Normal Use 
You may choose between entering plain text (without any formatting) directly into the program, and using existing files: 
  • In case of entering text, click in the left big text box and enter the text, or paste it in by first copying it from another source. 
  • In case of using existing files, use the Browse-button or enter their full path (using wildchars) in the left small text box. 
    In the first case, it might look like this, after entering the text and right before clicking the high-lighted button: 
    After having encrypted the text with the locked padlock button, it may be selected and cut or copied as usual text, and, for example, be pasted into an e-mail. The receiver selects and copies the secret message, pastes it into the Encrypted Text frame, clicks at the unlocked padlock button, and, the message is revealed. 
    In the case of using files, enter the full path to the file that is to be encrypted in the Input File (plain) frame, or use the Browse button to locate the files. Default, the name and place for the output file is the same as for the input file, which means that the input file will be written over, and hence, lost. 
    To decrypt files, use the right instead of the left frame. In the case below, after having used the browse button to locate the encrypted file, the name has been changed in the left frame, so that the output file has a different name, and hence, the input (encrypted) file will not be lost (this does only work if one file is specified as the input file, not for more than one). 
    To start the encryption or decryption of files, just use the corresponding padlock button. 
    The keys are the key to security. 
    Bad keys will give poor security, while good ones may offer you high security. Therefore, it is in your hand to choose good keys and protect them well, so that no one that might be interested in your encrypted data can get access to your keys, or simply guess them. 
    Keys are always associated with nicknames. This because the keys should be hard-to-guess arrays of characters, and hence, often hard-to-remeber, while there should be easy-to-remember associations with them. Note that the nicknames have nothing to do with the cryptation. Therefore, if John and Mary share a key for secret messages between them, John's nickname would probably by Mary and Mary's nickname would probably be John. The only important thing is that their nicknames correspond to the same key. 
    The only necessary information for decrypting encrypted data, is the knowledge of the secret key used for encryption (and the options used). Three default keys follow the program, but these should of course not be used for anything but testing. After having setup keys of your choice, just select an appropriate one from the drop down list Nicknames of Keys. To create new keys, modify or delete existing ones, use the key button in the main window to enter: 
    The selected key is shown at the bottom of the window. The harder it is for other people to guess your keys, the safer the encrypted data is. 
    Also, your keys may be protected by a password, so that no one that have access to your computer may use your keys. This is done by checking the Protecting your Nicknames and Keys with a password check box in the window above the Key Generator. You'll be asked for a password and your nicknames and keys, which are stored in the computer, will now be stored encrypted with a key (your password). When you start the program from now on, you'll be asked for this password and your nicknames and keys will be decrypted by your entered password. If wrong, you will not get your correct keys (nor the correct nicknames, which is the easiest way to see if you entered the password correctly). Because the password is not stored anyware, the program has no way of telling you whether the password was correct or not (but you see it if you look at the nicknames). Because of this, no one can steal your keys, even if they take your whole computer. 
    Instead of inventing your own keys, you may use the Key Generator, which is supplied for this purpose: 
    By choosing how many characters you would like to have in the key, and the type of characters that should be in the key, you start the generator by the start button. Then, move the cursor randomly over the right frame, for a while, and a random key is generated based both on your mouse movements and your computer's system time, when the Get Key button is being hit. The result will be copied into the previous window's key text field, when the OK button finally is used.