Você está na página 1de 37

P O T A S S I U M H Y D R O X I D E

(KOH)

Disk Encryption System

Written by "The King of Hearts"

The executable program KOH.COM and this


document file KOH.DOC may be distributed
for free. Please spread them all over
the known universe!

Complete source, or an original


distribution disk is available from:

American Eagle Publications, Inc.


P.O. Box 41401
Tucson, AZ 85717

See the order form at the end of this document.

(C) 1993 American Eagle Publications, Inc.

---------------------------------
* This software was developed in MEXICO *

WARNING: Certain entities who claim civil authority in the


United States consider this to be an export-controlled item
due to the strong cryptography implemented therein. We do not
intend to defy them though their claims to said authority are
somewhat dubious in view of their disdain for the
constitution. This matter you must consider for yourself.
-------------------------------
3

INDEX
=====

CHAPTER PAGE

1. Warning 5
2. How KOH Works 6
3. Installation 7
Floppy Disk Installation 7
Hard Disk Installation 8
4. Speed Considerations 12
5. IDEA-Based Cryptography 13
6. Hotkeys 16
7. System Backup 18
8. How do I . . . ? 21
9. If you have problems 23
10. Order Information 25
5

1. WARNING
==========

This disk encryption system employs a state-of-the-art


encryption algorithm called IDEA in conjunction with a
sophisticated low-level disk intercept to secure your
IBM compatible personal computer system from intrusion.

PLEASE READ THESE INSTRUCTIONS COMPLETELY BEFORE INSTALLING


THIS PROGRAM ON YOUR COMPUTER SYSTEM.

If you do not, you could render all of the data in your


system PERMANENTLY INACCESSIBLE WITHOUT REMEDY!

Secondly, improper installation could leave your computer


system vulnerable to cryto-analytic attack. Although KOH uses
a very good cryptographic algorithm, YOU have a part to play
in making sure you are secure. This manual will tell you how.

In short, take your time, read the manual, and do it right


and you'll be glad you did!
6

2. HOW KOH WORKS


================

Potassium Hydroxide is an on-the-fly disk encryption program.


When you install it, it will encrypt your hard disk (and
floppies) so that all of the information on it will look like
jibberish without the corresponding decryption in place, and
the proper password entered when you start the computer.

KOH hides itself in a small space on your hard disk that is


normally never used, and it is the very first thing loaded
from disk when you turn your computer on. It installs itself
in your computer's memory, and then asks you for a pass
phrase. If you enter the wrong thing, your disk still looks
like jibberish.

Once KOH is installed in memory, it monitors all attempts to


access the disks in your system. Everything that is written
to disk is encrypted by KOH, and everything read from disk
into memory is decrypted. Nothing is ever stored to disk in
an unencrypted form as long as KOH is in the system. Thus, if
you are in a situation where you have a security problem, all
you have to do is turn your computer off, or hit the reset
button, and everything is instantly locked out of the reach
of anyone who doesn't know your pass phrase.

Functionally, KOH works in a manner similar to a computer


virus. It uses "stealth" technology developed by computer
virus writers to hide itself in your computer system's memory
and on its disks. Likewise, it uses technology first
developed by virus writers to help you keep all of your work
encrypted without having to remember to do all the
housekeeping yourself. KOH differs from a virus in that it is
friendly. It doesn't just come along and do something nasty
whether you want it to or not. You remain in control, and KOH
does an important job for you!

This virus technology actually makes KOH a much more


effective program than some other commercial programs. For
example, some programs implement encryption using a device
driver. This, however, makes it impossible to encrypt the
boot-up code, and part of the directory structure. Others
force you to set up a separate partition on your hard disk,
etc., etc. By hiding like a virus, KOH allows you to encrypt
EVERYTHING.
7

3. INSTALLATION
===============

IMPORTANT: Read this section through once from start to


finish and then go through it again, step by step, while
doing what it says.

A. Floppy Disk Installation


---------------------------

There are two ways to put an active copy of KOH on a floppy


disk. The first way we will discuss is to use the KOH.COM
program, provided with this DOC file.

To create a disk encrypted with KOH, you should first create


a bootable floppy of the type used in your A: drive. To do
this, use the command

FORMAT A: /S /U

to format the disk in drive A: and put the system files on


it, so that it can be booted. The /U calls for an
unconditional format, which just wipes out any pre-existing
data on that disk. Once you've done this, simply run the KOH
program as

KOH A:

When you run KOH, you will be prompted for a pass phrase for
that floppy disk. You should always pick a good pass phrase.
A bad one will seriously compromise security in your system.
If somebody (or somebody's computer) can guess your password,
then you're wide open. See the discussion of pass phrases
below, IDEA-Based Cryptography.

After you enter a pass phrase, KOH will proceed to encrypt


this disk and install itself. The process takes a minute or
two. When complete, KOH will inform you that is is done, and
you will find yourself back at the prompt. If you attempt to
do a directory of that floppy now, it will look like pure
gibberish.

Now, if you have a floppy-only computer system, or if you


don't want KOH on the hard disk, you can boot from your newly
created floppy disk. KOH will load itself into memory and
ask you for a pass phrase. Enter the pass phrase, and your
disk will proceed to boot. If you do a directory on it,
you'll see everything there just like you would expect, with
no jibberish. KOH is resident in memory, decrypting the
information on that disk as it is loaded into your computer's
memory. You can turn your computer off at any time, and your
disk will be completely safe from prying eyes.
8

When KOH is resident in memory (loaded by booting off a disk


on which it is installed), you can encrypt new disks with no
trouble at all. All you have to do is do a directory on a
disk, and KOH will automatically encrypt it with the same
password you entered when you started up, and put the
decryption routines on it. For example, if you put a diskette
in your B: drive and type

DIR B:

you won't get the directory immediately, like you usually do.
KOH will sense an unencrypted disk in that drive, and encrypt
it before anything else happens. When KOH is done encrypting,
you'll get the directory display just like you usually do,
but now that disk is encrypted. Thus, once you have your
first encrypted disk, making more is very easy.

If you need to access a diskette WITHOUT automatically


encrypting it (perhaps you are copying a few files from a
friend, and you want to give his disk back), you can easily
turn the auto-migrate feature off by using the hot-key
Ctrl-Alt-O (letter o). When you press this three-key
combination (just like you use Ctrl-Alt-Del to reboot), your
computer will beep and a minus sign "-" will be displayed on
the screen to tell you that auto-migrate is off. Then you can
access floppy disks, and KOH will not attempt to encrypt
them. To turn the auto-migrate feature back on, press
Ctrl-Alt-O again. Your computer will beep and a plus sign "+"
will be displayed to indicate that auto-migrate is on. You
can read more about this feature in the section on Hotkeys.

B. Hard Disk Installation


-------------------------

To install KOH on your hard disk, the first thing you must do
is install it on a floppy disk. Use the instructions above to
do that before proceeding with installation on your hard
disk.

Backing Up
----------

Once you have made a bootable floppy disk with KOH on it,
then you are ready to install it on your hard disk.

BEFORE YOU INSTALL ON YOUR HARD DISK, YOU MUST BACK UP YOUR
COMPUTER!!!

Encrypting your disk is a sensitive process. If the power


were to fail, or if something went wrong half-way through the
process, you could conceivably lose everything you have
stored on your computer. Thus, before you proceed, you must
back up your computer. DO IT NOW. Don't take the chance that
everything will go fine, because you just never can tell.
9

However, obviously, if you make a backup of your computer


now, that backup won't be encrypted. This is a potential
security breach. There are a couple ways to deal with it,
depending on how your computer is configured. I'm going to
assume you haven't been backing up your data regularly,
because most people don't. So first a few instructions on
making a proper backup when using KOH.

The only way to back up your computer and allow KOH to


encrypt the backup for you is to back up onto floppy disks
using a program that does not use a non-standard disk format.
The standard DOS BACKUP utility works fine, as do compression
programs like PKZIP and ARJ, which allow for multi-volume
processing. Get a bunch of floppies, and back up now, before
anything is encrypted. You can encrypt this backup later, if
you want to. For more information about backing up with KOH
in your computer, see the section System Backup in this manual.

Putting KOH on your Hard Disk


-----------------------------

Once backup is complete, you are ready to move KOH to your


hard disk. To install KOH, first put the floppy which has KOH
on it in the A: drive and reboot your computer. The computer
will access the A: drive first, and load KOH into memory. At
this point, KOH will ask you:

KOH-Migrate to hard drive on this computer (please backup)?

At first, answer "N" for no. This is a preliminary test.


First you want to see if your KOH-ed floppy will work. Then you
will be asked for a pass phrase. Enter the pass phrase you
chose for the disk when you made it. Next, the disk should
boot, and you should have an A: prompt. You should be able to
do a directory of the hard disk, etc., without problems.

If, rather than booting up, you get an error to the effect of
"Non-system disk" then you may have entered the wrong
pass phrase, so press Ctrl-Alt-Delete and try again.

After successfully booting your floppy under KOH, you can do


a directory of it, and you will see everything that was on it
just like it was before you encrypted. Now we're ready to
install on the hard disk. Press Ctrl-Alt-Delete and allow the
computer to boot from the floppy again. Now, when it asks you
about migrating to the hard drive, answer "Y" for yes. Again,
you will be asked for a password. You don't really need to
enter it, because once it's asked, KOH is already on your
hard disk. So you can just press Ctrl-Alt-Delete again, and
take the floppy out of the A: drive so your system will boot
from the hard disk.
10

When KOH loads from the hard drive, it will ask if you want to
encrypt your data now. Again, it's probably a good idea to
test your disk out and answer this question "N" for no. Your
computer should then proceed to boot and operate normally.

The Secret Key


--------------

After you've seen that your computer is still working, it is


time to encrypt. Press Ctrl-Alt-Delete once more, and when
you're asked if you want to encrypt, answer "Y" for yes. KOH
will then ask you to start pressing keys. This is a critical
part of generating a good encryption key, and it's important
not to slacken up here and try to rush the process. You'll
have to press about 128 keys to get through this part. To do
it right will take a few minutes. CHOOSE KEYS ON YOUR
KEYBOARD COMPLETELY AT RANDOM AND PRESS THEM SLOWLY. Use all
of the keys on your keyboard too. If you try to rush this,
you're only compromising the security of the random key which
is being generated, and it is your own loss. Once the
computer has enough keystrokes, it will beep and ask you to
press the ESC key to continue.

After you press ESC, you will be asked for two pass phrases.
One is for the hard disk and one is for your floppy disks.

The Hard Disk Pass Phrase


-------------------------

Chose a hard disk pass phrase carefully. It needs to be


something that cannot be easily guessed, yet something you
can remember, and it can be any combination of keystrokes up
to 128 characters. This pass phrase is what you will enter
into the computer every time you turn it on from now on.
See IDEA-Based Cryptography for more information on picking a
good pass phrase.

The Floppy Disk Pass Phrase


---------------------------

The pass phrase for the floppy disk will be completely


invisible after you enter it. It is stored (encrypted) on
your hard disk in a special area, and you will not normally
need to enter it. However, since you are liable not to use it
for long periods of time, make sure it is something you will
remember--or save it somewhere on your *encrypted* hard disk.
You will need it if you boot off of an encrypted floppy, or
wish to access that floppy from another machine.

After you have entered both pass phrases, KOH will proceed to
encrypt your hard disk. This is where you have to just kick
back and wait, as the process can take anywhere from 20
minutes to several hours, depending on how big your hard disk
11

is, and how fast your computer is. Allocate plenty of time to
encrypt, and do not turn the computer off before it finishes
the job and tells you so. If you do, chances are a major
portion of the data on your hard disk will be lost forever!
That's why you want to back up, too. You never know when the
electric company might shut down your computer for you. You
have been warned!!

Note: You can change both the hard disk and floppy disk
pass phrases at a moment's notice by pressing Ctrl-Alt-K,
preferably from the DOS prompt. Then you will be asked to
enter new pass phrases. See Hotkeys for more information.

Note that KOH only encrypts the presently-active partition on


your physical hard disk. Thus, if you have your computer set
up with two logical drives, C: and D:, only the C: drive will
be encrypted. The D: drive will not get encrypted. If you
want everything encrypted, then you must set your hard disk
up with a single partition if it is not already. (Use the
FDISK program, supplied with DOS, to determine how many
partitions you have if you do not know.)

At this point KOH is completely installed on your hard disk.


The next time you start your computer, you will be prompted
for a pass phrase. Enter it right, and your computer
will start right up. Enter it wrong, and you cannot get in!

NOTE: If you are installing on a SCSI drive, read the


section in "What To Do If You Have Problems" concerning SCSI's
before you install. That will help you to avoid surprises
with SCSI's, which can be a bit more complex than ordinary
drives.
12

4. SPEED CONSIDERATIONS
=======================

KOH requires a considerable amount of overhead to do


encryption and decryption on the fly. You are bound to notice
a slow-down in disk accesses after you install KOH. That is
always something that's hard to get used to. These are the
breaks of using on the fly encryption, and the better your
encryption algorithm, the more overhead it takes.

To minimize the impact of the slowdown, I recommend two


things:

(1) Install a disk cache in memory--as big as you can afford.


A caching controller will not do the job, because that cache
lives on the other side of KOH. You need just an ordinary
cache that resides in system memory, preferably one that
caches reads and writes. (The standard MS-DOS cache works
just fine.) This will keep data cached in an unencrypted
state so that accessing it does not require calling IDEA. You
may want to install some more memory so you can make your
disk cache bigger.

(2) Upgrade your processor, if you can afford it. The speedup
from the new processor will offset the slowdown from KOH, and
you'll be happier. For example, if you upgrade from a 386SX-
16 to a 486SX-25, you probably won't even notice the
slowdown, and it's not THAT expensive.

If you cannot afford the above solutions and you still can't
live with a slower system, there is one other possibility,
though it is not as secure. You can partition your disk with
a logical drive. For example, if you have an 80 megabyte
drive, create a 20 megabyte partition, and make it your C:
drive, and create a 60 megabyte partition and make it your D:
drive. Now, put all of your programs, and data that is not
sensitive on your D: drive, and put all of your sensitive
data on the C: drive. Then install KOH. KOH will encrypt the
C: drive, but leave the D: drive alone. This means that your
D: drive will be as fast as it was before, and your C: drive
will be slowed down by the encryption routines. All your
programs, etc., will load real fast. The problem here is that
you need to make sure you don't put sensitive data on your D:
drive. Don't ever put it there. Remember that erasing files
doesn't really erase the information. And don't let your
programs create temporary files on your D: drive with
sensitive information in them either. (And that's easier said
than done!!) As I said, this is not really a very good
option, but it can be done.
13

5. IDEA-BASED CRYPTOGRAPHY
==========================

IDEA stands for International Data Encryption Algorithm. It


was developed in the 1980's in europe as an alternative to
the US government developed DES (Data Encryption Standard)
algorithm.

Most good commercial encryption programs use DES at present.


DES has been proven to be a pretty good algorithm by the
academic crypto community, however quite a few people are
suspicious about it because it was developed by the US
government and the National Security Agency. Although perhaps
quite suitable for civilian use 99.99% of the time, there is
always that lurking suspicion that the NSA knows how to crack
it. Additionally, DES uses a 56 bit key (7 byte). As
computers become more and more powerful, it is possible that
a brute-force attack against DES would be possible at a
reasonable cost. By a brute-force attack, I mean you just set
up a computer to try every possible 7 byte key until you get
the right one. That could be only a few years away, as
computer technology is improving so rapidly.

IDEA offers an alternative. Developed by the academic


community, it does not carry with it the suspicions of an
algorithm developed by a super-secret government agency. It
has proved to be a good algorithm without inherent
weaknesses. However, IDEA is still rather young--much younger
than DES. Thus, it is possible that someone could find a
weakness and prove it's not so good after all. That has not
happened to date, and it's a calculated risk you have to take.
Also, the IDEA employs a 128 bit key (16 byte). This larger
key makes a brute-force attach MUCH more difficult, and
removes it from the realm of possibility for a long time to
come.

The development team felt the IDEA offered the best security
at present of any known algorithm, for the purposes we have
in mind for KOH, and that includes keeping your private
computer data away from prying government eyes. Since
government has the one-up on everyone else with DES, we felt
IDEA offered a better chance of keeping the playing field
level.

The IDEA algorithm can be operated in several modes. We use


the Cipher Block Chaining mode, because this is the most
secure, and it makes sure that, even if two blocks of data on
your disk contain the same unencrypted data, they'll look
completely different when encrypted.

As with all cryptography, even a strong algorithm can be


broken easily if you aren't careful about your password. I
know hackers who can get into all kinds of computer systems
14

with the greatest of ease, simply because people choose


passwords that are easy to guess. The famous Internet Worm
had a list of passwords in it--about a hundred words--which
are used by at least one user on over 90% of all computer
systems. Now just about anybody can sit down and try 100
different words that you're likely to use for a password!

I recommend you don't use a word at all. KOH gives you up to


128 characters for the pass phrase. They can be any
combination of (case sensitive) letters, numbers and
punctuation. USE THEM. If you just use one word, I can write
a computer program in about ten minutes that will test every
word in the dictionary against your passphrase. And it can
find your "secret" word in about ten minutes. At least use a
phrase. Definitely use punctuation. Maybe use unusual
capitalization rules. Probably you should include at least
one nonsense word. By all means don't quote your favorite
book.

What ever you do, remember that if somebody wants to crack


your pass phrase, it's not just some guy sitting there trying
to dream up good guesses. It's a guy with a computer that can
make a million guesses an hour. Make sure that even if you
could make a million guesses an hour, it would take forever
to get the right one. That may sound intimidating, but it's
not really. Chosing 5 random words from a dictionary of
100,000 means you have about 10,000,000,000,000,000,000,000,000
possibilities and even at 1,000,000 an hour, the universe
will collapse before you get done. Adding an unnecessary
exclamation point at the end makes the job all that more
difficult.

You should be getting the point: Give some thought to your


pass phrase.

The next point is that you need to watch your floppy disks.
Some people are careful to encrypt some of their data, but
not all of it. Then if they are attacked, the unencryted data
is enough to cause trouble. KOH tries to make encryption as
easy as possible with the auto-migrate feature. It is
recommended that you leave this feature ON at all times,
unless you have a specific task at hand that requires it to
be off. Then turn it off, complete that task, and turn it
back on. That way, everything that touches your computer will
stay encrypted, day in and day out. Make sure you go back to
any old floppies you had before you installed KOH and
encrypt too (just sit down and do directories on them and
they'll get encrypted).

Note that the IDEA algorithm is patented by a group in


Switzerland. There is no license fee required for non-
commercial use. For commercial use, you'll have to contact
the patent holder. Since this program is freeware, we don't
15

handle license fees. Contact Dieter Profos, Ascom-Tech AG,


Solothurn Lab, Postfach 151, 4502 Solothurn, Switzerland for
information.

References:

Xuejia Lai, "On the Design and Security of Block Ciphers",


Institute for Signal and Information Processing, ETH-Zentrum,
Zurich, Switzerland, 1992

Xuejia Lai, James Massey, Sean Murphy, "Markov Ciphers and


Differential Cryptanalysis", Advances in Cryptology,
Eurocrypt 1991.
16

6. HOTKEYS
==========

KOH has three basic hotkeys which you can use to perform
special functions with KOH while it is active in your
computer. These hotkeys are designed to be easy to remember.
They are called up by holding down the Ctrl and Alt keys, and
pressing K, O or H. Let's see what they do:

Ctrl-Alt-K
----------

This hotkey allows you to change your system pass phrases. As


you will recall, if you booted from a hard disk, there is a
hard disk pass phrase and a floppy disk pass phrase. If you
booted from a floppy disk, there is only a floppy disk pass
phrase. KOH will allow you to change whatever pass phrases
are appropriate.

Changing the hard disk pass phrase is permanent, and allows


you to access that hard disk only by entering the new pass
phrase when you start the computer. It takes only a few
seconds to change this pass phrase, as KOH does not need to
decrypt and encrypt the whole disk to make it effective. You
will want to change the hard disk pass phrase any time you
believe the security of your old pass phrase has been
compromised.

Changing the floppy disk pass phrase does not change the
pass phrase with which you access a given floppy disk. Once a
floppy has been encrypted using a given pass phrase, it will
always require that pass phrase to be accessed. A new floppy
pass phrase will only take effect on any new floppies you put
in your computer. For example, suppose your floppy pass
phrase is "PHYSICS TEST = 90" and a friend brings a disk over
encrypted with the pass phrase "for MY Friend". You can
change to this floppy pass phrase to read this disk. However,
your usual disks will not be accessible while this pass
phrase is in effect. When you're done with your friend,
you'll want to change back to your original pass phrase so
you can read your own disks again.

Ctrl-Alt-O (Remember O = On/Off)


----------

This hotkey turns KOH's auto-migrate feature on and off.


Auto-migrate is the feature that causes KOH to automatically
encrypt floppy disks that are put in your computer.

The hotkey acts as a toggle. If auto-migrate is on, the


hotkey turns it off, and vice-versa. To tell you what just
happened when you press this key combination, KOH makes your
computer beep and displays a "+" or a "-". The plus sign
17

tells you that auto-migrate is now on, and the minus tells
you it is off.

If you load KOH from a floppy disk, the change in the status
of auto-migrate is temporary, and effective only as long as
your computer is on. When you reboot, or turn your computer
off and on, KOH will load itself into memory with auto-
migrate on.

If you load KOH from your hard disk, the change in status of
auto-migrate is saved to disk, so that you can turn your
computer off and on again, and if you had auto-migrate off to
start with, it will still be off.

Ctrl-Alt-H (Remember H = Hard disk uninstall)


----------

This hotkey un-installs KOH from your hard disk. It will ask
you if you are sure you want to uninstall, and if you answer
"Y", KOH will proceed to uninstall itself. You can uninstall
KOH from a hard drive whether that drive is encrypted or not.
If the drive is encrypted, it may take several hours to
complete the uninstall--as long as it took to install. So
make sure you have enough time to allow KOH to uninstall
itself!

When uninstalling, the same considerations apply as when


installing. In other words, make sure you back your system
up. If you lose power during the uninstall process, you could
lose everything on your hard disk.

To uninstall, you must have booted your system with KOH


installed on the hard disk. If you can't remember the pass
phrase, this will NOT help you out.

You cannot un-install KOH on a floppy disk. If you want to


get the encryption off of a floppy, the only way to do it is
to copy it all to an unencrypted disk (with auto-migrate
off, if KOH is active in your computer).
18

7. SYSTEM BACKUP
================

Here I want to explain how to do a proper backup when KOH is


installed on your hard disk, and keep your data private in
the process. I am going to discuss two things: (1) Making a
master backup disk, and (2) backing up all of your data to
floppy disks.

Now, a lot of people have way too much data to use floppies
to back up, and they use tape drives. KOH will not encrypt
the data on your tape, so you have two options: (1) is to buy
a tape backup program that will encrypt your data. There are
a number on the market that use some form of DES, but none
that I know of which use IDEA. Some use weak forms of DES
too, so beware. The alternative is (2) not to encrypt the
data on your tape. That is, of course, a potential security
hole, unless you hide the tape where no one will ever, ever
find it. Probably getting an air-tight capsule and burying it
somewhere, or keeping it in a safe-deposit box at some
foreign bank would work best. We fully intend to build
modules to allow you to back up to tapes using IDEA, and
working off your KOH key, but these are not available yet.

The Master Disk


---------------

A master disk is a bootable disk with enough software to get


your computer up and running again in the event of a disk
crash. At the very least, you should have a bootable disk
with FDISK, FORMAT and SYS, as well as the program you need
to restore your backup from the backup floppies, or the tape
drive.

You can encrypt this master disk with KOH. It will not affect
anything you do if you ever have to restore your hard disk.
Alternatively, you may just want to put the KOH.COM program
on the master disk, and maybe this file as well.

There is one other thing you will want to put on your master
disk. KOH makes your computer system somewhat more
susceptible to damage by computer viruses, because viruses
don't usually know how to handle the encryption routines. For
example, the Stoned virus is fairly benign on most computer
systems. It just displays the message "Your PC is stoned."
now and then. However, if it infects your encrypted computer,
it can totally trash everything in your computer. A small
program VPROTECT has been included with the KOH distribution
package. This creates a special file on your master disk that
is an image of the KOH system areas. You should run it from
your master disk as follows:
VPROTECT
19

It will create a file VPROTECT.DAT on your master disk. In


the event your computer is attacked by a virus, or the system
areas are damaged for any other reason, you should run

VPROTECT /write

from your master disk to restore the system areas on your


hard disk. Once this is done, KOH will have the decryption
keys restored and everything necessary to hand over control
to DOS. Obviously, if a virus trashes more data on your
computer than just this system area, you'll have to deal with
that in other ways.

Backup to Floppy
----------------

KOH will allow you to backup your hard disk to floppy disks
without compromising security. It can encrypt your backup
floppies just as it encrypts any other floppy. The key to
using KOH effectively in a floppy backup is to use a program
that uses a standard DOS disk format.

A fine way to back up without using an excessive number of


disks is using the PKZIP/PKUNZIP programs or the ARJ program.
I'll describe this process in case you want to use it. Also,
the considerations discussed in using ARJ with KOH will
apply to other backup programs as well.

Typically, you cannot get a backup file onto the disk without
KOH going there first when auto-migrate is on. Thus, the
process of backing up will be completely transparent, even if
you use disks that have never been encrypted. The one thing
you have to remember is that KOH takes up a small amount of
disk space, so if you have to tell the backup program how big
your diskette is, you should reduce it by about 6 kilobytes.
For example, using ARJ to backup to 1.44 megabyte diskettes
in the B: drive, you would specify

arj a -r -v1430000 b:backup c:\*.*

This tells ARJ to create the archive BACKUP on the B: drive


and use a volume size of 1.43 megabytes, and to recurse
subdirectories (so your whole disk is backed up). Just
execute this and everything will work fine.

One thing to be aware of is that some backup programs will


allow you to optionally format the floppy disks as you go
through the backup. Turn this option off, because it will
invariably confuse KOH. Format your floppies before you do
the backup.
Note: You can still use a backup program that uses non-
20

standard disk formats (like some versions of Fastback and PC


Tools) with KOH, you just can't encrypt with KOH. To use
these kinds of programs without confusing KOH, turn auto-
migrate off before backing up using the hotkey Ctrl-Alt-O.
21

8. HOW DO I . . . ?
===================

Here I'd just like to answer a few common questions.

Format floppy disks?


--------------------

Formatting floppy disks is one process that wipes out the


boot sector on a disk, obliterates data, and re-organizes the
FAT table. Furthermore, there are many different ways this
can be done. KOH cannot possibly anticipate all the possible
ways this happens. As such, a little more care must be taken
when formatting floppy disks when KOH is resident.

First of all, if you use DOS 5 or greater, the FORMAT program


doesn't always really format. This fake-format is a sure way
to confuse KOH--but that is just as well, because it is also
a great way to compromise your valuable data. When KOH is
installed, it is recommended that you only use a REAL format.
For DOS 5 and up, this is accomplished by using the /u
switch. For example, to format the disk in A:, type
"FORMAT A: /U". If you use something other than the standard
DOS format, you should experiment first to see what it does.

As a safety, to make sure you get a clean, unformatted disk


when formatting, KOH disables encryption to floppy disks as
soon as it sees formatting take place. To remind you that
encryption was turned off by formatting, every time you
access a floppy disk, you will hear a series of beeps. The
only way to start encryption back up after a format is to
reboot.

Share an encrypted disk with a friend?


--------------------------------------

If your friend has KOH on his computer, you can temporarily


change the pass phrase on a floppy disk to an agreed upon
phrase, and then give it to him. He can then temporarily
change to that password to get at the data. I do not
recommend you make your standard floppy pass phrase public.
That defeats its purpose.

If your friend does not have KOH on his computer, you can
still give him an encrypted disk. He will just have to boot
off of it to access it as discussed next . . .

Access data from a machine that doesn't have KOH installed?


-----------------------------------------------------------

Suppose you go somewhere and you have encrypted disks. You


want to access them, but the machine you are at doesn't even
have KOH installed. How can you get to the data?
22

Since KOH usually copies itself to disks that it encrypts,


you can boot off of those disks to load KOH into memory. If
your floppy disk is a boot disk, fine, that is all you need
to do. But what if it isn't? You should still boot off of
that disk, and tell KOH to migrate to the hard disk. KOH will
then ask for a pass phrase. Instead of entering it, just
reboot. When you reboot, boot off of the hard disk (don't
encrypt it unless you really want to do all that) and enter
the pass phrase that your floppy is encrypted with. Now you
should be able to access that floppy disk. When you're done,
just uninstall KOH using the hotkey Ctrl-Alt-H. The uninstall
will only take a second since the hard disk is not encrypted.

Re-Partition a drive?
---------------------

Changing the partition information on a drive is such a


drastic change that you should completely uninstall KOH
before changing the partitions, and then re-install when you
are done.

Install Windows or a disk compression utility?


----------------------------------------------

You can install Windows or a disk compression utility like


DOS' own, or Stacker, just as you ordinarily would. KOH is
fully compatible with both.

If you have the Windows 32-bit extensions, you may find that
the disk driver will not load, and suggest that you may have
a virus. Simply ignore this. Our experience is that this
driver has so many problems that you are better off not using
it to begin with, and when it doesn't load, it just allows
the disk to be accessed in the normal way, so you'll never
know it's not there.

Install OS/2 (or Unix)?


-----------------------

At present, KOH is not compatible with advanced operating


systems which do not go through the system BIOS to access the
disk, and it is not compatible with IBM's boot manager. We
intend to create drivers to make it work seamlessly
with these operating systems eventually. Also, we are going
to make a boot manager that will work with KOH available very
soon. If you are interested, please contact American Eagle
Publications at the address below.
23

9. IF YOU HAVE PROBLEMS


=======================

There are a number of known problems that you may encounter


when you use KOH. Some of these have nothing to do with KOH
and can't be fixed at our end. I'll explain what I know
about. If you run into a bug that you don't know how to fix,
write to American Eagle Publications at the address below.

No Room for KOH


---------------

If you have used non-standard partitioning software, your


hard disk may not be able to hold KOH properly in its
reserved area. In this event, KOH will tell you there is no
room on the hard disk for it, and it will not install itself.
To make your disk accept KOH, you must re-partition your
drive with the standard DOS FDISK program, and then re-
install. Realize that running FDISK will certainly wipe out
all the data on your computer, so you'd better have backed
up.

Keyboard BIOS Bugs


------------------

Some AMI (and probably other manufacturers) keyboard BIOS's


don't seem to work very well in real mode. Now, typically you
never notice this, because you load HIMEM.SYS, or some other
memory manager into your computer's memory when you boot, and
the processor goes almost immediately into protected mode.
Since KOH takes control before any device drivers, it always
operates in real mode. Thus this bug could manifest on you
now even though you've never seen it before. What you'll
experience is a difficulty in entering your pass phrases
properly, and there is practically nothing you can do about
it. You'll never get through to anyone at the manufacturer
who will believe you. Personally, I recommend you replace you
keyboard BIOS with a Phoenix chip if you run into this
problem. (The keyboard BIOS and the BIOS are NOT the same
thing. The keyboard BIOS is implemented in an 8042 chip.)

Some XT hard disks time out loading DOS 6


-----------------------------------------

Anyone who wants to use KOH on an XT based machine CAN do so.


There is nothing in the software to prevent it from working.
However, it's incredibly SLOOOOOW. You may find out that your
operating system will time-out when loading. I know for a
fact that MS-DOS 6.2 will time out on some XTs. And I know
you can get MS-DOS 3.3 to load properly. I'd really recommend
you upgrade your motherboard--it's so inexpensive. But if you
must run this on an XT, then you may have to experiment with
which version of DOS to run. If it doesn't load, try a
different version.
24

Password Doesn't Seem to Work


-----------------------------

If your password doesn't appear to work the first time you


try to use your computer after encrypting, you may have
entered it wrong. Remember your password is case sensitive.
Could the CAPS LOCK or NUM LOCK key have been active when you
originally entered your password. Could you have capitalized
a word? Try the different possibilities. If all else fails,
start over from scratch.

SCSI Drives
-----------

Some SCSI drives use installable device drivers in addition


to the ROM BIOS on the SCSI card. Sometimes these drivers can
cause problems because they are vendor specific and they can
manipulate the ROM BIOS in unfriendly ways. Specifically,
they may replace it entirely, and bypass the KOH decryption
algorithms. Then your disk may look like trash as soon as
the driver loads. Alternatively, they may hook it in some
funny way, so, for example the hot keys won't work properly
when they are installed. To avoid such problems when
installing KOH, it is recommended that you first remove all
such drivers (from CONFIG.SYS) and then install KOH with your
SCSI drive relying purely on the ROM BIOS. Next, put your
drivers back in, one at a time, and make sure KOH is still
working.
25

10. ORDERING INFORMATION


========================

The executable files and the KOH.DOC files are freeware and
may be distributed freely. You may order a disk with these
files on them directly from American Eagle Publications. If
you are in a country other than the US, the price is
different, and the software will be sent to you directly from
an overseas affiliate, because we will obey the law here
in the US about not exporting this program. You may also
order a diskette with complete source code on it, if you
prefer. The source IS NOT freeware and MAY NOT be distributed
freely. You must purchase it from American Eagle and you may
not copy it.

Prices
------

KOH Distribution Disk Source Disk


--------------------- -----------
US $10 $20
Non-US $20 $30

Please send check, cash or money order, or your VISA or MC


number and expiration date. Overseas customers may send US $
or the equivalent in your currency. All prices are postpaid.

Where to Order
--------------

Order from:

American Eagle Publications, Inc.


P.O. Box 41401
Tucson, AZ 85717
(602)888-4957

Você também pode gostar