to select this procedure.

 Creating a backup file is a good idea, especially if you are decrypting files. If
 you mistype a password, the file may be ruined and you may need to turn  to
 this backup file. See the help topic BACKUP FILE PROCEDURE for details
 regarding usage and naming convention of the backup files.

 The last option available that you may select is the SHARE CPU option. This 
 option will configure SUPERCRYPT to run in the background, freeing you to 
 work in another windows application, or even in SUPERCRYPT, while the
 processing of your file or files is taking place. See the help topic SHARING
 YOUR CPU for advantages, disadvantages, precautions, and a
 definition of this option.

 Now your files have been selected, and your options have been set, and you 
 are ready to initiate the encryption or decryption operation. Press the
 ENCRYPT or DECRYPT command button,  or select ENCRYPT OR DECRYPT
 from the OPERATIONS menu of the SUPERCRYPT interface.

 The password form will appear, ready to accept the password to use during the
 operation. see the help topic PASSWORD SELECTION for the options
 available to you during the entering of your password. When the desired 
 password has been entered into the password forms' text box, click the button
 titled ENTER PASSWORD.  The password will be fed to the encryption
 engine, and the process will begin.

 When the file or files have been completely processed, you will be presented 
 with a message box stating that the encryption or decryption of the selected 
 file or files has been completed. 


ENCRYPTING/DECRYPTING THE CLIPBOARD.


 SUPERCRYPT FOR WINDOWS has the ability to encrypt or decrypt text that
 is contained in the windows system clipboard. This gives this program the 
 ability to encrypt/decrypt portions of documents created in any windows
 editor or word processor, while leaving the remainder unaltered.


 The following example describes the steps necessary for SUPERCRYPT to
 work in conjunction with the clipboard and the windows WRITE editor.

 
 In the program manager, start the SUPERCRYPT program by clicking on the
 ICON you have created for it or by clicking on the scrptwin.exe filename in the
 file manager. 


 Once the SUPERCRYPT FOR WINDOWS interface is loaded, press Ctrl-Esc to
 activate the task manager. Then use the task manager to switch to the
 program manager, and from there start WINDOWS WRITE. 


 Once in WRITE, type the following line:

 Bill, I have spoken to my broker and he indicated that I should pass you 
 the  following information . >>Sell all of your apple stock now!<<.

 You will notice that I used the delimiters >> and << around the text that I wish 
 to cut, encrypt and place back into the file. This is so that the recipient of the
 document will know what text to cut into the clipboard for their copy  of  
 SUPERCRYPT to process.


 Now select the phrase Sell all of your apple stock now! with the curser, and
 use the WRITE edit menu to cut the phrase from the document.

 The line in WRITE will now appear as follows:

 Bill, I have spoken to my broker and he indicated that I should pass you 
 the  following information .>><<

 Use the WRITE Ctrl-Esc again to switch to the windows task manager, then 
 from there switch to SUPERCRYPT.

 Once in SUPERCRYPT, open the OPERATIONS menu, then select ENCRYPT
 CLIPBOARD. You will be asked for a password, and the contents of the
 clipboard will be encrypted.

 Use the task manager to return to WRITE, and with the curser between the
 two delimiters, select paste from the edit menu. The result, encrypted with my
 password looks like:

 Bill, I have spoken to my broker and he indicated that I should pass you 
 the  following information .  >>6]-W?^OKp~E2gD89`hR1t^qu<gBCYTh;%<<.

 Clipboard encryption always uses the text method of encryption, so there is no
 reason to indicate to SUPERCRYPT which method you prefer.

 Decryption is handled in the same manner as encryption. Select the text
 between the delimiters, switch to SUPERCRYPT, select DECRYPT 
 CLIPBOARD, provide the correct password, then paste the clipboard contents
 back into the document.
 
 Bill, I have spoken to my broker and he indicated that I should pass you 
 the  following information . >>Sell all of your apple stock now!<<.
 
 You can also use the clipboard encryption option to encrypt portions of
 documents created in the SUPERCRYPT NOTEPAD.

 The choice of delimiter characters is up to you, just make sure the recipient
 of any message is aware of your choice.

ENCRYPTING SELECTED TEXT.

 With documents that are being viewed in the integrated notepad, you may 
 wish to encrypt selected text only. This is similar in effect to encrypting
 the clipboard, except that it is faster and simpler to do. The restriction is 
 that only selected text in the integrated notepad is recognized.

 To use this feature, open any text file under 32000 bytes long and activate 
 the integrated notepad. 

 Use the mouse to highlight the text that you wish to encrypt, then with the
 text highlighted, choose ENCRYPT SELECTED TEXT in the OPERATIONS
 menu of the main SUPERCRYPT interface. Provide a password and the 
 selected text will be replaced with encrypted code. You may wish to
 use delimiter characters to help identify the text that needs to be selected 
 in order to be decrypted properly. See the help topic ENCRYPTING\
 DECRYPTING THE CLIPBOARD for an example using delimiters.


SHARING YOUR CPU

 Supercrypt can be instructed to encrypt in the background while you work 
 in another windows program or the SUPERCRYPT editor. 

 A few precautions should be taken when processing files in the background.
 Do not attempt to open, close save to, delete, or data wipe a file that is 
 currently being processed by Supercrypt.

 ADVANTAGES

 When processing large or large numbers of files, it allows you to remain
 productive in another WINDOWS application while SUPERCRYPT is
 busy. 

 DISADVANTAGES

 The processing speed of SUPERCRYPT does  diminish when sharing
 the CPU with other applications. The exact amount of performance loss
 depends on the processing requirements of the competing application.
 


BACKUP FILE PROCEDURE


 SUPERCRYPT contains a system that allows you to generate copies of
 files that are being processed by the encryption engine, in their condition
 prior to processing. 

 When encrypting files, unencrypted copies are generated, and when 
 decrypting, encrypted copies are maintained.

 Activating this system requires a click on the BACKUP FILE option button
 on the right of the SUPERCRYPT interface,  or select BACKUP FILE from
 the OPTIONS menu. This option must be selected AFTER the file or files 
 have been opened, because the system needs to know if you are planning
 to process single or multiple files.

 If you have a single file selected when you select the BACKUP FILE
 option, a dialog box will appear, asking you to provide a filename for the
 backup file. This dialog displays the default name for the backup file, that
 you may use by pressing O.K. if you wish. Or you may enter a different 
 filename and then press O.K.  SUPERCRYPT will check to see if the
 indicated filename already exists on your system, and if it does,  you will
 be asked if you would like this file to be overwritten. If you choose NO, 
 then you will be given an opportunity to select a different one.

 If you have selected multiple files and have chosen the BACKUP FILE 
 MODE, A dialog box will appear, indicating that the default backup file
 naming scheme will be used. The reason for this is so that you will not
 be interrupted by a dialog box each time SUPERCRYPT begins processing
 a different file in your selection.

  The default backup naming procedure during multiple file operations is as
 follows. As each file is processed, a new file is created, with the same name
 as the original file, except that the extension is replaced with .NSC. Therefore,
 the filename private.txt would be backed up with the file private.nsc. If there
 is another file with the name  private.nsc in the same directory, you will be 
 notified that the filename already exists, and you may choose to overwrite the
 file if you wish. If you choose not to overwrite,  you will be given an opportunity
 to select a filename. The filename  must include a full path, and must indicate
 the same drive that contains the file being processed. If at this time you fail to
 provide a viable backup filename, SUPERCRYPT will revert to the default 
 filename of private.nsc, and overwrite the existing file.


DATA WIPE SYSTEM

 Supercrypt incorporates the technology of one of my earlier utilities, 
 NAILLONWORKS DATA-WIPE.  The essence of this program has been
 assigned to the DATA WIPE command button.  

 
 DATA WIPE is a method in which sensitive data can be completely 
 scrubbed from your hard drive, making it impossible for others to restore
 the file with undelete utilities. 

 
 This operation may be performed on single as well as multiple files. You
 may open the file or files with either the main SUPERCRYPT or the 
 SUPERCRYPT NOTEPAD interface, but in order to select multiple files
 you must use the prior.  File selection is handled in the identical manner
 as described in the help topic  FILE SELECTION(OPENING FILES).
 

 Once your file or files have been selected, press the DATA WIPE button
 or select Data Wipe from the Operations menu of the main SUPERCRYPT
 interface. You will be asked for confirmation and given the opportunity to
 cancel the procedure. If you continue, the DATA WIPE engine will begin 
 to totally remove your selection from your drive.

 
DELETING FILES 

 
 You are able to delete any file or files currently selected (listed in the file
 box of the main SUPERCRYPT interface), by selecting Delete File from the
 File menu of SUPERCRYPT.  You will be asked for confirmation before any
 files are removed from your system.
 

 The trash can is nothing more than a quick delete facility. It allows you to 
 select the filename or names  contained in the file box with a mouse click on
 the filename or filenames listed in the file box, and then with the mouse
 button depressed, drag it into the trash can. 

 Deletion is not the same as DATA WIPE, where files are rendered 
 unrecoverable by undelete utilities.


REGISTRATION

  (CANNOT BE FILLED OUT WHILE IN SUPERCRYPT HELP. PRESS
  THE PRINT ORDER FORM  BUTTON TO PRINT A COPY,  OR 
  PROVIDE THE FOLLOWING INFORMATION IF YOU DO NOT HAVE 
  A PRINTER. THE INTRODUCTION SCREEN ALSO PROVIDES A 
  CONVENIENT WAY TO FILL OUT THE ORDER FORM ON SCREEN
  AND PRINT IT  OUT WHEN COMPLETED ).
 
     SUPERCRYPT 1.2 FOR WINDOWS REGISTRATION FORM

 NAME        _________________________________________________
 COMPANY _________________________________________________
 ADDRESS  _________________________________________________
 CITY/STATE ________________________________________________
 PHONE      _________________________________________________
 COMPUTER_________________________________________________
 WINDOWS VERSION_________________________________________
 COPIES OF SUPERCRYPT 1.2 FOR WINDOWS ___x$39.95 = ______
 COMMENTS_________________________________________________
 ____________________________________________________________

 Send completed order form and registration fee to:
 NAILLONWORKS PROGRAMMING
 ROUTE 1 BOX F 19
 OROVILLE, WASHINGTON 98844

 ORDERS SHIPPED IMMEDIATELY.

 Registered users will recieve the registered version of SUPERCRYPT 1.2
 FOR WINDOWS with a TWO site license.


RIGHTS AND LIMITATIONS

 You have the right to distribute this evaluation version of Naillonworks
 Supercrypt royalty free and in unlimited supply, providing the files
 READFRST.TXT, VENDOR.TXT, SUPRCRPT.EXE, SUPCRPT.TXT
 are all included, unaltered and in their entirety, on any distribution
 diskette, in any compressed distribution archive, or any other distribution
 method. It is also advisable to include the microsoft files VBRUN300.DLL,
 THREED.VBX (latest version), COMMDLG.DLL, and CMDIALOG.VBX
 in any distribution, or make sure that the files are readily available to the 
 user, as they are required for SUPERCRYPT to run.

DISCLAIMER

  NAILLONWORKS PROGRAMMING is in no way responsible for any loss,
  including but not limited to lost time, profits, data, or equipment failure
  resulting from the use, improper use or inability to use SUPERCRYPT 
  1.2 FOR WINDOWS.

 