========================================================================== F-Secure Desktop 1.0 Beta ========================================================================== F-Secure Desktop Beta is subject to the terms detailed in the Beta license agreement accompanying it. Data Fellows has just made a major breakthrough in optimizing the Blowfish encryption algorithm. We have achieved 12-18Mbits per second encryption speeds in laboratory conditions. The release version of F-Secure Desktop will use an optimized version of Blowfish, that will beta about 3-4 times faster that the non-optimized version in the Internet beta. ========================================================================== Protecting Your Information Assets ========================================================================== How are your company information assets protected? Today's technology makes it possible to store a copy of your company's sales database on every sales persons laptop. The copy contains the same confidential data as the actual company database that is protected by firewalls and locked cabinets. What about the copy on the laptop? Isn't it entitled to the same level of protection, or even more as it travels in a more vulnerable environment? All previously closed sales, quotes, and pending cases that your competition would kill to see are unprotected. Introducing F-Secure Desktop for Windows and Windows 95 There are many access control and security packages on the market, but none of them is easy enough to use that your people would trust it and install it on their computers. F-Secure Desktop removes the complexity and provides an easy-to-use, easy-to-install, low-cost, strong-encryption solution to protect your company's information assets. With F-Secure Desktop, you can encrypt/decrypt files, directories, and Windows 95 folders automatically during the starting and closing of Windows. F-Secure is by far the easiest, and strongest way to protect the sensitive information on your laptops and PCs. F-Secure Desktop is an add-on for your Windows File Manager, providing you a user-interface that you already know how to use. The only change you'll notice is three added buttons on the tool bar and a new "F-Secure" menu. On your Windows 95, F-Secure Desktop is integrated to the Windows 95 shell. You can drag and drop files to folders that will be encrypted automatically or you can encrypt/decrypt any object by just clicking the right mouse button on the object and selecting encrypt or decrypt. Nothing could be more simpler to use. With the AutoSecure(TM) feature, you can define sets of files, directories, and Windows 95 folders that will be automatically encrypted and decrypted every time you start or close Windows. You can leave top- secret files out of the AutoSecure(TM) list, to be manual encrypted. F-Secure Desktop does not make any special files or directories on your system. You select which files, directories, and folders are encrypted, quickly and easily, anywhere. This means that you do not have to make any changes to your system structure when adding F-Secure Desktop strong encryption technology to your PC or laptop. Easy to Use, Easy to Setup F-Secure Desktop comes with a setup Wizard that is used to create your keys, select the files to encrypt, backup your master key, and to setup other options in F-Secure Desktop. We have made F-Secure Desktop so simple to setup and use that you'll never have to go back to the settings after you have finished the setup. Each user can choose to select an existing key that has been created to be used by a group of people sharing private data, or to create a personal key that will keep their data private. NOTE: For more information on the products features, see "Release Notes". F-Secure Desktop feedback and bug reports can be sent via e-mail to Feedback: F-Secure-Beta-Feedback@DataFellows.com Bugs: F-Secure-Desktop-Bugs@DataFellows.com Support and commercial licenses are available from: Data Fellows Ltd. Päiväntaite 8 FIN-02210 ESPOO FINLAND Sales: F-Secure-Desktop-Sales@DataFellows.com Support: F-Secure-Desktop-Support@DataFellows.com WWW: http://www.datafellows.com/ http://www.europe.datafellows.com/ ========================================================================== Release Notes 19/09/1996 ========================================================================== Add-on Operating System Security Features ----------------------------------------- o Encryption is performed with Blowfish a very fast block cipher, with 256-bit keys. o All files encrypted with F-Secure Desktop are also protected against modification, with a crc32 integrity check. o Plain text files are always overwritten with random bytes after encryption. Once with random data, or three times first with a pattern, then its complement, and finally once with random data, or seven times, first with a pattern, then its complement, and finally five times with random data. Control Panel Application ------------------------- o Users can change their passphrase from the F-Secure Desktop control panel application. o AutoSecure files list and exclude file list can be updated from the control panel. o Secure Overwrite settings can be changed from the control panel. o User's that have Web Browser software can connect Data Fellows Ltd's WWW server can be contacted directly from the control panel. F-Secure Desktop Wizard ----------------------- o Creates a security profile for the user by requesting his/her name, company information, user name, and a passphrase o The user's can select to create a new private encryption key, or to select or previously created key. o The user can make a backup of his key and store the backup on disk encrypted with a passphrase selected for the sole purpose of protecting the backup key. o AutoSecure file list and an exclusion list for automatically encrypted files can be created by the Wizard. File Manager Extension ---------------------- o F-Secure Desktop add-on adds a menu to File Manager that allows the user to access all F-Secure Desktop features from File manager. o Shortcuts are added on the File Manager Toolbar for encryption, decryption, and to access the AutoSecure dialog. o All .FFF files created by F-Secure Desktop can be decrypted by double clicking on the. Windows 95 Shell Extension -------------------------- o Each file, directory, and folder shows a new menu entry for "Encrypt", "Decrypt", and "Properties" when clicked upon with the right mouse button. ========================================================================== Installation Instructions ========================================================================== * Installation Select Windows Program Manager's File|Run... menu and run SETUP.EXE If you are using the Windows 95 shell select Run from the Start Menu and run SETUP.EXE. Setup installs all files and creates a F-Secure Desktop Program Manager group for the installed applications. See section "Running F-Secure Desktop" for more information on how to use F-Secure Desktop. ========================================================================== Running F-Secure Desktop ========================================================================== F-Secure Desktop Wizard will help you create a new security profile and to create a new private encryption key, or to select or previously created key. You can also configure your AutoSecure file list and an exclusion list for files, directories, and folders to be secured automatically. File Manager Extension contains a new add-on menu that allows you to to access all F-Secure Desktop features from File manager. You can perform encryption, decryption, and update your AutoSecure file list from File Manager. Windows 95 Shell Extension adds a new entry to encrypt or decrypt any file, directory, or folder on the Windows 95 system. To access the menu click the right mouse button on a file. Control Panel Application contains most of the F-Secure Desktop setting, changeable by the user. If you have Web Browser software you can connect to Data Fellows Ltd's WWW server directly from the control panel. Below is a list of common tasks and how to perform them. HOW TO ENCRYPT OR DECRYPT A FILE ================================ Windows 3.1 ----------- Start File Manager, browse for the file you want to encrypt, then select F-Secure|Encrypt... from the menu. Next you have to select the way you wish to decrypt the file in the future: a) Checking "Add to AutoSecure Files" will decrypt the file always when starting Windows. b) Leaving "Add to AutoSecure Files" unselected will leave the file encrypted until you manually decrypt it. Then type in your passphrase and click OK to encrypt the file. To decrypt a file with an .FFF extension, double click the file and type in your passphrase and click OK to decrypt the file. NOTE: All decrypted files will be automatically encrypted when you close Windows! Windows 95 ---------- Select a file, directory, or a folder with the Windows Explorer. Click the right mouse button on your selection to see a menu, select Encrypt... Next have to select the way you wish to decrypt the file in the future: a) Checking "Add to AutoSecure Files" will decrypt the file always when starting Windows. b) Leaving "Add to AutoSecure Files" unselected will leave the file encrypted until you manually decrypt it. Then type in your passphrase and click OK to encrypt the file. To decrypt a file with an .FFF extension, double click the file and type in your passphrase and click OK to decrypt the file. NOTE: All decrypted files will be automatically encrypted when you close Windows! HOW TO ENCRYPT OR DECRYPT FILES QUICKLY ======================================= To encrypt all decrypted files, open the F-Secure Desktop group from the file manager or from the Windows 95 Programs Menu. Next double click the "Encrypt All Files" icon, type in your passphrase and click OK to encrypt the files. To decrypt all AutoSecure files, open the F-Secure Desktop group from the file manager or from the Windows 95 Programs Menu. Next double click the "Decrypt All Files" icon, type in your passphrase and click OK to decrypt the files. NOTE: All decrypted files will be automatically encrypted when you close Windows! HOW TO ADD OR REMOVE FILES FROM THE AUTOSECURE(TM) FILES ======================================================== You can access the AutoSecure(TM) dialog easily from the control panel. Open the F-Secure control panel application, select AutoSecure and view, add, or remove file, directories, and folders as you wish. HOW TO CHANGE YOUR PASSPHRASE ============================= We recommend that you select a passphrase rather than a password to be used with F-Secure Desktop. The passphrase will be used to protect your encryption key. A normal password would be something like "qw79lp0", a passphrase is something a bit longer like "this is something for me to remember!". Well selected passphrases are almost impossible to break. To change your passphrase the F-Secure Desktop control panel application, select "Passphrase" and type in the requested information. You can change your passphrase as often as you like, and still be able to access all your encrypted files. NOTE: Your passphrase is the weakest link in this product, so select it with care! HOW TO USE A COMMON WORKGROUP KEY TO SHARE INFORMATION ====================================================== A workgroup key is just an ordinary encryption key created with the F-Secure Desktop Wizard. Take the backup disk for the key that you are using and distribute it to those personnel that you want to share information with. Ask them to install that key when they set up their copy of F-Secure Desktop. This way you can share encrypted files with each other. ========================================================================== Known Issues & Bugs ========================================================================== Known Issues o Help for the application is not available yet. o If the uninstallation fails you should: - Boot to DOS - Delete the following files in your \WINDOWS\SYSTEM directory: FSID32.DLL, FSCOM32.DLL, FSECSE.DLL, FSEC32.CPL, and FSDENU32.DLL - Remove the reference to FSID32.DLL in the [Boot] section in SYSTEM.INI - Restart the computer and boot to Windows 95. o The encryption algorithm is an unoptimized version of Blowfish. The optimized version is 3-4 times as fast as the current implementation. ========================================================================== For More Information Contact ========================================================================== * For more information on the commercial version of F-Secure Desktop contact one of the addresses below: Sales: F-Secure-Desktop-Sales@DataFellows.com Support: F-Secure-Desktop-Support@DataFellows.com WWW: http://www.datafellows.com/ http://www.europe.datafellows.com/ ========================================================================== Copyrights ========================================================================== * F-Secure Desktop Copyright (c) 1996 Data Fellows Ltd. Portions (c) 1995-96 SSH Communications Security Ltd. ========================================================================== Beta License Agreement ========================================================================== F-SECURE DESKTOP FOR WINDOWS AND WINDOWS 95 BETA LICENSE AGREEMENT (Version 1, July 17th, 1996) BY EXERCISING YOUR RIGHTS TO MAKE AND USE COPIES OF THIS SOFTWARE YOU AGREE TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, DO NOT COPY OR USE THE SOFTWARE. GRANT. Data Fellows Ltd. grants you a non-exclusive license to use this version of the F-Secure Desktop software (the "Software") free of charge for evaluation and trial purposes only. This License does not entitle you to hard-copy documentation, support or telephone assistance. While Data Fellows intends to distribute a commercial release of the Software, Data Fellows reserves the right at any time not to release a commercial release of the Software or, if released, to alter prices, features, specifications, capabilities, functions, licensing terms or other characteristics of the commercial release. You may not publish or provide any results of benchmark tests run on the Software to a third party without Data Fellows' prior written consent. You may make a single copy of the Software for archival purposes, provided such copy must contain all of the original Software's proprietary notices. ENCRYPTION. As the Software contains cryptographic features, you are responsible for ensuring that your use of the Software does not contradict any local legislation or other requirements and rules. In no situation does Data Fellows assume any responsibility for your use of the Software. DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON- INFRINGEMENT. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS BORNE BY YOU. SHOULD THE SOFTWARE PROVE DEFECTIVE, YOU AND NOT DATA FELLOWS ASSUME THE ENTIRE COST OF ANY SERVICE AND REPAIR. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THE AGREEMENT. SOME JURISDICTIONS DO NOT ALLOW EXCLUSIONS OF AN IMPLIED WARRANTY, SO THIS DISCLAIMER MAY NOT APPLY TO YOU AND YOU MAY HAVE OTHER LEGAL RIGHTS THAT VARY BY JURISDICTION. LIMITATIONS. You may not: - permit other individuals to use the Software except under the terms listed above; modify, translate, reverse engineer, decompile, disassemble (except to the extent applicable laws specifically allow such restriction), or create derivative works based on the Software; - copy the Software other than as specified above; rent, lease, grant a security interest in, or otherwise transfer rights to the Software; or - remove any proprietary notices or labels on the Software. TITLE. Title, ownership rights, and intellectual property rights in the Software shall remain in Data Fellows, and/or its suppliers. The Software is protected by the copyright laws of the United States and international copyright treaties. This license does not grant you any right to any enhancement or update to the Software. TERMINATION. The license will terminate automatically if you fail to comply with the limitations described herein. Upon termination of this License, or in any event within thirty (30) days following Data Fellows's release of a commercial version of the Software, you agree to destroy all copies of the Software. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, TORT, CONTRACT, OR OTHERWISE, SHALL DATA FELLOWS OR ITS SUPPLIERS OR RESELLERS BE LIABLE TO YOU OR ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES. IN NO EVENT WILL DATA FELLOWS OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES, EVEN IF DATA FELLOWS AND/OR ITS SUPPLIERS SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY OTHER PARTY. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. HIGH RISK ACTIVITIES. The Software is not fault-tolerant and is not designed, manufactured or intended for use or resale as on-line control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines, or weapons systems, in which the failure of the Software could lead directly to death, personal injury, or severe physical or environmental damage ("High Risk Activities"). Data Fellows and its suppliers specifically disclaim any express or implied warranty of fitness for High Risk Activities. U.S. GOVERNMENT RIGHTS. If you are acquiring the Software (including the related documentation) on behalf of any part of the United States Government, the following provisions apply. The Software is deemed to be "commercial software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR 12.212, as applicable. Any use, modification, reproduction, release, performance, display or disclosure of the Software (including the related documentation) by the U.S. Government or any of its agencies shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement. MISCELLANEOUS. This Agreement represents the complete agreement concerning this license and may amended only by a writing executed by both parties. This license is personal to you and you agree not to assign your rights in herein, and any attempted assignment by you shall be null and void. If any provision of this Agreement is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This Agreement shall be governed by the laws of Finland.