Friday, December 23, 2011

115 - PrivySwap tutorial

115- Encryption series: simple apps to encrypt things from your little brother or sister. Tutorial of:
PrivySwap v 1.0
===== written Nov.08.2011 by JCPMA ©
Summary
*Diffie-Hellman, Public Key Exchange Passkey manager
*Why: Stronger passwords
*Small portable
*Easy to use
*Private Key is kept secret
*Mutual Key is kept secret
*Public Key is not a secret

[screenshot: privyswap-ss22.png]
http://www.mediafire.com/download.php?zlluz1zoo8r8hmk
http://www.box.com/s/ugflzhcc7c8frc8vgvh3

Voon-Li Chung is one of my heroes. He wrote Privycrypt, an app for text encryption, and is the creator of PrivySwap, an app that simplifies Public Key Exchange. PrivySwap is a small portable program at under 400 KB for Windows. (Although somewhere in cyberspace there may exist a UNIX port of it.)

The point of Public Key Exchange is to enable encryption where the passkey need NOT be transmitted, and thus reduce risk of cracking.

Although it was created to be a companion program to Privycrypt, the beautiful part of PrivySwap is that the passkey it generates can be used in ANY encryption program which can handle its length (56 characters)!
For instance Scrambled Egg, Copyright (C) 2011 by Cristi Constantin.
Website : http://scrambled-egg.googlecode.com/ or similar type app.

Tips on using PrivySwap
===
-Just as both parties each require a copy of the encrypting software, so it is that both require a copy of the passkey manager, namely PrivySwap.
-Your Private Key can be up to 28 characters. It is something you think up yourself. Alternatively you can have a shorter Private Key and check the box "Expand private key to full length". It's best to have a long Private Key. Keep this a SECRET.
-Next, press the Compute Public button. This will generate your Public Key. Your Public Key is for all to see.
-Now clear the Public Key field. Obtain your friend's Public Key and paste it in the Public Key field. Make sure your own Private Key is in the Private Key field. Click the Compute Mutual button. This generates a Mutual (Pass)Key. Use this Mutual Passkey to encrypt your messages. Keep the Mutual Key a SECRET.
-At the other end, your friend would generates the same Mutual Key, but using their own Private Key and your Public Key. They will then decrypt your cipher-text using the Mutual Key.

The Copyright © holders have all rights reserved. The software and web documents are provided "as is" without express or implied warranty of any kind by the parties and contributors involved.

privyswap1_0.zip http://www.mediafire.com/download.php?tppmt94d7hedtl0
privyswap1_0.zip http://www.box.com/s/td0uhjeqsnfzdrxzzqt3

The contents of archive privyswap1_0.zip:
(MD5 of privyswap1_0.zip: 0DC41FB213332751CC9D5E03DAF90268)

- copy of privyswap.exe
(MD5 of privyswap.exe: a4553b13a781a7a9877cd2a30f715b06)
- copy of privyswap info & license (the readme file)
- quikguide.txt http://www.box.com/s/enuu9d68qu48kb961co6
- screen shot privyswap-ss22.png http://www.mediafire.com/download.php?zlluz1zoo8r8hmk http://www.box.com/s/ugflzhcc7c8frc8vgvh3

- crypton1.2 signature: privyswap1_0.sgn http://www.mediafire.com/download.php?eyk9dg9wfmq2830 http://www.box.com/s/psne4uxdrvmoip79c9j9

- crypton1.2 public key: jcpma2011-public-crypton-key_242A.pbl http://www.mediafire.com/download.php?3bruccy636bkd23 http://www.box.com/s/b4anqmo29hoqd1fovaov

privyswap filesharing directory http://www.mediafire.com/?38aewn13oah94
privyswap filesharing directory http://www.box.com/s/sl9bmt4ldgioov02g49q

- my privyswap public key is:
a21bc4ef48e722b90763e991544dba81aebca8b9df6deffdc038848f

(In the future if I find a javascript html version of PrivySwap or something similar to PrivySwap, I will definitely post a link to it!)

±±±± pre-amble of Public Key Exchange encryption
A casual/vague synonym for Public key exchange may be "Diffie-Hellman exchange" named after the duo who invented this type passkey encryption. They could be considered the grandparents of Public Key Exchange encryption. RSA, Elgamal, & DSA are some of the variations of this type of encryption†.
I'm most comfortable with traditional passkey use, the kind that does not involve a Public key exchange. Examples are many: webmail login; using a bank card at an ATM or retail shoppe; logging on to a computer; logging in to a blog account to post a blog entry; etc... This is much SIMPLER, but LESS SECURE. If someone guessed or found your password it would be easy for them to pretend to be you. Non-crucial information can be encrypted by any of the vast number of available encryption apps to prevent it from being viewed by nosy neighbors. It's fast and easy and most of the time it is adequate. However for sensitive data, Public key exchange types of software should be considered for encryption.

I was introduced to Public key exchanges when PGP, and GnuPG started to become popular. These programs secure email's text and email's file sending. (PGP doesn't really stand for Pretty Gconfusing Privacy, nor does GnuPG stand for Gnu Privacy Gconfusion.) It was a steep learning curve for me to just get a grasp of the basic/minimal concepts before I even touched any of the software.
This type of key use enables:
1. encryption targeted for a specific receiver.
2. a working hybrid key that is difficult to crack.

Public key exchange based programs like PGP, and GnuPG have a built in Key Manager. The key manager performs two crucial functions:
i.) It creates unique pairs of private-public keys.
ii.) It creates hybrids between your own private key and an external third-party public key (OR in some cases hybrids between the program's temporary key, your private key and an external third-party public key).

If anyone gets a hold of two public keys, it would be extremely difficult, if not impossible, for them to figure out the hybrid key. (If they were to get a hold of a private key,... well that's "a different story!").

(†)"Introduction to Cryptography" (Copyright 1999, Network Associates, Inc., Santa Clara, CA 95054 http://www.nai.com)
end of pre-amble ±±±±

114 - logging out of stumbleupon

114 - logging out of stumbleupon.com
written by JCPMA Dec.22.2011

Today I went into stumbleupon to review an account. When I was ready to log-off I couldn't find a link or button to do so.

Easy way:
Enter this url into your browser; This will bring up a log-off type button:

http://www.stumbleupon.com/logout



Photobucket

http://s556.photobucket.com/albums/ss4/jcpma/blogger-kx/?action=view&current=dec2011-logout-stumbleupon.png

Thursday, December 22, 2011

113 - 4t HIT Mail Privacy LITE and Scrambled Egg

113 - steganography series: simple apps to encrypt things from your little brother or sister. test of:
4t HIT Mail Privacy LITE and also Scrambled Egg steganography
==== written Nov.06.2011 by JCPMA©

4t HIT Mail Privacy LITE 1.01 by Niagra Software (2002) can encrypt 250 characters
text into an image.
http://www.4t-niagara.com
It runs on Windows. The source image can be any common format jpg, gif, etc...
Output file is a BMP (or ZIP or HIT archive of the bmp). Zip apps should be able to extract the bmp file from either archive. Checksums of the 3 bmps differ but the decrypted text message is OK.

I performed the encryption process for 3 cycles with two different jpgs.
One cycle gave 3 outputs where the CRC checksum was identical for the 3 versions of bmps.
With the next jpg, the CRC was different for the 3 versions of bmps. I confirmed this by repeating the cycle again but with different text and password.

250 text characters isn't very much. It is about a paragraph. It is however easy to put such a small amount of cipher text into a small image. The smallest jpg I have so far used measures approx. 54x54 pixels. You can probably use a smaller image if you wish.
It appears the output bmp may contain a digital WATERMARK which tells the app that it is an encrypted container. I haven't confirmed this. But for casual use, this will be inconsequential.
It would be nice if this app could output files in other image formats, perhaps jpg, gif, png etc..
This app encodes traditional ANSI text.
It does not encode Unicode text.

My subjective ratings for this app (out of 5 stars):
-overall:3
-ease of use:5
-encryption strength:3
-plausibility/deniability:unknown
-versatility:2

The Copyright © holders have all rights reserved. The software and web documents are provided "as is" without express or implied warranty of any kind by the parties and contributors involved.


4tHITMailPL-ss-etc.png http://www.mediafire.com/?reppiphg8r6hio8
4tHITMailPL-ss-etc.png http://www.box.com/s/xgh5vfbpinfek3blkz43

[image/example]-the password is "password"
outputs are:
130k_G0RD0N.bmp (126KB), http://www.mediafire.com/download.php?9752o0fwjdl9o5g http://www.box.com/s/13alyflnr9opyzi8fb30

130k_G0RD0N.HIT (99KB), http://www.mediafire.com/download.php?gabixidpvbxrwcu http://www.box.com/s/xxnia662xh33tf6g7xa4 and

130k_G0RD0N.zip (99KB). http://www.mediafire.com/download.php?qscc32r3d85yl4r http://www.box.com/s/ghr4fvdkxbu44b5u0iku

[file share folder 4thitmail] http://www.mediafire.com/?x6tkew1hawgex
http://www.box.com/s/0jbuy8099ny81u6x21d8

4tHITMailPrivLite.zip MD5:F4EFA7E141D293CEA31F603DA10A8985
http://www.mediafire.com/download.php?6brdzc4ay7ma9y8
http://www.box.com/s/qhs84id5lnn53fkt4bks

4tHITMailPrivLite.sgn Crypton1.2 signature file
http://www.mediafire.com/download.php?ulas8oge8i7y743 http://www.box.com/s/xpn9gmv1u8y5xvzm0yqg


jcpma2011-public-crypton-key_242A.pbl Crypton1.2 public key
http://www.mediafire.com/download.php?3123o7c1nnlt21t http://www.box.com/s/v846yqiqb405eqs0zgnn

Scrambled Egg 0.4 Portable
===
ŠË is primarily a text to text encryption app. I stumbled onto its steganography feature by accident. Press the "Export" button on the lower right corner and it will export the cipher-text into a square PNG image. The size of the square depends on the amount of cipher-text. The square PNG is an image of noise/static.

Description & user guide for Scrambled Egg
http://www.makeuseof.com/tag/control-text-encryption-scrambledegg/
Download page for Scrambled egg portable 0.4
http://code.google.com/p/scrambled-egg/downloads/list


SummaryTableOfSomeSteganographyApps (ratings out of 5):
###########
App-name
Carrier/Output; CarriedData; (Ease) EncrStength; [Deniab.] Comment;
--------------- ------------ ------ ------------ --------- --------
4t HIT Mail Privacy Lite v1.01
common images/bmp,zip..; text; (5) 3; [unknown] userfriendly

BmpPacker v1.2a
(none)/bmp; anyfile; (3) 4; [0] output is always strips of noise bmp

Camerashy v0.2.23.1
gif/gif; text or basic html; (2) 3; [3] somewhat clunky

Eyemage IIE v0.9.0.1
bmp/bmp; anyfile or text; (4) 4; [4 w.TradPassword] lowerDeniability w Intimakeys. noisyBmpMakingFeature

Jpg+FileBinder v1
jpg/jpg; zip; (3) 0*; [0/low] ok for casual steganography, (*any encryption depends on the zip app used)

Jphs jpeg hide and see v0.5
jpg/jpg; anyfile; (3) 3; [4] hiddenFile's extension is lost

Paperback v1
none/bmp; anyfile; (4) 3; [0/low] practical for small files

Puff v2
png,bmp,others?/same; anyfile; (1) Unknown; [Unknown] MediaFilesAsCarriers; Clunky/low confidence

Scrambled Egg v 0.4 Portable
none/text or png; text; (4) 5; [unknown] pngs are noise/supports Unicode text!
==
In a previous posts, I wrote about some of the picture steganography apps mentioned above.

Tuesday, December 20, 2011

112 - Icon Spacing on Windows7 Starter

A Newbie (Noob) Adjusts Icon Spacing on the Desktop of a Windows 7 Starter Netbook
======== written by JCPMA© [Oct.14.2011]

My netbook's default resolution is 1024 x 600 pixels. The default icon spacing values are 47 pixels horizontal and 47 pixels vertical. This translates into being able to fit 12 icons across the screen and 6 icons along the height of the screen. This means this desktop can accomodate 72 icons visually. If you have more than 72 items, they are still there, but you will not be able to see them on the desktop.
Holy Cow! Who has 72 or more items on a desktop?

My preference for desktop items is along the philosophy of "Fewer is Better." Perhaps the ideal desktop has six or less icons on it. This being said, there may be times where you need to do some intense work or heavy organizing, and being able to have more desktop items will be helpful.
When you reduce the Icon Spacing values, what you are doing is decreasing the space between icon items. That is, decreasing the pixel number of the "spacing" (padding) will "scrunch/squish" the icons more closely together. The Horizontal spacing will adjust the number of icons for the width of the screen, and the Vertical spacing, the number of icons for the height of the screen. In my extreme example, without altering the netbook's resolution, I can fit upto 120 icons on the desktop! (Values for this are: "IconSpacing Horiz."=36(pixels), and "IconSpacing Vert."=28; [ie., This holds 15 icons across & 8 icons down].) Look at the illustration for examples.




Photobucket netbookIconDensity-b.png http://s556.photobucket.com/albums/ss4/jcpma/blogger-kx/?action=view&current=netbookIconDensity-b.png
netbookIconDensity-b.png at Photobucket

Accessing the Adjustment
This adjustment is located in the "Advanced Window Color and Appearance" settings. Access this by typing into the StartMenu search field "Change the color scheme" > Advanced button > Item dropdown menu > adjust the size to your taste, and then > click OK, followed by clicking on the Apply button.

Here are the values. [You would enter the 1st number before the slash]:
Icon Spacing Horizontal: 47/12 icons; 46/13 icons; 40/14 icons; 36/15 icons
Icon Spacing Vertical: 47/6 icons; 41/6½ icons; 36/7½ icons; 28/ 8 icons

This method allows upto 120 desktop items, 48 more than the default 72. Although we may prefer a sparser icon spacing on our desktop, it is nice to know we can have the choice of easily changing this when the need arises.
===
In a future post, I will discuss the Windows 7 Starter netbook desktop theme "Visual Styles".

111 - Crypton tutorial

111 - Encryption series: simple apps to encrypt things from your little brother or sister. Tutorial of:
Crypton 1.2
==== tutorial written by JCPMA © Nov.07.2011

SUMMARY
•Crypton requires no installation & is usb-drive portable.
•is small (only 30 KB)

What you can do with Crypton:
* Sign files (to vouch for/ prove their integrity).
* Verify signed files.
* Calculate files' checksums (MD2, MD4, MD5, and SHA1 hashes).
* Wipe/Shred files.
* Encrypt files for yourself.
* Encrypt files for others (you need their public key first though).

Crypton v 1.2 created by Damian Bakowski is a brilliant small app, for Windows, that incorporates a Public key exchange. Where PGP and GnuPG are mainly concerned with email, Crypton is mainly focused on encryption of a FILE and signing of a FILE. It has no compatibility with PGP-type programs, but it shares similar theories in encryption.

I downloaded this app in the Spring of 2006. Obviously there was an English users manual which I have since lost, but I have partially retained some of its information through a .txt copy.(see links below). Like most, I find the whole process of Private and Public key-pairs, PGP keys, GPG keys etc... intimidating and complex. After reviewing the little information I had with Crypton, my first instinct was to delete it. But I reconsidered and am promoting it here because...
It does a great job of encryption but it has even greater value as a SIGNING application! With Crypton, you can sign files (whether they be encrypted or not) before you post/send them via the internet/other. Others will then use Crypton, a small 30 KB app, to verify the files you signed.
PGP (& so far with GnuPG) require their program to be installed on a computer for the ability to sign and verify files. If you do not mind installing programs you should choose either PGP or GPG(GnuPG). It is a good type of software to have. GPG4usbPortable-version0.3 is about 11 MB in size, but have not yet finished their development of signing emails or files. Thunderbird2Portable-with-GPG1.4-with-Enigmail0.95 is a 36 MB package that is portable. It can sign emails/email attachments, but cannot sign files or verify other signed files. Perhaps a more recent version will be capable.
What is wrong with using checksums like MD5 or CRC to verify files? Nothing! I use checksums for 99% of my needs and it works perfectly. However, signing a file adds a personal touch, in that, you are personally vouching for a file's integrity. If you want to be a geek, you have to go that extra step.


crypton-ss_3.png http://www.mediafire.com/download.php?38x8wcj64y3s44f
http://www.box.com/s/85770lidq58esb6bb30k

The original website was here: http://www.d--b.webpark.pl/crypton_en.htm
Crypton is still available for download from other internet sites but I uploaded my own copy with some keys here:

Box.net FileShareFolder \crypton\ http://www.box.com/s/plgvnuncu3k65duxm7ux

crypton12jc-pkg.MD5.txt http://www.box.com/s/ixyr2rv5vdep76ksp5lv
crypton-ss_3.png http://www.box.com/s/85770lidq58esb6bb30k
howtoUse-Crypton3.ans.odt http://www.box.com/s/rrlryrx1mjgh2cmx78u6
howtoUse-Crypton3.ans.pdf http://www.box.com/s/azyqr81yevnazfpkvlmt
howtoUse-Crypton3.ans.txt http://www.box.com/s/3mo3qbfy3gexfamltc47
crypton12jc.sgn http://www.box.com/s/2idn116b73n7cff75via

crypton12jc.zip <== this is the software
http://www.box.com/s/btgx3fjhako1kqrcqqeo

Mediafire FileShareFolder \crypton\ http://www.mediafire.com/?pa1wjewwt79sb

crypton12jc-pkg.MD5.txt http://www.mediafire.com/download.php?z4dpmwjh1dfoj92
crypton12jc.sgn http://www.mediafire.com/download.php?pvvsrbcobortl7e
crypton12jc.zip http://www.mediafire.com/download.php?dj4e34j39ccwwme
crypton-ss_3.png http://www.mediafire.com/download.php?38x8wcj64y3s44f
howtoUse-Crypton3.ans.pdf http://www.mediafire.com/download.php?tx35x6wm5i9xtda
jcpma2011-public-crypton-key_242A.pbl http://www.mediafire.com/download.php?53983hy5oi7sd4x

The Copyright © holders have all rights reserved. The software and web documents are provided "as is" without express or implied warranty of any kind by the parties and contributors involved.

±±±± pre-amble of Public Key Exchange encryption
A casual/vague synonym for Public key exchange may be "Diffie-Hellman exchange" named after the duo who invented this type passkey encryption. They could be considered the grandparents of Public Key Exchange encryption. RSA, Elgamal, & DSA are some of the variations of this type of encryption†.
I'm most comfortable with traditional passkey use, the kind that does not involve a Public key exchange. Examples are many: webmail login; using a bank card at an ATM or retail shoppe; logging on to a computer; logging in to a blog account to post a blog entry; etc... This is much SIMPLER, but LESS SECURE. If someone guessed or found your password it would be easy for them to pretend to be you. Non-crucial information can be encrypted by any of the vast number of available encryption apps to prevent it from being viewed by nosy neighbors. It's fast and easy and most of the time it is adequate. However for sensitive data, Public key exchange types of software should be considered for encryption.

I was introduced to Public key exchanges when PGP, and GnuPG started to become popular. These programs secure email's text and email's file sending. (PGP doesn't really stand for Pretty Gconfusing Privacy, nor does GnuPG stand for Gnu Privacy Gconfusion.) It was a steep learning curve for me to just get a grasp of the basic/minimal concepts before I even touched any of the software.
This type of key use enables:
1. encryption targeted for a specific receiver.
2. a working hybrid key that is difficult to crack.

Public key exchange based programs like PGP, and GnuPG have a built in Key Manager. The key manager performs two crucial functions:
i.) It creates unique pairs of private-public keys.
ii.) It creates hybrids between your own private key and an external third-party public key (OR in some cases hybrids between the program's temporary key, your private key and an external third-party public key).

If anyone gets a hold of two public keys, it would be extremely difficult, if not impossible, for them to figure out the hybrid key. (If they were to get a hold of a private key,... well that's "a different story!").

(†)"Introduction to Cryptography" (Copyright 1999, Network Associates, Inc., Santa Clara, CA 95054 http://www.nai.com)
end of pre-amble ±±±±

Friday, December 16, 2011

110 - Step 64 Text Encryption

### - Javascript Encryption series: webpages to encrypt things from your little brother or sister.
Step 64 Text Encryption ===Dec.11.2011-written by JCPMA===

This is the inaugural post for the Javascript Encryption series. The series begins with Step 64 Text Encryption.
Step 64 can encrypt messages written with contemporary text. It accepts most text characters of another language, unusual symbols, or non-standard punctuation.

Step 64 was hosted at http://jcpma.bravehost.com/js-encr/step64-tnk.html
 Step 64 is hosted at http://bigarrow.tripod.com/js-encr/step64-tnk.html
If the IFrames link below, does not work in your browser, then here is a screenshot of what it looks like.




----Download a copy of Step 64 Text Encryption----
Step 64 is a 20 KB standalone webpage. Its complement logo is 2 KB, but is not necessary for for the script operation. (It just makes the webpage prettier.) Saving a copy from the website will work, however, it is recommended to download from the file sharing site Mediafire or Box.net for reasons of html purity.

The webhost I am using is advertisment-supported. They inject ad-related code into the webpage inflating it to a size of 35 KB. Also, they anchor the page by associating it with approximately 20 (ad and marketing related) extra files of 104 KB. Thus a total of 22 files at 139 KB instead of the original 2 files at 22 KB. None of these extra files are necessary to the function of the encryption.

Download the ad-free original webpage, step64-tnk.html, from Mediafire: http://www.mediafire.com/download.php?nol5eomkagx97sn
Download the ad-free original webpage, step64-tnk.html, from Box.net: http://www.box.com/s/tdcb24rz49jdjhmpnxbf

Download the logo, step64logo32.png 2 KB
(This is an old link - do not go here: http://jcpma.bravehost.com/js-encr/step64logo32.png)
Bravehost site has restructured, therefore ignore any ref's to their links mentioned in this site.
The newer sites are Tripod and others.

http://bigarrow.tripod.com/js-encr//step64logo32.png
step64logo.32.png at Mediafire: http://www.mediafire.com/download.php?oecqrxvsrcyle6v
step64logo.32.png at Box.net: http://www.box.com/s/973aboc02x42tq019zyk

Javascript Encryption series preamble (Links to the series follow below)
I have assembled and modified a compilation of html webpages which run on Javascript and perform to encrypt text. (This includes one of my own creations, that is, a javascript webpage made by a non-programmer!)
Why I am a proponent for encryption. Briefly explained, the promotion of privacy is one of the pillars of a coveted civilization. (If convenient, this may be discussed in a future post.)

Why I chose javascript. In my own words, javascript is ubiquitous and is supported in most if not all current popular web browsers. Operations are performed locally, ie., at your computer terminal whether you are connected to the internet or not. Javascript has one aspect of superiority over "Java". Most web browsers are ready to perform with javascript, whereas with Java, the computer must undergo a one-time installation of Java software/plug-in in order to work. Many but not all computers have Java installed. Another way of saying this is that at any given moment, the likelihood of a web browser having Java ability is less than javascript ability. Also, the webpages when saved locally should function even at a moment when the hardware is disconnected from the internet.
Why the creator of Javascrypt, John Walker of www.fourmilab.ch, supports javascript. (The quote is not exact verbatim, but the thoughts are his.) "...Transparency and Security. Transparency refers to the opportunity to view/inspect the javascript code/source code to ensure it does what it claims to. Security refers to performing encryption at your unique browser terminal. It does not rely on a constant calling of software from another location or across the internet. ..."

---PLAN A---
My intention was to publish each webpage of this series as a separate post. Notice the series header begins with three hash (###) marks. I wanted to start each post with an identifying number unique to this blog.
The Obstacle. The obstacle to this plan was the incompatibility with Blogger. I experimented by posting a webpage via Blogger's html editor, and the interim result showed only a partially functioning javascript post with most of the formatting and colours incomplete or mishandled. I reviewed some of the solutions from the internet on how to enable javascript in Blogger. The answers distil down to two categories.
One, make the javascript a part of your template/layout; or
Two, make the javascript a part of a post by altering the code.
Method One is unacceptable as I do not want the javascript to be loaded (UNIVERSALLY) with each and every post.
Method Two is IMPRACTICAL as altering the javascript is labour-intensive; Tremendously a massive amount of effort is needed, and not guaranteed to work. (The information I found on the internet claims the javascript in a post will function if you write the code as a single line. Remove all components which 'freak out' Blogger's editor thus preventing it from 'hiccupping' and inserting line breaks defacing the code.) Method Two may be adequate for small short pieces of javascript, but my compilation contains huge lumps of the stuff.

---PLAN B---
This is instead how I will proceed. The collection will be uploaded via FTP to a traditional non-blogging webpage hosting site. This permits employing or trying out the webpage directly from cyberspace without having to download anything. The disadvantage is that there are host inserted ads, usually banner ads at the top and or bottom of the page, which inflate the size (KB) of the webpage. Surprisingly the dvertisements and its components can take up a lot of space. (see above)
These pages will be linked by IFrames (experimentally) to this blog. For archiving redundancy the original (unaltered) webpages will be uploaded to file sharing sites Mediafire.com and Box.net (My current two favourite file sharing sites).

[Cloud Impermanence. A rehashing of my own biassed opinion: One of my favourite web 2.0 ("cloud") services, was Drop.io, a file sharing and archiving site from a southwestern company. The convenience it offered was slick and beyond excellence. Then one day business forces resulted in a restructuring of the current terms of service. Reasonable and adequate notice was given for Drop.io users to prepare for service termination. For the informed user, no loss of digital files happened. Unfortunately, any user hyperlinks pointing to the site were nullified. Thusly, so was the work put into setting up the links. I only had a handful of dead-links, but others had many many links. What a frustrating process. Here is some good news. As powerful as Google is, they remain surprisingly ethical. Like Mr. Spock would say, I wish Google, Bravenet, Mediafire, and Box.net "long-life and prosperity" so their current excellence can be maintained. My skeptical nature however tells me any service can decline/cease with time. There will be more dead-links.]

So far, the entire series is hosted at this website in this directory:
http://jcpma.bravehost.com/js-encr/
This is the js-encr folder at Mediafire: http://www.mediafire.com/?yz2o4lrg3xplq
This is the js-encr folder at Box.net: http://www.box.com/s/g3mjclevtqh5zucy5hi2
The files:
http://jcpma.bravehost.com/js-encr/11jscram.htm
http://jcpma.bravehost.com/js-encr/ba_index-b64-6.html
http://jcpma.bravehost.com/js-encr/base64logo32.png
http://jcpma.bravehost.com/js-encr/block-tea7.html
http://users3.jabry.com/jonjonbadboy/js-encr/j4jscrypt.html
http://jcpma.bravehost.com/js-encr/js-encr.txt

http://jcpma.bravehost.com/js-encr/js-encr-checksum.md5.txt
js-encr-checksum.md5.txt at Mediafire: http://www.mediafire.com/download.php?fqv0agszmuzepg7
js-encr-checksum.md5.txt at Box.net: http://www.box.com/s/uy95tayfxx9lburtj33v

http://jcpma.bravehost.com/js-encr/js-encr.zip <== this file represents all the files in the directory.
js-encr.zip at Mediafire http://www.mediafire.com/download.php?28i307t6nktfhi9
js-encr.zip at Box.net http://www.box.com/s/ay3l6q9zlojbdqqfaaeg

http://jcpma.bravehost.com/js-encr/m_aes8.html
http://jcpma.bravehost.com/js-encr/md5logo32.png
http://jcpma.bravehost.com/js-encr/md_index-md5-6.html
http://jcpma.bravehost.com/js-encr/n-alphac8.html
http://jcpma.bravehost.com/js-encr/PG1pubkeya.htm
http://jcpma.bravehost.com/js-encr/PG2encodi.htm
http://carpediem2100.fcpages.com/js-encr/sereg7.htm
http://bigarrow.tripod.com/js-encr/step64-tnk.html
http://jcpma.bravehost.com/js-encr/step64logo32.png
http://jcpma.bravehost.com/js-encr/v2c-JEnc.htm

md5 hashes of the directory:
11jscram.htm,292edb74be45bc5114f725d215786180
base64logo32.png,15fe14a4e58b6777942190ed84ea6833
ba_index-b64-6.html,9f7bbe60e1e2c19ddaef9e7291b8f6c3
block-tea7.html,989ad5c2c5dbadfeb0328ae6519a36f5
j4jscrypt.html,c0374cced40bbfb97ea992f7c8ca44d5
js-encr.txt,09cd9a9bbb94a3bc23854cd43a9e8573
js-encr-checksum.md5.txt,00e5ff886491a1a62acb43c8f13a3de7
js-encr.zip,71e86697e6589075e3f05eb4592871cc

md5logo32.png,d898a1ee216ab264edc677d2efec7be6
md_index-md5-6.html,5a5f9d940b5abab1ce5224a50fb61b18
m_aes8.html,5803a81cc5f10314325a7ceb6d2be398
n-alphac8.html,ee0733a05ab84a81ba5efe6d8e0a94a4
PG1pubkeya.htm,f6a6e06a1e6b89d4b789ad90d3f610c2
PG2encodi.htm,b7d5fb7e29d353271767d732d0e4988b
sereg7.htm,833585e0d25fa79d5fcbe23074f90ec2
step64-tnk.html,a418dd41773e3a58cf8e6e73b3fb52f2
step64logo32.png,1ca4e881eb2216b2d46e2aac85eb4ac7
v2c-JEnc.htm,93289a6e0e14ab51962f79fc43ae89f7
 
*re-jcpmaone-blogger* *re-jcpma-lv-cm-histats*