Re: Announcing Stash

  • From: "InthaneElf" <inthaneelf@xxxxxxxxxxxxxx>
  • To: <programmingblind@xxxxxxxxxxxxx>
  • Date: Wed, 8 Oct 2008 17:01:49 -0700

ok Jamal,

sounds good for some folks, I have two questions though, one if you "stash" things, and your comp goes down, how does one unstash there backup files on the repaired/replaced computer? and my second note is why no GUI? I myself can't stand using command line stuff and avoid it at any chance I can, you can't do completely without, not if your going to utilize all the functionality of a computer, but when I can, I do, up to and including paying for programs that have a free command line interface counterpart, or searching until I can find a GUI one, even if it doesn't have some of the functionality of its command line equivalent.

regards,
inthane
proprietor, The Grab Bag,
for blind computer users and programmers
http://grabbag.alacorncomputer.com
Owner: Alacorn Computer Enterprises
"own the might and majesty of a Alacorn!"
www.alacorncomputer.com
Owner: Agemtree
"merchants in fine facetted and cabochon gemstones"
www.agemtree.com
operator: Fruit Basket Demo Sight, where you can find a similar project done in several programming languages, along with its source code, so you can decide what language is right for you
http://fruitbasketdemo.alacorncomputer.com

----- Original Message ----- From: "Jamal Mazrui" <empower@xxxxxxxxx>
To: <programmingblind@xxxxxxxxxxxxx>; <program-l@xxxxxxxxxxxxx>
Sent: Wednesday, October 08, 2008 6:29 AM
Subject: Announcing Stash


Now available at
http://EmpowermentZone.com/stash.zip

Stash
Version 1.0
October 8, 2008
Copyright 2008 by Jamal Mazrui
LGPL license

Stash is a set of console-mode, command-line utilities for encrypting and
decrypting text.  Requiring the .NET Framework 2.0 (or above), the three
utilities are sh.exe, Stash.exe, and Unstash.exe.  They work as follows.

sh Text
where Text is a sequence of characters to encrypt, e.g., a password.  If
it contains one or more space characters, then surrounding quotes should
be used.  The result is a file called sh (no extension) in the current
directory.  This file encrypts the text in such a way that it is
considered secure from being read on any computer besides the one on which
it was created.

If sh.exe is run without a command-line parameter, it looks for a file
called sh in the current directory, decrypts it, and sends the text to
standard output.  This output would be visible in a console window.
Alternatively, another program may run the utility and capture its
standard output.

The other utilities provide more flexibility and work as a pair.

Stash SourceFile TargetFile

or

Unstash SourceFile TargetFile

Stash.exe encryptes text contained in SourceFile, creating TargetFile as
the result.  Unstash.exe does the reverse, decrypting SourceFile and
putting its text in TargetFile.  If either file name contains a space,
surrounding quotes should be used.

The Stash utilities are open source, with code in the language of Visual
Basic 2005.  Under the license, derivative works must likewise be open
source.  If only the binary executables are being used, however,
redistributing the source code is not necessary.

Note that information saved by Stash may be read by someone else who has
access to the same computer and knowledge of the technique.  Stash offers
high protection only when the file is copied to another computer.


__________
View the list's information and change your settings at
//www.freelists.org/list/programmingblind



__________
View the list's information and change your settings at //www.freelists.org/list/programmingblind

Other related posts: