Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: Password protected folder  (Read 11794 times)

0 Members and 1 Guest are viewing this topic.

zask

    Topic Starter


    Intermediate

    • Experience: Experienced
    • OS: Other
    Password protected folder
    « on: January 17, 2016, 10:39:20 AM »
    i'm trying to create a file that searches if the directory "C:\Pswrd.Zask\", the username file "C:\Pswrd.Zask\Username.Zask", and the password file C:\Pswrd.Zask\Password.Zask all exist. if they do they go to the (PasswordScreen), if they don't they go to the (CreatePasswordScreen). The create (CreatePasswordScreen) ask's for user input, that input is then stored into a file named Password.Zask & Username.Zask inside the folder C:\Pswrd.Zask\". on Second run of the program, the program detects that all the folder, username file, and password file exist and then sets the username & password from the Username & Password file in "C:\Pswrd.Zask inside a variable right before the (PasswordScreen), which will be used to determine if the password is correct or not. The problem is that i cannot get the Password and Username to store correctly in the batch file as a variable without the batch process ultimately coming to a end for an unknown reason. Did I miss use a command? the problem should be right under then line that says (:UsernameExist). Thank You.


    @echo off
    color 0a

    if not exist "C:\Pswrd.Zask\" (
      mkdir "C:\Pswrd.Zask\"
        if "!errorlevel!" EQU "0" (
          goto DirectoryExist
        ) else (
       echo Created the folder "C:\Pswrd.Zask"
      )
    ) else (
          goto DirectoryExist
    )

    :DirectoryExist

    if exist C:\Pswrd.Zask\Password.Zask (
        goto PasswordExist
    ) else (
        goto CreatePasswordScreen
    )
    :PasswordExist

    if exist C:\Pswrd.Zask\Username.Zask (
        goto UsernameExist
    ) else (
        goto CreatePasswordScreen
    )

    :UsernameExist

        for /f "Delims=" %%A in (C:\Pswrd.Zask\Password.Zask) do (
          set CHECKPASSWORD=%%A
     
        for /f "Delims=" %%B in (C:\Pswrd.Zask\Username.Zask) do (
          set CHECKUSERNAME=%%B

    goto PasswordScreen

    :CreatePasswordScreen
    cls
    echo Create a password.
    echo.

    set /p "CREATEPASSWORD= Enter password : "
    set /p "CREATEUSERNAME= Enter username : "

    echo %CREATEPASSWORD% >> C:\Pswrd.Zask\Password.Zask
    attrib C:\Pswrd.Zask\Password.Zask -s -h & echo Password Created!

    echo %CREATEUSERNAME% >> C:\Pswrd.Zask\Username.Zask
    attrib C:\Pswrd.Zask\Username.Zask -s -h & echo Username Created!

    echo.
    echo Loading...
    timeout /5

    :PasswordScreen
    color 0a
    cls
    echo Existing User Account.
    echo.
    set /p "PASSWORD= Enter Password : "
    set /p "USERNAME= Enter Username : "
    if %PASSWORD%==%CHECKPASSWORD% goto Operation1True
    if not %PASSWORD%==%CHECKPASSWORD% goto OperationFalse
    :Operation1True
    if %PASSWORD%==%CHECKPASSWORD% goto Operation2True
    if not %PASSWORD%==%CHECKPASSWORD% goto OperationFalse

    :OperationFalse
    color 0c
    echo Password Incorrect!
    timeout /10
    goto PasswordScreen

    :Operation2True
    cls
    echo Password Correct!
    pause

    patio

    • Moderator


    • Genius
    • Maud' Dib
    • Thanked: 1769
      • Yes
    • Experience: Beginner
    • OS: Windows 7
    Re: Password protected folder
    « Reply #1 on: January 17, 2016, 11:10:40 AM »
    Ain't gonna happen...
    " Anyone who goes to a psychiatrist should have his head examined. "

    Salmon Trout

    • Guest
    Re: Password protected folder
    « Reply #2 on: January 17, 2016, 11:13:53 AM »
    There may be other errors, but I immediately spotted this:

    You need to fix the FOR structures (missing closing parentheses) by

    EITHER:

    :UsernameExist

    for /f "Delims=" %%A in (C:\Pswrd.Zask\Password.Zask) do (
          set CHECKPASSWORD=%%A
    )
        for /f "Delims=" %%B in (C:\Pswrd.Zask\Username.Zask) do (
          set CHECKUSERNAME=%%B
    )


    OR:

    :UsernameExist

    for /f "Delims=" %%A in (C:\Pswrd.Zask\Password.Zask) do set CHECKPASSWORD=%%A
    for /f "Delims=" %%B in (C:\Pswrd.Zask\Username.Zask) do set CHECKUSERNAME=%%B





    zask

      Topic Starter


      Intermediate

      • Experience: Experienced
      • OS: Other
      Re: Password protected folder
      « Reply #3 on: January 17, 2016, 11:19:35 AM »
      Ain't gonna happen...

      What do you mean? iv'e seen people do it before?

      zask

        Topic Starter


        Intermediate

        • Experience: Experienced
        • OS: Other
        Re: Password protected folder
        « Reply #4 on: January 17, 2016, 11:21:56 AM »
        for /f "Delims=" %%A in (C:\Pswrd.Zask\Password.Zask) do (
              set CHECKPASSWORD=%%A
         )
            for /f "Delims=" %%B in (C:\Pswrd.Zask\Username.Zask) do (
              set CHECKUSERNAME=%%B
        )

        Well i didn't expect it to be that easy.... Thank you.

        zask

          Topic Starter


          Intermediate

          • Experience: Experienced
          • OS: Other
          Re: Password protected folder
          « Reply #5 on: January 17, 2016, 11:27:50 AM »
          There may be other errors, but I immediately spotted this:

          You need to fix the FOR structures (missing closing parentheses) by

          EITHER:

          :UsernameExist

          for /f "Delims=" %%A in (C:\Pswrd.Zask\Password.Zask) do (
                set CHECKPASSWORD=%%A
          )
              for /f "Delims=" %%B in (C:\Pswrd.Zask\Username.Zask) do (
                set CHECKUSERNAME=%%B
          )


          OR:

          :UsernameExist

          for /f "Delims=" %%A in (C:\Pswrd.Zask\Password.Zask) do set CHECKPASSWORD=%%A
          for /f "Delims=" %%B in (C:\Pswrd.Zask\Username.Zask) do set CHECKUSERNAME=%%B


          Okay thank you this worked, but there's another problem, it's not correctly detecting if the password is true or not.

          set /p "PASSWORD= Enter Password : "
          set /p "USERNAME= Enter Username : "
          if %PASSWORD%==%CHECKPASSWORD% goto Operation1True
          if not %PASSWORD%==%CHECKPASSWORD% goto OperationFalse
          :Operation1True
          if %USERNAME%==%CHECKPASSWORD% goto Operation2True
          if not %USERNAME%==%CHECKPASSWORD% goto OperationFalse

          whats wrong with this?

          Salmon Trout

          • Guest
          Re: Password protected folder
          « Reply #6 on: January 17, 2016, 11:32:07 AM »
          Try running the batch with @echo on at the start and PAUSE at the end and watch the screen. Then you can see what is being compared in the IF lines. if you are running the batch by double clicking in Explorer, then instead run it from a command prompt.

          and

          Why dont you do this:

          if %PASSWORD%==%CHECKPASSWORD% (
          goto Operation1True
          ) else (
          goto OperationFalse
          )

          Or even this

          if %PASSWORD%==%CHECKPASSWORD% goto Operation1True
          goto OperationFalse


          « Last Edit: January 17, 2016, 11:44:22 AM by Salmon Trout »

          Salmon Trout

          • Guest
          Re: Password protected folder
          « Reply #7 on: January 17, 2016, 11:35:51 AM »
          The problem is, and I can see what Patio means, is that your code shouts that you are trying to run before you can walk, you are creating big huge batch scripts when you clearly don't fully understand what you are doing. When this happens people are reluctant to help because you won't really understand the answers.

          zask

            Topic Starter


            Intermediate

            • Experience: Experienced
            • OS: Other
            Re: Password protected folder
            « Reply #8 on: January 17, 2016, 11:44:06 AM »
            Try running the batch with @echo on at the start and PAUSE at the end and watch the screen. Then you can see what is being compared in the IF lines.

            and

            Why dont you do this:

            if %PASSWORD%==%CHECKPASSWORD% (
            goto Operation1True
            ) else (
            goto OperationFalse
            )

            Or even this

            if %PASSWORD%==%CHECKPASSWORD% goto Operation1True
            goto OperationFalse

            Worked! thank you!

            zask

              Topic Starter


              Intermediate

              • Experience: Experienced
              • OS: Other
              Re: Password protected folder
              « Reply #9 on: January 18, 2016, 06:03:01 PM »
              okay i encrypted it's contents so that users who regularly desired to edit the file will not see it's password and username, it is currently working correctly. i was wondering if anyone wanted to try it to rate it. the file is completely safe so have no worry's. rate 1-10 plz. :P

              @echo off
              color 0a
              echo                              ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
              echo                              º  Zask's Encripted Password Directory!  º
              echo                              ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
              echo.


              Rem Encryption .A
              set zneu=xss
              set zneu=s
              GoTo zneu
              set zneu=yj
              :zneu
              set xbre=sdy
              set xbre=e
              GoTo xbre
              set xbre=zm
              :xbre
              set eyut=sym
              set eyut=t
              GoTo eyut
              set eyut=bx
              :eyut
              %zneu%%xbre%%eyut% dv=jec
              %zneu%%xbre%%eyut% dv=a
              GoTo dv
              %zneu%%xbre%%eyut%  dv=vd
              :dv
              %zneu%%xbre%%eyut% ae=xfc
              %zneu%%xbre%%eyut% ae=b
              GoTo ae
              %zneu%%xbre%%eyut%  ae=iv
              :ae
              %zneu%%xbre%%eyut% pl=zro
              %zneu%%xbre%%eyut% pl=c
              GoTo pl
              %zneu%%xbre%%eyut%  pl=gq
              :pl
              %zneu%%xbre%%eyut% wd=oyq
              %zneu%%xbre%%eyut% wd=d
              GoTo wd
              %zneu%%xbre%%eyut%  wd=sg
              :wd
              %zneu%%xbre%%eyut% wz=vsj
              %zneu%%xbre%%eyut% wz=e
              GoTo wz
              %zneu%%xbre%%eyut%  wz=in
              :wz
              %zneu%%xbre%%eyut% yy=unv
              %zneu%%xbre%%eyut% yy=f
              GoTo yy
              %zneu%%xbre%%eyut%  yy=av
              :yy
              %zneu%%xbre%%eyut% zw=qsk
              %zneu%%xbre%%eyut% zw=g
              GoTo zw
              %zneu%%xbre%%eyut%  zw=vq
              :zw
              %zneu%%xbre%%eyut% oq=zuo
              %zneu%%xbre%%eyut% oq=h
              GoTo oq
              %zneu%%xbre%%eyut%  oq=me
              :oq
              %zneu%%xbre%%eyut% jl=cvz
              %zneu%%xbre%%eyut% jl=i
              GoTo jl
              %zneu%%xbre%%eyut%  jl=cc
              :jl
              %zneu%%xbre%%eyut% hk=ooj
              %zneu%%xbre%%eyut% hk=j
              GoTo hk
              %zneu%%xbre%%eyut%  hk=bj
              :hk
              %zneu%%xbre%%eyut% lf=hsh
              %zneu%%xbre%%eyut% lf=k
              GoTo lf
              %zneu%%xbre%%eyut%  lf=gl
              :lf
              %zneu%%xbre%%eyut% kb=vps
              %zneu%%xbre%%eyut% kb=l
              GoTo kb
              %zneu%%xbre%%eyut%  kb=fl
              :kb
              %zneu%%xbre%%eyut% yo=fsh
              %zneu%%xbre%%eyut% yo=m
              GoTo yo
              %zneu%%xbre%%eyut%  yo=ce
              :yo
              %zneu%%xbre%%eyut% ow=epj
              %zneu%%xbre%%eyut% ow=n
              GoTo ow
              %zneu%%xbre%%eyut%  ow=ho
              :ow
              %zneu%%xbre%%eyut% sq=wxs
              %zneu%%xbre%%eyut% sq=o
              GoTo sq
              %zneu%%xbre%%eyut%  sq=vb
              :sq
              %zneu%%xbre%%eyut% jm=khg
              %zneu%%xbre%%eyut% jm=p
              GoTo jm
              %zneu%%xbre%%eyut%  jm=jd
              :jm
              %zneu%%xbre%%eyut% xz=oup
              %zneu%%xbre%%eyut% xz=q
              GoTo xz
              %zneu%%xbre%%eyut%  xz=gf
              :xz
              %zneu%%xbre%%eyut% wr=mfq
              %zneu%%xbre%%eyut% wr=r
              GoTo wr
              %zneu%%xbre%%eyut%  wr=ar
              :wr
              %zneu%%xbre%%eyut% ep=bdi
              %zneu%%xbre%%eyut% ep=s
              GoTo ep
              %zneu%%xbre%%eyut%  ep=xa
              :ep
              %zneu%%xbre%%eyut% uc=kis
              %zneu%%xbre%%eyut% uc=t
              GoTo uc
              %zneu%%xbre%%eyut%  uc=tk
              :uc
              %zneu%%xbre%%eyut% rs=dkq
              %zneu%%xbre%%eyut% rs=u
              GoTo rs
              %zneu%%xbre%%eyut%  rs=iy
              :rs
              %zneu%%xbre%%eyut% gi=zeg
              %zneu%%xbre%%eyut% gi=v
              GoTo gi
              %zneu%%xbre%%eyut%  gi=po
              :gi
              %zneu%%xbre%%eyut% ne=azo
              %zneu%%xbre%%eyut% ne=w
              GoTo ne
              %zneu%%xbre%%eyut%  ne=ot
              :ne
              %zneu%%xbre%%eyut% fp=hym
              %zneu%%xbre%%eyut% fp=x
              GoTo fp
              %zneu%%xbre%%eyut%  fp=jn
              :fp
              %zneu%%xbre%%eyut% es=knd
              %zneu%%xbre%%eyut% es=y
              GoTo es
              %zneu%%xbre%%eyut%  es=fc
              :es
              %zneu%%xbre%%eyut% gu=qsx
              %zneu%%xbre%%eyut% gu=z
              GoTo gu
              %zneu%%xbre%%eyut%  gu=qf
              :gu
              %zneu%%xbre%%eyut% yn=bfj
              %zneu%%xbre%%eyut% yn=GoTo yn
              %zneu%%xbre%%eyut%  yn=ii
              :yn


              %jl%%yy% %ow%%sq%%uc% %wz%%fp%%jl%%ep%%uc% "C:\P%ep%%ne%%wr%%wd%.Z%dv%%ep%%lf%\" (
                %yo%%lf%%wd%%jl%%wr% "C:\P%ep%%ne%%wr%%wd%.Z%dv%%ep%%lf%\"
                  %jl%%yy% "!%wz%%wr%%wr%%sq%%wr%%kb%%wz%%gi%%wz%%kb%!" EQU "0" (
                    %zw%%sq%%uc%%sq% D%jl%%wr%%wz%%pl%%uc%%sq%%wr%%es%E%fp%%jl%%ep%%uc%
                  ) %wz%%kb%%ep%%wz% (
                 %wz%%pl%%oq%%sq% C%wr%%wz%%dv%%uc%%wz%%wd% %uc%%oq%%wz% %yy%%sq%%kb%%wd%%wz%%wr% "C:\P%ep%%ne%%wr%%wd%.Z%dv%%ep%%lf%" & %uc%%jl%%yo%%wz%%sq%%rs%%uc% /%uc% 5
                )
              ) %wz%%kb%%ep%%wz% (
                    %zw%%sq%%uc%%sq% D%jl%%wr%%wz%%pl%%uc%%sq%%wr%%es%E%fp%%jl%%ep%%uc%
              )
              Rem Encryption .A


              :DirectoryExist


              Rem Encryption .B
              set nyog=irc
              set nyog=s
              GoTo nyog
              set nyog=wi
              :nyog
              set mpef=qad
              set mpef=e
              GoTo mpef
              set mpef=ux
              :mpef
              set lljr=sgf
              set lljr=t
              GoTo lljr
              set lljr=qs
              :lljr
              %nyog%%mpef%%lljr% vb=uoo
              %nyog%%mpef%%lljr% vb=a
              GoTo vb
              %nyog%%mpef%%lljr%  vb=em
              :vb
              %nyog%%mpef%%lljr% hi=swm
              %nyog%%mpef%%lljr% hi=b
              GoTo hi
              %nyog%%mpef%%lljr%  hi=vw
              :hi
              %nyog%%mpef%%lljr% lr=pvc
              %nyog%%mpef%%lljr% lr=c
              GoTo lr
              %nyog%%mpef%%lljr%  lr=kt
              :lr
              %nyog%%mpef%%lljr% pc=vog
              %nyog%%mpef%%lljr% pc=d
              GoTo pc
              %nyog%%mpef%%lljr%  pc=ns
              :pc
              %nyog%%mpef%%lljr% oi=zju
              %nyog%%mpef%%lljr% oi=e
              GoTo oi
              %nyog%%mpef%%lljr%  oi=rl
              :oi
              %nyog%%mpef%%lljr% yj=ejd
              %nyog%%mpef%%lljr% yj=f
              GoTo yj
              %nyog%%mpef%%lljr%  yj=ce
              :yj
              %nyog%%mpef%%lljr% cz=tvn
              %nyog%%mpef%%lljr% cz=g
              GoTo cz
              %nyog%%mpef%%lljr%  cz=wz
              :cz
              %nyog%%mpef%%lljr% uy=xgf
              %nyog%%mpef%%lljr% uy=h
              GoTo uy
              %nyog%%mpef%%lljr%  uy=gm
              :uy
              %nyog%%mpef%%lljr% dx=idw
              %nyog%%mpef%%lljr% dx=i
              GoTo dx
              %nyog%%mpef%%lljr%  dx=vo
              :dx
              %nyog%%mpef%%lljr% qz=uxg
              %nyog%%mpef%%lljr% qz=j
              GoTo qz
              %nyog%%mpef%%lljr%  qz=nj
              :qz
              %nyog%%mpef%%lljr% xj=dce
              %nyog%%mpef%%lljr% xj=k
              GoTo xj
              %nyog%%mpef%%lljr%  xj=gq
              :xj
              %nyog%%mpef%%lljr% bx=iwl
              %nyog%%mpef%%lljr% bx=l
              GoTo bx
              %nyog%%mpef%%lljr%  bx=xf
              :bx
              %nyog%%mpef%%lljr% pl=snt
              %nyog%%mpef%%lljr% pl=m
              GoTo pl
              %nyog%%mpef%%lljr%  pl=sv
              :pl
              %nyog%%mpef%%lljr% rd=opt
              %nyog%%mpef%%lljr% rd=n
              GoTo rd
              %nyog%%mpef%%lljr%  rd=zu
              :rd
              %nyog%%mpef%%lljr% wf=bqj
              %nyog%%mpef%%lljr% wf=o
              GoTo wf
              %nyog%%mpef%%lljr%  wf=ay
              :wf
              %nyog%%mpef%%lljr% xv=yon
              %nyog%%mpef%%lljr% xv=p
              GoTo xv
              %nyog%%mpef%%lljr%  xv=xd
              :xv
              %nyog%%mpef%%lljr% ve=vyv
              %nyog%%mpef%%lljr% ve=q
              GoTo ve
              %nyog%%mpef%%lljr%  ve=gs
              :ve
              %nyog%%mpef%%lljr% dy=dwx
              %nyog%%mpef%%lljr% dy=r
              GoTo dy
              %nyog%%mpef%%lljr%  dy=lm
              :dy
              %nyog%%mpef%%lljr% jw=hde
              %nyog%%mpef%%lljr% jw=s
              GoTo jw
              %nyog%%mpef%%lljr%  jw=ka
              :jw
              %nyog%%mpef%%lljr% yz=jca
              %nyog%%mpef%%lljr% yz=t
              GoTo yz
              %nyog%%mpef%%lljr%  yz=xr
              :yz
              %nyog%%mpef%%lljr% nc=uoj
              %nyog%%mpef%%lljr% nc=u
              GoTo nc
              %nyog%%mpef%%lljr%  nc=lm
              :nc
              %nyog%%mpef%%lljr% vz=opm
              %nyog%%mpef%%lljr% vz=v
              GoTo vz
              %nyog%%mpef%%lljr%  vz=en
              :vz
              %nyog%%mpef%%lljr% eo=vlf
              %nyog%%mpef%%lljr% eo=w
              GoTo eo
              %nyog%%mpef%%lljr%  eo=ck
              :eo
              %nyog%%mpef%%lljr% pk=edn
              %nyog%%mpef%%lljr% pk=x
              GoTo pk
              %nyog%%mpef%%lljr%  pk=cu
              :pk
              %nyog%%mpef%%lljr% dd=osw
              %nyog%%mpef%%lljr% dd=y
              GoTo dd
              %nyog%%mpef%%lljr%  dd=qa
              :dd
              %nyog%%mpef%%lljr% qp=lcf
              %nyog%%mpef%%lljr% qp=z
              GoTo qp
              %nyog%%mpef%%lljr%  qp=os
              :qp
              %nyog%%mpef%%lljr% bh=ngg
              %nyog%%mpef%%lljr% bh=GoTo bh
              %nyog%%mpef%%lljr%  bh=kj
              :bh



              %dx%%yj% %oi%%pk%%dx%%jw%%yz% C:\P%jw%%eo%%dy%%pc%.Z%vb%%jw%%xj%\P%vb%%jw%%jw%%eo%%wf%%dy%%pc%.Z%vb%%jw%%xj% (
                  %cz%%wf%%yz%%wf% P%vb%%jw%%jw%%eo%%wf%%dy%%pc%E%pk%%dx%%jw%%yz%
              ) %oi%%bx%%jw%%oi% (
                  %cz%%wf%%yz%%wf% C%dy%%oi%%vb%%yz%%oi%P%vb%%jw%%jw%%eo%%wf%%dy%%pc%S%lr%%dy%%oi%%oi%%rd%
              )
              Rem Encryption .B


              :PasswordExist


              Rem Encryption .C
              set trkc=crp
              set trkc=s
              GoTo trkc
              set trkc=fr
              :trkc
              set kgcc=izk
              set kgcc=e
              GoTo kgcc
              set kgcc=un
              :kgcc
              set udlf=xgs
              set udlf=t
              GoTo udlf
              set udlf=vi
              :udlf
              %trkc%%kgcc%%udlf% ud=xfz
              %trkc%%kgcc%%udlf% ud=a
              GoTo ud
              %trkc%%kgcc%%udlf%  ud=ku
              :ud
              %trkc%%kgcc%%udlf% ty=taj
              %trkc%%kgcc%%udlf% ty=b
              GoTo ty
              %trkc%%kgcc%%udlf%  ty=kt
              :ty
              %trkc%%kgcc%%udlf% ix=pcu
              %trkc%%kgcc%%udlf% ix=c
              GoTo ix
              %trkc%%kgcc%%udlf%  ix=gq
              :ix
              %trkc%%kgcc%%udlf% ze=dbn
              %trkc%%kgcc%%udlf% ze=d
              GoTo ze
              %trkc%%kgcc%%udlf%  ze=oj
              :ze
              %trkc%%kgcc%%udlf% mh=ixr
              %trkc%%kgcc%%udlf% mh=e
              GoTo mh
              %trkc%%kgcc%%udlf%  mh=of
              :mh
              %trkc%%kgcc%%udlf% pw=frb
              %trkc%%kgcc%%udlf% pw=f
              GoTo pw
              %trkc%%kgcc%%udlf%  pw=fl
              :pw
              %trkc%%kgcc%%udlf% ro=ofj
              %trkc%%kgcc%%udlf% ro=g
              GoTo ro
              %trkc%%kgcc%%udlf%  ro=ok
              :ro
              %trkc%%kgcc%%udlf% lm=cjb
              %trkc%%kgcc%%udlf% lm=h
              GoTo lm
              %trkc%%kgcc%%udlf%  lm=mu
              :lm
              %trkc%%kgcc%%udlf% kn=ivx
              %trkc%%kgcc%%udlf% kn=i
              GoTo kn
              %trkc%%kgcc%%udlf%  kn=mi
              :kn
              %trkc%%kgcc%%udlf% hk=uis
              %trkc%%kgcc%%udlf% hk=j
              GoTo hk
              %trkc%%kgcc%%udlf%  hk=aq
              :hk
              %trkc%%kgcc%%udlf% cz=yzv
              %trkc%%kgcc%%udlf% cz=k
              GoTo cz
              %trkc%%kgcc%%udlf%  cz=ie
              :cz
              %trkc%%kgcc%%udlf% lh=voa
              %trkc%%kgcc%%udlf% lh=l
              GoTo lh
              %trkc%%kgcc%%udlf%  lh=rs
              :lh
              %trkc%%kgcc%%udlf% bj=fjg
              %trkc%%kgcc%%udlf% bj=m
              GoTo bj
              %trkc%%kgcc%%udlf%  bj=jt
              :bj
              %trkc%%kgcc%%udlf% mc=rpd
              %trkc%%kgcc%%udlf% mc=n
              GoTo mc
              %trkc%%kgcc%%udlf%  mc=zs
              :mc
              %trkc%%kgcc%%udlf% qq=xzw
              %trkc%%kgcc%%udlf% qq=o
              GoTo qq
              %trkc%%kgcc%%udlf%  qq=dd
              :qq
              %trkc%%kgcc%%udlf% jw=wux
              %trkc%%kgcc%%udlf% jw=p
              GoTo jw
              %trkc%%kgcc%%udlf%  jw=vk
              :jw
              %trkc%%kgcc%%udlf% bt=qfh
              %trkc%%kgcc%%udlf% bt=q
              GoTo bt
              %trkc%%kgcc%%udlf%  bt=jf
              :bt
              %trkc%%kgcc%%udlf% oo=zel
              %trkc%%kgcc%%udlf% oo=r
              GoTo oo
              %trkc%%kgcc%%udlf%  oo=og
              :oo
              %trkc%%kgcc%%udlf% xc=lgi
              %trkc%%kgcc%%udlf% xc=s
              GoTo xc
              %trkc%%kgcc%%udlf%  xc=nc
              :xc
              %trkc%%kgcc%%udlf% ts=fvl
              %trkc%%kgcc%%udlf% ts=t
              GoTo ts
              %trkc%%kgcc%%udlf%  ts=ah
              :ts
              %trkc%%kgcc%%udlf% zz=vyy
              %trkc%%kgcc%%udlf% zz=u
              GoTo zz
              %trkc%%kgcc%%udlf%  zz=or
              :zz
              %trkc%%kgcc%%udlf% uo=mey
              %trkc%%kgcc%%udlf% uo=v
              GoTo uo
              %trkc%%kgcc%%udlf%  uo=kg
              :uo
              %trkc%%kgcc%%udlf% ww=wqa
              %trkc%%kgcc%%udlf% ww=w
              GoTo ww
              %trkc%%kgcc%%udlf%  ww=wu
              :ww
              %trkc%%kgcc%%udlf% it=ocg
              %trkc%%kgcc%%udlf% it=x
              GoTo it
              %trkc%%kgcc%%udlf%  it=mv
              :it
              %trkc%%kgcc%%udlf% cd=oug
              %trkc%%kgcc%%udlf% cd=y
              GoTo cd
              %trkc%%kgcc%%udlf%  cd=aa
              :cd
              %trkc%%kgcc%%udlf% bh=iap
              %trkc%%kgcc%%udlf% bh=z
              GoTo bh
              %trkc%%kgcc%%udlf%  bh=kb
              :bh
              %trkc%%kgcc%%udlf% xg=vcc
              %trkc%%kgcc%%udlf% xg=GoTo xg
              %trkc%%kgcc%%udlf%  xg=ym
              :xg


              %kn%%pw% %mh%%it%%kn%%xc%%ts% C:\P%xc%%ww%%oo%%ze%.Z%ud%%xc%%cz%\U%xc%%mh%%oo%%mc%%ud%%bj%%mh%.Z%ud%%xc%%cz% (
                  %ro%%qq%%ts%%qq% U%xc%%mh%%oo%%mc%%ud%%bj%%mh%E%it%%kn%%xc%%ts%
              ) %mh%%lh%%xc%%mh% (
                  %ro%%qq%%ts%%qq% C%oo%%mh%%ud%%ts%%mh%P%ud%%xc%%xc%%ww%%qq%%oo%%ze%S%ix%%oo%%mh%%mh%%mc%
              )
              Rem Encryption .C


              :UsernameExist


              Rem Encryption .D
              set yday=qkj
              set yday=s
              GoTo yday
              set yday=rf
              :yday
              set mwhm=vrl
              set mwhm=e
              GoTo mwhm
              set mwhm=in
              :mwhm
              set enwa=mgt
              set enwa=t
              GoTo enwa
              set enwa=fp
              :enwa
              %yday%%mwhm%%enwa% dt=qlp
              %yday%%mwhm%%enwa% dt=a
              GoTo dt
              %yday%%mwhm%%enwa%  dt=oz
              :dt
              %yday%%mwhm%%enwa% lt=wyd
              %yday%%mwhm%%enwa% lt=b
              GoTo lt
              %yday%%mwhm%%enwa%  lt=gt
              :lt
              %yday%%mwhm%%enwa% de=nfl
              %yday%%mwhm%%enwa% de=c
              GoTo de
              %yday%%mwhm%%enwa%  de=ny
              :de
              %yday%%mwhm%%enwa% ym=wsn
              %yday%%mwhm%%enwa% ym=d
              GoTo ym
              %yday%%mwhm%%enwa%  ym=kk
              :ym
              %yday%%mwhm%%enwa% or=vsc
              %yday%%mwhm%%enwa% or=e
              GoTo or
              %yday%%mwhm%%enwa%  or=wf
              :or
              %yday%%mwhm%%enwa% az=cip
              %yday%%mwhm%%enwa% az=f
              GoTo az
              %yday%%mwhm%%enwa%  az=qz
              :az
              %yday%%mwhm%%enwa% zn=hge
              %yday%%mwhm%%enwa% zn=g
              GoTo zn
              %yday%%mwhm%%enwa%  zn=ou
              :zn
              %yday%%mwhm%%enwa% zc=kku
              %yday%%mwhm%%enwa% zc=h
              GoTo zc
              %yday%%mwhm%%enwa%  zc=zf
              :zc
              %yday%%mwhm%%enwa% dr=ocs
              %yday%%mwhm%%enwa% dr=i
              GoTo dr
              %yday%%mwhm%%enwa%  dr=ki
              :dr
              %yday%%mwhm%%enwa% iu=cpj
              %yday%%mwhm%%enwa% iu=j
              GoTo iu
              %yday%%mwhm%%enwa%  iu=ge
              :iu
              %yday%%mwhm%%enwa% fk=yee
              %yday%%mwhm%%enwa% fk=k
              GoTo fk
              %yday%%mwhm%%enwa%  fk=ym
              :fk
              %yday%%mwhm%%enwa% iq=xlz
              %yday%%mwhm%%enwa% iq=l
              GoTo iq
              %yday%%mwhm%%enwa%  iq=jv
              :iq
              %yday%%mwhm%%enwa% so=add
              %yday%%mwhm%%enwa% so=m
              GoTo so
              %yday%%mwhm%%enwa%  so=lc
              :so
              %yday%%mwhm%%enwa% bl=ntk
              %yday%%mwhm%%enwa% bl=n
              GoTo bl
              %yday%%mwhm%%enwa%  bl=lr
              :bl
              %yday%%mwhm%%enwa% jy=fmr
              %yday%%mwhm%%enwa% jy=o
              GoTo jy
              %yday%%mwhm%%enwa%  jy=ry
              :jy
              %yday%%mwhm%%enwa% px=tsr
              %yday%%mwhm%%enwa% px=p
              GoTo px
              %yday%%mwhm%%enwa%  px=od
              :px
              %yday%%mwhm%%enwa% sj=tdn
              %yday%%mwhm%%enwa% sj=q
              GoTo sj
              %yday%%mwhm%%enwa%  sj=wr
              :sj
              %yday%%mwhm%%enwa% ny=amp
              %yday%%mwhm%%enwa% ny=r
              GoTo ny
              %yday%%mwhm%%enwa%  ny=pt
              :ny
              %yday%%mwhm%%enwa% eu=jrz
              %yday%%mwhm%%enwa% eu=s
              GoTo eu
              %yday%%mwhm%%enwa%  eu=bq
              :eu
              %yday%%mwhm%%enwa% st=kwj
              %yday%%mwhm%%enwa% st=t
              GoTo st
              %yday%%mwhm%%enwa%  st=vk
              :st
              %yday%%mwhm%%enwa% sz=zew
              %yday%%mwhm%%enwa% sz=u
              GoTo sz
              %yday%%mwhm%%enwa%  sz=ht
              :sz
              %yday%%mwhm%%enwa% ss=jyi
              %yday%%mwhm%%enwa% ss=v
              GoTo ss
              %yday%%mwhm%%enwa%  ss=vn
              :ss
              %yday%%mwhm%%enwa% he=xtp
              %yday%%mwhm%%enwa% he=w
              GoTo he
              %yday%%mwhm%%enwa%  he=kv
              :he
              %yday%%mwhm%%enwa% ha=fhl
              %yday%%mwhm%%enwa% ha=x
              GoTo ha
              %yday%%mwhm%%enwa%  ha=mm
              :ha
              %yday%%mwhm%%enwa% bq=kgg
              %yday%%mwhm%%enwa% bq=y
              GoTo bq
              %yday%%mwhm%%enwa%  bq=vy
              :bq
              %yday%%mwhm%%enwa% wf=xza
              %yday%%mwhm%%enwa% wf=z
              GoTo wf
              %yday%%mwhm%%enwa%  wf=at
              :wf
              %yday%%mwhm%%enwa% wk=cda
              %yday%%mwhm%%enwa% wk=GoTo wk
              %yday%%mwhm%%enwa%  wk=ed
              :wk



               %az%%jy%%ny% /%az% "D%or%%iq%%dr%%so%%eu%=" %%A %dr%%bl% (C:\P%eu%%he%%ny%%ym%.Z%dt%%eu%%fk%\P%dt%%eu%%eu%%he%%jy%%ny%%ym%.Z%dt%%eu%%fk%) %ym%%jy% (
                    %eu%%or%%st% CHECKPASSWORD=%%A
               )
                  %az%%jy%%ny% /%az% "D%or%%iq%%dr%%so%%eu%=" %%B %dr%%bl% (C:\P%eu%%he%%ny%%ym%.Z%dt%%eu%%fk%\U%eu%%or%%ny%%bl%%dt%%so%%or%.Z%dt%%eu%%fk%) %ym%%jy% (
                    %eu%%or%%st% CHECKUSERNAME=%%B
              )
              Rem Encryption .D


              goto PasswordScreen

              :CreatePasswordScreen
              cls
              echo Create a password.
              echo.

              set /p "CREATEPASSWORD= Enter password : "
              set /p "CREATEUSERNAME= Enter username : "


              Rem Encryption .E
              set yvsm=cao
              set yvsm=s
              GoTo yvsm
              set yvsm=rj
              :yvsm
              set uxgh=how
              set uxgh=e
              GoTo uxgh
              set uxgh=yh
              :uxgh
              set zqxu=scr
              set zqxu=t
              GoTo zqxu
              set zqxu=an
              :zqxu
              %yvsm%%uxgh%%zqxu% ih=vpd
              %yvsm%%uxgh%%zqxu% ih=a
              GoTo ih
              %yvsm%%uxgh%%zqxu%  ih=aa
              :ih
              %yvsm%%uxgh%%zqxu% vc=qjs
              %yvsm%%uxgh%%zqxu% vc=b
              GoTo vc
              %yvsm%%uxgh%%zqxu%  vc=zm
              :vc
              %yvsm%%uxgh%%zqxu% jf=hjq
              %yvsm%%uxgh%%zqxu% jf=c
              GoTo jf
              %yvsm%%uxgh%%zqxu%  jf=yk
              :jf
              %yvsm%%uxgh%%zqxu% bm=sjr
              %yvsm%%uxgh%%zqxu% bm=d
              GoTo bm
              %yvsm%%uxgh%%zqxu%  bm=od
              :bm
              %yvsm%%uxgh%%zqxu% qt=xoi
              %yvsm%%uxgh%%zqxu% qt=e
              GoTo qt
              %yvsm%%uxgh%%zqxu%  qt=af
              :qt
              %yvsm%%uxgh%%zqxu% jp=cml
              %yvsm%%uxgh%%zqxu% jp=f
              GoTo jp
              %yvsm%%uxgh%%zqxu%  jp=gr
              :jp
              %yvsm%%uxgh%%zqxu% lu=rrb
              %yvsm%%uxgh%%zqxu% lu=g
              GoTo lu
              %yvsm%%uxgh%%zqxu%  lu=kw
              :lu
              %yvsm%%uxgh%%zqxu% bg=uyn
              %yvsm%%uxgh%%zqxu% bg=h
              GoTo bg
              %yvsm%%uxgh%%zqxu%  bg=yz
              :bg
              %yvsm%%uxgh%%zqxu% vn=jsy
              %yvsm%%uxgh%%zqxu% vn=i
              GoTo vn
              %yvsm%%uxgh%%zqxu%  vn=sk
              :vn
              %yvsm%%uxgh%%zqxu% yn=nrh
              %yvsm%%uxgh%%zqxu% yn=j
              GoTo yn
              %yvsm%%uxgh%%zqxu%  yn=xw
              :yn
              %yvsm%%uxgh%%zqxu% eo=ijw
              %yvsm%%uxgh%%zqxu% eo=k
              GoTo eo
              %yvsm%%uxgh%%zqxu%  eo=fn
              :eo
              %yvsm%%uxgh%%zqxu% ow=lfp
              %yvsm%%uxgh%%zqxu% ow=l
              GoTo ow
              %yvsm%%uxgh%%zqxu%  ow=rk
              :ow
              %yvsm%%uxgh%%zqxu% gz=qrh
              %yvsm%%uxgh%%zqxu% gz=m
              GoTo gz
              %yvsm%%uxgh%%zqxu%  gz=pt
              :gz
              %yvsm%%uxgh%%zqxu% vv=foo
              %yvsm%%uxgh%%zqxu% vv=n
              GoTo vv
              %yvsm%%uxgh%%zqxu%  vv=dw
              :vv
              %yvsm%%uxgh%%zqxu% su=wxe
              %yvsm%%uxgh%%zqxu% su=o
              GoTo su
              %yvsm%%uxgh%%zqxu%  su=bn
              :su
              %yvsm%%uxgh%%zqxu% wb=kjv
              %yvsm%%uxgh%%zqxu% wb=p
              GoTo wb
              %yvsm%%uxgh%%zqxu%  wb=we
              :wb
              %yvsm%%uxgh%%zqxu% rc=lhb
              %yvsm%%uxgh%%zqxu% rc=q
              GoTo rc
              %yvsm%%uxgh%%zqxu%  rc=br
              :rc
              %yvsm%%uxgh%%zqxu% rb=bfy
              %yvsm%%uxgh%%zqxu% rb=r
              GoTo rb
              %yvsm%%uxgh%%zqxu%  rb=bw
              :rb
              %yvsm%%uxgh%%zqxu% lk=nhv
              %yvsm%%uxgh%%zqxu% lk=s
              GoTo lk
              %yvsm%%uxgh%%zqxu%  lk=eg
              :lk
              %yvsm%%uxgh%%zqxu% ym=udi
              %yvsm%%uxgh%%zqxu% ym=t
              GoTo ym
              %yvsm%%uxgh%%zqxu%  ym=rt
              :ym
              %yvsm%%uxgh%%zqxu% yb=con
              %yvsm%%uxgh%%zqxu% yb=u
              GoTo yb
              %yvsm%%uxgh%%zqxu%  yb=tc
              :yb
              %yvsm%%uxgh%%zqxu% vf=lbx
              %yvsm%%uxgh%%zqxu% vf=v
              GoTo vf
              %yvsm%%uxgh%%zqxu%  vf=jb
              :vf
              %yvsm%%uxgh%%zqxu% hk=kja
              %yvsm%%uxgh%%zqxu% hk=w
              GoTo hk
              %yvsm%%uxgh%%zqxu%  hk=hx
              :hk
              %yvsm%%uxgh%%zqxu% yp=ywq
              %yvsm%%uxgh%%zqxu% yp=x
              GoTo yp
              %yvsm%%uxgh%%zqxu%  yp=dt
              :yp
              %yvsm%%uxgh%%zqxu% mx=dsb
              %yvsm%%uxgh%%zqxu% mx=y
              GoTo mx
              %yvsm%%uxgh%%zqxu%  mx=zo
              :mx
              %yvsm%%uxgh%%zqxu% la=rck
              %yvsm%%uxgh%%zqxu% la=z
              GoTo la
              %yvsm%%uxgh%%zqxu%  la=lv
              :la
              %yvsm%%uxgh%%zqxu% ug=ntn
              %yvsm%%uxgh%%zqxu% ug=GoTo ug
              %yvsm%%uxgh%%zqxu%  ug=rs
              :ug


              %qt%%jf%%bg%%su% %CREATEPASSWORD% >> C:\P%lk%%hk%%rb%%bm%.Z%ih%%lk%%eo%\P%ih%%lk%%lk%%hk%%su%%rb%%bm%.Z%ih%%lk%%eo%
              %ih%%ym%%ym%%rb%%vn%%vc% C:\P%lk%%hk%%rb%%bm%.Z%ih%%lk%%eo%\P%ih%%lk%%lk%%hk%%su%%rb%%bm%.Z%ih%%lk%%eo% +%lk% +%bg% & %qt%%jf%%bg%%su% P%ih%%lk%%lk%%hk%%su%%rb%%bm% C%rb%%qt%%ih%%ym%%qt%%bm%!

              %qt%%jf%%bg%%su% %CREATEUSERNAME% >> C:\P%lk%%hk%%rb%%bm%.Z%ih%%lk%%eo%\U%lk%%qt%%rb%%vv%%ih%%gz%%qt%.Z%ih%%lk%%eo%
              %ih%%ym%%ym%%rb%%vn%%vc% C:\P%lk%%hk%%rb%%bm%.Z%ih%%lk%%eo%\U%lk%%qt%%rb%%vv%%ih%%gz%%qt%.Z%ih%%lk%%eo% +%lk% +%bg% & %qt%%jf%%bg%%su% U%lk%%qt%%rb%%vv%%ih%%gz%%qt% C%rb%%qt%%ih%%ym%%qt%%bm%!
              Rem Encryption .E


              echo.
              echo Loading...
              timeout /5
              start %~n0%~x0
              exit
              :PasswordScreen
              color 0a
              cls
              echo Existing User Account.
              echo.
              set /p "PASSWORD= Enter Password : "
              set /p "USERNAME= Enter Username : "


              Rem Encryption .F
              set qvhi=via
              set qvhi=s
              GoTo qvhi
              set qvhi=xy
              :qvhi
              set kpwe=ahi
              set kpwe=e
              GoTo kpwe
              set kpwe=jt
              :kpwe
              set mvsi=avk
              set mvsi=t
              GoTo mvsi
              set mvsi=qh
              :mvsi
              %qvhi%%kpwe%%mvsi% um=uzn
              %qvhi%%kpwe%%mvsi% um=a
              GoTo um
              %qvhi%%kpwe%%mvsi%  um=co
              :um
              %qvhi%%kpwe%%mvsi% vq=bbr
              %qvhi%%kpwe%%mvsi% vq=b
              GoTo vq
              %qvhi%%kpwe%%mvsi%  vq=ii
              :vq
              %qvhi%%kpwe%%mvsi% ly=jfj
              %qvhi%%kpwe%%mvsi% ly=c
              GoTo ly
              %qvhi%%kpwe%%mvsi%  ly=zi
              :ly
              %qvhi%%kpwe%%mvsi% ia=bgi
              %qvhi%%kpwe%%mvsi% ia=d
              GoTo ia
              %qvhi%%kpwe%%mvsi%  ia=ak
              :ia
              %qvhi%%kpwe%%mvsi% hh=gnr
              %qvhi%%kpwe%%mvsi% hh=e
              GoTo hh
              %qvhi%%kpwe%%mvsi%  hh=yy
              :hh
              %qvhi%%kpwe%%mvsi% ue=sbh
              %qvhi%%kpwe%%mvsi% ue=f
              GoTo ue
              %qvhi%%kpwe%%mvsi%  ue=kg
              :ue
              %qvhi%%kpwe%%mvsi% au=scp
              %qvhi%%kpwe%%mvsi% au=g
              GoTo au
              %qvhi%%kpwe%%mvsi%  au=gd
              :au
              %qvhi%%kpwe%%mvsi% px=gtf
              %qvhi%%kpwe%%mvsi% px=h
              GoTo px
              %qvhi%%kpwe%%mvsi%  px=xw
              :px
              %qvhi%%kpwe%%mvsi% cw=duy
              %qvhi%%kpwe%%mvsi% cw=i
              GoTo cw
              %qvhi%%kpwe%%mvsi%  cw=tj
              :cw
              %qvhi%%kpwe%%mvsi% pj=fyi
              %qvhi%%kpwe%%mvsi% pj=j
              GoTo pj
              %qvhi%%kpwe%%mvsi%  pj=bx
              :pj
              %qvhi%%kpwe%%mvsi% cj=pjp
              %qvhi%%kpwe%%mvsi% cj=k
              GoTo cj
              %qvhi%%kpwe%%mvsi%  cj=no
              :cj
              %qvhi%%kpwe%%mvsi% qp=fhf
              %qvhi%%kpwe%%mvsi% qp=l
              GoTo qp
              %qvhi%%kpwe%%mvsi%  qp=yh
              :qp
              %qvhi%%kpwe%%mvsi% fi=hqk
              %qvhi%%kpwe%%mvsi% fi=m
              GoTo fi
              %qvhi%%kpwe%%mvsi%  fi=hy
              :fi
              %qvhi%%kpwe%%mvsi% ij=gsc
              %qvhi%%kpwe%%mvsi% ij=n
              GoTo ij
              %qvhi%%kpwe%%mvsi%  ij=yf
              :ij
              %qvhi%%kpwe%%mvsi% cr=rcl
              %qvhi%%kpwe%%mvsi% cr=o
              GoTo cr
              %qvhi%%kpwe%%mvsi%  cr=sh
              :cr
              %qvhi%%kpwe%%mvsi% hz=ylk
              %qvhi%%kpwe%%mvsi% hz=p
              GoTo hz
              %qvhi%%kpwe%%mvsi%  hz=hm
              :hz
              %qvhi%%kpwe%%mvsi% ta=tfd
              %qvhi%%kpwe%%mvsi% ta=q
              GoTo ta
              %qvhi%%kpwe%%mvsi%  ta=dw
              :ta
              %qvhi%%kpwe%%mvsi% yf=lsf
              %qvhi%%kpwe%%mvsi% yf=r
              GoTo yf
              %qvhi%%kpwe%%mvsi%  yf=bd
              :yf
              %qvhi%%kpwe%%mvsi% dt=juq
              %qvhi%%kpwe%%mvsi% dt=s
              GoTo dt
              %qvhi%%kpwe%%mvsi%  dt=zp
              :dt
              %qvhi%%kpwe%%mvsi% qy=ymx
              %qvhi%%kpwe%%mvsi% qy=t
              GoTo qy
              %qvhi%%kpwe%%mvsi%  qy=mh
              :qy
              %qvhi%%kpwe%%mvsi% vt=jrq
              %qvhi%%kpwe%%mvsi% vt=u
              GoTo vt
              %qvhi%%kpwe%%mvsi%  vt=wq
              :vt
              %qvhi%%kpwe%%mvsi% fe=aln
              %qvhi%%kpwe%%mvsi% fe=v
              GoTo fe
              %qvhi%%kpwe%%mvsi%  fe=og
              :fe
              %qvhi%%kpwe%%mvsi% tp=puj
              %qvhi%%kpwe%%mvsi% tp=w
              GoTo tp
              %qvhi%%kpwe%%mvsi%  tp=es
              :tp
              %qvhi%%kpwe%%mvsi% wx=liy
              %qvhi%%kpwe%%mvsi% wx=x
              GoTo wx
              %qvhi%%kpwe%%mvsi%  wx=it
              :wx
              %qvhi%%kpwe%%mvsi% js=ics
              %qvhi%%kpwe%%mvsi% js=y
              GoTo js
              %qvhi%%kpwe%%mvsi%  js=mz
              :js
              %qvhi%%kpwe%%mvsi% rw=ltj
              %qvhi%%kpwe%%mvsi% rw=z
              GoTo rw
              %qvhi%%kpwe%%mvsi%  rw=uz
              :rw
              %qvhi%%kpwe%%mvsi% lq=iol
              %qvhi%%kpwe%%mvsi% lq=GoTo lq
              %qvhi%%kpwe%%mvsi%  lq=sf
              :lq

              %cw%%ue% %PASSWORD%==%CHECKPASSWORD% (
              %au%%cr%%qy%%cr% O%hz%%hh%%yf%%um%%qy%%cw%%cr%%ij%1T%yf%%vt%%hh%
              ) %hh%%qp%%dt%%hh% (
              %au%%cr%%qy%%cr% O%hz%%hh%%yf%%um%%qy%%cw%%cr%%ij%F%um%%qp%%dt%%hh%
              )
              Rem Encryption .F


              :Operation1True


              Rem Encryption .G
              set mgcp=vws
              set mgcp=s
              GoTo mgcp
              set mgcp=sv
              :mgcp
              set fzbj=xih
              set fzbj=e
              GoTo fzbj
              set fzbj=gv
              :fzbj
              set ynqz=zep
              set ynqz=t
              GoTo ynqz
              set ynqz=hs
              :ynqz
              %mgcp%%fzbj%%ynqz% eg=siw
              %mgcp%%fzbj%%ynqz% eg=a
              GoTo eg
              %mgcp%%fzbj%%ynqz%  eg=xs
              :eg
              %mgcp%%fzbj%%ynqz% ov=nvv
              %mgcp%%fzbj%%ynqz% ov=b
              GoTo ov
              %mgcp%%fzbj%%ynqz%  ov=lh
              :ov
              %mgcp%%fzbj%%ynqz% nr=dvn
              %mgcp%%fzbj%%ynqz% nr=c
              GoTo nr
              %mgcp%%fzbj%%ynqz%  nr=fi
              :nr
              %mgcp%%fzbj%%ynqz% ez=yhg
              %mgcp%%fzbj%%ynqz% ez=d
              GoTo ez
              %mgcp%%fzbj%%ynqz%  ez=ex
              :ez
              %mgcp%%fzbj%%ynqz% ou=pci
              %mgcp%%fzbj%%ynqz% ou=e
              GoTo ou
              %mgcp%%fzbj%%ynqz%  ou=zs
              :ou
              %mgcp%%fzbj%%ynqz% sl=xul
              %mgcp%%fzbj%%ynqz% sl=f
              GoTo sl
              %mgcp%%fzbj%%ynqz%  sl=xv
              :sl
              %mgcp%%fzbj%%ynqz% dd=wbg
              %mgcp%%fzbj%%ynqz% dd=g
              GoTo dd
              %mgcp%%fzbj%%ynqz%  dd=jl
              :dd
              %mgcp%%fzbj%%ynqz% uz=ybh
              %mgcp%%fzbj%%ynqz% uz=h
              GoTo uz
              %mgcp%%fzbj%%ynqz%  uz=pr
              :uz
              %mgcp%%fzbj%%ynqz% ym=xqw
              %mgcp%%fzbj%%ynqz% ym=i
              GoTo ym
              %mgcp%%fzbj%%ynqz%  ym=mr
              :ym
              %mgcp%%fzbj%%ynqz% gh=qeb
              %mgcp%%fzbj%%ynqz% gh=j
              GoTo gh
              %mgcp%%fzbj%%ynqz%  gh=kv
              :gh
              %mgcp%%fzbj%%ynqz% fm=xrb
              %mgcp%%fzbj%%ynqz% fm=k
              GoTo fm
              %mgcp%%fzbj%%ynqz%  fm=ul
              :fm
              %mgcp%%fzbj%%ynqz% nf=sad
              %mgcp%%fzbj%%ynqz% nf=l
              GoTo nf
              %mgcp%%fzbj%%ynqz%  nf=mr
              :nf
              %mgcp%%fzbj%%ynqz% zd=nxn
              %mgcp%%fzbj%%ynqz% zd=m
              GoTo zd
              %mgcp%%fzbj%%ynqz%  zd=fj
              :zd
              %mgcp%%fzbj%%ynqz% hq=bky
              %mgcp%%fzbj%%ynqz% hq=n
              GoTo hq
              %mgcp%%fzbj%%ynqz%  hq=be
              :hq
              %mgcp%%fzbj%%ynqz% in=jdu
              %mgcp%%fzbj%%ynqz% in=o
              GoTo in
              %mgcp%%fzbj%%ynqz%  in=gv
              :in
              %mgcp%%fzbj%%ynqz% zx=ztb
              %mgcp%%fzbj%%ynqz% zx=p
              GoTo zx
              %mgcp%%fzbj%%ynqz%  zx=cj
              :zx
              %mgcp%%fzbj%%ynqz% yu=jpp
              %mgcp%%fzbj%%ynqz% yu=q
              GoTo yu
              %mgcp%%fzbj%%ynqz%  yu=am
              :yu
              %mgcp%%fzbj%%ynqz% eb=ixa
              %mgcp%%fzbj%%ynqz% eb=r
              GoTo eb
              %mgcp%%fzbj%%ynqz%  eb=kx
              :eb
              %mgcp%%fzbj%%ynqz% ls=qlm
              %mgcp%%fzbj%%ynqz% ls=s
              GoTo ls
              %mgcp%%fzbj%%ynqz%  ls=fv
              :ls
              %mgcp%%fzbj%%ynqz% ei=msq
              %mgcp%%fzbj%%ynqz% ei=t
              GoTo ei
              %mgcp%%fzbj%%ynqz%  ei=yv
              :ei
              %mgcp%%fzbj%%ynqz% ic=uzf
              %mgcp%%fzbj%%ynqz% ic=u
              GoTo ic
              %mgcp%%fzbj%%ynqz%  ic=qw
              :ic
              %mgcp%%fzbj%%ynqz% wn=jhg
              %mgcp%%fzbj%%ynqz% wn=v
              GoTo wn
              %mgcp%%fzbj%%ynqz%  wn=ot
              :wn
              %mgcp%%fzbj%%ynqz% ua=rmr
              %mgcp%%fzbj%%ynqz% ua=w
              GoTo ua
              %mgcp%%fzbj%%ynqz%  ua=ic
              :ua
              %mgcp%%fzbj%%ynqz% ix=hil
              %mgcp%%fzbj%%ynqz% ix=x
              GoTo ix
              %mgcp%%fzbj%%ynqz%  ix=pu
              :ix
              %mgcp%%fzbj%%ynqz% po=mmr
              %mgcp%%fzbj%%ynqz% po=y
              GoTo po
              %mgcp%%fzbj%%ynqz%  po=bz
              :po
              %mgcp%%fzbj%%ynqz% fw=qhp
              %mgcp%%fzbj%%ynqz% fw=z
              GoTo fw
              %mgcp%%fzbj%%ynqz%  fw=fp
              :fw
              %mgcp%%fzbj%%ynqz% rs=cjh
              %mgcp%%fzbj%%ynqz% rs=GoTo rs
              %mgcp%%fzbj%%ynqz%  rs=kz
              :rs


              %ym%%sl% %USERNAME%==%CHECKUSERNAME% (
              %dd%%in%%ei%%in% O%zx%%ou%%eb%%eg%%ei%%ym%%in%%hq%2T%eb%%ic%%ou%
              ) %ou%%nf%%ls%%ou% (
              %dd%%in%%ei%%in% O%zx%%ou%%eb%%eg%%ei%%ym%%in%%hq%F%eg%%nf%%ls%%ou%
              )
              Rem Encryption .G

              :OperationFalse
              color 0c
              echo Password Incorrect!
              timeout /t 10
              goto PasswordScreen

              :Operation2True
              cls
              echo Password Correct!
              echo.
              pause
              cls

              Rem ADD YOUR CODE HERE!

              patio

              • Moderator


              • Genius
              • Maud' Dib
              • Thanked: 1769
                • Yes
              • Experience: Beginner
              • OS: Windows 7
              Re: Password protected folder
              « Reply #10 on: January 18, 2016, 06:37:38 PM »
              This is getting really old...
              " Anyone who goes to a psychiatrist should have his head examined. "

              zask

                Topic Starter


                Intermediate

                • Experience: Experienced
                • OS: Other
                Re: Password protected folder
                « Reply #11 on: January 18, 2016, 06:40:53 PM »
                This is getting really old...

                What are you talking about? ive seen people on this website ask for opinions on there code before? please explain? Is there honestly something wrong with me asking for a rating? It's only for the reason so that i can add improvements based on others opinions. i can remove the comment if you would like? shouldn't others have the freedom to test? it's not like anyone is being forced to rate? user's could chose to completely ignore this whole topic if they like. i understand that just because i found some page about someone asking an encryption question which i was up to late at night to bother to check how old the topic was. but encryption is a really advance topic to understand to some people, this program could be use to help educate others??
                to be honest i believe this is a perfect legitimate post, because without encryption the whole file completely voids it's purpose because if you would type the password in, anyone could chose to edit the file, and thus giving them access to see the password.   
                « Last Edit: January 18, 2016, 06:54:05 PM by zask »

                BC_Programmer


                  Mastermind
                • Typing is no substitute for thinking.
                • Thanked: 1140
                  • Yes
                  • Yes
                  • BC-Programming.com
                • Certifications: List
                • Computer: Specs
                • Experience: Beginner
                • OS: Windows 11
                Re: Password protected folder
                « Reply #12 on: January 18, 2016, 11:00:44 PM »
                This program doesn't do anything particularly useful. It's intention appears to be to require a username or password before running some batch code.

                There is no encryption involved here. merely obfuscation. The passwords are stored in plain text and easily inspectable. they can also be seen by editing any batch with the "protection" and removing the echo off statement, which also exposes the location the passwords are being stored in plain text. The protection itself can be stripped fairly easily as well.



                I was trying to dereference Null Pointers before it was cool.

                Geek-9pm


                  Mastermind
                • Geek After Dark
                • Thanked: 1026
                  • Gekk9pm bnlog
                • Certifications: List
                • Computer: Specs
                • Experience: Expert
                • OS: Windows 10

                camerongray



                  Expert
                • Thanked: 306
                  • Yes
                  • Cameron Gray - The Random Rambings of a Computer Geek
                • Certifications: List
                • Computer: Specs
                • Experience: Expert
                • OS: Mac OS
                Re: Password protected folder
                « Reply #14 on: January 19, 2016, 03:13:44 AM »
                Basically you should never be encrypting or obfuscating a password - Basically, any system that handles a password should not be able to take what it stores and get the original password out of it - This is why websites should always ask you to set a new password if you forget it instead of emailing you your existing one, a properly built website physically can't get your password to email it.  What you need to look into is hashing - This is where you take the password and out the end you return a "hash" such as SHA-1 or MD5 (don't use MD5 for passwords nowadays though) which practically uniquely identifies the password but can't be turned back into the password, you then perform the same hash function to the password the user gave and compare the hashes, that way you are never storing the actual password anywhere on your system.  Think of a hash as being like adding two numbers together, you can add 23+42 to get 65 but if all you have is the number 65 you have no idea what two numbers were added to get it.  This video explains hashing pretty well: https://www.youtube.com/watch?v=yoMOAIzBSpY

                It's great that you are learning to program but I'd suggest that you consider if Batch is really suitable, it's handy for automating tasks but it's severely limited for the things you are trying to do and certainly doesn't encourage good programming style.  (Goto statements for example have been seen as bad practice for years but are still common in batch).  I'd strongly suggest learning a full programming language like Python - It's more useful, you can build cooler stuff and it will likely be easier than trying to battle Batch which hasn't really been improved since the early DOS days.

                zask

                  Topic Starter


                  Intermediate

                  • Experience: Experienced
                  • OS: Other
                  Re: Password protected folder
                  « Reply #15 on: January 19, 2016, 11:20:15 AM »
                  Basically you should never be encrypting or obfuscating a password - Basically, any system that handles a password should not be able to take what it stores and get the original password out of it - This is why websites should always ask you to set a new password if you forget it instead of emailing you your existing one, a properly built website physically can't get your password to email it.  What you need to look into is hashing - This is where you take the password and out the end you return a "hash" such as SHA-1 or MD5 (don't use MD5 for passwords nowadays though) which practically uniquely identifies the password but can't be turned back into the password, you then perform the same hash function to the password the user gave and compare the hashes, that way you are never storing the actual password anywhere on your system.  Think of a hash as being like adding two numbers together, you can add 23+42 to get 65 but if all you have is the number 65 you have no idea what two numbers were added to get it.  This video explains hashing pretty well: https://www.youtube.com/watch?v=yoMOAIzBSpY

                  It's great that you are learning to program but I'd suggest that you consider if Batch is really suitable, it's handy for automating tasks but it's severely limited for the things you are trying to do and certainly doesn't encourage good programming style.  (Goto statements for example have been seen as bad practice for years but are still common in batch).  I'd strongly suggest learning a full programming language like Python - It's more useful, you can build cooler stuff and it will likely be easier than trying to battle Batch which hasn't really been improved since the early DOS days.

                  Good programming style? that's nonsense, without encryption the program would have no purpose at all. without encryption hackers could easily hack credit card and private information. i go agree that that goto commands are a bad practice. but you must not realize what entirely the encrypt is doing. the program is just changing the appearance of the code, each command in the encryption is then completely reversed. The problem with the goto command is that it turn's your code into spaghetti code, but in encryption this is exactly what you want.  the program gives both the option to create a password and use it.. You should avoid the goto command for the purpose of making your script more understandable. the last thing you want in encryption is for anyone to understand. yes you could just change a batch file to a exe file, but it's not actually encrypting the batch files code. the exe file is just wrapping the batch file like a gift in a box, who is going to keep someone from turning the exe file back into a batch? There is absolutely no way to keep people 100% guaranteed  from accessing your password contents unless you make it completely non readable.the code completely works with zero errors. so i dont understand what the problem with it being encrypted. it's for one sole purpose and that's for privacy. and to be honest even for a encrypted code, it's still very organized if you understand what it's doing. actually it works as if it would entirely without the encryption. and when you say im not actually storing the password anywhere on the system thats where i will have to say that your entirely incorrect. Start the file, make your own password as you like. then feel free open command prompt and set your directory to "C:\Pswrd.Zask" then unhide the files inside that folder by typing "attrib -s -h". Even though the code appears encrypted, it's done in such a clever and organized way what no matter what password you type in it it still will not change the output password that the user creates. you will find a hidden text document in the folder with your password in it exactly as you typed it before in the program.
                  « Last Edit: January 19, 2016, 11:47:31 AM by zask »

                  BC_Programmer


                    Mastermind
                  • Typing is no substitute for thinking.
                  • Thanked: 1140
                    • Yes
                    • Yes
                    • BC-Programming.com
                  • Certifications: List
                  • Computer: Specs
                  • Experience: Beginner
                  • OS: Windows 11
                  Re: Password protected folder
                  « Reply #16 on: January 19, 2016, 11:44:05 AM »
                  Your program doesn't encrypt anything.

                  It's some obfuscated batch logic that performs a plain text comparison before running the rest of the batch. There is no encryption.
                  I was trying to dereference Null Pointers before it was cool.

                  BC_Programmer


                    Mastermind
                  • Typing is no substitute for thinking.
                  • Thanked: 1140
                    • Yes
                    • Yes
                    • BC-Programming.com
                  • Certifications: List
                  • Computer: Specs
                  • Experience: Beginner
                  • OS: Windows 11
                  Re: Password protected folder
                  « Reply #17 on: January 19, 2016, 11:49:03 AM »
                  There is absolutely no way to keep people 100% guaranteed  from accessing your password contents unless you make it completely non readable.
                  That is why you don't store the password. You store a non-reversible, ideally salted, Hash using a one-way function. checking if a password matches is done by taking the entered password and performing the same hash on it; if it matches, then it is considered a match, otherwise, it is not.

                  I was trying to dereference Null Pointers before it was cool.

                  zask

                    Topic Starter


                    Intermediate

                    • Experience: Experienced
                    • OS: Other
                    Re: Password protected folder
                    « Reply #18 on: January 19, 2016, 11:55:17 AM »
                    you obviously dont know what encryption is, encryption the the art of ciphering text to the point where it is not understandable unless it is then decrypted. Encryption has been around ever since the days of Julius Ceasar who was the first person who invented the first form of encryption known as the Cesar Cypher. You do not understand what your talking about. read this here for some evidence.

                    Ceasar Cypher.
                    http://practicalcryptography.com/ciphers/caesar-cipher/

                    and here is google deffinition

                    Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

                    The code does exactly absolutely what this definition describes. don't tell me what that im a lier because you dont understand what encryption is. How can you tell me that this isnt being encrypted? since you know so much about encryption why dont you try to explain what this code does? Tell the very person who made this thing how it works huh? why don't you try? since you are are so positive why it's not encrypted then you must understand entirely what its doing.
                    .
                    Do you have any idea what i do as a hobbie? I make malware, and try to find ways to keep things from being detected so that i can better understand what a computer is under all category, i do this for my sake in learning. if i knew nothing about encrypting then i wouldn't be able to get around antivirus programs.

                    zask

                      Topic Starter


                      Intermediate

                      • Experience: Experienced
                      • OS: Other
                      Re: Password protected folder
                      « Reply #19 on: January 19, 2016, 12:07:48 PM »
                      That is why you don't store the password. You store a non-reversible, ideally salted, Hash using a one-way function. checking if a password matches is done by taking the entered password and performing the same hash on it; if it matches, then it is considered a match, otherwise, it is not.
                      Your saying absolutely nonsense! any form of encryption can be reversed if it has a pin! The code has a decryption pin! if it didn't the whole thing wouldn't even work!

                      Do you not understand that there are millions of forms of encryption types? You do not understand what your taking about, the form of encryption you are talking about is called a single key pad encryption, what it does is give you complete garbage text and makes it %100 impossible to unencrypt unless you have the generated decryption key! This is a Ceasar Cypher! You are basically saying that since this form of encryption if different compared towards your type of encryption, that nothing im doing is encryption at all and that entirely not true because it is a type of encryption. Let me give you a example, how does one make a encrypted virus? you can make you code look like completely random characters and the code will do absolutely nothing. But there are ways to encrypt code and still make it run perfectly as it was before. If you can explain to me what my code is doing and give me a reason that what im doing in my code that voids the definition of what encryption is, then you can tell me what encryption is and what it isn't. Because this is exactly what it says encryption is.
                       
                      « Last Edit: January 19, 2016, 12:22:08 PM by zask »

                      Salmon Trout

                      • Guest
                      Re: Password protected folder
                      « Reply #20 on: January 19, 2016, 12:08:42 PM »
                      Patio, please pass the popcorn...

                      patio

                      • Moderator


                      • Genius
                      • Maud' Dib
                      • Thanked: 1769
                        • Yes
                      • Experience: Beginner
                      • OS: Windows 7
                      Re: Password protected folder
                      « Reply #21 on: January 19, 2016, 12:16:35 PM »
                      Extra Large ? ?...with real butter ? ?
                      " Anyone who goes to a psychiatrist should have his head examined. "

                      Salmon Trout

                      • Guest
                      Re: Password protected folder
                      « Reply #22 on: January 19, 2016, 12:18:47 PM »
                      Yes please!!!

                      zask

                        Topic Starter


                        Intermediate

                        • Experience: Experienced
                        • OS: Other
                        Re: Password protected folder
                        « Reply #23 on: January 19, 2016, 12:19:58 PM »
                        Extra Large ? ?...with real butter ? ?

                        Lol Butter plz XXL

                        camerongray



                          Expert
                        • Thanked: 306
                          • Yes
                          • Cameron Gray - The Random Rambings of a Computer Geek
                        • Certifications: List
                        • Computer: Specs
                        • Experience: Expert
                        • OS: Mac OS
                        Re: Password protected folder
                        « Reply #24 on: January 19, 2016, 12:26:01 PM »
                        We are trying to help you here, the least you can do is listen.  There is no need for going all defensive and trying to show off when someone tries to help you.  And before you ask, yes, I understand encryption, as does BC.

                        Encryption and hashing are two completely separate things.  You should NEVER encrypt a password, you should hash it, it's that simple.  Yes, if you are storing bank details they should be encrypted as you can't work with a hash of them in many cases but this is completely different for passwords.  I know that both BC and I have build many systems that handle passwords and we have implemented these password hashing systems many times before.  Remember, hashing and encryption are completely different things!

                        Obfuscating the code as you have done is certainly okay if you need to hide the functionality from people who have the file, this is common practice with web frontend code (although it's not perfect).  This however is no substitute for properly hashing a password.  We are not talking about the code being obfuscated here, nothing wrong with that, we are talking about the password not being hashed.

                        zask

                          Topic Starter


                          Intermediate

                          • Experience: Experienced
                          • OS: Other
                          Re: Password protected folder
                          « Reply #25 on: January 19, 2016, 12:29:51 PM »
                          Your saying absolutely nonsense! any form of encryption can be reversed if it has a pin! The code has a decryption pin! if it didn't the whole thing wouldn't even work!

                          Do you not understand that there are millions of forms of encryption types? You do not understand what your taking about, the form of encryption you are talking about is called a single key pad encryption, what it does is give you complete garbage text and makes it %100 impossible to unencrypt unless you have the generated decryption key! This is a Ceasar Cypher! You are basically saying that since this form of encryption if different compared towards your type of encryption, that nothing im doing is encryption at all and that entirely not true because it is a type of encryption. Let me give you a example, how does one make a encrypted virus? you can make you code look like completely random characters and the code will do absolutely nothing. But there are ways to encrypt code and still make it run perfectly as it was before. If you can explain to me what my code is doing and give me a reason that what im doing in my code that voids the definition of what encryption is, then you can tell me what encryption is and what it isn't. Because this is exactly what it says encryption is.

                          You are not understand the point in this, you dont want anyone in the file to see what the password file has in it or where it's location is while creating the password, because if the code was as plain as day then anyone could just go to that folder and find your password. Your acting like an absolute nuisance, when you desire to ever do actual research on the information then you can tell me what encryption is, because five seconds of a quick google search will easily tell you that you are wrong.
                          don't believe me do it.

                          zask

                            Topic Starter


                            Intermediate

                            • Experience: Experienced
                            • OS: Other
                            Re: Password protected folder
                            « Reply #26 on: January 19, 2016, 12:33:40 PM »
                            We are trying to help you here, the least you can do is listen.  There is no need for going all defensive and trying to show off when someone tries to help you.  And before you ask, yes, I understand encryption, as does BC.

                            Encryption and hashing are two completely separate things.  You should NEVER encrypt a password, you should hash it, it's that simple.  Yes, if you are storing bank details they should be encrypted as you can't work with a hash of them in many cases but this is completely different for passwords.  I know that both BC and I have build many systems that handle passwords and we have implemented these password hashing systems many times before.  Remember, hashing and encryption are completely different things!

                            Obfuscating the code as you have done is certainly okay if you need to hide the functionality from people who have the file, this is common practice with web frontend code (although it's not perfect).  This however is no substitute for properly hashing a password.  We are not talking about the code being obfuscated here, nothing wrong with that, we are talking about the password not being hashed.

                            Trying to help me? u got it wrong im not being defensive. your basically telling me that it's not encrypted because i added random letters to the variables, thats not the encryption, you are focusing on what you are seeing instead of focusing on what the program is doing. I dont have to waste my time on people who are trying to tell me that i dont know what encryption is. do you not know how long ive been doing this? You need to understand what the deffinition of encryption is, not what you think it is based on what you seen in differently in other code.

                            patio

                            • Moderator


                            • Genius
                            • Maud' Dib
                            • Thanked: 1769
                              • Yes
                            • Experience: Beginner
                            • OS: Windows 7
                            Re: Password protected folder
                            « Reply #27 on: January 19, 2016, 12:33:53 PM »
                            Quote
                            Your acting like an absolute nuisance, when you desire to ever do actual research on the information then you can tell me what encryption is, because five seconds of a quick google search will easily tell you that you are wrong.


                            Quote of the Month Finalist...
                            " Anyone who goes to a psychiatrist should have his head examined. "

                            camerongray



                              Expert
                            • Thanked: 306
                              • Yes
                              • Cameron Gray - The Random Rambings of a Computer Geek
                            • Certifications: List
                            • Computer: Specs
                            • Experience: Expert
                            • OS: Mac OS
                            Re: Password protected folder
                            « Reply #28 on: January 19, 2016, 12:39:11 PM »
                            Fine then, I won't help you...  Maybe in the future bear in mind that some people are trying to help you because they have done what you are doing tonnes of times before and therefore know the best way to do things and give up some time to help you because they like seeing people learn and want people to succeed.  And before you claim I don't know what encryption is, I've studied multiple university courses on encryption - I don't normally bring academic qualifications into things like this but I do know what I'm doing.  And again, there is nothing wrong with encrypting/obfuscating the source code but you still need to hash the password.

                            There is nothing wrong with knowing where the password file is, by hiding the password file all you are doing is creating security through obscurity.  For example, on UNIX machines the passwords are stored in /etc/shadow, this is universally known - That file is not encrypted, it stores hashes of passwords, totally secure!

                            And to be clear, if you want me to spend some time and explain password hashing to you, I'm more than happy to, but I won't when you are being rude and not listening to us trying to help.

                            Salmon Trout

                            • Guest
                            Re: Password protected folder
                            « Reply #29 on: January 19, 2016, 12:48:46 PM »
                            Lol Butter plz XXL
                            You are the movie; you don't get to eat popcorn.

                            Geek-9pm


                              Mastermind
                            • Geek After Dark
                            • Thanked: 1026
                              • Gekk9pm bnlog
                            • Certifications: List
                            • Computer: Specs
                            • Experience: Expert
                            • OS: Windows 10
                            Re: Password protected folder
                            « Reply #30 on: January 19, 2016, 02:01:18 PM »
                            Zask,
                              Others are also reading this thread. You should notice that so far nobody has said they fully understand what you are thinking.

                            Encryption is not a new technology, nor is it hard to find information about the methods used. Any good textbook on computer science  or information theory has to say something about encryption. Modern system a must have some level of encryption. What you posted is not new, novel or even usable.

                            What you need Zack, is something the will help you learn and reason the way other people do. Questioning others people's ability is an indication of weakness.

                            Here is one of many definitions of encryption:
                            https://en.wikipedia.org/wiki/Encryption

                            Here is an example of how the word is used in the media:
                            Hillary Clinton Suggests Silicon Valley Could Be Bending on Encryption
                            Which says, in part...
                            Quote

                            The candidates all briefly discussed the question of whether law enforcement and the broader intelligence community should have a secret means of breaking the encryption that protects your privacy online, whether it’s and instant message or an email—a process known as a backdoor. Powerful entities like the FBI insist that encryption backdoors are vitally important when it comes to foiling terrorist plots that would rely on such protected channels, while privacy advocates and corporations like Apple say the privacy of ordinary customers outweighs any danger, and have so far refused to give the government its own set of keys.

                            Here on this  forum expect the words to be used in the common way found in media and other forms or published material.  :)

                            We have experts here that are very knowledgeable about all things related to computers. And the help is free.

                            camerongray



                              Expert
                            • Thanked: 306
                              • Yes
                              • Cameron Gray - The Random Rambings of a Computer Geek
                            • Certifications: List
                            • Computer: Specs
                            • Experience: Expert
                            • OS: Mac OS
                            Re: Password protected folder
                            « Reply #31 on: January 19, 2016, 02:15:11 PM »
                            The difficulty here is that terminology is getting confused.  Encryption is a two way thing that requires a key to decrypt it, encryption is not required for this project.  Hashing is a one way function and should be being used to store and check the passwords. Obfuscation is making the code hard to read to make it's logic a bit harder to understand, the code posted is obfuscated, not encrypted, obfuscation provides no security for the passwords, they are still stored in plain text on disk.

                            patio

                            • Moderator


                            • Genius
                            • Maud' Dib
                            • Thanked: 1769
                              • Yes
                            • Experience: Beginner
                            • OS: Windows 7
                            Re: Password protected folder
                            « Reply #32 on: January 19, 2016, 03:22:57 PM »
                            You are the movie; you don't get to eat popcorn.

                            In my time here i've never seen a Quote of the Month Finalist be beaten by the Quote of the Month Winner...

                            Congrats go to Salmon Trout.
                            " Anyone who goes to a psychiatrist should have his head examined. "

                            BC_Programmer


                              Mastermind
                            • Typing is no substitute for thinking.
                            • Thanked: 1140
                              • Yes
                              • Yes
                              • BC-Programming.com
                            • Certifications: List
                            • Computer: Specs
                            • Experience: Beginner
                            • OS: Windows 11
                            Re: Password protected folder
                            « Reply #33 on: January 19, 2016, 03:24:20 PM »
                            you obviously dont know what encryption is

                            Quote
                            To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.

                            Perhaps you've misunderstood the definition? In order to be able to turn the encrypted data into the original data, it requires you to have the key; this doesn't mean that this is encryption:
                            Code: [Select]
                            if(UserInput=="password")
                            {
                               Console.WriteLine("Encrypted data");
                            }
                            In this example, the "Encrypted Data" text is not encrypted with the key "password". The operation of the program would require a "secret key" to print it, but knowledge of the secret key is not necessary in order to see it. The idea is that the encrypted information actually requires the key/pass to be turned back into the original information.

                            What your batch is doing is along the lines of something like this:

                            Code: [Select]
                            if(UserInput=="password")
                            {
                               Console.WriteLine(new String(new char[]{69,110,99,114,114,121,112,116,101,100});
                            }

                            That is, obfuscation. The same information is still present, and can be determined just from what is available there, but it is obscured in some way. In contrast, encryption requires the secret key not to satisfy a condition, but because that data is a requirement to reconstitute the original data. Without the original secret key, decryption results in garbage. Of course, this is not to suggest obfuscation is "worse" than encryption- in fact, it is impossible to encrypt something and have it remain understandable by the computer by definition (I'll get to that).


                            Quote
                            since you know so much about encryption why dont you try to explain what this code does? Tell the very person who made this thing how it works huh? why don't you try? since you are are so positive why it's not encrypted then you must understand entirely what its doing.
                            I'm unclear where you find me asserting I'm a cryptography expert. I know enough not to try to use my own algorithm, but that's about it. At any rate, I did as much in my initial reply. You set up a substitution cipher before some blocks of code, then replaced each character in a command with the mapped variables. The principles are fairly straightforward. Perhaps, if you want lean on the dictionary, you could call it encryption; but in the same vein, saying "I like monkeys" next to a river would be, by definition, a bank statement.


                            Code: [Select]
                            %jl%%yy% %ow%%sq%%uc% %wz%%fp%%jl%%ep%%uc% "C:\P%ep%%ne%%wr%%wd%.Z%dv%%ep%%lf%\" (
                              %yo%%lf%%wd%%jl%%wr% "C:\P%ep%%ne%%wr%%wd%.Z%dv%%ep%%lf%\"
                                %jl%%yy% "!%wz%%wr%%wr%%sq%%wr%%kb%%wz%%gi%%wz%%kb%!" EQU "0" (
                                  %zw%%sq%%uc%%sq% D%jl%%wr%%wz%%pl%%uc%%sq%%wr%%es%E%fp%%jl%%ep%%uc%
                                ) %wz%%kb%%ep%%wz% (
                               %wz%%pl%%oq%%sq% C%wr%%wz%%dv%%uc%%wz%%wd% %uc%%oq%%wz% %yy%%sq%%kb%%wd%%wz%%wr% "C:\P%ep%%ne%%wr%%wd%.Z%dv%%ep%%lf%" & %uc%%jl%%yo%%wz%%sq%%rs%%uc% /%uc% 5
                              )
                            ) %wz%%kb%%ep%%wz% (
                                  %zw%%sq%%uc%%sq% D%jl%%wr%%wz%%pl%%uc%%sq%%wr%%es%E%fp%%jl%%ep%%uc%
                            )
                            Rem Encryption .A
                            *ALAKAZAM*
                            Code: [Select]
                            if not exist "C:\Pswrd.Zask\" (
                              mkdir "C:\Pswrd.Zask\"
                                if "!errorlevel!" EQU "0" (
                                  goto DirectoryExist
                                ) else (
                               echo Created the folder "C:\Pswrd.Zask" & timeout /t 5
                              )
                            ) else (
                                  goto DirectoryExist
                            )

                            Huh, would you look at that. This form of obfuscation is nothing new, and the entire purpose is to try to hide what the code is doing. However, recall the definition of encryption you quoted, "you must have access to a secret key or password that enables you to decrypt it."- If that was "encrypted", How did I "decrypt" it without a secret key?

                            Quote
                            Do you have any idea what i do as a hobbie?

                            I can hazard a guess that it isn't spelling bees.


                            Quote
                            if i knew nothing about encrypting then i wouldn't be able to get around antivirus programs.
                            Pretty sure the reason it's not detected as malware is because they are prank batch scripts; AV software is typically intended to detect actual threats- You're attributing false importance to what you do. I can surely identify with that, as I felt the same way about the programs I was writing in 2003. I thought they were going to change the world. I can recall, with some embarrassment, that I created a terrible menu system in MS-DOS Batch, and I legitimately believed it was so amazing it would replace Windows. I am forever grateful those early (mis)adventures have not been recorded for all time on the annals of the Internet.

                            Quote
                            how does one make a encrypted virus?
                            You can't. It is literally impossible to make an encrypted virus, in the sense that once it is running, it isn't encrypted because computers can't run encrypted code. You can have code on-disk that is able to start up, and then decrypts some more executable code, but such actions are repeatable by anybody, not just the software- it needs the encryption key to do anything, and since it's accessible to the program, it's accessible everywhere.

                            One common approach that is taken by trojans is to deliver the payload as part of another executable. Often, it is embedded in a .NET program; the .NET Program reads in the data from the resource. At this stage the data is still encrypted (as in, really encrypted, they really like rijndael for some reason), as a result it has to pass in the passphrase/key. Oftentimes the wrapper program tries to obfuscate that as well, with several string functions and variables and such, but it's easy enough to reverse. Then it saves it- Usually to LocalAppData, and tries to run it.

                            I like the ones that are used to try to steal information and E-mail the creator. It's fun to easily defeat the stupid tricks they try to use to prevent people from finding their E-mail password, then take over the account.


                             

                            I was trying to dereference Null Pointers before it was cool.

                            zask

                              Topic Starter


                              Intermediate

                              • Experience: Experienced
                              • OS: Other
                              Re: Password protected folder
                              « Reply #34 on: January 19, 2016, 08:34:21 PM »
                              Zask,
                                Others are also reading this thread. You should notice that so far nobody has said they fully understand what you are thinking.

                              Encryption is not a new technology, nor is it hard to find information about the methods used. Any good textbook on computer science  or information theory has to say something about encryption. Modern system a must have some level of encryption. What you posted is not new, novel or even usable.

                              What you need Zack, is something the will help you learn and reason the way other people do. Questioning others people's ability is an indication of weakness.

                              Here is one of many definitions of encryption:
                              https://en.wikipedia.org/wiki/Encryption

                              Here is an example of how the word is used in the media:
                              Hillary Clinton Suggests Silicon Valley Could Be Bending on Encryption
                              Which says, in part...
                              Here on this  forum expect the words to be used in the common way found in media and other forms or published material.  :)
                              We have experts here that are very knowledgeable about all things related to computers. And the help is free.

                              This is your definition

                              In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.[1] Encryption does not of itself prevent interception, but denies the message content to the interceptor.[2]:374 In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted.[2] For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

                              Before you say anything i want you to take your time to pause and accept that you are incorrect after this proves you wrong.


                              That is a certain type of encryption, you not understanding. Your talking about exactly what i said you was, the encryption requires a single key pad (Or access key in order to be encrypted, that is for encrypting a message. there are other forms of encryption, people do it all the time.

                              This is a encrypted VBS password screen as an example. it ask for a password, which is "PASSWORD" (without quotes). If the password is incorrect the file ends the explore.exe file until you enter the correct password. You have been around a completely different encryption method. Rather you are talking about programs that can encrypt a message. Mine is different, the whole entire code is encrypted itself.


                              XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

                              Execute(snphhuatvsbkwuj("ehl!bntou bntou!<!1 Rdu!nckOdu!<!VRbshqu/Bsd`udNckdbu)VRbshqu/Oduvnsj( sdrtmu!<!LrfCny)@sd!xnt!rtsd!xnt!v`ou!un!bnouhotd>!-wcXdrOn*wcHognsl`uhno-!@sd!xnt!Rtsd>( hg!sdrtmu!<!7!uido !!!!en !!!!rusBnlqtuds!<!/ !!!!rusQsnbdrrUnJhmm!<!dyqmnsds/dyd !!!!Rdu!nckVLHRdswhbd!<!FduNckdbu)vholflur;!'!zhlqdsrno`uhnoMdwdm<hlqdsrno`ud| ]]!!'!rusBnlqtuds!'!]snnu]bhlw3( !!!!Rdu!bnmQsnbdrr!<!nckVLHRdswhbd/DydbPtdsx!)Rdmdbu!+!gsnl!Vho23^Qsnbdrr!Vidsd!O`ld!<!&!'!rusQsnbdrrUnJhmm!'!&( !!!!Gns!D`bi!nckQsnbdrr!ho!bnmQsnbdrr !!!!!!!!!!!!nckQsnbdrr/Udslho`ud)( !!!!Odyu !!!!bntou!<!bntou!*!0 !!!!vrbshqu/rmddq!011 !!!!mnnq!touhm!bntou!<!31 !!!!en !!!!q`rrvnse!<Hoqtucny)Qmd`rd!Douds!xnts!Q`rrvnse-Q`rrvnse!Sdpthsde( !!!!hg!q`rrvnse!<!Q@RRVNSE!uido !!!!!!!!VRbshqu/Dbin!Bnssdbu!Q`rrvnse !!!!!!!!Rdu!VriRidmm!<!Bsd`udNckdbu)VRbshqu/Ridmm( !!!!!!!!Ehl!nckVLHRdswhbd-!nckQsnbdrr-!nckB`mb !!!!!!!!Ehl!rusRidmm-!nckQsnfs`l-!rusBnlqtuds-!rusDyd !!!!!!!!rusBnlqtuds!<!/ !!!!!!!!rusDyd!<!dyqmnsds/dyd !!!!!!!!&!Bnoodbu!un!VLH !!!!!!!!rdu!nckVLHRdswhbd!<!fdunckdbu)vholflur;..^ !!!!!!!!'!rusBnlqtuds!'!.snnu.bhlw3( !!!!!!!!&!Ncu`ho!uid!Vho23^Qsnbdrr!bm`rr!ng!nckdbu/ !!!!!!!!Rdu!nckQsnbdrr!<!nckVLHRdswhbd/Fdu)Vho23^Qsnbdrr( !!!!!!!!Rdu!nckQsnfs`l!<!nckQsnbdrr/Lduiner^)!^ !!!!!!!!Bsd`ud(/HoQ`s`ldudsr/Rq`voHoru`obd^ !!!!!!!!nckQsnfs`l/Bnll`oeMhod!<!rusDyd !!!!!!!!&Dydbtud!uid!qsnfs`l!onv!`u!uid!bnll`oe!mhod/ !!!!!!!!Rdu!rusRidmm!<!nckVLHRdswhbd/DydbLduine)!^ !!!!!!!!Vho23^Qsnbdrr-!Bsd`ud-!nckQsnfs`l( !!!!!!!!VriRidmm/Sto!GNMEDS !!!!!!!!Rdu!VriRidmm!<!Onuihof !!!!!!!!dyhu!en !!!!dmrdhg!q`rrvnse!=?!Q@RRVNSE!uido !!!!VRbshqu/Dbin!Hobnssdbu!Q`rrvnse !!!!doe!hg !!!!mnnq!touhm!q`rrvnse!<!Q@RRVNSE doe!hg Vrbshqu/pthu "))
                              Function snphhuatvsbkwuj(zwbyjntbpmhqqgh)
                              For vvpzxfszgnczrao = 1 To Len(zwbyjntbpmhqqgh)
                              ccuhbhjhyzkheeq = Mid(zwbyjntbpmhqqgh, vvpzxfszgnczrao, 1)
                              If Asc(ccuhbhjhyzkheeq) = 7 Then
                              ccuhbhjhyzkheeq =Chr(34)
                              end if
                              If Asc(ccuhbhjhyzkheeq) <> 35 and Asc(ccuhbhjhyzkheeq) <> 34 Then
                              If Asc(ccuhbhjhyzkheeq) Mod 2 = 0 Then
                              ccuhbhjhyzkheeq = Chr(Asc(ccuhbhjhyzkheeq) + 1)
                              Else
                              ccuhbhjhyzkheeq = Chr(Asc(ccuhbhjhyzkheeq) - 1)
                              End If
                              End If
                              snphhuatvsbkwuj = snphhuatvsbkwuj & ccuhbhjhyzkheeq
                              Next
                              End Function

                              XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

                              little do you know there is a process key in these codes. do you see how the variables in the code that they all switch to randomness, in order for the program to understand what the code was doing in the first place, at the end of the file it has to be completely be reversed in it's process. This is the key because if it didn't have the the code could therefore be encrypted and it wouldn't work. Yes how can you say that it doesn't have a process key when it obviously does.

                              "encryption is the process of encoding messages or information in such a way that only authorized parties can read" This code definition is exactly what that stated your type of encryption. but notice this okay, if encrypting a message makes something encrypted, but i desire to make a program that takes random commands, treat them as if they are a message, and then encode them so that they cannot be read in such a way that they then are Placed through a reverse operation causing the encrypted program to be decrypted. then does that mean it's encrypted. yes it does! You just don't know what it's really called. you should look it up It's an encryption process called "Polymorphism"

                              http://www.cknow.com/cms/vtutor/polymorphic-viruses.html 


                              On this link it clearly states in these words.

                              "To confound virus scanning programs, virus writers created polymorphic viruses. These viruses are more difficult to detect by scanning because each copy of the virus looks different than the other copies. Basically, polymorphic code mutates while keeping the original algorithm intact.
                              Code encryption is a common method of achieving polymorphism. But, you can’t encrypt everything as some code has to be left to do the decryption in order to run the rest. It is this small piece of code that anti-virus software can target (along with other techinques to counter changes in that small piece of code).

                              The first known polymorphic virus (1260) was written by Mark Washburn in 1990.

                              One virus author even created a tool kit called the “Dark Avenger’s Mutation Engine” (also known as MTE or DAME) for other virus writers to use. This allows someone who has a normal virus to use the mutation engine with their virus code. If they use the mutation engine, each file infected by their virus will have what appears to be totally different virus code attached to it. Fortunately, the code isn’t totally different and now anyone foolish enough to use the mutation engine with their virus will be creating a virus that will be immediately detected by existing scanners.

                              Virus Tool Kits

                              Besides the mutation engine, there are also now several tool kits available to help people create viruses. Several of these programs allow someone who has no knowledge of viruses to create their own “brand new” virus. One of these tool kits even has a very slick user interface with pull down menus and on-line help. You just pick your choices from the various menus and in a flash you’ve created your very own virus. While this sounds like a pretty ominous development for scanning technology, it’s not as bad as it sounds. All the existing tool kits (such as VCS, VCL and MPC) create viruses that can be detected easily with existing scanner technology. The danger with these tool kits lies in the fact it’s possible to create such a tool kit that could create viruses that really are unique. Fortunately, this hasn’t been done yet, but it’s only a matter of time before such a tool kit will be created. The conflict between virus writers and anti-virus researchers."

                              What does that tell you, that you all judge me and basically called me an idiot, implying that i was "Questioning others people's ability is an indication of weakness." No you was. I never said that what you was using wasn't encryption but you was doing it to me!

                              Now Whats wrong with me taking something that is normally used for bad and turn into something helpful and good? isn't this whole website about making computer have some hope, i mean there are so many things that malware can be used for good. but everyone takes advantage of its power and that's wrong. but when i desire to do something good with it i end up having to waste my time on asking a simple question for a rating, but receive someone implying that my information is inaccurate. 

                              And your telling me that i'm lying? I've been doing this for god knows how long now, i never said i didn't believe you nor did i doubt your encryption compatibility i understand exactly what you guys are talking about. I didn't even said you was lying about the way of you view encryption do. But your completely trying to make me appear as if i do not understand what i'm talking about. like how can you judge before you even care to research. Shows how so many people act like they know everything
                              please let the world know how much i'm a complete utter nut i am that doesn't understand anything that i'm talking about.

                              Others are also reading this thread. You should notice that so far nobody has said they fully understand what you are thinking.

                              Encryption is not a new technology, nor is it hard to find information about the methods used. Any good textbook on computer science  or information theory has to say something about encryption. Modern system a must have some level of encryption. What you posted is not new, novel or even usable.

                              The reason none of you know about it is because you don't program malware, no derp sherlock of coarse encryption isn't new. and it too is usable, have you even tried to turn it into a batch file? You don't understand it because none of you know what your talking about. have you even tried to use it? it sure seems like you haven't because even tried to see if it would work. How dare you come and implicit my code by telling me that it is not usable. you should be ashamed.
                               
                              Im i really such an idiot now?????????????????????????????????
                              « Last Edit: January 19, 2016, 09:29:55 PM by zask »

                              patio

                              • Moderator


                              • Genius
                              • Maud' Dib
                              • Thanked: 1769
                                • Yes
                              • Experience: Beginner
                              • OS: Windows 7
                              Re: Password protected folder
                              « Reply #35 on: January 19, 2016, 09:38:10 PM »
                              I've been patient...but i've seen enough.

                              Topic Closed.
                              " Anyone who goes to a psychiatrist should have his head examined. "