Note
Documentation is written in ASCII-DOC, UTF8, CRLF

$Id: WhatsNew-rPCP.txt,v 1.14 2025/02/09 00:59:34 ralph Exp $

      ____    ____     ____
     /\  _`\ /\  _`\  /\  _`\
 _ __\ \ \L\ \ \ \/\_\\ \ \L\ \
/\`'__\ \ ,__/\ \ \/_/_\ \ ,__/
\ \ \/ \ \ \/  \ \ \L\ \\ \ \/
 \ \_\  \ \_\   \ \____/ \ \_\
  \/_/   \/_/    \/___/   \/_/     ROSE SWE Packer and Cryptor Package
                                          for DOS only

ROSE SWE Packer and Cryptor Package for DOS only.

A collection of programs to manipulate DOS COM and EXE binaries.

1. What?

The ROSE SWE Packer and Cryptor Package is a collection of programs that were previously released as separate archives. This package includes various tools designed for executable file manipulation and protection. Some of the notable programs included are RC 386, RC 286, rCrypt, RUE, HackStop/DOS, PPC, RecSmall, RecAV, RERP, RoseTiny, and rUCC. These programs offer features such as executable compression, encryption, password protection, virus detection, EXE relocation packing, and more. The ROSE SWE Packer and Cryptor Package is provided as freeware by ROSE SWE.

While primarily intended for the nowadays old DOS operating system, many of the included programs can also be executed on 32-bit editions of Windows 10. However, please note that compatibility with 64-bit editions is limited due to the absence of DOS support. Some of the programs we have ported to Windows and Linux!

2. What is a Executable packer or Cryptor?

An executable packer, also known as a binary packer or file compressor, is a software tool used to compress or "pack" executable files (such as EXE or COM files) into a smaller size. The primary purpose of an executable packer is to reduce the file size of an executable while preserving its functionality.

When an executable file is packed, the packer applies various compression techniques to compress the file’s code and data sections. This compression reduces the overall size of the executable, making it occupy less storage space on disk and facilitating faster file transfers.

In addition to compression, executable packers often employ other techniques, such as encryption or obfuscation, to protect the packed file from analysis or reverse engineering. These additional features add a layer of security to the executable, making it more difficult for attackers to understand or modify its contents.

When a packed executable is executed, it is first unpacked or decompressed by a decompression routine embedded within the packer. The decompression routine restores the packed code and data to their original state, allowing the executable to run as intended.

Executable packers have been used for various purposes, including software distribution, malware protection, and software cracking. However, it’s important to note that while packing can offer benefits in certain contexts, it can also raise concerns from antivirus software, as some packing techniques are also employed by malware to evade detection.

An executable cryptor, also known as a file cryptor or code encryptor, is a tool used to encrypt executable files, such as EXE or COM files, to protect their contents from unauthorized access or analysis. The primary purpose of an executable cryptor is to make the executable file unreadable and unusable without the decryption key or algorithm.

When an executable file is encrypted using a cryptor, the original code and data within the file are transformed using cryptographic algorithms. The encryption process scrambles the executable’s content, making it unintelligible and preventing anyone without the proper decryption mechanism from understanding or modifying the code.

The use of executable cryptors can provide several security benefits. Encrypted executables make it challenging for reverse engineers, malware analysts, or unauthorized users to analyze or modify the file’s content. This can be useful in protecting sensitive intellectual property or preventing software piracy.

When an encrypted executable needs to be executed, it must first be decrypted using the appropriate decryption key or algorithm. The decryption process reverses the encryption and restores the executable to its original state, allowing it to be executed as intended.

Executable cryptors are often used in the development of software protection systems, where the encryption adds an additional layer of security to prevent unauthorized tampering or reverse engineering.

3. What motivated the (re)creation of this package?

In November 2020, during my online explorations, I came across the website defacto2 and stumbled upon an archive named "packers.zip," which surprisingly included many of my own programs. Inspired by this unexpected discovery, I decided to breathe new life into the rPCP package and release it once again. I believe there may still be interest among collectors and enthusiasts who appreciate these tools for their historical value and functional capabilities.

MS-DOS & Windows binary file packers. packers.zip. 21.4 MB 2017 December Filepack

MS-DOS & Windows binary file unpackers. unpackers.zip. 2.8 MB 2017 December Filepack

Tip
Thanks and greetings go out to user 'bleuge' for making this (and other) collections available.

4. WhatsNew?

Release   Date          Description
  21*     09.02.2025      rosetiny: Updated dox, RoseTiny 1.13, AHCR updated
                          All programs refreshed

  20      12.07.2024      Many small updates, we lost to track all in detail

  19      20-Dec-2023     Many small updates, HS 1.32...

  18*     08-June-2023    Updated RUCC, HS 1.30, RoseTiny 1.12, documentation
                          Refreshed programs like rue. ahcr etc.

  17      06-Sep-2022     Updated some documentation, small program updates

  16      29-Jan-2022     Added the program "AHCR"

  15*     15-Dec-2020     A few programs refreshed. Updated HackStop included

  14*     07-Dec-2020     Released with all programs refreshed.

  13      02-Dec-2020     Enhancements on RSCC and RC286. RUCC for Windows/Linux

  12      18-Nov-2020     Too many changes to keep track off.

  11      14-Apr-2008     updated most of the stuff, re-released, because the
                          package was for long time not available at all.

  10      06-Nov-2006     updated: RoseTiny, RC286, HackStop etc.


  09      05-Oct-2005     updated rucc586, HackStop 1.22/3xx
                          removed HackStop/32 after request from Vecna

  08      01-Feb-2005     updated rucc586, recAV+recSmall, RC286
                          refreshed RoseTiny, rrc, rCrypt (RC1), HackStop 1.20-292

  07      07-Nov-2003     Updated Rec/AV/Small package to 1.08
                          Updated RoseTiny 1.06, added RoseTiny/32
                          (windows version). rCrypt 0.96

  06      27-Aug-2003     Added HackStop package

  05      30-July-2003    RC/286 version 1.20 updated, works now under WinXP

  04      16-June-2003    recompiled RoseTiny (better startup code), added URL
                          and descript.ion

  03      16-July-2002    Protected HackStop32 with password to keep
                          antivirus software quite (AntiGen etc.).

  02      09-July-2002    Added rCrypt 0.93, rERP 0.01, RUCC386 -> RUCC586
                          (Pentium optimized code), rCrypt.txt, updated RC286
                          version 1.19 and RSCC version 1.05

  01      14-May-2002     Initial release
  • = Public release

/* end */