Crypto Anywhere - Secure Email Utility Protecting Your Right to Privacy

This page is an unformatted version of the Crypto Anywhere product pages provided for easy searching. If you would like to view the formatted version, with index, please click here or on the link above.

Product: Crypto Anywhere
Operating Systems: Windows 2000, windows NT, Windows XP, Windows 98, ME.
Category: Email and Network Security
Keywords: secure email, privacy, internet privacy, pc privacy, secure e-mail, encryption software, corporate email encryption, corporate e-mail encryption, corporate email security, corporate e-mail security, email security, email encryption, e-mail security, e-mail encryption, email, e-mail, security, secure, confidential, symmetric, encrypt, encrypting, encryption, online encryption, crypto, software, free software, program, download, cryptography, privacy, communication, ecommerce, pgp, aes, des, rsa.


Introduction

What is Crypto Anywhere ?

 

Secure email in an incredibly small package!

Crypto Anywhere is secure email on the move ! Crypto Anywhere is small enough to fit on a single floppy or USB key chain drive and so easy to use your grandma will be using it. Don't have a computer yourself but want to protect your web based e-mail at your local internet cafe ? Crypto Anywhere is for you ! If you suspect your employer is reading your private email, put an end to that. If you run Crypto Anywhere from a floppy disk or USB drive, you can encrypt your email without even installing software on your workstation. With Crypto Anywhere you can send and receive secure mail to and from anyone with an email account - the recipients do not have to be "crypto savvy" or even have Crypto Anywhere themselves.

Crypto Anywhere implements trusted, industry standard, strong encryption algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random number generator. Crypto Anywhere e-mail is compatible with SecExMail client based and SecExMail Gate server based encryption. See SecExMail encryption.

 

Encrypting mail 1,2,3

Decrypting mail 1,2,3

For your eyes only

Preferences

Portable media

RSA Public Key Encryption

Crypto Anywhere / SecExMail Encryption

ISAAC Random Number Generator

SecExMail Message Format

One-Time Pads

Crypto Anywhere / SecExMail Keys

About Crypto Anywhere

About Bytefusion Ltd.

Acknowledgements

 

 

Working with Crypto Anywhere

Encrypting Mail 1,2,3

 

To encrypt mail, open Crypto Anywhere, select My Messages on the left, then click the Encryptor icon.

Step 1: Specify the recipient(s)

To specify the recipient of your message, click the "To:" button. This will display the For your eyes only screen. Crypto Anywhere automatically collects encryption keys from other people running Crypto Anywhere as you communicate them. If an encryption key is shown for the person or persons you wish to send e-mail to, select their name with your mouse and click "Ok". Otherwise, simply select "unlisted e-mail address" and provide both the email address and a passphrase for your message.

Step 2: Enter your message

If you are a registered user of Crypto Anywhere you may attach documents and files to your message.

Step 3: Encrypt the message

Select "Encipher" from the menu or click the encipher button. This will display the encrypted message or cryptogram, ready for sending. Click "Send".

Decrypting Mail 1,2,3

 

If you have received a Crypto Anywhere message or cryptogram, follow the simple steps outlined below.

 

Step 1: Copy the encrypted message to the Windows clipboard

In your favorite e-mail client or web browser, select the entire encrypted e-mail with your mouse and copy it to the windows clipboard. To do this click above or to the left of the line

--Begin SecEx 1.1--

and hold the left mouse button down while scrolling to the end of the page. The entire message should now be highlighted. Now select Edit, Copy from the menu or use the keyboard shortcut Ctrl-C. This will copy the encrypted message to the Windows clipboard.

Step 2: Paste the encrypted message into Crypto Anywhere

Open Crypto Anywhere. Select My Messages on the left, then click the Decryptor icon. Now click the Paste button on the toolbar.

Step 3: Decrypt the message

Select "Decipher" from the Crypto Anywhere menu or click the decipher button on the toolbar. This will decrypt the message and display the plain text in the message window.

 

For your eyes only screen

 

When sending encrypted e-mail, you will need to specify the recipient(s) of your message. As you receive Crypto Anywhere messages from other people, Crypto Anywhere collects encryption keys from the senders - your secure friends. When sending mail to your secure friends, messages are encrypted so that only your secure friends will be able to read them. You yourself won't be able to decrypt a message encrypted to a secure friend - unless of course you selected your own key for encryption also. You may select one or more keys. Using secure friend keys is the recommended mode of encryption.

In many cases, the intended recipient of a message has not provided you with an encryption key. This will be especially the case when communicating with someone for the first time. In this case simply click "unlisted email address". This will select "Self decrypting e-mail" as encryption method.

Self decrypting e-mail messages carry an attachment which bundles your encrypted message, the Crypto Anywhere software needed to decrypt the message and any required encryption keys into a self extracting archive. The encryption key required to decode the message is itself stored using 3DES encryption and protected by the passphrase you supply. Therefore you will need to supply the recipient of the message with this passphrase. The ability to receive email ments will vary from recipient to recipient. Some email clients or email servers block self extracting attachments or block attachments with specific file names or extensions. For this reason you may send self decrypting e-mails in three formats under "Send As". The following options are supported :

Request encrypted reply

Check this option if you want to include keys needed to send you encrypted e-mail ( your public keys ).

Share secure friends list

Check this option if you want to share your secure friends list with the recipients ( secure friends public keys ).

In most cases you will only have to send a self decrypting email to a particular recipient once. After decrypting and reading your message, the recipient will be given the option to configure CryptoAnywhere immediately and send you encrypted mail in reply.

 

 

 

Preferences

 

The preferences window allows you to customize the behavior of Crypto Anywhere.

MAPI compliant email client :

MAPI is an acronym for messaging application programming interface and allows Windows applications to use existing e-mail accounts without further configuration. E-Mail clients which support MAPI include Microsoft Outlook and Eudora. Use this option if you have a MAPI compatible e-mail client and intend to use Crypto Anywhere mostly on your own computer. If you are storing Crypto Anywhere on a floppy or other portable medium for use on different computers, the SMTP module is the recommended option. If you are unsure if your computer supports MAPI, you may test for MAPI compatibility via the configuration wizard.

Built in SMTP component :

Crypto Anywhere has a built in SMTP module to send e-mail. This allows Crypto Anywhere to send e-mail independently of mail settings of the computer or computers on which it is run. This option is especially useful if you plan to use Crypto Anywhere in internet cafe's. Some service providers do not allow access to their SMTP send mail servers when connecting from other service provider's networks and might require SMTP logon to permit you to send mail. See "Server requires user authentication".

Server :

This option is only required in SMTP mode. Please provide the DNS name or IP address of your outgoing mail server.

Port :

This option is only required in SMTP mode. Please provide the port number of your outgoing mail server SMTP service. It is safe to leave the default value.

Server requires user authentication :

This option is only required in SMTP mode. Some service providers require user logon to permit sending of e-mail. Usually this is the same information as is required for the checking of e-mail. User logon, also called SMTP AUTH, is only available with extended SMTP, or ESMTP.

User :

This option is only required in extended SMTP mode with SMTP AUTH. Please enter your user name for your e-mail account.

Password :

This option is only required in extended SMTP mode with SMTP AUTH. Please enter your password for your e-mail account.

Your e-mail address :

This option specifies your return e-mail address or "reply-to" address. By default, the "reply-to" e-mail address corresponds to the e-mail address of your default Crypto Anywhere / SecExMail key.

Append my public key to end of e-mails :

If you check this option, Crypto Anywhere will append your default public key to the end of outgoing messages as a "tag line". This enables other users to send encrypted mail to you. You will be added to the secure friends list of other Crypto Anywhere users automatically

Accept auto update of public keys :

If you check this option, Crypto Anywhere will accept new public keys from other people and add them to your secure friends list when ever a key is not found on your secure friends list already. You will be prompted prior to each update.

 

Microsoft and Eudora are trademarks or registered trademarks of their respective owners.

 

 

 

 

 

Portable Media

 

If you have installed Crypto Anywhere on your hard drive ( typically c:\cryptoanywhere ) and wish to use it on a floppy drive, USB drive or similar removable medium, simply copy the entire CryptoAnywhere installation folder to your removable medium.

Files you need to copy:

File

Comment

cryptoanywhere.exe

main executable

cryptoanywhere.hlp

help file

cryptoanywhere.cnt

help file index

crypto.conf

configuration file

secexmail.rnd

random number generator seed

*.pubrsa

public key files

*.privrsa

private key files

Approximate space requirement 1 MB.

 

 

 

 

 

 

 

 

 

 

 

 

 

Technical

RSA Public Key Encryption

 

"c = me mod n" is the algorithm that turns the world of e-commerce. Introduced in 1978 by Rivest, Shamir and Adleman after whom the cipher is named, RSA is the worlds foremost public key encryption system. Contrary to the design of classic encryption algorithms where the same key is used to lock and unlock the information, public key encryption relies on "two key" algorithms. The sender encrypts the message with the recipients public key who, upon receipt of the message, is able to decipher the same with the private key counterpart. This development was revolutionary in the field of cryptography because parties wishing to establish secure communications no longer had to meet in "secret" to exchange confidential keying information.

The SecExMail public key infrastructure uses industry standard RSA encryption as developed by the OpenSSL project.

See Acknowledgements.

 

 

 

 

 

 

Crypto Anywhere / SecExMail Encryption

 

SecExMail encryption uses the Twofish block cipher in conjunction with the ISAAC random number generator and is optimized to operate on real-time email streams. It uses cryptographic primitives which are available to the general public and have been subject to extensive peer review. SecExMail encryption incorporates RSA public key encryption. Message encryption is performed via the Twofish block cipher and the ISAAC random number generator. SecExMail is warranted to be free from spy-ware, key escrow or key recovery features of any kind. The email encryption process is described in detail below. See diagram.

 

 

SecExMail Encryption

 

Email data is received in variable length data blocks. SecExMail parses SMTP header info, mail and data bodies.

Because email messages frequently contain known plain text, such as salutation and or tag lines, which gives rise to known plain text attacks on the encrypted message and in order to minimize overall message expansion, the plain text is first compressed using the ZLIB compression algorithm. The net effect of deflating large amounts of data, containing both tidbits of known plain text such as greeting or tag lines as well as unknown message text into a compressed data stream is that any known plain text is effectively obscured.

The ZLIB stream has a fixed header format which in itself might be exploited as known plain text by a savvy cryptanalyst. For this reason, the first 64 bits of the steam are encoded by way of a One Time Pad, using standard XOR masking. This approach acknowledges that email messages will contain portions of known plain text and proactively manages this problem.

At this point the compressed data is XOR'ed using the 64 bit ISAAC random number stream.

The next step in the encryption process is to encrypt the random number encoded text using the 256 bit Twofish block cipher. Twofish is used in chained block mode. Instead of XOR'ing the previous block's cipher text into the plain text of the current block, the output from the ISAAC layer is "chained in". This chaining process is illustrated below.

 

Twofish Block Chaining

The final step is to assemble the output in base64 transfer encoded format for transmission via mail transfer agents (MTA).

 

 

ISAAC Random Number Generator

 

ISAAC (Indirection, Shift, Accumulate, Add, and Count) is a cryptographically secure pseudo random number generator. With an average cycle length of 2 to the 8295th power its output is uniformly distributed and unpredictable. ISAAC has been developed by Bob Jenkins and placed into the public domain in 1996. See Acknowledgements for legal information on ISAAC.

ISAAC is at the heart of SecExMail's entropy collection system.

 

 

 

 

SecExMail Message Format

 

SecExMail messages are transferred in base64 encoded format. Messages may be encrypted to multiple recipients. The internal message layout is defined as follows :

[<rsa bytes>:<recipient>]key[<rsa bytes>:<recipient>]key...cipher text

 

 

This is the size of the recipient's RSA key in bytes. Therefore a 2048 bit RSA key would be listed

as having a size of 256 bytes. RSA This parameter is defined for RSA key sizes of 2048, 4096, and 8192 bits.

This is the email address of the recipient to whom the message is encoded.

This is the SecExMail session key material, encrypted with the RSA public key of the recipient.

The SecExMail session key is used to encrypt the message body of the email message and is comprised

of a 64 bit One Time Pad key, a 64 bit ISAAC random number generator key, and a 256 bit Twofish key.

This is the message body encrypted using SecExMail Encryption.

 

A typical SecExMail message is depicted below :

 

--Begin SecEx 1.1--

WzI1NjpjaHJpc0BvZmZzaG9yZW1haWxyb29tLmNvbV0dJyyJnwwCm0LI0659zpBY/asERA3FRG99

OYRhm5f+rwohYORt8Wp3rmwI2Nguhk38KvH5pg8ZRTXXWiEHYMakQPPXpbnaJepJFZeXTcNMTi/d

p0Rc5HCTui5okW/00Gv8Sp328Ldh3DlgQcGW7oYt9qxG/cJ/PaVxxxEfDM3I4cnsCyLjfX+I0JY6

h+emWt4U/N6u+K0tPL4ua2OfGhGoBXo+6KK042bXGpk/Pj6WEOQMcKyR+VrsOx6ZcTgpqS3WCcUc

2/JDy9zHqlkPLohXcT4G2Hiwp/1JhviaQtoKA2NYYimuY5ZjNUGPMsIaN0h6AKS3/qZsHhK1LtcA

WpLnuoFbQleekuJngBCC1RIlIlI4lfFgMkxoUkZrtXg6E217Q6GMMhHMANJ4EU3D2c1BgauDYAQG

Rpz0p8efm/WAZoXai6KVElMEiK7tv98s8wu9LpUxN44QYj2eNRVI+72lGPfkBoKvr6eK5/TU4cHN

Dg9VxCGj4n8KDvfYsPRpBSNzLL+Ta4iz7toQ/MGdPCQa

--End SecEx Mail--

 

 

 

 

 

 

One-Time Pads

 

A one-time pad is a block of random data used to encrypt a block of equal length plain text data. Encryption is usually by way of XOR'ing the one-time pad with the message text. This process may be thought of as a 100% noise source used to mask the message. The one-time pad is secure if it is comprised of random data and is never reused. Because of this, one-time pads have limited application in modern ciphers, but are commonly acknowledged as the holy grail of cryptography.

SecExMail uses one-time pads to encrypt the ZLIB compression header in SecExMail messages.

 

 

Crypto Anywhere / SecExMail Keys

 

SecExMail employs public key encryption. Messages are encrypted to one or more recipients using their public keys. Only the intended recipient can, upon receipt of the message, recover the plain text using his/her private key. Public key encryption differs from classical encryption because the recipient of a message does not use the same key for decryption as the sender used for encryption.

In cryptography the fictional characters "Alice" and "Bob" are often used for illustration purposes. Consider the following scenario : Alice lives in New York and Bob lives in Los Angeles. Alice wants Bob to be able to send her confidential mail. She goes to her local hardware store and purchases a dozen or so combination padlocks, sets the unlocking code on each padlock, confuses the dials again, and sends the open padlocks to Bob in Los Angeles.

Bob is now in possession of Alice's padlocks, but not the unlocking codes. When Bob wants to send Alice a confidential letter, he places the letter inside a steel box and locks it with one of Alice's padlocks. Once the padlock is snapped shut, even he himself cannot re-open the box since he is not in possession of the combination which will release the lock. Only Alice will be able to open the box and therefore read the letter once she has received Bob's parcel in the mail.

Public key encryption works much in the same manner. The public key may be thought of as an open, electronic padlock. You can send this electronic padlock to all your friends. Your friends may then use that padlock to secure their emails to you in an electronic box. This electronic box is the encrypted email. Upon receipt of the encrypted email, you dial the secret combination which is your private key and retrieve the original message.

SecExMail does all this for you.

 

 

About

About Crypto Anywhere

 

Crypto Anywhere

Version 1.1

Copyright © 2003, Bytefusion Ltd.

All Rights Reserved

 

About Bytefusion Ltd.

 

Bytefusion Ltd.

22 Duke Street

Douglas, IOM

IM1 2AY

British Isles

Inquiries: sales@bytefusion.com

Acknowledgements

 

At the time of writing, the ISAAC home page can be found at http://burtleburtle.net/bob/rand/isaacafa.html.

ISAAC has been placed into the public domain by its author, Bob Jenkins in 1996.

-----------------------------------------------------------------------------------------------------------

My random number generator, ISAAC.

(c) Bob Jenkins, March 1996, Public Domain

You may use this code in any way you wish, and it is free. No warrantee.

-----------------------------------------------------------------------------------------------------------

The RSA algorithm was patented until September 2000 when RSA® Security Inc. released the algorithm into the public domain. "BEDFORD, Mass., September 6, 2000 -- RSA® Security Inc. (NASDAQ: RSAS) today announced it has released the RSA public key encryption algorithm into the public domain, allowing anyone to create products that incorporate their own implementation of the algorithm."At the time of writing a copy of this statement can be found at http://www.rsasecurity.com/news/pr/000906-1.html

The Twofish block cipher by Counterpane Labs was developed and analyzed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson. Twofish was one of the five Advanced Encryption Standard finalists. At the time of writing the Twofish homepage can be found at http://www.counterpane.com/twofish.html. The cipher has been made available to the general public by the following statement on http://www.counterpane.com/about-twofish.html :

" Twofish is unpatented, and the source code is uncopyrighted and license-free; it is free for all uses. Everyone is welcome to download Twofish and use it in their application. There are no rules about use, although I would appreciate being notified of any commercial applications using the algorithm so that I can list them on this website. "

ZLIB is a lossless data-compression library written by Jean-loup Gailly and Mark Adler. ZLIB is made

available as free, unpatented software to the general public at http://www.gzip.org/zlib/. The license

conditions are set forth at http://www.gzip.org/zlib/zlib_license.html and reproduced below :

 

" Copyright (C) 1995-2002 Jean-loup Gailly and Mark Adler

This software is provided 'as-is', without any express or implied

warranty. In no event will the authors be held liable for any damages

arising from the use of this software.

Permission is granted to anyone to use this software for any purpose,

including commercial applications, and to alter it and redistribute it

freely, subject to the following restrictions:

1. The origin of this software must not be misrepresented; you must not

claim that you wrote the original software. If you use this software

in a product, an acknowledgment in the product documentation would be

appreciated but is not required.

2. Altered source versions must be plainly marked as such, and must not be

misrepresented as being the original software.

3. This notice may not be removed or altered from any source distribution.

Jean-loup Gailly jloup@gzip.org

Mark Adler madler@alumni.caltech.edu "

 

The RIPE message digest was written by Antoon Bosselaers for Katholieke Universiteit Leuven, Department of Electrical Engineering ESAT/COSIC, Belgium. License conditions ask us to quote the following :

" RIPEMD-160 software written by Antoon Bosselaers,

available at http://www.esat.kuleuven.ac.be/~cosicart/ps/AB-9601/ "

Katja Bengtsson of Brisbane, Australia ( katja@offshoremailroom.com )

SecExMail contains cryptographic software from the OpenSSL project at www.openssl.org which is licensed under a "BSD-style" open source licenses. These licenses asks us to state the following :

"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"

"This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com)."

SecExMail is an independent, derived work and no endorsement of SecExMail by the OpenSSL project is implied. The full text of the OpenSSL license and the original SSLeay License is reproduced below.

OpenSSL License

====================================================================

Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.

Redistribution and use in source and binary forms, with or without

modification, are permitted provided that the following conditions

are met:

1. Redistributions of source code must retain the above copyright

notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright

notice, this list of conditions and the following disclaimer in

the documentation and/or other materials provided with the

distribution.

3. All advertising materials mentioning features or use of this

software must display the following acknowledgment:

"This product includes software developed by the OpenSSL Project

for use in the OpenSSL Toolkit. (http://www.openssl.org/)"

4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to

endorse or promote products derived from this software without

prior written permission. For written permission, please contact

openssl-core@openssl.org.

5. Products derived from this software may not be called "OpenSSL"

nor may "OpenSSL" appear in their names without prior written

permission of the OpenSSL Project.

6. Redistributions of any form whatsoever must retain the following

acknowledgment:

"This product includes software developed by the OpenSSL Project

for use in the OpenSSL Toolkit (http://www.openssl.org/)"

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY

EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR

PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR

ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,

SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT

NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;

LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)

HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,

STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)

ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED

OF THE POSSIBILITY OF SUCH DAMAGE.

====================================================================

This product includes cryptographic software written by Eric Young

(eay@cryptsoft.com). This product includes software written by Tim

Hudson (tjh@cryptsoft.com).

Original SSLeay License

 

Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)

All rights reserved.

This package is an SSL implementation written

by Eric Young (eay@cryptsoft.com).

The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as

the following conditions are adhered to. The following conditions

apply to all code found in this distribution, be it the RC4, RSA,

lhash, DES, etc., code; not just the SSL code. The SSL documentation

included with this distribution is covered by the same copyright terms

except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young's, and as such any Copyright notices in

the code are not to be removed.

If this package is used in a product, Eric Young should be given attribution

as the author of the parts of the library used.

This can be in the form of a textual message at program startup or

in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without

modification, are permitted provided that the following conditions

are met:

1. Redistributions of source code must retain the copyright

notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright

notice, this list of conditions and the following disclaimer in the

documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software

must display the following acknowledgement:

"This product includes cryptographic software written by

Eric Young (eay@cryptsoft.com)"

The word 'cryptographic' can be left out if the routines from the library

being used are not cryptographic related :-).

4. If you include any Windows specific code (or a derivative thereof) from

the apps directory (application code) you must include an acknowledgement:

"This product includes software written by Tim Hudson (tjh@cryptsoft.com)"

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND

ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE

FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL

DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS

OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)

HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT

LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY

OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF

SUCH DAMAGE.

The licence and distribution terms for any publicly available version or

derivative of this code cannot be changed. i.e. this code cannot simply be

copied and put under another distribution licence

[including the GNU Public Licence.]

 

Chris Kohlhepp and Mark Robertson, Bytefusion Ltd.

 

 

Your index page goes here...

In MS-Word, select INDEX AND CONTENTS from the INSERT menu.

Select INDEX and click OK.