ok Jamal,sounds good for some folks, I have two questions though, one if you "stash" things, and your comp goes down, how does one unstash there backup files on the repaired/replaced computer? and my second note is why no GUI? I myself can't stand using command line stuff and avoid it at any chance I can, you can't do completely without, not if your going to utilize all the functionality of a computer, but when I can, I do, up to and including paying for programs that have a free command line interface counterpart, or searching until I can find a GUI one, even if it doesn't have some of the functionality of its command line equivalent.
regards, inthane proprietor, The Grab Bag, for blind computer users and programmers http://grabbag.alacorncomputer.com Owner: Alacorn Computer Enterprises "own the might and majesty of a Alacorn!" www.alacorncomputer.com Owner: Agemtree "merchants in fine facetted and cabochon gemstones" www.agemtree.comoperator: Fruit Basket Demo Sight, where you can find a similar project done in several programming languages, along with its source code, so you can decide what language is right for you
http://fruitbasketdemo.alacorncomputer.com----- Original Message ----- From: "Jamal Mazrui" <empower@xxxxxxxxx>
To: <programmingblind@xxxxxxxxxxxxx>; <program-l@xxxxxxxxxxxxx> Sent: Wednesday, October 08, 2008 6:29 AM Subject: Announcing Stash
Now available at http://EmpowermentZone.com/stash.zip Stash Version 1.0 October 8, 2008 Copyright 2008 by Jamal Mazrui LGPL license Stash is a set of console-mode, command-line utilities for encrypting and decrypting text. Requiring the .NET Framework 2.0 (or above), the three utilities are sh.exe, Stash.exe, and Unstash.exe. They work as follows. sh Text where Text is a sequence of characters to encrypt, e.g., a password. If it contains one or more space characters, then surrounding quotes should be used. The result is a file called sh (no extension) in the current directory. This file encrypts the text in such a way that it is considered secure from being read on any computer besides the one on which it was created. If sh.exe is run without a command-line parameter, it looks for a file called sh in the current directory, decrypts it, and sends the text to standard output. This output would be visible in a console window. Alternatively, another program may run the utility and capture its standard output. The other utilities provide more flexibility and work as a pair. Stash SourceFile TargetFile or Unstash SourceFile TargetFile Stash.exe encryptes text contained in SourceFile, creating TargetFile as the result. Unstash.exe does the reverse, decrypting SourceFile and putting its text in TargetFile. If either file name contains a space, surrounding quotes should be used. The Stash utilities are open source, with code in the language of Visual Basic 2005. Under the license, derivative works must likewise be open source. If only the binary executables are being used, however, redistributing the source code is not necessary. Note that information saved by Stash may be read by someone else who has access to the same computer and knowledge of the technique. Stash offers high protection only when the file is copied to another computer. __________ View the list's information and change your settings at //www.freelists.org/list/programmingblind
__________View the list's information and change your settings at //www.freelists.org/list/programmingblind