
The XORcrypt encryption/decryption utility ver 1.3
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 - What is XORcrypt?
 - Why XORcrypt is better than other encryption utilities?
 - The requirements
 - XORcrypt: how to register?
 - Algorithm
 - Installation
 - How to use and basic opportunities?
 - What's new?
 - The future versions



What is XORcrypt?
=================

XORcrypt   is   utility  for reliably encrypting/decrypting of email and any
files  with the help of a LONG key file and bitwise operation "exclusive OR"
(XOR).
Neither complex algorithms nor closed code.Simply, clearly and reliably.


Why XORcrypt better than other encryption utilities?
====================================================

Do not believe to known complex encryption algorithms.
Earlyer   or   later   security  services  will receive access to the closed
(coded) information of the enterprises and private persons.
Recently  in  the  different  countries  began  to  occur the laws (or their
projects)  which  force  the  developers  of  algorithms  to  cooperate with
security services. For example "United & Strengthen America Act".
XOR  encryption  easily solves this problem. There is no algorithm. Only one
bitwise command.
The level of encripting is not below than at known algorithms.
As a key it is possible to choose any file.
The key file can be anywhere in the Internet.
Do  not  store  it  together  with  encrypted information and decryption for
extraneous becomes an unsoluble problem.
Very conveniently and it is reliable to use the multimedia files. For example
.gif, .jpg, .mid, or .mp3.
It is not necessary to choose very large file. 20K-50K is quite enough.
But if you regularly use the same key file for encrypting, it should be very
large.
You can consistently encrypt your information by two, three keys.
The  main  problem  how  to  pass  a  key.  Use  something from the Internet
galleries or identical CDs.
The program allows for a key instead of the local file to use a URL.
The simple decisions always more reliable.


The requirements
================

On  the  computer  should  be installed Windows Scripting  Host with JScript
version 5.0 or higher.
It is by default installed on Win XP/2000/98.
The new versions and versions for other Microsoft operational systems can be
found on
   http://www.microsoft.com/msdownload/vbscript/scripting.asp


XORcrypt: how to register?
==========================

You can register your copy of XORcrypt at a cost of $9 on the order page:

   https://www.regnow.com/softsell/nph-softsell.cgi?item=6025-1
or
   http://www.regsoft.net/regsoft/vieworderpage.php3?productid=41969

On payment approval (usually, in one-two business days), we'll send you the
confirmation.
Your  registration  will  be  valid  for all future versions of XORcrypt and
entitles to reception of advices.

If  you  will  not  get your confirmation within a reasonable amount of time
(three  business  days  for  credit  card  payments  or  two weeks for other
payments),   please   notify  us  about  that!  We're  very  sorry  for  any
inconvenience caused by those delays.

Important: when filling the order form, please double-check that your e-mail
address is correct. If it will not, we'll be unable to register you.


Algorithm
=========

XORcrypt does not use any encryption algorithms,
only bitwise operation "exclusive or" (XOR).
The operation XOR allows to encrypt:
    encrypted = source    XOR key 
or decrypt:
       source = encrypted XOR key
Try example.js. It is  so simple.
XORcrypt.js does the same with files.
Look in its source. You can trust to such simplicity .


Installation
============

XORcrypt does not require installation and at once is ready to use.
However  Install.js  allows  to register XORcrypt in Windows registry and to
add it in the contextual menu of Microsoft Explorer.
Uninstall.js deletes XORcrypt from Windows registry.


How to use and basic opportunities
==================================

XORcrypt [source] [/K:keyfile] [/O[:outfile]] [/E] [/Y] [/N] [/?]

source  - full path to source file. If it is omitted, it will be requested in dialogue.
keyfile - full path to key file. If it is omitted, it will be requested in dialogue.
outfile - full path to destination file. If it is omitted, it will be overwritten source file.
          If /O used without path, destination file will be requested in dialogue.
/E      - To encrypt file once more even if it is already encrypted.
          By default encrypted file will be decrypted.
/Y      - To carry out an encryption/decryption without confirmation.
/N      - The same with confirmation (default).
/?      - To show options list.

What's new?
============
- The control of the JScript versions is added.
- Stream encryption is released. Now it is possible to process and to use as
  a key files of any size. Speed of encriptyng has increased in some times.
- The support of Microsoft Outlook is added.

The future versions
===================

In the following version XORcrypt will be built-in in some email clients.
I shall be glad to any wishes and recommendations.
Please send them on saf@highedge.com.
Last version can be found on http://highedge.com/download/XORcrypt.zip

Yours faithfully,

                                                           Alexandr Shpirkov