Angel Eyes protects you and your confidential files from prying eyes. All types of information stored in electronic data files can be processed and converted to a safer encrypted format.
Angel Eyes uses proprietary encryption algorithms. For this reason, files carried out to other computers can not be unprotected by other means.


This documents explains every command and function included with the program. It also has sample procedures, security tips and benchmark comparative charts.

Angel eyes can be used for general use but it was specially conceived for corporate use which demands a higher reliability with unusual quality of encryption.
If your requirements are not so high, let us recommend you to get Crunch Machine, from our own collection of encryption tools which renders a very high quality solution with just a single button click and all in a beautiful windows interface. Visit PGTec web site at
http://www.bawy.org/pgtec/aeg/ to download the latest version of Crunch Machine.

This release of Angel Eyes is fully compatible with Windows 95, 98, Me, 2000 and specially optimized for Windows xp
 
     
  Angel Eyes Features

Security Levels

8 progressive-complexity security levels:
4 in normal mode, 3 in key file mode.
1 in Internet Share Format.
1 File Split mode.

Portability

7 (seven) reliable security modes permit file portability.
1 (one) highly security mode for non-portable protected files.

File System

Multiple files handling - in batch mode -
Mixed state encode/decode capable.
Automatic detection of popular file types.
Folder monitoring.

Auto Disguise

If program is idle,
Disguise function hides (if enabled) the program's interface after a period of time.

User Interface

Real time progress and status reports and indicators.
Menu and iconized buttons in an user friendly interface.
Easy to understand system messages.
Customizable preferences and settings.
Automatic settings back-up.
Embedded search engine.
Drag and drop files capable.
Customizable canvas.

Reliability Guaranty

We encourage hackers to attempt to hack our sample files.
To download encrypted sample files to play with go to our
downloadable samples page. All samples are encrypted with Angel Eyes v1.0.
 
     
  Update Notice


Angel Eyes 2 files are compatible with Angel Eyes 1. No encryption changes were made among versions.
 

         
 
         
  Iconized Toolbar    
 

Protect/unprotect

  View Memo-log      
 

   

Spliter

My Computer  
     

 

       

   

       

 
       

Disguise

 Abort    

Settings

Delete

         
         
 

Button

  Function Name Value
       

  Protect/Unprotect  

  Batch Files panel Show/Hide

  Split On/Off

  Info Box Show/Hide

  Disguise Manual launch

  Halt  

  View On/Off

  Delete  

  Memo Records Manual/Automatic

     
    Settings
    ___Start in Folder
    ___Clean History
    ___Clean Favorite Folders
    ___Reset Auto Show
    ___Default Extension
     
     
  Data types - Differences

1) Binary

Binary files are those which content is not text. For example, files containing music (wav, mp3, midi, etc.), video (mpg, vid, etc.), executable files, databases, pictures (jpg, gif, bmp, iff, png, etc.)


2) Text

Text files are those which content is readily readable by a human once the file is open. While Angel Eyes will attempt to, it may not recognize all type of text based content files. To be in the safe side, just try to remember to never use
Low or Med security levels to protect text files.
Some text files types are those with the following extensions: .txt, .doc, .html, .js, .pl, .cgi, and some data files generated by other applications. To verify if a file content is text based, open it with a text editor and see if you interpret the content. If you see a lot of weird characters and there is nothing that looks reasonable to interpret, then it is a binary file.


Security levels available for encryption:


Normal mode: Low, Med, High, High+
Key file mode: High, Vigh, Uigh

Use
Low to protect binary files only. Angel Eyes will attempt to detect the file type before processing and if the file type is text you will be told to switch to High security level.

Low mode offers very light protection and is very fast to process. Use is only recommended to protect a large amount of files at once, if available time is short, or for not so volatile content files. For example the family pictures album; because it is important to you that no one can get it without your authorization but the content is not top secret.

Med level is also not available nor recommended to be applied for text files. While it offers a better protection than Low, it is still not safe enough for sensitive content.
At the bottom of this document there is a sample
benchmark table where you can review speed differences and time gain between protection levels.

High can be used for all type of files due the protection it offers is safe enough to conceal safely your information.


High+ is the supreme protection level for any password protected file. Although of that, it speed is not much slower than the one for High level.


A password, which is not embedded on the file nor stored in the computer is used to conceal files content. As large the password is the better protected will be your data. A password can be a word of any length. It can contain spaces. Thus a phrase can be used instead. The limit on the phrase length depends directly on your system's memory. Usually you can use a pretty large phrase without problems. You can even use a sentence.


If the length of the password is long enough to be a head ache each time you need to import it to the program you may want to use a key file instead. This is available through the
Key File mode.


In Key File mode there are another three security levels. Note that each differs from all others in reliability and speed as a consequence.

The specific details of each security level are not disclosed nor being discussed here nor in any other documentation. This is done to protect our users data integrity and trust. Protocols and algorithms used by Angel Eyes are proprietary.

Vigh stands for Very High and Uigh stands for Ultra High

Ultra High -
Uigh - format is not portable. This means a file protected with this security method may not be read on another computer; even if Angel Eyes is installed. There is more information about this subject on the Key File section of this document.
 
     
     
     
  Portability

Files protected by portable methods can be transported over any media type including file attachments on Email messages, ftp transfers, P2P, etc.

The recipient party must know the password to open the protected file and have an enabled version of Angel Eyes.

Use the method of your preference to let the other party know the password. For example: A separate Email message, a Digital phone call (PCS), etc. You could also type the password into a text file, protect it with a word, long number or phrase you both know, etc. and send it over the other party. Just make sure the method is secure. If you chose the Email delivery, a good security step is not to send the password or key file on the same day and wait till the other party deletes the previous mail batch from the server. Another good advise is to avoid sending key passes from and to web Email addresses (ie hotmail, yahoo).
 
     

  Main Menu  
     
  .::

Quickly Hides/Shows My Computer/Batch panel. This button is located on the top menu to the left of the Files menu
 
     
  ::.

Quick Select/Deselect All files. This button is located on the top menu to the right of the Help menu.
 
     
  Open

Opens and loads a file into memory. This applies to protected and unprotected files.
If
Auto Show is selected and the file format is supported by the program, the file content will be displayed.

A file loaded by this method will be added to the batch of files either if it is on a different system folder than the one displayed by the Batch file-list and automatically check marked making it ready for further processing. i.e.: protection, deprotection, deletion, view.

If either
Flush Memory, Deselect All is selected at any time, the complete batch will lose the check-mark, then items which are not normally found on the displayed folder (shared by the batch display) will be removed from view (not physically deleted from disk).

If you deselect files from the Batch file-list, they will be removed from the Batch file-list.

If the
Protect command is given, and the batch is due for encryption, the resulting files will be automatically saved to disk after each process finishes. For information about the naming of the resulting file(s) read the Folders section.

If files are due for decryption and the
Restore command was selected, a Save As... dialog will appear each time a file is ready to be saved.

It might be less confusing if you process batches for encrypting and decrypting separately, but it is possible to mix processes in a single batch.

If
Auto Show is set to ON, Angel Eyes will attempt to display file(s) content once the current process is finished.
If the file format is not supported by the program, it will ask you to transfer command to Windows so the files can be opened by the registered program for that file type if available.
 
     
     
     
  Save As...

Opens a dialog box to request a disk path and filename to save the data actually contained in memory. The command is enabled only when there is safe data - encrypted - in memory.
 
     
     
     

 
 

Delete Files

Removes permanently the selected file(s) from disk.
This command can be found under the Files menu or through the Delete Files button on the iconized toolbar.
 
     
     
     
  Copy

Copies a file or files to the UData folder. - UData stands for Unsafe. Data on this folder is stored without protection and in the original file type.

To copy a file from any folder on your system, navigate to the folder where the file(s) are located and click the file's check box to select the ones to be copied; Then select Copy on the Files menu. Copied files will be transported to the UData folder regardless of it encryption state.
 
     
     
     
  Move

Moves a file or files to the UData folder.

To move a file from any folder on your system, navigate to the folder where the file(s) are located and click the file's check mark to select the ones to be moved; Then select Move on the Files menu.
 
     
     
     
  Delete Memo-log

This command removes permanently (deletes) from disk the Memo-log file created by the Memo-log tool.
 
     
     
     
  Memo-log Protection

This function protects/unprotects the Memo-log file.

The Memo-log file engine automatically detects if the file is protected and does the inverse operation after operator's confirmation.

Memo records are sensitive information due they contain information about the file(s) you protected. As explained elsewhere this tool can help you tracing the whereabouts of your files but may compromise security if left on the computer as plain text.
Protecting the content helps to reduce risk of prying eyes. A protected file can not be read by a human.

This tool requires a password to protect the file. You assign the password you want as for any other file.
 
     
     
     
  File Types

Select it to change the file types the Batch file-list displays.
When you select this option a pull down menu appears bellow the Batch file-list. That menu holds the most popular file types. Either select the one that matches your criteria or type it if it is not found on the list.

The Batch file-list will then display only files that match your selection.

If the Batch file-list already had items checked. Those items will remain active and visible.
 
     
     
     
  Path

Keeps track of the recent paths visited.
This function can be enabled / disabled by selecting / deselecting it on the Preferences menu.

This function is automatically enabled every time the program starts. If you do not want the program to store a memo of these paths, you can instruct it to clean the favorite (Paths) from disk on exit. To do so, select the Clean Favorites check mark on the
Settings screen.

Clicking on a visited path from the list to navigate quickly to that folder. Marked items will remain active.
 
     
     
     
  Recent Files

This keeps track of the last 10 (ten) files loaded into the program on each session. Angel Eyes keeps this memo on disk and it can be cleared upon exit. To do so, select the Clean History check mark on the Settings screen.

Click on an item from the list to reload/display that record.
 
     
     
     
  Exit

Quits Angel Eyes and closes all program's open screens.
Clears all internal registers and memory blocks used by the program. Cleans from the Windows System Registry all sensitive information needed by the program during execution.
See additional information at the bottom of the
Security Tips section.

Upon exit, Angel Eyes detects if there is an unprotected Memo-log file. If the program finds it, you will be prompted to protect it before closing. If you agree to protect it and there is a password on the password input field, the program uses this to process the file, otherwise Angel Eyes will prompt you to enter a password and the exit process aborts.
 
     
     
     

 
 

Halt

Aborts execution of the current process.
This command can be found under the Edit menu or through the Halt button on the iconized button bar.
 
     
     
     

 
 
 
 
 
 
 

Auto Show

Set this option if you want the program to automatically display the content once it is decrypted.

It also displays picture or text files as soon as it is loaded. For this case to work, the file must be supported by Angel Eyes and be stored without protection.

Auto Show option is found on the top menu under Preferences.
 
     
     
     

 
 
 
 

Show Thumbnails

Enables/Disables thumbnail display.

When selected, a thumbnail of the picture selected on the batch file-list file will be shown. This is valid only for graphical images with file types supported by the program. It will not show a protected file content. For more information read the
Thumbnail section.
 
     
     
     
  Confirm Delete

Setting this option to ON prompts the operator for confirmation previous to deleting a file. It only applies for commands issued through the program's interface controls.

Confirm Delete option is found on the main menu under Preferences.
 
     
     
     
  Alert when Finished

If this option is set, the program will show an alert every time it finishes processing a file.

This option is found on the top menu under Preferences.
 
     
     
     

 
 
 
 
 
 
 
 

Container

Data contained in files can be displayed either into the program boundaries or outside it.

The differences between both methods is that Images displayed into the program can be arranged horizontally, vertically or cascading. When the program is minimized, all images stay inside the program boundaries.

Images shown when container button is OFF can be maximized, minimized independently of Angel Eyes screen status.

This option is found on the top menu under Preferences.
 
     
     
     

 
 
 

Clock it

When this setting is ON the program clocks the time a process is taking and displays the result when process has finished. If multiple files are processed, each file is accounted separately.

This option is found on the top menu under Preferences.
 
     
     
     
  Key File

This permits to use a data file instead of a typed password.

How secure a key file encryption is, depends on how big the key file is, the type of data the key file has and the Key-File-specific security level you chose.

Angel Eyes handles 3 security levels in Key File mode. Those algorithms differ from the used on normal mode.
The levels are tagged as: High, Vigh and Uigh. Vigh stands for Very High and Uigh stands for Ultra High.


If you want to restrict portability use
Uigh security. A file encrypted using this method will fail to decrypt in any computer other than where it was created.
This method is very strong and at the same time exposes certain risks you need to be aware of as: If you replace your computer's disk drive, or if you reinstall or upgrade your computer's operative system the file might never be restored. Neither can we restore it for you due to the method employed to process it tight encryption.

In the other hand, if you use Uigh security, the key file length does not need to be as large as the one used with Vigh or High security levels. This is a time saving capability; However, as the key length shortens, the risk increases exponentially.


Use of a
binary file as the key file is encouraged. This trick increases security exponentially without affecting processing speed.

In Key File mode, levels are switched using the Quick Security Level changer control found on the button bar. These settings are not found on the Configuration Screen thus can not be saved as default security.


In key File mode, Low and Med security levels are not available and will not appear on the Quick Security Level switch control.

Encrypting/decrypting a file using a key file takes longer than with other processes but ensures a more reliable protection and is virtually impossible to decrypt it - without the original key file - even by the most powerful computers existing and to come.

It might take a few thousand years to crack this type of encryption if a considerably large key file is used even if the lower security setting (High) was used.

This option is found on the top menu under Preferences.


Variable Key Size

The length of the key can be modified when the file is loaded into Angel Eyes. This trick increases security if you plan to leave the key file on the computer. By varying the length of the key, the file will not decrypt successfully unless the correct key length is typed. This trick is not as reliable as not having the key file on the computer at all.
 
     
     
     

 
 
 
 

Protect

This command is used either to encrypt or decrypt file(s). - Protect / Unprotect
Angel Eyes automatically detects the process to apply based on the file's characteristics.


A key or password is required to safely encode file(s).
Passwords are entered into the input box of the program interface.

Passwords are case sensitive. In other words, 'my password' is not the same to 'MY PASSWORD', nor to 'mY PaSswoRd'.

Passwords can be words or phrases and/or numbers of any length up to the limit your system's memory supports. This parameter will vary depending on your actual system's memory and the amount that is being used for the system by other applications.

For extensively long keys or passwords, creating a
key file is largely recommended than pasting/typing the whole text into the input field.

This command is found on the top menu under Tools. Right clicking the mouse over the Batch will also display this command and with the padlock icon on the iconized tool bar.

The command is not available if there are no files selected.
 
     
     
     
  Angel Eyes Share format (AES)

This format permits the safe content transfer among Angel Eyes users without the need of a password.

AES features is a safe 128 byte encryption method which is processed using the High level setting on the internal security scale.
When this mode is active, Angel Eyes will use
High security level. It also pays no attention to other user settings nor key file selection (if set).

Files processed by this method have a default file extension named "AES". Any file with that extension name will be recognized by Angel Eyes as the AES type regardless of if it was or not created by Angel Eyes.


AES protection can only be called from the Tools menu and from the pop-up menu on the Batch file-list. There is no button for this mode on the Iconized toolbar.


WARNING
Files protected by this method can be open by any Angel Eyes user without the need for a password.
We do not recommend to use this method as a solutions other than for Network Shared files.
 
     
     
     
  Folder monitoring

A folder/directory can be set to be automatically monitored.
Dropping files on that folder will trigger the monitor and they will be protected, moved to the protected folder and the source removed from the source (monitored) folder.

Any files with an extension name different than the protected default extension are processed.

To activate this function, you are required to type a password first. Then select Folder Monitoring on the Tools menu. A screen to chose the folder to monitor will open. Select the one you want and click Ok.

To deactivate this function, deselect the check mark on the Folder Monitoring on the Tools menu.

Folder Monitoring is very useful, for example, when you download pictures from the web.
Tell Angel Eyes to monitor the folder where your browser saves those files and you will not have to spend extra time protecting them later.


For example you can tell your web browser to store those files on the My Pictures folder (usually inside the My Documents folder) or create another sub folder named "Special files" or under any other name you like and tell Angel Eyes to monitor that folder.


You can not set the Monitor Folder to monitor the Internet Temp folder to process everything dropped there. That's because Windows creates additional sub folders for storage. Angel Eyes does not monitor other folders than the root folder. - In a future version we may include this capability, we will wait to hear feedback from users requesting this capability -
 
     
     
     

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Split

This tool purpose is to increase your safety feeling by rearranging a file content and splitting it into two files.

One of those files will have a "src" extension and the other a "chl" extension.

You can later store both files in different media or leave one in the office and take the other home or take any other safety measure you like.

These files can not be connected to the other unless processed by Angel Eyes Spliter.

None of the files contain information about each other nor clues on how to rebuild the master file. Also, those files lose their original filename and extension when processed by Spliter.

Spliter does not know the original filename and extension when you rebuild the master file. For this reason, you need to be aware of what the file was about.

Files can be reconstituted easily by Spliter provided both "src" and "chl" files are supplied.

Spliter is meant to be used after processing a file by any of the protection methods provided. Using Spliter without previous protection protects nothing. To help you remember this, Spliter will not process a file which file extension is different than the one chosen as default for protected files.

If at any time you changed the default extension for protected files, Spliter will not know this. In this case you need to tell Angel Eyes to change the default extension for protected files previous to the use of Spliter.
Changes to the default extension name for protected files, are done on the Settings screen.

To rebuild a master file, both, "src" and "chl" parts must be present on the same folder where the "src" file is stored at time of rebuilding.
After Spliter finishes rebuilding the master file, you will be required to assign a filename and extension for it. If you don't give an extension, Spliter will assign the "dat" extension.
 
     
     
     

 

Quick Security Level Change

Click into the Security Level box to switch between levels.
Each mouse button can be used to go up or downside on the list.
This change is not permanent but will remain for as long as the program is running or you change it again.

Levels will scroll in normal mode between Low, Mid, High and High+. In key file mode it scrolls between High, Vigh and Uigh.
 
     
     
     
  Restore

This option needs to be checked when you want to restore and save an encrypted file to it original format.

Check the
Restore option and then select Protect when you are ready. After the process command finishes execution, a dialog box will show to request a disk path and filename to save the unprotected file.
 
     
     
     
 

 
 
 
 
 
 
My Computer panel

Shows and allow access to the drives, folders and files located in your computer's disk system. Use this panel to quickly navigate your computer's storage system.

Clicking the iconized button or selecting the option from the menu shows/hides the panel.

To quickly show or hide this and
Batch panel, click the .:: symbol located to the left-most corner of the menu bar.
 
     
     
     
  Batch panel

Displays the contents of the folder shown in the My Computer panel plus whatever file you've added to the Batch by any method.

It also allows multiple files to be added and/or removed from the
Batch.

Clicking the icon button or checking the menu option shows/hides the panel.

To quickly show or hide this and
My Computer panel, click the .:: symbol located to the left-most corner of the menu bar.
 
     
     
     
  Batch Processing

You can select as many files as necessary on the File-list/Batch panel. All checked names are added to the Batch buffer and each will be processed once the proper command is given.

You can use Batch Processing to encrypt, decrypt, delete or display files content.

If you chose to Display files and they are of graphic content, every image may open in a new screen outside of the program's main screen. If you chose
Container option (default) - located under the Preferences menu -, each file will open into the program's main screen.

If the images are maximized, switch between them selecting the
Screens option located under the Windows menu.
To close all screens at once select the
Close All option located under the Windows menu and right click menu over the Batch list.
 
     
     
     

 
 
 
 
 
 
 
 
View

Opens and displays file contents.


If file content is supported by Angel Eyes, the program opens a screen (if
Container mode was selected) or window otherwise as the base for display.

If the content is not supported by Angel Eyes, the program will transfer command to Windows to open the file with the registered program to that file type.

If the file was encrypted by Angel Eyes, the file type is the same as the default extension and the proper password is set, the program will attempt to decrypt the file and display the content. If the file fails the password check, an error message will be displayed and content will not be compromised.
 
     
     
     
  Images and Pictures Interface

In
Container mode data windows open maximized. This applies regardless the method used to call the file.

To close the currently visible screen click the
x button - located at top of the Stop button - if screen is maximized - or press the Delete or the Esc key.
 
     
     
     
  Search

Angel Eyes comes with a very powerful search engine similar to Windows Find [files or folders] located under the Start button.

The differences between Windows Find and Angel Eyes Search engine are as follows:



 

Angel Eyes

Windows

Find Exact Match alone

Yes

No

Match extension but also report all matching files without using wildcards. *

Yes

No

File Info **

Yes

Yes

Search All Drives

Yes

Yes

Search a single Drive

Yes

Yes

Search CDs

Yes

Yes

Match folder names

No

Yes

Case sensitive

No

Custom

Multi select

Yes

Yes

Edit functions/Menus

No

Yes

Discriminate Date/Size

No

Yes

Cached records ***

No

Yes

Announce when finish

Visual/Sound

Visual



* This makes writing a search string much easier with the same results.
** Angel Eyes reports this information by highlighting (note: not selecting) the files on the files found panel.
*** Record caching speeds up the scanning process at the expense of storing information about those files on the swap disk. In consequence Angel Eyes Search is safer to use in terms of security.


You can use the drag and drop method (as explained in the next topic) to transfer files from the results screen on Windows Find, to Angel Eyes Batch.

When using Angel Eyes Search, just click the files you want to add to the Batch and Angel Eyes does the transfer automatically. (there are no disk operations on this process. Your files remain on the same drive as they were).

To add files to the Batch using the found panel on the Search screen, click into the check mark next to the file of your interest.

To remove files from the Batch panel, click the marked check mark directly on that panel. Those files will not be unchecked from the found list. you can leave them checked if you want, Angel Eyes will not pay attention to that.
 
     
     
     
  Drag and drop

Another way of adding files to the Batch is by dragging files from other windows applications like Windows Explorer and dropping them into Angel Eyes.

You can use any drop zone while the mouse cursor does not seem a prohibited sign - circle with a bar crossing -

To do this find the file or files into your other application, click the file(s) to select them and move them to Angel Eyes screen. Then release the mouse button.

Angel Eyes will add the files to the Batch panel and select them automatically so they are ready for processing.
 
     
     
     
  Clear Recent Files

Clears the recently opened files-list display on the File menu.
 
     
     
     
  Flush Memory

Cleans up all registers and buffers from memory. Sets the info led to white.
 
     
     
     
  Clear Info Box

Cleans all messages reported during execution into the Status Box.
 
     
     
     

 
 
 
 
 
 
 

Select All / Deselect All

Files showing on the Batch Files-list can be selected individually by a mouse button click on their check mark square or by the Select All function.

The Select All is found as a button on the Batch Files-list bar; on the top menu under Edit and at the menu shown on the Batch Files-list after the mouse right button is pressed.

To deselect the whole Batch Use the
Select None function found on the menus or press again the Select All button (if depressed).
 
     
     
     
  Memo-log

This provides a way to keep track of the information your secured files contain. Records are stored as plain text and are readily editable and can be open with any text editor.
The information stored will vary depending on the method you use to store information.

If you select the Automatic method, just the source, the destination and the security level used are recorded.
If Manual method is selected the entire information contained on the Records screen will be stored.

To secure the Records Memo use the
Record Protection function available on the File menu. Angel Eyes will not secure this file automatically unless it was protected at startup. In other words, it will remain as a text file until you protect it.

If during normal operation Angel Eyes detects the current password does not match the password chosen for the protected Memo-log, no information will be updated on the file until you unprotect it . You can only unprotect it by typing the correct password.

Before exiting Angel Eyes, the program will alert you if it finds the Memo-log file unprotected.

If you want to delete this file use the Delete Memo-log function available on the File menu. Just remember to unprotected it whenever you want to add new entries.



Automatic - Records Memo -

If Automatic is set, every time a file has finished processing, an entry containing information about the file will be stored into a file named "RECORDS.TXT". This is an insecure file thus keeping this file away from your secured files is very important.

Manual - Records Memo -

This calls to a screen where you can enter information about files to be encrypted or already encrypted. The information entered will be stored into a file named "RECORDS.TXT". This is an insecure file thus keeping this file away from your secured files is very important.

In a manual input you can enter the following information:

File: the protected file name. Optionally can store the path to the file.

Original: the original file name - before protecting -

File type: the original extension name. (i.e.: txt, mpg, jpg)

Data type: the type of data the file contains (i.e.: text, video)

Description: A description of the file.

Disk Label: Information to locate the file. (i.e.: if you stored it on a CD, the label of the CD or any indication to refer to the disk.)

Key File: If a key file was used to protect it, name or path and file name to the file used as a key.


Any of those fields are optional. You can use all of them or just some. Angel Eyes pays no attention to this file content so you can fill out the fields with any information you feel relevant.
 
     
     
     
 
     
     
     
  Screens and Controls  
     
     
  Status Displays

Progress bar
Percentage done
Security Level
Info Led

For your convenience, these displays are shown at all times.
The Progress bar (when active) gives you an idea of how much was done an how much is left to do.
The Percentage done acts as the Progress bar but as an analog display.
The Security Level indicator also acts as a non-permanent switch to change the current security level.
The Info Led displays the program's memory status in real time.
 
     
     
     
  Status display

Section 1:
The Status display reports every major process being done by the program and results you need to be aware of; Also, every time a major function is selected, the Status displays a confirmation.


Section 2:
The second section accessible trough the Tool bar displays the status of some important settings in real time. Those settings can not be changed from this screen. This is an informative panel which is good to control before starting a process or other operation to make sure all settings are correct for the operation to be done.

The settings displayed in this panel are:

Auto Show
Show in AE
Confirm Delete
Remember Paths
Alert when Finished
Clock It
Key File
Folder Monitor
Recorder
Restore
Delete when Done
 
     
     
     
  Close All

This command closes all image windows opened in Container mode.
 
     
     
     
  Info Led

This light indicated the type of data that is loaded at any time. The only purpose of this display is informative. The info led is located next to the percentage display.


The Led will change color depending on the status of the program.

White: Buffers are empty - No data is in memory.
Green: Data in the main buffer is in encrypted state.
Yellow: Some encrypted data is loaded into memory.
Red: - Warning - Unsafe data loaded in memory -

The
Red light tells the data in memory is decrypted or in the process to being encrypted or decrypted. This, by all means tells you the data is in non-secure state.
A
Yellow light tells some data is in memory either when it is being processed or ready to be stored.
Green light appears after data has finished encrypting, thus memory content is safe.

After a manual
Flush the light switches to white. This is a preferred state specially when the computer is left unattended.

Tip: If you leave the computer unattended, flush the buffers by selecting the Flush option under Edit menu.
 
     
     
     
 

Options configuration screen



On this screen, many major functions and preferences can be set permanent.

Start in Folder - Tab


Start in Folder
This instruct Angel Eyes System File panel to show the content of the same folder every time the program starts.
Type the path to that folder on the
Start in Folder input line.
When the program starts the content of the folder set here will be show in the
My Computer panel.

Show File system on Start

This sets the My Computer panel visible/hidden at program startup.


Data Security - Tab

Clean History

Remove the
Clean History check mark if you want the program to forget the file names and paths to those files. Next time the program starts, Recent Files under the File menu, will show None.


Clean Favorite Folders

Remove the
Clean Favorite Folders check mark to instruct the program to remove the visited folders record when the program closes.

Tip: Checking this option may facilitate the way you work with the program, but at the same time may pose a treat against you by letting any other user know the folder(s) where you've been working.


Auto Show on Start

Auto Show on Start
enables the Auto Show function every time the program starts.



File Security
- Tab


Default Extension

This let you tailor the way your safe data is stored on disk. By changing the extension files are saved, security is also increased.

Angel Eyes has a list of possible extensions you may use which are not assigned to other applications or file types normally used by MS Windows or other parties. There is no relationship between those extensions and Angel Eyes, this means you can use any of those or create a new one. If you use one from the list or create a personal one, just make sure there is no other extension alike in your system and if there is one assigned to other application, this does not conflict with it.

The Default Extension can be changed at any time. You may rename your safe files extensions with Windows File Explorer or with any other application that allows it. Just make sure to assign the same extension into this field on Angel Eyes when you want to view or restore the original file.

File Name

This is the file name used to save protected files.

File Serial

This is the serial number added to file names.

Preserve Filename

Selecting this option will preserve the original filename of the file being protected. The whole or part of the name can be used. To use part of the name only, enter in the Chars field the amount of characters to be retained from the original name. Retained characters are accounted from left to right.

If you want to separate the filename from the serial number you can do so by entering the separator character into the 'Separate with' field.

There is an extended description on this subject on the Folders section.


Program Security - Tab

Level - (Security Level)

This is the default security level to be used. Pull down the control to switch between High+, High, Medium and Low.
It is always recommended to use the higher security level regardless of the file type to encrypt. However, files containing text data must be encrypted with High security level.

The real Security level can be increased exponentially compared to High level if using a key file instead of a password protection.
More about Key Files.

Disguise after

Disguise is specially useful when you leave the computer unattended for some time.
In Disguise mode the program sets an idle timer and monitors for activity. If there was no activity through the end of the lapse, the event assigned to disguise the program will be activated.

There are two Disguise modes:

1) Notepad
2) Exit

Notepad mode shows a Notepad-alike screen and hides Angel Eyes main display. A text file named "hbox.txt" will load every time this screen shows.

Exit mode suspends and quit the program.

In Notepad mode you can exit the screen and show the main program interface by typing "exit" without quotes, in the text input area of the screen.

If there is text being displayed on this notepad-alike screen, you must clear the screen before the command is accepted.

You can clear the screen by any of the following methods:

a) 1. Select All text. 2. Press Delete

b) 1. Select All text. 2. Type over


Tips: The function Select All can be selected on the Edit menu by choosing Select All; or left click the mouse over the first or last letter of the document. Drag the mouse without releasing the button to the opposite end of the document; Release the mouse button. Or click the left mouse-button over the first or last letter of the document, depress the shift key; move the highlight up or down with the arrow keys to the opposite end of the document; Release the shift key.

Note: This is not a notepad program nor the real notepad.

Tip: You can tailor the text shown in the notepad by replacing the "hbox.txt" file.

Warning: If you click the cross button to close the notepad or select Exit on the File menu, Angel Eyes will terminate. This is another safety measure included in the program.

The idle timer can be set to any value. Values are in seconds. Value ranges are from 20 seconds to 999 seconds.
To change the idle timer setting go to the
Settings screen / Program Security Tab. This screen is accessed either by selecting it on the Preferences menu or by clicking the button with the image of a document with a red check mark found on the Info Box window.

 
     
     
     
  Text Files encryption

Text files can only be encrypted with the highest security level. Remember to switch to High security if the type of file in question is text based data and the type is not automatically recognized by the program.

Angel Eyes will automatically recognize the following file types:

"txt", "doc", "htm", "html", "pl", "wri", "wpd", "asc", "rtf", "xls", "xlw", "mcw", "ans", "wk1", "wk3", "wk4", "class", "js", "ini", "log", "xml", "pdf", "pz3", "car", "fla"

If you regularly use another data type and it is not listed here, please contact us and we may gladly add the file type to the recognized formats on an upcoming upgrade.
 
     
     
     
  Download Info

This screen allows you to record information regarding the program download. If you ever need to report a bug or we need to track a problem with your installation, this information will be of great help to our support team.

Please take a minute and fill out this screen as soon as possible.
The screen will not show up automatically after it is completed.
 
     
     
     
  ETA

This reports the estimated time a process will take to complete. The real time will depend of other programs being run at the time and other delays the processor may have during normal operation.
 
     
     
     
  Folders - Where your files go

Once encrypted, the file processed is saved into a special Data sub folder located into Angel Eyes root folder.
If you want, those files can be later moved elsewhere (Read about
storing data safely) by using Windows File Explorer.

There is a sub folder named
UData that Angel Eyes has created into its root folder. The program use it to store unsafe (normal) files. You can take advantage of this folder too to store files until you are ready to encrypt them. Please note, the UData folder is not safe. The 'U' stands for Unsafe.

Protected files, unless a filename is chosen, are saved with a filename that is composed by a filename prefix, a sequence of numbers and an extension.

The Default Filename is composed by a fixed name followed by a serialized sequence of numbers taken from the count field on the
Preferences screen.

The fixed name is tagged as Filename on the
Preferences screen. It can be made up of any character accepted by Windows. The default is "0" (zero) but as said above it can be replaced by another sequence of numbers or letters or a mix of both. If you leave it as is the default a typical filename would be something like 00.meo or 0100.meo. If for example you replace the default name by an "A", the filename would be A0.meo for the first example and A100.meo for the second.


You can tell Angel Eyes to retain part of all of the original filename for the resulting protected file name. If you do so, this option will prevail over the others previously explained.
If the original name was xxxxxxxxx_xxx.doc the new name will be xxxxxxxxx_xxx.meo if you chose to retain the whole name and the default extension for protected files is kept.
If you chose to retain only 4 characters, the resulting file name will be _xxx.meo.


The extension used is the default name you chose for protected files or the original default if you haven't changed it. See the
Preferences screen.


If you want, you can change the default extension name for protected files. In fact, you are encouraged to do so in order to enhance your security feeling.
You may also want to change the extension name for different type of content or to avoid having a lot of files with the same extension. This is more to feed a feeling of security than a need.

Have in mind that Angel Eyes will recognize a file to be protected if the file extension matches the current default.

If you've protected a file and later changed the default extension name, the older file will not be recognized by Angel Eyes as being protected. This is because Angel Eyes leaves no trace on a protected file to be linked to the program.
To make this more clear to understand take the following examples

Windows recognize a file to be executable not only by the extension on the file ".exe" but for data embedded on the file that tells Windows it is an executable file.

A Zip packed file has information embedded on the file which tells windows it is a zip package and it must be open with a zip program.

Angel Eyes does not embed any information about itself on protected files. Thus Windows has no way to know a protected file is protected nor what program to call to open it.

The same happens to Angel Eyes; It will not know a file is protected. It will guess it is protected only if the extension name matches the one set for protected files.

If you are paranoid with security feelings you may consider changing the default extension name for protected files before closing the program. So the setting stored when the program quits will be wrong and "if somebody" runs the program it will not recognize any file whatsoever.
 
     
     
     
  Thumbnails


Thumbnails are used to have a quick idea of what a file's content is.
To make thumbnails visible either click the thumbnail button located on the Batch files-list bar or select it from the Preferences menu, section Show .


To display a thumbnail of a file, highlight a file name from the Batch files-list. The file must be of a picture type and be supported by Angel Eyes.

Thumbnail's size may vary from file to file. Size is dependent on the picture's real size. The same scale is used for all files which is about 20% of the actual size of the picture unless the actual picture already has thumbnail size in which case the thumbnail size will hardly vary.

When thumbnails open, they are shown next to the Batch files-list (default). The placement for thumbnails is the same every time the program starts.

If you want to move the thumbnail elsewhere, click on it picture and move the mouse to another location. Then click on the picture again to release into the new location.

This new position is kept for as long as the program is running or you change it.

Thumbnails can be left open on the work area and can also be set to display nothing. This hides the picture. To do it, position the mouse over the image and click the right mouse button. Clicking the same button again shows the picture.


If there is another picture shown into the container, the thumbnail for the new selection will appear on top.

You will notice an icon of Angel Eyes in the center of the picture frame when the picture is hidden. Clicking on the icon hides the thumbnail frame.
 
     
     
     

Examples

   
  Encrypting a Text File  
     
  Although the order of procedures is not important you may use the following order till you find the one you prefer.

1. Type a Password -
2. Chose High security level -
3. Find the path where the unsafe file is located -
4. Find the unsafe file. -
5. Click into the box next to the filename. -
6. Right click over the file list and select Process. -
 
     
     
     
  Encrypting a Binary File  
     
  Although the order of procedures is not important you may use the following order till you find the one you prefer.

1. Type a Password -
2. Chose the security level -
3. Find the path where the unsafe file is located -
4. Find the unsafe file. -
5. Click into the box next to the filename. -
6. Right click over the file list and select Process. -
 
     
     
     
  Encrypting a File using a Key File  
     
  1. Select Use Key File option located under the Preferences menu.
2. Find the file and click on it to select it.
3. Select from the my computer panel the file you want to secure .
4. Click into the box next to the filename.
5. Right click over the file list and select Process. -
 
     
     
     

Sounds

   
  When the program finishes delete operations a low gong will sound.

When Angel Eyes finishes Processing or Searching tasks, a yeri yeri ohh will sound..

Other events produce different sounds like clicks and toorooks.
 
     
     
     

Shortcut Keys

   
 

File Open Ctrl+O
Save As... Ctrl+S
Copy Ctrl+C
Move Ctrl+M
Delete Record Ctrl+D
Exit Program Ctrl+X
Flush Memory Ctrl+F
Clear Info Box Ctrl+B
Select All Ctrl+A
Select None Ctrl+U
View Ctrl+V
Z Split Ctrl+Z
Folder Monitoring Ctrl+T
Recorder Manual Ctrl+R
Key File Ctrl+K
Info Box Ctrl+I
Help F1
About F3
My Computer F4
Batch F5
Tile Horizontal F6
Tile Vertical F7
Cascade F8
Close All -screens F11
Stop - Abort F12

 
     
     
     
  Glossary

UData: Unprotected Data Folder

Vigh: Very High security level.

Uigh: Ultra High security level.
 
     
     

     
     
     
  SECURITY TIPS

1. Do not tell anybody you store confidential files.

2. Never store unsafe files in your computer, disks, CDs or any other media.

3. Do not store confidential files in your computer, rather use a floppy disk, a CD or other compact storage media. Avoid Tape backup media. Tape Backup media has an implicit meaning on it name and is the first place after your computer where anybody will look.

4. Use a non-standard extension name for your files or a name that might refer to something else.

5. Keep passwords and reference logs safely away from where you keep your confidential data.

6. Get an extremely safe encryption program to store passwords and login information. We recommend PGTec's
InteliPass or Online Keys for multilingual capability. Both applications can be download free from our web site.

7. Use the Highest security encryption level whenever possible.

8. If you leave the computer unattended clear up the password field and flush the buffers by selecting the
Flush option under Edit menu..

9. If another application has forced Windows to became unstable and/or your computer crashes and you had Angel Eyes active, some registers may have been left incorrectly cleared.
Restart the computer (even if you don't need to use it) and run Angel Eyes.
After the main working screen has open, close the program as you normally do. This procedure is needed to close properly the registers and clear properly blocks of memory used by the program.

10. Use passwords composed by two or more words, separated by a non standard separator or a space or two.

11. This is a 30 day evaluation program. Do not wait till the trial expires to purchase a license. Waiting too long will disable the program and you will not be able to use it till the registration arrives.

12. As this being a security program, do not tamper with it files. Doing so will damage the program and it settings irreversibly. The self protection security features embedded in the program will disallow any attempts of reinstallation or error correction. Once this program was messed up it will never run again on the same computer.
 
     
     
     
  Windows Registry Settings

To lower risk of exposure just a few keys are recorded onto the Windows System Registry.
No log file, path to protected files nor unprotected file loads are recorded into the registry.
No shared references to default protected file types are recorded either.

All logs and settings are stored on disk, usually on the application's root folder. Thus if an emergency arise, they can be easily removed.
 
     
     
   Benchmark

Note: Times will vary from system to system, due to processor speed, operative system, processor load and other factors. The following table is given for comparison purposes. The 550MHz is a K6/2 running on Windows 98. 1.2Ghz and 1.7 Ghz platforms run on Windows xp.

Type is the type of data processed - S. Level is the security level used. - KL is the Key length -
OPrc. is the # of other processor intensive programs running at the same time (ex: playing a mp3 file). Time to process in seconds and fraction. % R: Time gain in % if Angel Eyes process does not share processor cycles.
 
 

     

Type Format Size S. Level Process

Proc.

Time

KL

OPrc.

% R

Binary JPG 91k High Encrypt

550MHz

29

8

1

20.6

         

550MHz

23

8

0

         

1.2GHz

1.6

8

1

 
         

1.7GHz

 1.3

8

1

 
Binary JPG 91k Med Encrypt

550MHz

20

8

1

25.0

         

550MHz

15

8

0

         

1.2GHz

1.5

8

1

 
         

1.7GHz

 1.2

8

1

 
Binary JPG 91k Low Encrypt

550MHz

15

8

1

26.6

         

550MHz

11

8

0

         

1.2GHz

2.0

8

1

 
           1.7GHz

0.8

8

1

 
Binary JPG 91k Low Encrypt

550MHz

15

20

1

26.6

         

550MHz

11

20

0

         

1.2GHz

2.1

20

1

 
         

1.7GHz

0.9

20

1

 
Binary JPG 91k High Encrypt

550MHz

30

20

1

26.6

         

550MHz

22

20

0

         

1.2GHz

1.8

20

1

 
         

1.7GHz

1.2

20

1

 
Binary JPG 244k High Encrypt

550MHz

78

8

1

23.0

         

550MHz

60

8

0

         

1.7GHz

2.0

8

1

 
Binary JPG 244k High Encrypt

550MHz

60

20

0

 
         

1.2GHz

5.6

20

1

 
         

1.7GHz

2.0

20

1

 
Binary JPG 244k Med Encrypt

550MHz

40

20

0

 
         

1.2GHz

5.3

20

1

 
         

1.7GHz

1.3

20

1

 
Binary JPG 244k Low Encrypt

550MHz

30

20

0

 
         

1.2GHz

5.0

20

1

 
         

1.7GHz

1.1

8

1

 
Binary BMP 326k High Encrypt

550MHz

466

8

1

82.0

         

550MHz

80

8

0

         

1.2GHz

6.4

8

1

 
         

1.7GHz

5.0

8

1

 
Binary BMP 326k Med Encrypt

550MHz

308

8

1

82.5

         

550MHz

54

8

0

         

1.2GHz

6.8

8

1

 
         

1.7GHz

2.9

8

1

 
Binary BMP 326k Low Encrypt

550MHz

247

8

1

83.8

         

550MHz

40

8

0

         

1.2GHz

6.9

8

1

 
         

1.7GHz

2.3

8

1

 

     
     
     

Recommended Software

 
  InteliPass - Professional Password management Utility

Online Keys - Password management Utility w/Multilingual capability

Crunch Machine - Protect data with a single button click

Picture Bag - Add and view a collection of pictures to and from a single archive. Collections and albums can be optionally encrypted.
 
     
     
     
  Registration by standard mail

To purchase a license by mail, pull down the
Help menu, select Register and then click by Mail.

A screen to collect your personal information will open. Please fill out all applicable fields and click Print to get a copy on paper to be mailed to us with your payment.

That screen is divided into two parts. You need to fill out only the applicable for the method you want to receive the authentication code to unlock the program.

You don't need to fill out your physical address fields if you want to receive the code by Email.

Our preferred delivery method is Email.
If you want us to ship by standard mail you must add the cost of shipping plus media and packaging.

If you prefer we use a private courier service the above also applies and/or contact us for pricing, and to know if that courier provides service in our area.
 
     
     
     
  Online Registration

If you want to register online, pull down the
Help menu, select Register and then click Online;

After your payment processing is finished and we receive confirmation of it, we will email you instructions to activate the program.

For online registrations we only accept payments done trough PayPal. If you don't have an account with PayPal you can get one free after a few keystrokes. It is really easy.

At that point you become entitled to life time support for the program version you paid for. This includes a 1(one) back-up key with no charge if at any time - within 2 years - if you need to reinstall the product on the same computer.

Note: Keys are not portable. This means, each key is only useful on one computer at a time.


For corporate licensing or other network applications, please contact us for pricing and details.
 
     

Contact Information

   
  General questions (before registering) can be sent to software_isinet@hotmail.com
Please do not use this address for issues other than general questions.

Support for registered users is available online either through any of our web sites or by
email
Please do not use this address for other issues other than those described here.
 
     
  Due to spam and excessive unsolicited mailings, we change our email addresses from time to time. If you receive a message telling the address is invalid, visit our web site to get an updated address.
Frequent visits are encouraged in order to be up to date with upgrades and updates.



http://www.bawy.org/pgtec
 
   
     
 

Top | Index