Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
fhl-user-0-3-0.zip | 2024-03-12 | 1.0 MB | |
fhl-user-0-3-0.zip.sig | 2024-03-12 | 833 Bytes | |
sf-readme.txt | 2024-03-12 | 3.9 kB | |
fhl-libsrc-0-3-0.zip | 2024-03-12 | 48.5 kB | |
fhl-libsrc-0-3-0.zip.sig | 2024-03-12 | 833 Bytes | |
fhl-devel-0-3-0.zip | 2024-03-12 | 2.9 MB | |
fhl-lib-0-3-0.jar | 2024-03-12 | 117.4 kB | |
fhl-lib-0-3-0.jar.sig | 2024-03-12 | 833 Bytes | |
fhl-devel-0-3-0.zip.sig | 2024-03-12 | 833 Bytes | |
fhl-0-3-0.jar | 2024-03-12 | 453.6 kB | |
fhl-0-3-0.jar.sig | 2024-03-12 | 833 Bytes | |
fhl.jar | 2024-03-12 | 453.6 kB | |
changelog.txt | 2024-03-12 | 2.1 kB | |
fhl.jar.sig | 2024-03-12 | 833 Bytes | |
Totals: 14 Items | 5.0 MB | 0 |
FILEHASHLER README ================== Advanced Technology File Encryption Utility Software Version Status: Dev 0-3-0 (12 Mar 2024) Status: Mature What is FileHashler? -------------------- FileHashler is a security utility program capable of transforming any single datafile up to 9.2 EB size into encrypted form and back from encrypted into cleartext form. Furthermore, integrity and access to an encrypted file can be tested by a "verify" command. The encrypted form holds some cataloging information about the original, rendering the encrypted file free to use. Authorised access to an encrypted file is checked through a symmetric secret user keyword or passphrase. "Symmetric" means that you use the same key to encrypt and decrypt the file. FileHashler makes use of the Twofish algorithm designed by Bruce Schneier et al. and the "Password Safe" database format. The security status is "strong and practical" by default but can be lowered or enhanced by use of command options. See the user manual. How to Use FileHashler ---------------------- FileHashler is a Java program and requires JRE 1.8.0 or higher installed on your computer. This release works as a commandline program. It can be operated in pure console mode, i.e. on a headless Java VM, and in graphical support modus. Support modus is assumed the default if the VM allows it, and brings some comfort benefit through windowed passphrase input dialogs. It is possible to run the program in pure console modus with a commandline option. -- Simple Use Place the "fhl.jar" file into some directory D. Bring up a console or a console window and start with "java -jar <D>/fhl.jar <commandline>" to start the program. If <commandline> is empty a help text should be displayed. A user manual can be created by applying "-h <filename>" as command. Read this document for command details and general information. -- Installation in Linux/Unix Enter system administration. Copy fhl.jar file into /usr/bin folder. Create a text file with execution rights and the following content in /usr/bin: #!/bin/sh java -jar /usr/bin/fhl.jar $* Leave administration mode. You can now call FileHashler with 'fhl <commandline>' from anywhere. - RELEASE SECURITY Some downloads can be verified using the signature files '*.sig' and GnuPG (http://www.gnupg.org) or PGP and use of the public RSA key Wolfgang Keller 06B66D2C2D62226C <neolith@uber.space> which is available at a public key server or in the wiki of the project. Copyright and Legal Note ------------------------ - Copyright and Public Usage This software is copyright protected material to Wolfgang Keller, Munich (c) 2005 - 2024 and third parties where indicated in source code and documentation. It is made available for public use including modification exclusively under the GNU General Public License (GPL), Version 2. Please read the accompanying "License" text for proper understanding of these conditions. Remember this is not "freeware" software. For intended usage of this software outside of the GNU limitations please contact the rights owner under <neolith@uber.space>. Modified versions of this program must be explicit of their status and modifying author and MAY NOT be distributed under the same product name as this software. - Liability and Legal Restrictions This software is not commercial. Its use is entirely by your own risk and responsibility. No liability is given for damage caused, directly or indirectly, through the use of this software, other than what is legally necessitated. No liability can be given for the use of third party software which may be included in the packages. It is within your own responsibility to make the use of this software conforming to the local laws of your living place, in particular in regard to the use of low and high data encryption levels, which are both enabled by this software. Munich, 12 March 2024 - Wolfgang Keller