FooCrypt, A Tale Of Cynical Cyclical Encryption
​Preferences

Picture

Preferences is ‘FooCrypt, A Tale Of Cynical Cyclical Encryption’

configuration and master control area.

 

Giving you the user, options and variations that takes FooCrypt into the direction you need to go.

 

A quick break down of the functionality :

Select Logs Home

  • Select FooCrypt Logs Home Directory
  • DEFAULT LOCATION Darwin : [ Users Home Directory ]/Library/Caches/net.Cryptopocalypse.FooCrypt
  • DEFAULT LOCATION Linux : [ Users Home Directory ]/FooCrypt
  • DEFAULT LOCATION Solaris : [ Users Home Directory ]/FooCrypt

Select Bin Start

  • Select Bin Start
  • DEFAULT LOCATION : /

Select Bin OpenSSL

  • Select OpenSSL Version
  • DEFAULT VERSION Darwin : [ whence openssl searching PATH=/usr/bin:/usr/sbin:/bin:/sbin ]
  • DEFAULT VERSION Linux : [ whence openssl searching PATH=/usr/bin:/usr/sbin:/bin:/sbin ]
  • DEFAULT VERSION Solaris : [ whence openssl searching PATH=/usr/xpg4/bin:/usr/bin:/usr/sbin:/bin:/sbin:/opt/csw/bin ]
  • openssl version displayed

Select Bin Expect

  • Select Expect Version
  • DEFAULT VERSION Darwin : [ whence expect searching PATH=/usr/bin:/usr/sbin:/bin:/sbin ]
  • DEFAULT VERSION Linux : [ whence expect searching PATH=/usr/bin:/usr/sbin:/bin:/sbin ]
  • DEFAULT VERSION Solaris : [ whence expect searching PATH=/usr/xpg4/bin:/usr/bin:/usr/sbin:/bin:/sbin:/opt/csw/bin ]
  • expect version displayed

Bin Wish

  • Wish Version Is Unable To Be Modified
  • ​Wish [ Tcl / Tk ] is embedded into the FooCrypt, A Tale Of Cynical Cyclical Encryption Application Bundle by using StarKit packaging technology
  • ​Wish is a configurable startup item selectable via the FooCrypt CLI.

IKM_Data

  • Show IKM Data In The Text Window After The Data Is Imported

IKM_BarChart

  • Show IKM Bar Chart After The Data Is Imported ( See Graphic 5 Below )

CASCII_BarChart

  • Show Count ASCII Occurances Bar Charts

CLTAP

  • Change Log Window To Active Process

AK

  • Auto Key Press FooKeyBoard ASCII Character Key Under Mouse Cursor After About ( 2 – 3 ) Seconds

IWMA_Data

  • Show IWMA Data In The Text Window After The Data Is Imported

IWMA_BarChart

  • Show IWMA Bar Chart After The Data Is Imported ( See Graphic 5 Below )

IWMB_Summary

  • Show Binary Import Summary

Scroll_Logs

  • Scroll Logs On OutPut

FAK

  • Flash FooKeyBoard Active Destination Button and AutoKey Key

IWMB_Data

  • Show IWMB Data In The Text Window After The Data Is Imported

IWMB_BarChart

  • Show IWMB Bar Chart After The Data Is Imported ( See Graphic 5 Below )

IWMB_Save_Dump

  • Save IWMB Data In The Log Directory After The Data Has Been Imported

Scroll_Delay

  • Log Window Scroll_Delay ( Listing Is In Milliseconds )

IWMB_Seek

  • IWMB_Seek : Press Enter After Updating

IWMB_Count

  • IWMB_Count : Press Enter After Updating

IWMB_KILL

  • Automatically KILL IWMB Once ( IWMB_Seek + IWMB_Count ) Characters Have Been Read From The Binary File

FooKey_LCS

  • FooKey Line Count Start : Press Enter After Updating

Max_Gen_Random

  • Maximum Number of Random Numbers To Generate Into The Random Data Memory Buffer : Press Enter After Updating

Test_Min_ARG-MAX

  • ARG_MAX Test Start Number : Press Enter After Updating

Text_Max_ARG_MAX

  • ARG_MAX Test End Number : Press Enter After Updating

FooKey_ARG_MAX

  • ARG_MAX Setting For Fookey Generation : Press Enter After Updating

DDB

  • Select The Source Of Random Data ( See Graphic 1 Below )
  • /dev/random [ Uses /dev/random from the operating system as the source of random data ]
  • /dev/urandom [ Uses /dev/urandom from the operating system as the source of random data ]
  • /FooCrypt/Internal [ Uses FooCrypt’s internal random data generator as the source of random data ]
  • /FooCrypt/Piper [ Use’s ANY possible random data generator as the source of random data ]

Note : /dev/random is not available for use on the Linux version.
​​
Example /FooCrypt/Piper Config :

  • Using OpenSSL’s random number engine [ openssl rand 99999999 ] with the output redirected to the /FooCrypt/Piper input source
  • Using the UNIX Command yes as the source of random data [ yes ] with the output redirected to the /FooCrypt/Piper input source
  • ​The possibilities are unlimited.


/FooCrypt/Piper can accept any know random number generator that can conform to a standard POSIX named pipe [ fifo ] as an output destination which can be easily obtained via a simple standard out redirection to the fifo.

  •  openssl rand 99999 > [ PATH TO FIFO ]

DDB

  • Select The Default Cypher To Use ( See Graphic 2 Below )
  • DEFAULT : FooCrypt-aes256


Master Password

  • Master Password : Press Enter After Updating
  • DEFAULT : FooCrypt
  • Master Password is re-initialised to the DEFAULT setting upon each invocation of FooCrypt.
  • Master Password is utilised as the base encryption / decryption password for FooCrypt to save / load FooKey’s
  • Master Password is utilised as the base encryption / decryption password for FooCrypt to save / load preference settings
  • ​Maximum length of ARG_MAX

Reset Local Password

  • Reset Lock Password
  • ​Local Password is used on each invocation of FooCrypt to LOCK FooCrypt so no one else can access FooCrypt whilst your away from your computer

Sample color sequences are display in Graphic 4 Below

C0

  • Select Window Ridge Back Ground Color

C1

  • Select FooKeyBoard | Cypher Key Control | Log Window | Back Ground Color

C2

  • Select FooKeyBoard | Cypher Key Control | Log Window | Buttons Back Ground Color

C3

  • Select Help and Message Text Back Ground Color

C4

  • Select Help and Message Text Color

C5

  • Select Cypher Key Control Text Back Ground Color

C6

  • Select Cypher Key Control Text Color

C7

  • Select Log Window Back Ground Text Color

C8

  • Select Log Window Text Color

CC1 

  • Cycle Through Standard Colors 1 : C0 : C1 : C2

CC2

  • Cycle Through Standard Colors 2 : C0 : C1 : C2

SI

  • Select GIF Image
  • Supported File Types [ GIF and PPM image formats ]
  • The selected single frame image is loaded into FooCrypt and Displayed
  • The selected multi frame GIF image is loaded into FooCrypt, Displayed and Animated as per GIFFD timings

STEGANOGRAPHY

  • Pass Image Through The Steganography RGB Processing Demo
  • Get an insight into the future of FooCrypt’s Steganography Processing Of Images

​GIFFD

  • GIF Flash Delay ( See Graphic 3 )
  • Delay between the displaying of each frame of the GIF Image
  • Listing is in milliseconds

Graphic 1
​Select The Source Of Random Data

Picture

Graphic 2
Select The Default Cypher To Use

Picture

Graphic 3
GIF Flash Delay

Picture

Graphic 4
Sample color ranges ( Full RGB color spectrum is available )

Picture

Graphic 5
Bar Chart Example

Picture

Bar Charts are a quick and easy way for you to determine the randomness of the data
Click the : ‘|Counted = ‘ Text Line to close