Encoding your
file / data |
The first step is to
enter your key-phrase into the Key Field. Either load
a key-phrase that you have used previously, or generate
a new random key-phrase by clicking the Random Key
button, or just manually type in a new key-phrase
of your choice. |
Now there are 2
ways to encode: |
Plain Text
Encoding: - Go to the Tab “Text Encoder/Decoder”,
enter your plain text into the Input Box by either
typing it in manually, or by pasting it in from the
clipboard -- by clicking the 'clipboard to key'-button
using the Paste & Copy function. Click the Encode
button to proceed. |
File Encoding:
- Go to the Tab “File Encoder”,
load/enter the key, Click the “Add” button
and select the file from the file browser displayed,
browse the path for encrypted file and click the Encode
button to proceed. If you check the option “Self
Decrypt”, Encryption Protection will create
a secured self-decrypting file, i.e. a file, which,
on clicking, will ask, for the key and on feeding
the exact key the file is decoded automatically, no
matter whether the target machine has the application or not.
If you choose encode a file containing binary
information (e.g. a MS Word-document, MS Excel-file,
picture, pdf-file etc.) Encryption Protection will
create a secured file that can only be decoded on a
system that has the Encryption Protection application
itself installed on it. Bear in mind that the free
demo version of Encryption Protection will always
decode, even after its evaluation period has expired.
Encryption Protection will also enable the user to
encode a batch of binary files in a single run. Enter
your key-phrase into the Key Field and leave the Input
Box blank before clicking the Encode button to proceed.
Browse for a folder, open it and mark all the files you
wish to encrypt. Hold your Control Key to mark multiple
selections. Note that all contents of further
sub-folders within this designated folder will be
ignored. After having marked all files to be encrypted,
click 'open' to initialize the process of encryption.
All selected files will be packed into a single secured
file. Later, when you're going to decode that secured
file, all files within it will be saved separately as
they were previously selected. |
Please zip self
decrypting .exe files before sending them via email
as many email service providers don’t allow
sending plain .exe files. Encode time depends on file size
and so forth. |
Important:
You must never lose your key entry! Key-phrase
recovery is NOT possible
|
|
Decoding
your file/data |
The first thing you will
have to do is to enter your key-phrase into the Key
Field. Either load your key-phrase from a drive or
just type in the key-phrase manually. The key should
be exactly the same as that used while encrypting the
file. |
Now there are several
ways to decode your data: |
Plain Text
Decoding: - If you have received an email
carrying some Encryption Protection secured ciphertext
within it, retrieve your ciphertext by marking and copying
all data starting with "(" and ending with ")". Go to the
Tab “Text Encoder/Decoder”, bear in mind
that a single character missing in the ciphertext
will cause Encryption Protection to malfunction, though
any extra characters before and after the parentheses
will not. Paste your ciphertext into the Encryption
Protection-Input Box by clicking the 'clipboard to
input box’-button using Paste & Copy. Click
the Decode button to decode your text. |
File Decoding:
- Go to the Tab “File Decoder”,
Click the “Add” button and select the
file to be decoded from the file browser, browse the
path for decrypted file and click the “Decode”
button to proceed. You can choose from either a .epf-file
(carrying plain text) or a .exe-file carrying secured
binary information. |
Double click from
within your Internet browser on a secured .epf- or
.html-file. Your browser will open your self-decrypting
file containing either your secured text or a secured
webpage and will prompt you to enter your key-phrase
to get that file decoded. |
Note:
All files containing encoded binary information (such
as MS Word documents, mp3-files, pictures, movies
etc.) will require an installation of (at least the
free demo of) the Encryption Protection-application
to be able decode. |
Again, if you have
received an email carrying some Encryption Protection
secured ciphertext within it, retrieve your ciphertext
by marking and copying all data starting with "(" and
ending with ")". Stay online. Paste your ciphertext into
the Input Box of our Online Decoder at http://www.encryptionprotection.com/online.htm
and click the Decode button to be prompted to enter
your key-phrase. Encoded binary files or encoded files
containing text or HTML of large amounts cannot be
decoded using the Online Decoder.
|
|
Sending
self decrypting files through email |
Encryption Protection
works independently from all your desktop email applications,
such as Eudora or MS Outlook, and from all web based
email accounts. |
You can easily attach
any files generated by Encryption Protection to one
of your outgoing emails. The recipient can download
that attachment or open it right away within the email
account as a normal .exe file. However files carrying
encoded binary information (having a .exe-extension)
do not require the Encryption Protection
software to decode. The decoding can be done by simply
clicking on the exe file and providing the corresponding
key-phrase. |
Use Paste &
Copy to copy any ciphertext from Encryption Protection's
Input Box directly into one of your outgoing emails,
and vice versa. Important: Make sure you copy all
data starting with "(" and ending with ")". A single character
missing might cause Encryption Protection to malfunction.
The designated recipient of that email will need to
mark that text with the left mouse touch, copy it
and paste it into the Online Decoder at
http://www.encryptionprotection.com/online.htm
or into the Input Box of a Encryption Protection installation. |
Please zip self decrypting .exe files
before sending them via email as many email service providers
do not allow sending plain .exe file. Encode time depends
on file size and so forth. |
AOL
& Netscape Navigator users: We recommend use of
MS Internet Explorer or Netscape Communicator to open
and decode Encryption Protection's encrypted files.
|
|
Tips on how to agree on a key phrase |
Do not transmit
your key-phrase (key entry) to the person you wish
to communicate with through phone, fax or email unless
it's either concealed by a large amount of junk data
or it's not indicated as your personal key-phrase.
If you have to use email, make sure not to call your
key-phrase 'the very important key we are going to
use to encode Encryption Protections with'. Preferably,
agree on a key-phrase when you meet the recipient
in person. If you have to use electronic means of
communication we suggest you define a parameter for
the key-phrase beforehand so that any other person may
not decipher the content. |
Note:
If you lose your key-phrase, neither you nor the software
developer will be able to retrieve your data any
longer.
|
|
Tips on sending encrypted data through email
|
If you happen to
experience a problem sending a self-decrypting Encryption
Protection file to an email account through a firewall,
copy and paste the encoded data (ciphertext) from
the Input Box of your Encryption Protection application
directly into the body of your outgoing email. This
way only passive data is transmitted within the body
of your email, and there is no attachment containing any
.exe
file. Ask the recipient of your email to either use
the Online Decoder at http://www.encryptionprotection.com/online.htm
or the Encryption Protection software itself to decode. |
|
File
Shredder |
Encryption Protection
also features an integrated File Shredder. Click the
'file shredder'-button and browse for a file which
contains the confidential contents you want to have completely
erased. Normal file deletion only removes a file's
directory entry, but leaves the data contained in
the file on your drive as data chunks. The File Shredder
completely overwrites the contents of a file 7 times.
The purpose of the File Shredder is to completely
remove files and their contents from your drive. Once
a file has been shredded it cannot be recovered using
any sophisticated file restoration (un-delete) utility.
|
Note:
- |
(a)
You can’t shred more than 1 file at one time.
(b) You can’t shred folders. |
|
Using EncryptionProtection through
a command line |
Encryption Protection
can be executed by a command line to facilitate the
periodic tasks of securing files with a given key-phrase.
This way, the process of either
encrypting, decrypting or shredding a file can be
initiated via a single keystroke. Moreover, any other
program installed on your system that is capable of
implementing a command line can automatically also
pass instructions to
Encryption Protection, provided that the command
line parameters for EP have been set in advance. If you don't want to feed
an Encryption Protection-command-line from another
application,
we recommend that you create a simple shortcut on your desktop
that will initiate the EP function. What you need to
do is, go to your Encryption Protection installation
folder (probably in c:\program files\Encryption Protection),
right click the Encryption Protection executable file
and choose 'Send To > Desktop (Create Shortcut)'.
Go to your desktop, right click your shortcut, open
the 'Properties' tab, look for the path of the shortcut
to the actual executable file in your Encryption Protection
application folder and navigate to the location of
the Encryption Protection .exe file at the command
prompt, write the .exe file name and press the space
bar once. Then write the argument(s) in the same line
and press the Enter Key from the keyboard. The .Exe
will be executed accordingly. If you are looking to
execute the File Shredder through a command line,
the same method will be used. The following elements are
required in this order to form a command line to
either encode or decode: |
Start with the path
to the executable file of the Encryption Protection
application in its installation folder. Probably it
will be: |
c:\program files\EncryptionProtection\Encryption
Protection.exe [ENCODE][DECODE][SHRED] Src =[FileName]
Dest =[Destination Path] Key = [KeyFile] |
Src= This
is the path of the source file you intend to either
encode or decode. |
Dest= This
is the path of the destination file that the results of
this task will be saved in. If you are encoding some
data, the destination file will need to have an .epf
-extension. If you are decoding a file, the destination
file will need to have exact the same extension it
had before it was encoded. |
Key= This
is the path of to the file on your computer containing
your key-phrase. All key-phrases saved from within
the Encryption Protection application have a different
extension. A key-phrase named "mykey" will
be saved on your computer as "mykey.eKey ".
You will need include the extension of your key-phrase
into this path. However, if you saved your key with
Windows Notepad, it has the .txt extension. However this
key file will not be good enough for the command line
decryption. |
Encryption Protection
totally obeys to your command line. It does not correct
any incorrectly specified extensions. When you are naming
the path of a file to be decrypted in the src-parameter,
you need to recall the original extension of that
file it had before it was encrypted. |
|
EXAMPLE
OF A COMMAND LINE TO EXECUTE ENCODING OR DECODING:
|
Say you intend to
encrypt an invoice written on MS Word called 'MyDoc'
over and over again, and at every time you intend to
use a key-phrase-file previously created and saved
by Encryption Protection called 'mykey', and you want
to have the encrypted file named 'securedMyDoc' and
have it placed on your root drive, use the following
command line: |
c:\program files\Encryption
Protection\Encryption Protection.exe encode
src=c:\mydoc.doc dest=c:\securedMyDoc.epf
key=c:\mykey.eKey |
If you
intend to decrypt the same invoice over and over again
using the same key-phrase, the following command line
could look like this: |
Once all parameters
are perfectly set, click OK and close your shortcut.
From now on, all you'll need to do to initialize the
process of encryption of this document is to click
on your icon on the desktop. Of course you can create
as many shortcuts as you like, each one of them assigned
with a different task. |
EXAMPLE
OF A COMMAND LINE TO EXECUTE THE FILE SHREDDER:
|
Say you intend to
shred 'MyDoc' on your root drive, use the following
command line:
c:\program files\Encryption Protection\Encryption
Protection.exe shred c:\myDoc.doc |