Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
sf-readme.txt | 2024-05-02 | 3.9 kB | |
fhl.jar | 2024-05-02 | 463.1 kB | |
fhl-1-0-0.jar | 2024-05-02 | 463.1 kB | |
fhl-devel-1-0-0.zip | 2024-05-02 | 2.9 MB | |
fhl-lib-1-0-0.jar | 2024-05-02 | 126.8 kB | |
fhl-user-1-0-0.zip | 2024-05-02 | 1.0 MB | |
fhl-libsrc-1-0-0.zip | 2024-05-02 | 54.6 kB | |
fhl-user-1-0-0.zip.sig | 2024-05-02 | 833 Bytes | |
fhl-devel-1-0-0.zip.sig | 2024-05-02 | 833 Bytes | |
fhl-lib-1-0-0.jar.sig | 2024-05-02 | 833 Bytes | |
fhl-libsrc-1-0-0.zip.sig | 2024-05-02 | 833 Bytes | |
fhl-1-0-0.jar.sig | 2024-05-02 | 833 Bytes | |
fhl.jar.sig | 2024-05-02 | 833 Bytes | |
Totals: 13 Items | 5.1 MB | 2 |
FILEHASHLER README ================== Advanced Technology Object Encryption Utility Software Version Status: Dev 1-0-0 (01 May 2024) Status: Mature What is FileHashler? -------------------- FileHashler is a security utility program capable of transforming any single datafile up to 9.2 EB size into encrypted form and back from encrypted into cleartext form. The program can also encrypt and decrypt entire directories, in which case a set of encrypted single files is created under a new directory name. Any encrypted object (file or directory) can be tested for integrity and correct accessibility via a verification command. The encrypted file holds internal cataloging information about the original, rendering the encrypted form as free to use. Authorised access to an encrypted file is checked through a symmetric secret user keyword or passphrase. "Symmetric" means that you use the same key to encrypt and decrypt the file. Through verification the catalogue information of an encrypted object is displayed. How to Use FileHashler ---------------------- FileHashler is a Java program and requires JRE 1.8.0 or higher installed on your computer. This release works as a commandline program. It can be operated in pure console mode, i.e. on a headless Java VM, and in graphical support modus. Support modus is assumed the default if the VM allows it, and brings some comfort benefit through windowed passphrase input dialogs. It is possible to run the program in pure console modus with a commandline option. -- Simple Use Place the "fhl.jar" file into some directory D. Bring up a console or a console window and start with "java -jar <D>/fhl.jar <commandline>" to start the program. If <commandline> is empty a help text should be displayed. A user manual can be created by applying "-h <filename>" as command. Read this document for command details and general information. -- Installation in Linux/Unix Enter system administration. Copy fhl.jar file into /usr/bin folder. Create a text file with execution rights and the following content in /usr/bin: #!/bin/sh java -jar /usr/bin/fhl.jar $* Leave administration mode. You can now call FileHashler with 'fhl <commandline>' from anywhere. - RELEASE SECURITY Some downloads can be verified using the signature files '*.sig' and GnuPG (http://www.gnupg.org) or PGP and use of the public RSA key Wolfgang Keller 06B66D2C2D62226C <neolith@uber.space> which is available at a public key server or in the wiki of the project. Copyright and Legal Note ------------------------ - Copyright and Public Usage This software is copyright protected material to Wolfgang Keller, Munich (c) 2005 - 2024 and third parties where indicated in source code and documentation. It is made available for public use including modification exclusively under the GNU General Public License (GPL), Version 2. Please read the accompanying "License" text for proper understanding of these conditions. Remember this is not "freeware" software. For intended usage of this software outside of the GNU limitations please contact the rights owner under <neolith@uber.space>. Modified versions of this program must be explicit of their status and modifying author and MAY NOT be distributed under the same product name as this software. - Liability and Legal Restrictions This software is not commercial. Its use is entirely by your own risk and responsibility. No liability is given for damage caused, directly or indirectly, through the use of this software, other than what is legally necessitated. No liability can be given for the use of third party software which may be included in the packages. It is within your own responsibility to make the use of this software conforming to the local laws of your living place, in particular in regard to the use of low and high data encryption levels, which are both enabled by this software. Munich, 01 May 2024 - Wolfgang Keller