This is the home page mirror for the program "TOPSECRET".

Down load the latest version (includes source code): Topsecret (for DOS)

This program is freely distributable and fully functional with no time limits; and $5 to register.

"TOPSECRET",a shareware program to encrypt your sensitive files.This
program does not use RSA type algorithms which are restricted for export.
This program can use the aid of a "Catalyst" file (which can be any
file) to encrypt another file(any file).(Using a fairly random and changing
Catalyst gives you the most protection).The Catalyst acts as a
key to code and decode your sensitive files.Ofcourse you can even make
your own catalyst by encrypting one file with another.A periodically
changing Catalyst can be made by combining 1-Registered mail file
2-Courier file 3-Last message file;This would ensure high security for
the transmission of your sensitive files.I am sure you will come up
with your own methods.You will find the program SIMPLE to operate,try it!

This is a DOS based program, so you should be familiar with DOS to use
it. DOS was put together before the government became concerned with
encryption.(Windows environments seem to create data which is
not always in the interests of privacy for the user.)
You may have to transmit encrypted e-mail with a *.zip extension so
that your browser does not try to display the encoded junk.


For programmers: tops.exe V2.0 is 24736 bytes.It is fully data compatible
with the original(21824 bytes) release.But this version is faster and can
be run by command line inputs.

     1    2           3 4           5           6
c:\>tops onefile.dat 1 twofile.enc catfile.dat mycodegoeshere
              |                |               |     |                 |
              input file    1=encrypt |    Catalyst file Personal key
                               2=decode |
                                               new output file

In this example "onefile.dat" is encrypted(option-1) with the aid of
a catalyst file "catfile.dat" and the output is named "twofile.enc".
"mycodegoeshere" is the personal key.

- A "2" in field 3 would decode a program when all other data is valid.
- A "0" in field 5 would indicate no catalyst file to be used.
- Fields 2,4,5,6 can be a maximum of 64 characters each,however the
  the Operating System will restrict the length of your entire
  command line input to 128 characters.

Note:"tops.exe" should not be renamed(upper and lower case ok)  and/ or
echo-off(screen off) commands should not be used; since the program
searches from cursor to the top of screen for the five trigger
characters "tops ".

Since command input batch programs may contain sensitive information,
the batch programs and the associated files/data should not be

If all the field parameters are not valid,the program runs in default
mode where all the data is taken manually.The command line input is
ideal for time critical operations.It can be used in conjunction with
RAM drives and batch programs for real time network data encryption.