Alternately, use the DOS "md" command to create a new subdirectory such as "clo2" and copy the program there. Then use the DOS "cd" command to move to that directory whenever you use the program. You can use the program from any directory by adding the cloak2 subdirectory (e.g., ";C:\CLO2") to your command path, which is normally set in AUTOEXEC.BAT.
Suppose you have advanced CLOAK2 and a file named FILE.TXT; to encipher the contents of FILE.TXT into a new file FILE.CLO, enter:
cloak2 file.txt file.clo /e ^ ^ ^ ^ encipher | | resulting file | source file program nameCLOAK2 will announce itself, then ask for the User Key, twice. The User Key can be any sequence of characters, but a long unique text phrase is easier to remember than random characters. After getting the key, a 30K file should finish in a second or two. The result is a file of random-like binary data.
cloak2 file.clo *.res /d ^ ^ ^ ^ decipher | | resulting file (FILE.RES) | source file program nameCloak2 will again ask for the User Key twice, and this must be exactly the same key as was used to encipher the file. (An advanced Cloak2 alias file makes using keys much easier.)
cloak2 newfred.trn /a fred /gHere Mary creates a new key to Fred: "fred" is the local alias tag she will use to access the new key. "newfred.trn" is the name Mary gives the file she will later send to Fred (she has already erased any file of that name). Cloak2 will generate a random key for alias "fred" and automatically place it at the start of Mary's closest existing alias file, or will create a new alias file in the current directory.
Mary will be asked to enter the key for her alias file twice; this is the most-used and most-important key she will have, and should be a long unique phrase which she can remember and keep secret.
Cloak2 will also place the same new random key in NEWFRED.TRN (the transport file) and Mary will enter "mary" as the far-end tag; this is the alias Fred will use for the new key, once he installs it in his own alias file. Mary will also enter another phrase (the transport key) twice, to protect NEWFRED.TRN until it gets to Fred.
cloak2 file.txt *.clo /e /a fredNow Mary only needs to enter a key once: the key for the alias file. The actual encipher key is found automatically in the alias file under alias "fred". Decipher uses the same alias, the same way (with /d).
cloak2 newfred.trn /d (one-filename decipher; Fred enters the transport key) cloak2 newfred.trn /e (one-filename encipher; Fred enters his own alias-file key) copy /b cloak2.mgt clo2mgt.old copy /b newfred.trn+clo2mgt.old cloak2.mgtWe assume that Fred is in his alias directory (which is usually the Cloak2 directory) and so will have direct access to his alias file. Fred could have several alias files, and the last two commands could be modified and repeated for each file where the new alias is needed.
Use the PIF Editor (in Program Manager group Main) selections File, New to start a new definition. Then set Program Filename as the complete path to Cloak2 (e.g., "c:\clo2\cloak2.exe"). Optional Parameters and Start-up Directory should be empty. Video Memory should be "Text". Memory Requirements for KB Required should be "200"; KB Desired should be "320"; for both EMS and XMS memory, KB Required and KB Limit should be "0". Display Usage should be "Windowed", Close Window on Exit checked, and neither Background nor Exclusive Execution need be checked.
Of the Advanced Options, Uses High Memory Area need not be checked, but Emulate Text Mode should be. Then use the PIF Editor selections File, Save As to save the new file as CLOAK2.PIF, in the same directory as Cloak2 (e.g., "c:\clo2\cloak2.pif").
The "PIF" file tells Windows how to set up the DOS window when Cloak2 is invoked.
To Encipher a file with Cloak2 open up Cloak2 (use Ctrl-Esc, Switch To), select "Enter" and enter an encipher command (for example, "/e c:\email\john01.ltr"). You will be asked to enter a User Key, twice, and then Cloak2 will encipher that file.
If you have Advanced Cloak2, it is better to establish an alias file to hold your keys. You can use public alias tags to select any of the keys, and you need only enter the one key for the alias file, once. A typical command would be: "/e c:\email\john01.ltr /a johnj" after you establish a key for "johnj".
To Decipher a file with Cloak2 open up Cloak2 (use Ctrl-Esc, Switch To), select "Enter" and enter a decipher command (for example, "/d c:\email\fred1.msg"). You will be asked to enter a User Key, twice, and then Cloak2 will decipher that file.
Again, if you have Advanced Cloak2, it is better to establish an alias file for your keys. Then "/d c:\email\fred1.msg /a fredw" will select the key for "fredw".