Note
|
Documentation is written in ASCII-DOC, UTF8, CRLF |
$Id: WhatsNew-rPCP.txt,v 1.14 2025/02/09 00:59:34 ralph Exp $
____ ____ ____ /\ _`\ /\ _`\ /\ _`\ _ __\ \ \L\ \ \ \/\_\\ \ \L\ \ /\`'__\ \ ,__/\ \ \/_/_\ \ ,__/ \ \ \/ \ \ \/ \ \ \L\ \\ \ \/ \ \_\ \ \_\ \ \____/ \ \_\ \/_/ \/_/ \/___/ \/_/ ROSE SWE Packer and Cryptor Package for DOS only
ROSE SWE Packer and Cryptor Package for DOS only.
A collection of programs to manipulate DOS COM and EXE binaries.
1. What?
The ROSE SWE Packer and Cryptor Package is a collection of programs that were previously released as separate archives. This package includes various tools designed for executable file manipulation and protection. Some of the notable programs included are RC 386, RC 286, rCrypt, RUE, HackStop/DOS, PPC, RecSmall, RecAV, RERP, RoseTiny, and rUCC. These programs offer features such as executable compression, encryption, password protection, virus detection, EXE relocation packing, and more. The ROSE SWE Packer and Cryptor Package is provided as freeware by ROSE SWE.
While primarily intended for the nowadays old DOS operating system, many of the included programs can also be executed on 32-bit editions of Windows 10. However, please note that compatibility with 64-bit editions is limited due to the absence of DOS support. Some of the programs we have ported to Windows and Linux!
2. What is a Executable packer or Cryptor?
An executable packer, also known as a binary packer or file compressor, is a software tool used to compress or "pack" executable files (such as EXE or COM files) into a smaller size. The primary purpose of an executable packer is to reduce the file size of an executable while preserving its functionality.
When an executable file is packed, the packer applies various compression techniques to compress the file’s code and data sections. This compression reduces the overall size of the executable, making it occupy less storage space on disk and facilitating faster file transfers.
In addition to compression, executable packers often employ other techniques, such as encryption or obfuscation, to protect the packed file from analysis or reverse engineering. These additional features add a layer of security to the executable, making it more difficult for attackers to understand or modify its contents.
When a packed executable is executed, it is first unpacked or decompressed by a decompression routine embedded within the packer. The decompression routine restores the packed code and data to their original state, allowing the executable to run as intended.
Executable packers have been used for various purposes, including software distribution, malware protection, and software cracking. However, it’s important to note that while packing can offer benefits in certain contexts, it can also raise concerns from antivirus software, as some packing techniques are also employed by malware to evade detection.
An executable cryptor, also known as a file cryptor or code encryptor, is a tool used to encrypt executable files, such as EXE or COM files, to protect their contents from unauthorized access or analysis. The primary purpose of an executable cryptor is to make the executable file unreadable and unusable without the decryption key or algorithm.
When an executable file is encrypted using a cryptor, the original code and data within the file are transformed using cryptographic algorithms. The encryption process scrambles the executable’s content, making it unintelligible and preventing anyone without the proper decryption mechanism from understanding or modifying the code.
The use of executable cryptors can provide several security benefits. Encrypted executables make it challenging for reverse engineers, malware analysts, or unauthorized users to analyze or modify the file’s content. This can be useful in protecting sensitive intellectual property or preventing software piracy.
When an encrypted executable needs to be executed, it must first be decrypted using the appropriate decryption key or algorithm. The decryption process reverses the encryption and restores the executable to its original state, allowing it to be executed as intended.
Executable cryptors are often used in the development of software protection systems, where the encryption adds an additional layer of security to prevent unauthorized tampering or reverse engineering.
3. What motivated the (re)creation of this package?
In November 2020, during my online explorations, I came across the website defacto2 and stumbled upon an archive named "packers.zip," which surprisingly included many of my own programs. Inspired by this unexpected discovery, I decided to breathe new life into the rPCP package and release it once again. I believe there may still be interest among collectors and enthusiasts who appreciate these tools for their historical value and functional capabilities.
MS-DOS & Windows binary file packers. packers.zip. 21.4 MB 2017 December Filepack
MS-DOS & Windows binary file unpackers. unpackers.zip. 2.8 MB 2017 December Filepack
Tip
|
Thanks and greetings go out to user 'bleuge' for making this (and other) collections available. |
4. WhatsNew?
Release Date Description
21* 09.02.2025 rosetiny: Updated dox, RoseTiny 1.13, AHCR updated All programs refreshed 20 12.07.2024 Many small updates, we lost to track all in detail 19 20-Dec-2023 Many small updates, HS 1.32... 18* 08-June-2023 Updated RUCC, HS 1.30, RoseTiny 1.12, documentation Refreshed programs like rue. ahcr etc. 17 06-Sep-2022 Updated some documentation, small program updates 16 29-Jan-2022 Added the program "AHCR" 15* 15-Dec-2020 A few programs refreshed. Updated HackStop included 14* 07-Dec-2020 Released with all programs refreshed. 13 02-Dec-2020 Enhancements on RSCC and RC286. RUCC for Windows/Linux 12 18-Nov-2020 Too many changes to keep track off. 11 14-Apr-2008 updated most of the stuff, re-released, because the package was for long time not available at all. 10 06-Nov-2006 updated: RoseTiny, RC286, HackStop etc. 09 05-Oct-2005 updated rucc586, HackStop 1.22/3xx removed HackStop/32 after request from Vecna 08 01-Feb-2005 updated rucc586, recAV+recSmall, RC286 refreshed RoseTiny, rrc, rCrypt (RC1), HackStop 1.20-292 07 07-Nov-2003 Updated Rec/AV/Small package to 1.08 Updated RoseTiny 1.06, added RoseTiny/32 (windows version). rCrypt 0.96 06 27-Aug-2003 Added HackStop package 05 30-July-2003 RC/286 version 1.20 updated, works now under WinXP 04 16-June-2003 recompiled RoseTiny (better startup code), added URL and descript.ion 03 16-July-2002 Protected HackStop32 with password to keep antivirus software quite (AntiGen etc.). 02 09-July-2002 Added rCrypt 0.93, rERP 0.01, RUCC386 -> RUCC586 (Pentium optimized code), rCrypt.txt, updated RC286 version 1.19 and RSCC version 1.05 01 14-May-2002 Initial release
-
= Public release
/* end */