encryption software Home Support Resources  
   
   
 

Encryption Protection 3.0 - Advanced Encryption, Decryption and File Shredding

 
   
 

Linux system administration

Mining Dogecoin

About Maxion
Screenshots
Free Trial
Free Decoder
FAQ
Affiliates
Encoding your file / data
The first step is to enter your key-phrase into the Key Field. Either load a key-phrase that you have used previously, or generate a new random key-phrase by clicking the Random Key button, or just manually type in a new key-phrase of your choice.
Now there are 2 ways to encode:
Plain Text Encoding: - Go to the Tab “Text Encoder/Decoder”, enter your plain text into the Input Box by either typing it in manually, or by pasting it in from the clipboard -- by clicking the 'clipboard to key'-button using the Paste & Copy function. Click the Encode button to proceed.
File Encoding: - Go to the Tab “File Encoder”, load/enter the key, Click the “Add” button and select the file from the file browser displayed, browse the path for encrypted file and click the Encode button to proceed. If you check the option “Self Decrypt”, Encryption Protection will create a secured self-decrypting file, i.e. a file, which, on clicking, will ask, for the key and on feeding the exact key the file is decoded automatically, no matter whether the target machine has the application or not. If you choose encode a file containing binary information (e.g. a MS Word-document, MS Excel-file, picture, pdf-file etc.) Encryption Protection will create a secured file that can only be decoded on a system that has the Encryption Protection application itself installed on it. Bear in mind that the free demo version of Encryption Protection will always decode, even after its evaluation period has expired.
 
Encryption Protection will also enable the user to encode a batch of binary files in a single run. Enter your key-phrase into the Key Field and leave the Input Box blank before clicking the Encode button to proceed. Browse for a folder, open it and mark all the files you wish to encrypt. Hold your Control Key to mark multiple selections. Note that all contents of further sub-folders within this designated folder will be ignored. After having marked all files to be encrypted, click 'open' to initialize the process of encryption. All selected files will be packed into a single secured file. Later, when you're going to decode that secured file, all files within it will be saved separately as they were previously selected.
Please zip self decrypting .exe files before sending them via email as many email service providers don’t allow sending plain .exe files. Encode time depends on file size and so forth.
Important: You must never lose your key entry! Key-phrase recovery is NOT possible
 
Decoding your file/data
The first thing you will have to do is to enter your key-phrase into the Key Field. Either load your key-phrase from a drive or just type in the key-phrase manually. The key should be exactly the same as that used while encrypting the file.
Now there are several ways to decode your data:
Plain Text Decoding: - If you have received an email carrying some Encryption Protection secured ciphertext within it, retrieve your ciphertext by marking and copying all data starting with "(" and ending with ")". Go to the Tab “Text Encoder/Decoder”, bear in mind that a single character missing in the ciphertext will cause Encryption Protection to malfunction, though any extra characters before and after the parentheses will not. Paste your ciphertext into the Encryption Protection-Input Box by clicking the 'clipboard to input box’-button using Paste & Copy. Click the Decode button to decode your text.
File Decoding: - Go to the Tab “File Decoder”, Click the “Add” button and select the file to be decoded from the file browser, browse the path for decrypted file and click the “Decode” button to proceed. You can choose from either a .epf-file (carrying plain text) or a .exe-file carrying secured binary information.
Double click from within your Internet browser on a secured .epf- or .html-file. Your browser will open your self-decrypting file containing either your secured text or a secured webpage and will prompt you to enter your key-phrase to get that file decoded.
Note: All files containing encoded binary information (such as MS Word documents, mp3-files, pictures, movies etc.) will require an installation of (at least the free demo of) the Encryption Protection-application to be able decode.
Again, if you have received an email carrying some Encryption Protection secured ciphertext within it, retrieve your ciphertext by marking and copying all data starting with "(" and ending with ")". Stay online. Paste your ciphertext into the Input Box of our Online Decoder at http://www.encryptionprotection.com/online.htm and click the Decode button to be prompted to enter your key-phrase. Encoded binary files or encoded files containing text or HTML of large amounts cannot be decoded using the Online Decoder.
 
Sending self decrypting files through email
Encryption Protection works independently from all your desktop email applications, such as Eudora or MS Outlook, and from all web based email accounts.
You can easily attach any files generated by Encryption Protection to one of your outgoing emails. The recipient can download that attachment or open it right away within the email account as a normal .exe file. However files carrying encoded binary information (having a .exe-extension) do not require the Encryption Protection software to decode. The decoding can be done by simply clicking on the exe file and providing the corresponding key-phrase.
Use Paste & Copy to copy any ciphertext from Encryption Protection's Input Box directly into one of your outgoing emails, and vice versa. Important: Make sure you copy all data starting with "(" and ending with ")". A single character missing might cause Encryption Protection to malfunction. The designated recipient of that email will need to mark that text with the left mouse touch, copy it and paste it into the Online Decoder at http://www.encryptionprotection.com/online.htm or into the Input Box of a Encryption Protection installation.

Please zip self decrypting .exe files before sending them via email as many email service providers do not allow sending plain .exe file. Encode time depends on file size and so forth.

AOL & Netscape Navigator users: We recommend use of MS Internet Explorer or Netscape Communicator to open and decode Encryption Protection's encrypted files.
 
Tips on how to agree on a key phrase
Do not transmit your key-phrase (key entry) to the person you wish to communicate with through phone, fax or email unless it's either concealed by a large amount of junk data or it's not indicated as your personal key-phrase. If you have to use email, make sure not to call your key-phrase 'the very important key we are going to use to encode Encryption Protections with'. Preferably, agree on a key-phrase when you meet the recipient in person. If you have to use electronic means of communication we suggest you define a parameter for the key-phrase beforehand so that any other person may not decipher the content.
Note: If you lose your key-phrase, neither you nor the software developer will be able to retrieve your data any longer.
 
Tips on sending encrypted data through email
If you happen to experience a problem sending a self-decrypting Encryption Protection file to an email account through a firewall, copy and paste the encoded data (ciphertext) from the Input Box of your Encryption Protection application directly into the body of your outgoing email. This way only passive data is transmitted within the body of your email, and there is no attachment containing any .exe file. Ask the recipient of your email to either use the Online Decoder at http://www.encryptionprotection.com/online.htm or the Encryption Protection software itself to decode.
 
File Shredder
Encryption Protection also features an integrated File Shredder. Click the 'file shredder'-button and browse for a file which contains the confidential contents you want to have completely erased. Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your drive as data chunks. The File Shredder completely overwrites the contents of a file 7 times. The purpose of the File Shredder is to completely remove files and their contents from your drive. Once a file has been shredded it cannot be recovered using any sophisticated file restoration (un-delete) utility.
Note: -
(a) You can’t shred more than 1 file at one time.
(b) You can’t shred folders.
 
Using EncryptionProtection through a command line
Encryption Protection can be executed by a command line to facilitate the periodic tasks of securing files with a given key-phrase. This way, the process of either encrypting, decrypting or shredding a file can be initiated via a single keystroke. Moreover, any other program installed on your system that is capable of implementing a command line can automatically also pass instructions to Encryption Protection, provided that the command line parameters for EP have been set in advance. If you don't want to feed an Encryption Protection-command-line from another application, we recommend that you create a simple shortcut on your desktop that will initiate the EP function. What you need to do is, go to your Encryption Protection installation folder (probably in c:\program files\Encryption Protection), right click the Encryption Protection executable file and choose 'Send To > Desktop (Create Shortcut)'. Go to your desktop, right click your shortcut, open the 'Properties' tab, look for the path of the shortcut to the actual executable file in your Encryption Protection application folder and navigate to the location of the Encryption Protection .exe file at the command prompt, write the .exe file name and press the space bar once. Then write the argument(s) in the same line and press the Enter Key from the keyboard. The .Exe will be executed accordingly. If you are looking to execute the File Shredder through a command line, the same method will be used. The following elements are required in this order to form a command line to either encode or decode:
Start with the path to the executable file of the Encryption Protection application in its installation folder. Probably it will be:
c:\program files\EncryptionProtection\Encryption Protection.exe [ENCODE][DECODE][SHRED] Src =[FileName] Dest =[Destination Path] Key = [KeyFile]
Src= This is the path of the source file you intend to either encode or decode.
Dest= This is the path of the destination file that the results of this task will be saved in. If you are encoding some data, the destination file will need to have an .epf -extension. If you are decoding a file, the destination file will need to have exact the same extension it had before it was encoded.
Key= This is the path of to the file on your computer containing your key-phrase. All key-phrases saved from within the Encryption Protection application have a different extension. A key-phrase named "mykey" will be saved on your computer as "mykey.eKey ". You will need include the extension of your key-phrase into this path. However, if you saved your key with Windows Notepad, it has the .txt extension. However this key file will not be good enough for the command line decryption.
Encryption Protection totally obeys to your command line. It does not correct any incorrectly specified extensions. When you are naming the path of a file to be decrypted in the src-parameter, you need to recall the original extension of that file it had before it was encrypted.
 
EXAMPLE OF A COMMAND LINE TO EXECUTE ENCODING OR DECODING:
Say you intend to encrypt an invoice written on MS Word called 'MyDoc' over and over again, and at every time you intend to use a key-phrase-file previously created and saved by Encryption Protection called 'mykey', and you want to have the encrypted file named 'securedMyDoc' and have it placed on your root drive, use the following command line:
c:\program files\Encryption Protection\Encryption Protection.exe encode
src=c:\mydoc.doc dest=c:\securedMyDoc.epf
key=c:\mykey.eKey
If you intend to decrypt the same invoice over and over again using the same key-phrase, the following command line could look like this:
Once all parameters are perfectly set, click OK and close your shortcut. From now on, all you'll need to do to initialize the process of encryption of this document is to click on your icon on the desktop. Of course you can create as many shortcuts as you like, each one of them assigned with a different task.
EXAMPLE OF A COMMAND LINE TO EXECUTE THE FILE SHREDDER:
Say you intend to shred 'MyDoc' on your root drive, use the following command line:
c:\program files\Encryption Protection\Encryption Protection.exe shred c:\myDoc.doc

 

 
  Home • About Maxion • Screenshots • Free Trial • Free Decoder • FAQ • Affiliates  

Copyright 2005 Maxion Software. All Rights Reserved