StangroomeCrypt beta v1.00.0002

	StangroomeCrypt is an encryption/decryption application that uses a simple XOR method
	that should keep your data away from unwanted eyes.
	To use StangroomeCrypt you will require the MS Visual Basic 4.0 run-time files.

How To Encrypt a File

	 1) Browse ("..." button) to the Source File on your computer. In this case this is the
            file that you want to encrypt. 
	 2) Choose an Output File. This is where the encrypted data will be saved. It is a good
	    idea to give this file an extension like .CRYPT so you know that it is encrypted.
	 3) Select a Key File, this is like a password only it is a whole file.
	    (see "Choosing a Good Key File" below)

		BE SURE TO CHOOSE A KEY FILE THAT WILL NOT VARY! DO NOT USE
		A FILE THAT CHANGES OFTEN, SUCH AS A LOG FILE OR DATABASE!

	 4) Click the Crypt button to begin encryption. The Title Bar will show how much has
            been encrypted as a percentage and you can stop it at any time with the Cancel
            button. The process is time consuming but it is faster than many other techniques.

Choosing a Good Key File

	 *  A Key File must be a file that will not change. If the Key File changes while your
	    file is in an encrypted state you will not be able to decrypt it properly.
	 *  A Key File should have very few zero bytes in it as these bytes do not affect the
	    data. A future version may have a facility to check for excessive zeros.
	 *  The larger the Key File the better. The Data Encryption Standard uses a 56 bit
	    (7 bytes) key giving 72,057,594,037,930,000 possible combinations. For each bit
	    you add the number of combinations doubles.
	 *  Use a file that not many people will have. Use a photo of yourself or a friend
	    as a Key File, instead of something like WIN.COM which is very common.

How To Decrypt a File

	 1) Select the encrypted file as the Source File this time. StangroomeCrypt uses one
	    routine for both encryption and decryption.
	 2) Choose as Output File. This is where the original data will be saved after it has
	    been decrypted. Make sure you give it the original extension.
	 3) Select the same Key File that was used to encrypt the file. If you use a different
	    file or if the Key File changed, the Output File will be mainly garble.
	 4) Click the Crypt button to begin decryption. Again, the Title Bar will show how much
	    has been decrypted and you can stop it at any time with the Cancel button.

Disclaimer

	THE FILES PROVIDED ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND.
	I DISCLAIM ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
	WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
	IN NO EVENT SHALL I OR MY SUPPLIERS BE LIABLE FOR ANY DAMAGES
	WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS
	OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF I OR MY SUPPLIERS HAVE
	BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Contacting the Author

	THIS SOFTWARE IS NO LONGER SUPPORTED.

										7th January, 1999