obfuscator/Obfuscator-2_1
2021-06-12 20:23:21 -07:00
..
copying.txt Extracted. 2021-06-12 20:23:21 -07:00
gpl.txt Extracted. 2021-06-12 20:23:21 -07:00
icon0.ico Extracted. 2021-06-12 20:23:21 -07:00
icon1.ico Extracted. 2021-06-12 20:23:21 -07:00
icon2.ico Extracted. 2021-06-12 20:23:21 -07:00
icon3.ico Extracted. 2021-06-12 20:23:21 -07:00
icon4.ico Extracted. 2021-06-12 20:23:21 -07:00
icon5.ico Extracted. 2021-06-12 20:23:21 -07:00
main.c Extracted. 2021-06-12 20:23:21 -07:00
main.h Extracted. 2021-06-12 20:23:21 -07:00
main.ico Extracted. 2021-06-12 20:23:21 -07:00
makefile Extracted. 2021-06-12 20:23:21 -07:00
readme.txt Extracted. 2021-06-12 20:23:21 -07:00
res.h Extracted. 2021-06-12 20:23:21 -07:00
res.rc Extracted. 2021-06-12 20:23:21 -07:00

Copyright (C) 2001 Neil Edelman, see copying.txt.
neil dot edelman each mail dot mcgill dot ca

Version 2.1.

This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions; see copying.txt.

The encryption process uses a stream cipher. The length of the
key is linearly related to how many bits of encryption. The bits of
the key generate a pseudorandom keysteam. It is possible that this
is insecure.