Universal Shield™ 3
User’s Guide
Copyrights
Copyright © 2004 Everstrike Software. All rights reserved.
Universal Shield User’s Guide.
Universal Shield Online Help.
This documentation is published by Everstrike Software, and is intended solely for use in conjunction
with Universal Shield software. This documentation is available to all current Licensees in print and
electronic format. No one may copy, photocopy, reproduce, translate, or convert to any electronic or
machine-readable form, or post to a Web site, in whole or in part, the documentation without the prior
written approval of Everstrike Software.
Trademarks
Universal Shield and Everstrike Software are trademarks of Everstrike Software. Microsoft, Windows,
Windows NT, Word, and Excel, are registered trademarks of Microsoft Corporation. Adobe, Acrobat, and
Acrobat Reader are registered trademarks of Adobe Systems Incorporated. All other brands, company or
product names, or trademarks belong to their respective holders.
Credits
Sean Brierley, Author
Philip Hodgers, Managing Editor
Page 2
Universal Shield User’s Guide
Table of Contents
Introduction to Universal Shield ™......................................................................................5
Installing Universal Shield....................................................................................................6
Registering Universal Shield................................................................................................9
Getting Started ....................................................................................................................11
The Universal Shield Interface ..........................................................................................11
Menus ...........................................................................................................................11
Buttons and Shortcut Keystrokes ..................................................................................13
Using Wizards ...................................................................................................................14
How to Hide Files and Folders ......................................................................................14
How to Show Hidden Files and Folders .........................................................................17
How to Set Access Read-Only Permissions ..................................................................18
How to Encrypt a File ....................................................................................................20
How to Decrypt a File ....................................................................................................23
How to Protect System Files, Folders, and Settings ......................................................25
How to Edit Protections .................................................................................................27
How to Password Protect the Universal Shield Software ...............................................27
How to Use File Mask to Select Multiple Files ...............................................................28
How to Set Up Trusted Processes.................................................................................30
How to Set Hot Keys .....................................................................................................30
How to Use Stealth Mode ..............................................................................................31
Universal Shield Menus and Options ................................................................................32
File ....................................................................................................................................32
Protect Object ...............................................................................................................32
Universal Shield Wizard ................................................................................................34
Security Tricks...............................................................................................................34
Exit ................................................................................................................................35
Edit ...................................................................................................................................35
Copy .............................................................................................................................35
Remove.........................................................................................................................35
Clear All ........................................................................................................................36
Find ...............................................................................................................................36
Find Object ....................................................................................................................36
Properties......................................................................................................................36
Encryption .........................................................................................................................36
Encryption Wizard .........................................................................................................36
Encrypt File ...................................................................................................................38
Decrypt File ...................................................................................................................39
Security .............................................................................................................................40
Toggle Protection ..........................................................................................................40
Trusted Processes ........................................................................................................40
Change Password .........................................................................................................41
Go to Stealth Mode .......................................................................................................41
Go to Visible Mode ........................................................................................................41
Options .............................................................................................................................41
Always on Top...............................................................................................................42
Protect after Exit ............................................................................................................42
Protect on Windows Start ..............................................................................................42
Password Protection .....................................................................................................42
Universal Shield User’s Guide
Page 3
Set Hot Keys .................................................................................................................42
Font ...............................................................................................................................43
Language ......................................................................................................................43
Help ..................................................................................................................................43
Help ....................................................................................................................................44
Context Help ......................................................................................................................44
Tip of the Day ................................................................................................................44
Buy Now........................................................................................................................44
Register.........................................................................................................................44
About ............................................................................................................................44
Algorithms ...........................................................................................................................45
Hints and Frequently Asked Questions.............................................................................46
Password Best Practices ...................................................................................................47
Universal Shield Support ...................................................................................................48
Uninstalling Universal Shield .............................................................................................49
Glossary ..............................................................................................................................50
Index ....................................................................................................................................51
Page 4
Universal Shield User’s Guide
Introduction to Universal Shield ™
Universal Shield ™ is a secure and easy to use program that lets you password-protect and easily prevent
access to your important files and folders. It supports modes for making your folders completely
invisible, simply inaccessible, or allowing read-only access. It even lets you specify which programs are
still able to access protected items, such as virus scanners or disk drive utilities. A protected folder and its
contents will be prevented from being renamed, modified, deleted, copied, moved, accessed or even seen
on the system.
Universal Shield lets you:
 Encrypt files with nine available Algorithms.
 Hide files, folders, and drives (Microsoft® Windows® NT, 2000, and XP only).
 Deny access to objects, like My Documents, Control Panel, etc.
 Prevent file changes, including changes to the Windows desktop, time/date settings, Internet
history, and contents of data files, such as Microsoft Word® files.
 Operate Universal Shield invisibly, using its stealth features.
 Set trusted processes—such as virus scanners and disk drive utilities that can still access
protected items.
Wherever, at home, work, or any other environment where you share your computer with others,
Universal Shield can really help you secure your files and folders from prying eyes, malicious programs,
users, and getting infected by dangerous viruses and unwanted access or accidental damage.
It is a must-have tool for anyone seeking to secure their system with ease and in confidence and trust.
Universal Shield is so secure that even if it crashes or if someone kills the program maliciously, it will
still keep protecting your folders.
Universal Shield User’s Guide
Page 5
Installing Universal Shield
Before you install Universal Shield:
 Turn off any anti-virus software that might interfere with the installation.
 Exit and close all software applications on your computer.
Note: After the Universal Shield installation finishes, you will be prompted to reboot your
computer. You will need to reboot your computer before running Universal Shield for the
first time.
If you upgrade your operating system, you will need to re-install Universal Shield.
To install the Universal Shield software:
1. Insert the Universal Shield CD into your CD-ROM drive. The Universal Shield Installation Wizard
should start automatically.

If the installation Wizard does not start, view the CD contents and run the file called
USHILED.EXE located in the root directory of the installation CD.

If you obtained your installation file from the Universal Shield website, then simply doubleclick the USHIELD.EXE file in its current location.
2. You will see the welcome screen of the Installation Wizard, click Next to proceed with the
installation.
3. Read the Software License carefully. Use the scroll bar or Page Down key to move to the bottom of
the agreement.
4. Only if you agree to abide by the terms of the Software License, click Yes; otherwise, click No to
decline to use the software and the software installation will end without installing any software.
Page 6
Universal Shield User’s Guide
5. As part of the installation procedure, you will be asked to set up a password for Universal Shield. We
recommend you set a password to protect your Universal Shield software from others. You can,
however, set this password after installation, using the Security > Change Password menu option.

If you want to set your Universal Shield password during the installation type your password
into the Password text box. Then, type the same password into the Confirm text box. The
Universal Shield software requires that you enter the same password in both places, to protect
against typographical errors. For more information, see “Password Best Practices” on page
47. Click Next after you finish entering your password.

If you want to set up the Universal Shield password later, click Next without making any
changes on the Universal Shield Password Screen.
6. Click Next to install Universal Shield in the default location. If you wish to install Universal Shield to
a different location, click the Browse button, select your preferred destination, and then click Next.
7. Now you will be shown a summary of your installation settings. Click Next to install the software. A
progress bar will show the installation progress.
8. Click Next, when prompted.
Universal Shield User’s Guide
Page 7
9. At the end of the installation procedure, you will be prompted to reboot your system. We recommend
you reboot your system to complete the installation, before running Universal Shield for the first
time.
10. After your computer reboots, run the Universal Shield software by clicking Start > Programs >
Universal Shield and clicking the Universal Shield icon, or by double-clicking the Universal Shield
shortcut on your Windows desktop.
Page 8
Universal Shield User’s Guide
Registering Universal Shield
Note: When you buy Universal Shield, you will receive a registration key. Save this
number in a safe place; you will need it if you ever reinstall the software or if you contact
technical support.
When first installed, Universal Shield will be in unregistered mode. The software will remain usable for a
total of 30 days, before it expires and the software is disabled.
To avoid your software becoming disabled, and to remove the unregistered notification screens, you will
need to register your copy of Universal Shield with your supplied registration code.
If you purchased the boxed version of Universal Shield, you will find the registration code on the cover of
the Getting Started Guide. If you purchased your registration online, you will have received the code in
your order-confirmation e-mail.
If you do not yet have a registration code, you may purchase one directly from us through the following
means: see “Universal Shield Support” on page 48.
There are two ways to register Universal Shield:
1. You can Register Universal Shield when you run the software.
a. If needed, run the Universal Shield software by clicking Start > Programs > Universal
Shield.
b. If the Tip of the Day is open, close it.
c. If the Universal Shield Wizard is open, click Cancel to close it.
d. In the toolbar, click Help to open the Help menu, and select Register.
Select Help > Register
2. Or, you can register Universal Shield when closing the software.
a. If Universal Shield is open, when you close the software, you are able to register
Universal Shield.
b. Click the Register button.
Universal Shield User’s Guide
Page 9
3. No matter which way you register, the Registration dialog box opens.
4. In the Registration dialog box, type a valid registration code, making sure to respect the hyphens
in the code. Registration codes are case-sensitive, so uppercase and lowercase letters are treated
differently; you must use the correct capitalization when entering your registration code. (For
more information, see “Universal Shield Support” on page 48 and “Buy Now” on page 44.)
When you enter a registration code, the OK button becomes active.
5. When the OK button becomes active, click OK to enter the registration code you typed.
6. Click OK to close the message box that tells you to restart Universal Shield.
7. Restart Universal Shield, by clicking File > Exit to close the software and then starting it again.
8. You will be notified if you entered an invalid registration code and will be prompted to enter the
code again.
Evaluation displays until
you successfully register
Universal Shield
9. If you entered a valid registration number, the word Evaluation will no longer display in the title
bar of Universal Shield.
Page 10
Universal Shield User’s Guide
Getting Started
This section provides a brief overview of the Universal Shield interface and menus. For more in-depth
discussion and presentation of Universal Shield and its features, see the tutorials and menu reference:
“Using Wizards” on page 14 and “Universal Shield Menus and Options” on page 32.
The Universal Shield Interface
The Universal Shield interface has been designed to be intuitive and easy to use. For more detailed
information about the Universal Shield interface, see “Using Wizards” on page 14 and “Universal Shield
Menus and Options” on page 32.
Status bar
Toolbar
(buttons)
Menus
Title bar
MENUS
Many of the more commonly-used menu selections have buttons in the toolbar for one-click access.
File
Most importantly, the File menu gives you access to the Universal
Shield Wizard, which leads you through several key tasks. The File
menu also lets you set up protections for the Windows operating
system and special system folders.
For more information, see “File” on page 32
Edit
The Edit menu lets you see the properties of a selected object, copy
and paste objects, and search for objects.
For more information, see “Edit” on page 35.
Universal Shield User’s Guide
Page 11
Encryption
The Encryption menu lets you encrypt and decrypt files, and provides
access to the Encryption Wizard which leads you through the process
of protecting a file with encryption.
For more information, see “Encryption” on page 36.
Security
The Security menu lets you turn protection, security, and object
visibility on and off. Additionally, this menu lets you create, change,
or delete the password used to access Universal Shield.
For more information, see “Security” on page 40.
Options
The Options menu give you control over the Universal Shield
interface. It lets you turn protection on and off, set the positioning of
the program screen, control the fonts and language used, and also set
the hot keys used to control Universal Shield.
For more information, see “Options” on page 41.
Help
The Help menu lets you access the online help and register Universal
Shield. You can also press Shift+F1 to open the online help.
For more information, see “Help” on page 43.
Page 12
Universal Shield User’s Guide
BUTTONS AND SHORTCUT KEYSTROKES
Many of the more commonly-used menu selections have buttons in the toolbar for one-click access.
Quick access to certain program features is also provided through the built-in shortcut keys. The relevant
key combinations are listed in the program menus beside their particular function. To use a shortcut, press
and hold the Ctrl key, then click the letter key shown, and then release both keys. (It is not necessary to
release the keys at the same time, it is only important that both keys are pressed at the same time.)
Protect
The Protect button is a shortcut for File > Protect Object.
For more information, see “Protect Object” on page 32.
Wizard
The Wizard button is a shortcut for File > Universal Shield Wizard.
For more information, see “Universal Shield Wizard” on page 34.
Edit
The Edit button is a shortcut for Edit > Properties (Ctrl+E).
For more information, see “Properties” on page 36.
Remove
The Remove button is a shortcut for Edit > Remove (Ctrl+R).
For more information, see “Remove” on page 35.
Trust
The Trust button is a shortcut for Security > Trusted Processes
(Ctrl+P).
For more information, see “Trusted Processes” on page 40.
Locked/Unlocked
The Locked/Unlocked button is a shortcut for Security > Toggle
Protection (Ctrl+Windows key).
For more information, see “Toggle Protection” on page 40.
Universal Shield User’s Guide
Page 13
Using Wizards
Note: You can click Back in Universal Shield Wizards to visit a previous step and change
what you entered or selected.
Universal Shield includes Wizards to help you easily and quickly perform some common tasks.

“How to Hide Files and Folders” on page 14

“How to Show Hidden Files and Folders” on page 17

“How to Set Access Read-Only Permissions” on page 18

“How to Encrypt a File” on page 20

“How to Decrypt a File” on page 23

“How to Protect System Files, Folders, and Settings” on page 25

“How to Edit Protections” on page 27

“How to Password Protect the Universal Shield Software” on page 27

“How to Use File Mask to Select Multiple Files” on page 28

“How to Set Up Trusted Processes” on page 30

“How to Set Hot Keys” on page 30

“How to Use Stealth Mode” on page 31
HOW TO HIDE FILES AND FOLDERS
Caution: Do not hide Windows system files or folders. If a file Windows needs is hidden,
and Windows cannot find the file, then Windows can become unstable and data can be
damaged or lost. Certainly, this includes but is not limited to subfolders and files in the
\Windows and \WinNT folders.
You can use Universal Shield’s wizards to quickly hide an object (file, folder, group of files), so others
cannot see the object in Windows.
Note: You may have to refresh the current view of the screen, in Windows Explorer, if the
file, or folder containing a file, is currently in view when you perform a hide operation. This
also applies to folders on the windows desktop.
1. If needed, run the Universal Shield software by clicking Start > Programs > Universal Shield
and clicking the Universal Shield icon, or by double-clicking the Universal Shield shortcut on
your Windows desktop.
2. If the Universal Shield Wizard does not open automatically, click the Wizard button. The
Universal Shield Wizard opens.
3. Select Hide files, folders, or disks. (You can only hide disks in Windows NT, 2000, XP and
2003 Server.)
Page 14
Universal Shield User’s Guide
4. After you select the option you want, click Next. The Wizard leads you through the process of
hiding files or folders.
5. Choose the object you want to hide. For example, you might want to hide a Microsoft Word
(*.DOC) file. Select I want to hide a file.
6. Click Next.
7. Select the file you want to hide.
a. Click Add to List.
Universal Shield User’s Guide
Page 15
b. In the Select File dialog box, browse to find the file you want. For testing, choose a file
that is unimportant or create a file that you know you can delete without harming
anything.
c. When you find the file, click it to select it; click Open (or, double-click the file). The file
you selected appears in the Universal Shield Wizard window.
The files
you select
display here
d. If you want, you could select more than one file by using Add to List.
e. After you finish adding files, click Next.
f.
Click Finish to close the Wizard.
8. The Universal Shield window displays the files you set to be hidden.
9. To set the hidden property, you must ENABLE protection. Click the Unlocked button.
(Notice that the lock button now displays its Locked icon. Clicking the button again
would toggle the protection back to disabled, showing the Unlocked view once more.)
The status bar shows whether protection is ENABLED.
10. Notice that the window shows the visibility status—a cross in the visibility field indicates a file is
hidden, whereas a check shows the file is visible.
Page 16
Universal Shield User’s Guide
Universal Shield has
now made the file
TopSecret.doc invisible!
11. Using Windows Explorer, or My Computer, navigate to the location where the hidden file
resides—it’s no longer visible!—you cannot see it.

A file will remain hidden if it is set to be hidden, is listed in Universal Shield, and if
protection is ENABLED—if you select the file and delete it from Universal Shield, then
the file becomes visible in Windows again.

If the file is listed in Universal Shield and is hidden with protection ENABLED, you can
close Universal Shield and the file will remain hidden in Windows—when you open
Universal Shield again, the file will still be in the Universal Shield list.

Whenever you change the visibility of a file, you must refresh any open instances of
Windows Explorer or My Computer, etc.—changes in visibility status are not always
shown in open Windows without refreshing them, thus you might still not be able to see a
file that you just made visible until you use View > Refresh to refresh the open window.
HOW TO SHOW HIDDEN FILES AND FOLDERS
To show or unhide an object (file, folder, group of files), click the object in Universal Shield, to select it,
and:

Click the Locked button to DISABLE protection.

Or, click the Remove button to remove the object from the Universal Shield list.

Or, right-click the entry in the protection list, select Properties, and change the custom settings to
enable visibility.
Remember to use View > Refresh to update any open windows after changing the visibility of an object.
Universal Shield User’s Guide
Page 17
Click the Locked or Remove
toolbar buttons to disable or
remove protection for the object—
the file will now be visible again
HOW TO SET ACCESS READ-ONLY PERMISSIONS
You can use Universal Shield’s wizards to quickly set an object (file, folder, group of files) to read-only,
so others cannot modify the files or files in a folder.
1. If needed, run the Universal Shield software by clicking Start > Programs > Universal Shield
and clicking the Universal Shield icon, or by double-clicking the Universal Shield shortcut on
your Windows desktop.
2. If the Universal Shield Wizard does not open automatically, click the Wizard button.
The Universal Shield Wizard opens.
3. Select Set read-only access mode for the selected objects.
4. After you select the option you want, click Next. The Wizard leads you through the process of
setting permissions.
Page 18
Universal Shield User’s Guide
5. Choose the object for which you want to set permissions. For example, you might want to set a
Microsoft Word (*.DOC) file as read-only, so nobody else can edit it. Select Set Read-Only
Access for a File.
6. Click Next.
7. Select the file to which you want to apply read-only access.
a. Click Add to List.
b. In the Select File dialog box, browse to find the file you want. For testing, choose a file
that is unimportant or create a file that you know you can delete without harming
anything.
c. When you find the file, click it to select it; click Open (or, double-click the file). The file
you selected appears in the Universal Shield Wizard window.
Universal Shield User’s Guide
Page 19
d. If you want, you could select more than one file by using Add to List.
e. After you finish adding files, click Next.
f.
Click Finish to close the Wizard.
8. The Universal Shield window displays the files you set to read-only.
9. To set the read-only permissions, you must ENABLE protection. Click the Unlocked
button (but do not click the Locked button). The status bar shows whether protection
is ENABLED.
10. Notice that the window shows you how the permissions are set—a check indicates an action
(Read) is permissible but a cross indicates other actions (Write, Delete, and Edit) are not
permissible.
Universal Shield displays
the status of each object
11. Using Windows Explorer, or My Computer, navigate to the file you protected and try to delete it
or copy and paste it—you cannot. Note that you can open the file using Microsoft Word, make
changes and save the file under a different name, but you can't modify the original file in anyway.
HOW TO ENCRYPT A FILE
You can use Universal Shield’s wizards to quickly encrypt one or more files. The contents of an
encrypted file are scrambled, so others cannot open, read, use, or view the data. You could, for example,
encrypt a Microsoft Word document that contained sensitive information and e-mail it securely to
someone else. Note, you will need to have an installation of Universal Shield on the system where you
decrypt the file (this can be a Universal Shield installation running in trial mode.) If the e-mail were
intercepted, the Microsoft Word attachment would not be usable or useful to those who did not have the
decryption password.
Note: The items you selected to encrypt remain encrypted until you decrypt them. Even if
you DISABLE protection and delete the file from the Universal Shield window, the
encryption remains in-place. For more information, see “How to Decrypt a File” on page
23.
1. If needed, run the Universal Shield software by clicking Start > Programs > Universal Shield and
clicking the Universal Shield icon, or by double-clicking the Universal Shield shortcut on your
Windows desktop.
Page 20
Universal Shield User’s Guide
2. If the Universal Shield Wizard does not open automatically, click the Wizard button. The Universal
Shield Wizard opens.
3. Select Encrypt selected files.
4. After you select the option you want, click Next. The Wizard leads you through the process of setting
encryption.
5. Choose the object you want to encrypt. For example, you might want to encrypt a Microsoft Word
(*.DOC), so nobody else can use it. Select Encrypt a File.
6. Click Next.
7. Select the file you want to encrypt.
Universal Shield User’s Guide
Page 21
a. Click Add to List.
b. In the Select File dialog box, browse to find the file you want. For testing, choose a file that is
unimportant or create a file that you know you can delete without harming anything.
c. When you find the file, click it to select it; click Open (or, double-click the file). The file you
selected appears in the Universal Shield Wizard window.
d. If you want, you could select more than one file by using Add to List.
e. After you finish adding files, click Next.
f.
Select the Algorithms you want to use from the drop-down list.
Page 22
Universal Shield User’s Guide
g. Set your Password. Anyone who wants to use the data in your encrypted files will need to know
the password to decrypt them.
h. Click Start and then Finish to encrypt the files you selected.
i.
Click Close to close the Wizard.
8. The Universal Shield window displays the files you encrypted.
Universal Shield displays
the status of each object
9. Using Microsoft Word, or other software that is appropriate for the kind of file you have encrypted
such as Adobe Reader for .PDF files, open the encrypted file. If you try, either the file will not open
or the file opens and appears scrambled an unusable.
HOW TO DECRYPT A FILE
You can use encryption to protect your data from prying eyes. But, to use encrypted data yourself, you
need to use Universal Shield and the encryption password to decrypt the file.
1. If needed, run the Universal Shield software by clicking Start > Programs > Universal Shield and
clicking the Universal Shield icon, or by double-clicking the Universal Shield shortcut on your
Windows desktop.
2. If the file you want to decrypt is not listed in Universal Shield, add the file to the list.
The file you want to decrypt
is not yet listed—you'll need
to add it to the protection list
before decrypting
Universal Shield User’s Guide
Page 23
a. Open Windows Explorer to the location of the file you want to decrypt.
b. Drag-and-drop the file you want to decrypt from Windows Explorer to the Universal Shield
window.
Drag the file you want from Windows
Explorer to Universal Shield
3. With the file now entered into the protection list, it’s a simple matter to perform the decryption.
Right-click the file you want to decrypt, and select Decrypt File. Or, select Encryption > Decrypt
File. You can Shift+click and/or Ctrl+click more than one file to decrypt several files at once, but you
can only decrypt a group of files that are encrypted with the same password.
4. Type the encryption password into the Password field, and click Start.
Page 24
Universal Shield User’s Guide
5. Click Close to close the dialog box. Your file is decrypted and you can view and use it normally.
Notice that the Encryption attribute of the file TopSecret.doc now says No.
HOW TO PROTECT SYSTEM FILES, FOLDERS, AND SETTINGS
You can use Universal Shield’s wizards to quickly protect selected system files, folders, an settings.
1. If needed, run the Universal Shield software by clicking Start > Programs > Universal Shield and
clicking the Universal Shield icon, or by double-clicking the Universal Shield shortcut on your
Windows desktop.
2. If the Universal Shield Wizard does not open automatically, click the Wizard button. The
Universal Shield Wizard opens.
3. Select Security tricks.
Click to select
the button
4. After you select the option you want, click Next. The Wizard leads you through the process of hiding
files or folders.
5. Choose the objects you want to protect. Universal Shield lets you protect: My Documents, Favorites,
History, Control Panel, date/time settings, and the windows desktop.
Universal Shield User’s Guide
Page 25
6. Click Next and Finish to apply protection to the items you selected.
7. Those items that are protected cannot be opened or accessed. For example (remember, you can customize and edit these protections, see “How to Edit Protections” on page 27):

If you protect My Documents, then any folders or files in MyDocuments cannot be opened.
Note: If you change the protection on your Favorites list, by DISABLING protection
(clicking the Locked button) while your Web browser is open, you will have to close and
re-open your Web browser to see the change take effect.

If you protect Favorites, then your Favorites list is not available in your browser.

If you select History, then the contents of your Internet history folder are unavailable.

If you select Control Panel, then nothing in your control panel can be selected.

If you select Data/Time, then your system clock and date become inaccessible.

If you select Windows Desktop, then the layout of the desktop is preserved and the changes are
prevented from being made to the names/details of files, folders, and shortcuts, etc., on the desktop.
The items you selected to protect are displayed in Universal Shield’s protection list. Protection remains in
force if the following are true:

An item is listed in Universal Shield

An item has protection ENABLED (by clicking the Unlocked button)
Protection is disabled if:

An item is deleted or removed from Universal Shield (the item is selected and the Remove button
clicked)

An item has Protection DISABLED (by clicking the Locked button)
Page 26
Universal Shield User’s Guide
HOW TO EDIT PROTECTIONS
Protection is ENABLED
for all items in the list
You can edit and customize the protections assigned to items in Universal Shield. Select Edit >
Properties to change the protections an object has. For example, you can turn off Write permissions or
hide a selected object in addition to existing protections.
HOW TO PASSWORD PROTECT THE UNIVERSAL SHIELD SOFTWARE
When you first install Universal Shield, you are prompted to password protect the software at that time.
Pass-word-protecting Universal Shield means:

You can only uninstall Universal Shield if you know the password. Password-protecting the
Universal Shield installation prevents someone from defeating protections to your files and
folders by uninstalling Universal Shield. When somebody attempts to uninstall Universal Shield,
they will be prompted for the correct password before being allowed to continue.

If, as recommended, you enable password protection of Universal Shield, anyone trying to access
the software will be required to enter the correct password information. Password-protecting the
operation of Universal Shield prevents someone from defeating protections to your files and
folders by using the Universal Shield software without your permission.
If you did not password-protect Universal Shield at the time of installation, you can do so at any time by:
1. Select Security > Change Password.
2. Type a password into the Password field. For more information, see “Password Best Practices” on
page 47.
3. Confirm your password, by re-typing it into the Confirm field, and click OK.
4. Click Options, and select Password Protection to turn on protection using the password you set.
Universal Shield User’s Guide
Page 27
A check displays
when you enable
password protection
HOW TO USE FILE MASK TO SELECT MULTIPLE FILES
Universal Shield lets you use file masks as a way to make it easier to select more than one file. Selecting
files with a mask can be accomplished by choosing the Protect > Hide by mask drop down on the
toolbar, or by using the Universal Shield Wizard.
Note: This section discusses using masks to select files. For a more thorough example
of hiding objects, see “How to Hide Files and Folders” on page 14.
1. If needed, run the Universal Shield software by clicking Start > Programs > Universal Shield and
clicking the Universal Shield icon, or by double-clicking the Universal Shield shortcut on your
Windows desktop.
2. If the Universal Shield Wizard does not open automatically, click the Wizard button. The
Universal Shield Wizard opens.
3. Select Hide files, folders, or disks. (You can only hide disks in Windows NT, 2000, XP and 2003
Server.)
Click to select the
button
Page 28
Universal Shield User’s Guide
4. After you select the option you want, click Next. The Wizard leads you through the process of hiding
files or folders.
5. Choose the object you want to hide. For example, you might want to hide a Microsoft Word (*.DOC)
file. Select I want to hide a group of files using a mask.
6. Click Next.
7. Click Add to List.
Note: When you set a path, all subdirectories in the path will be affected. Therefore,
selecting C:\*.PDF would protect all PDF files on your computer that were located directly
under the C:\ path or in folders and subfolders anywhere on the C:\ drive.
8. Universal Shield prompts you to type the mask you want to use to select files. All files that meet the
criteria defined by the mask will be selected.
a. Enter a path name and mask that defines the files you want to protect. Use the following
wildcards to define the mask:
*—An asterisk (*) denotes any number of any characters. Thus, *.DOC means you are selecting
all DOC (Microsoft Word) files of any name.
Thus, you might enter, C:\MyFolder\*.DOC to select and protect all Microsoft Word files in a
folder called MyFolder. Note that all PDFs in subfolders in MyFolder would also be protected.
b. Click OK, Next, Finish to complete the process of selecting the files you want to protect.
Universal Shield User’s Guide
Page 29
9. The Universal Shield window displays the files you set to be hidden.
10. To set the hidden property, you must ENABLE protection. Click the Unlocked button.
The status bar shows whether protection is ENABLED.
HOW TO SET UP TRUSTED PROCESSES
Trusted processes are applications or software that are permitted to see all protected objects; nothing is
hidden from trusted processes. You should consider setting up certain applications as trusted processes,
such as anti-virus software that needs to check protected files for computer viruses or backup software
that needs to archive your data.
To set up trusted processes, or edit your list of existing trusted processes:
1. Click the Trust button or select Security > Trusted Processes.
2. In the Select Trusted Processes dialog box:

Click Add to List to add new trusted processes. Navigate to the program you want and
select it.

Click Remove to remove a selected process from the list. You can Ctrl+click and/or Shift+click
to select more than one process at a time.

Click Clear All to remove all processes from the list.
3. Click OK to accept your changes.
HOW TO SET HOT KEYS
Using hot keys is an integral part of using Universal Shield, because they let you run Universal Shield in
Stealth Mode. Hot keys are keyboard combinations that activate a certain task, or process, such as a key
combination that causes the Universal Shield software to run.
To set up hot keys:
1. Click Options > Set hot keys. The Set hot keys dialog box opens.
Page 30
Universal Shield User’s Guide
2. Select the Enable hot keys check box. This lets you use hot keys with Universal Shield.
3. Define your hot keys for running the Universal Shield software. This hot-key combination works
when Universal Shield is closed to run the Universal Shield software.
a. Click the Open Universal Shield field, but don’t type.
b. Instead, press the keys you want to be hot keys. It’s a good idea to use a combination of three
keys at once, one of which must be the Shift, Ctrl, or Alt keys, such as Ctrl+Shift+1 (where, you
are not pressing the + key, but + indicates you are pressing Ctrl, Alt, and 1 simultaneously).
c. Thereafter, at any time when Universal Shield is closed, you can press Ctrl+Shift+1 (or whatever
your hot keys are) to run the Universal Shield software.
4. Define other hot keys as needed. For more information, see “Set Hot Keys” on page 42.
HOW TO USE STEALTH MODE
In Stealth Mode, the Universal Shield installation becomes invisible to all users—the desktop shortcut,
Start menu shortcut, and Program Files folder for Hide Menu all become hidden. You must use the hot
key functions of Universal Shield to access the program in this mode (see “How to Set Hot Keys” on page
30 and “Set Hot Keys” on page 42).
To use Stealth Mode:
1. Click Security > Go to Stealth Mode. Automatically, Universal Shield protects its own processes
and ENABLES protection. (If you do not have any hot keys set up, a message box opens and prompts
you to set up hot keys. You cannot use this feature without setting up hot keys.)
2. Click Options, and turn on Protect After Exit and Protect On Windows Start. These will provide
protection after you close Universal Shield and immediately on starting Windows if you reboot.
3. Close Universal Shield (click File > Exit).
4. You can turn off Stealth Mode by running Universal Shield (using hot keys) and clicking Security >
Go to visible mode. For more information, see “Go to Visible Mode” on page 41.
Universal Shield User’s Guide
Page 31
Universal Shield Menus and Options
Note: For more information about using these menu options, see “Using Wizards” on
page 14.
Universal Shield includes the following menus:

“File” on page 32

“Edit” on page 35

“Encryption” on page 36

“Security” on page 40

“Options” on page 41

“Help” on page 43
Menu items that are dimmed (greyed out) are unavailable for selection.
File
The File menu lets you access the following features:

“Protect Object” on page 32

“Universal Shield Wizard” on page 34

“Security Tricks” on page 34

“Exit” on page 35
PROTECT OBJECT
Protect Object lets you protect a drive, folder, file, or several files as defined by a mask (see “How to Use
File Mask to Select Multiple Files” on page 28).
Page 32
Universal Shield User’s Guide
First, select the kind of
object you want to protect
To use Protect Object:
1. Click the kind of object you want to protect: Drive (in Windows NT, 2000, XP and 2003), Folder,
File, or Mask (multiple files).
2. Select the object you want to protect by clicking the Ellipsis (…) button to browse for the object
or to define the mask you want to use. (The Ellipsis (…) button is the button with three dots at
the right of the Select path to file: entry field.)
3. After you select the object you want to protect, set the access that you want to deny or grant. The
access options that are available depend on the kind of object you are protecting; not all options are
available for all object types.
Select Drive/Path/Mask
After you select the kind of object you want to protect, click the
Ellipsis (…) button to select the instance of that object (or objects, in
the case of a Mask selection).
Protect Included Files
If you are protecting a drive or folder, you can choose to protect the
files in that folder and drive as well. Subfolders in the drive and folder
and their contents are also protected.
Full Access
Selecting Full Access disables all protection for the selected object.
No Access
Selecting No Access enables full protection, including invisibility
(hidden status) for the selected object.
Other
Other lets you choose which specific protections you want to apply
and deny to the selected object. Select the check box for each
permission you want to grant—a check means that anyone can
perform the function. A deselected check box means nobody can
perform the function and the object is protected for that function.
Full protection would be clearing all check boxes, whereas no
protection would be a check in every check box.
Read (R)
Universal Shield User’s Guide
Select the Read check box to let everyone be able to open the selected
object. Deselecting this check box prevents everyone from reviewing
any data in the object.
Page 33
Write (W)
Select the Write check box to let everyone be able to edit (write to)
the selected object, including make changes and copies. Deselecting
this check box prevents everyone from copying the object.
Delete (D)
Select the Delete check box to let everyone be able to delete the
selected object. Deselecting this check box prevents everyone from
deleting the object.
Visibility (V)
Select the Visibility check box to make the object visible in Windows
to everyone. Deselecting this check box hides the file so it does not
display.
For these protections to remain in-force, you must:

Leave the files you protect listed in the Universal Shield main window

Enable protection (“Toggle Protection” on page 40)
UNIVERSAL SHIELD WIZARD
For new users, this is the easiest way to start protecting your system using Universal Shield. The
Universal Shield Wizard leads you through some of the most common Universal Shield Tasks:

Hide files, folders, or disks

Set read-only access

Encrypt selected files

Security tricks—limit access to My Documents, Favorites, Desktop, History, Control Panel, and
Windows date and time
For more information, see “Using Wizards” on page 14.
SECURITY TRICKS
Security Tricks, which is also accessible through the Universal Shield Wizard, lets you protect your
Windows system quickly in one dialog box. This lets you protect:

My Documents

Favorites

History

Control Panel

Date and time settings

Desktop
For more information, see “How to Protect System Files, Folders, and Settings” on page 25.
Page 34
Universal Shield User’s Guide
EXIT
Use Exit to close the Universal Shield software. Before you close the software, you should consider
setting hot keys (see “How to Set Hot Keys” on page 30) and protection after exit (see “Protect after Exit”
on page 42).
Edit
The Edit menu lets you access the following features:

“Copy” on page 35

“Remove” on page 35

“Clear All” on page 36

“Find” on page 36

“Find Object” on page 36

“Properties” on page 36
COPY
Copy lets you copy selected items in the Universal Shield main window list to the Windows clipboard.
From there, you can paste the data into your favorite spreadsheet software, word processing software, or
even a text editor. For example, you could use this to keep a spreadsheet-based copy of the objects you
are protecting with the Universal Shield software.
To use Copy:
Select those rows in the Universal Shield window that you want to copy.
Click Edit > Copy (or press Ctrl+C).
Open the software into which you want to paste the data you copied, and paste the data (Ctrl+V).
REMOVE
Remove lets you delete the selected items from the Universal Shield main window list. Using
Remove in this way removes protection from those files. This is the same as using the Remove
button.
To use Remove:
1. Select those rows in the Universal Shield window that you want to delete.
2. Click Edit > Remove (or press Ctrl+R).
Universal Shield User’s Guide
Page 35
CLEAR ALL
Clear All lets you delete all items in the Universal Shield main window list, regardless of whether they
are selected or not. This is a quick way to remove all protection from all of the objects in the Universal
Shield list.
To use Clear All, click Edit > Clear All (or press Ctrl+L).
FIND
Find (Ctrl+F) lets you find text strings in the objects you have protected. For example, if you had a long
list of protected objects and you wanted to find a Word (.DOC) file, you could enter DOC in the Find
dialog box and click Find Next to find the next object in the list with DOC in its name. You cannot use
Wildcards in the Find dialog box.
FIND OBJECT
Find Object (Ctrl+O) lets you navigate to the highlighted file on the protection list. Universal Shield
opens Windows Explorer and navigates directly to the file, where the target object resides.
PROPERTIES
Properties lets you edit the protections assigned to an object. This opens the File Properties dialog box for
the object selected in the Universal Shield list. If you select more than one object, you can make all their
protections identical.
For more information, see “Protect Object” on page 32.
Encryption
The Encryption menu lets you access the following features:

“Encryption Wizard” on page 36

“Encrypt File” on page 38

“Decrypt File” on page 39
ENCRYPTION WIZARD
Note: For new users, the Encryption Wizard provides a guided means of encrypting your
files. However, as you become more familiar using Universal Shield, you'll probably find it
quicker to directly right-click objects in the protection list and choose Encrypt or Decrypt
directly.
The Encryption Wizard leads you through the process of encrypting files. (You can use the Universal
Shield Wizard to encrypt files in the same way—for more information, see “How to Encrypt a File” on
page 20 and “How to Decrypt a File” on page 23.)
Note: The items you selected to encrypt remain encrypted until you decrypt them. Even if
you DISABLE protection and delete the file from the Universal Shield window, the
Page 36
Universal Shield User’s Guide
encryption remains in-place. For more information, see “How to Decrypt a File” on page
23.
To use the Encryption Wizard:
1. Click Encryption > Encryption Wizard.
2. Choose to Encrypt a File, and click Next.
3. Choose the object you want to encrypt. For example, you might want to encrypt a Microsoft Word
(*.DOC), so nobody else can use it. Select Encrypt a File.
4. Select the file you want to encrypt.
a. Click Add to List.
b. In the Select File dialog box, browse to find the file you want. For testing, choose a file that is
unimportant or create a file that you know you can delete without harming anything.
c. When you find the file, click it to select it; click Open (or, double-click the file). The file you
selected appears in the Universal Shield Wizard window.
d. If you want, you could select more than one file by using Add to List.
e. After you finish adding files, click Next.
Universal Shield User’s Guide
Page 37
f.
Select the Algorithms you want to use from the drop-down list.
g. Set your Password. Anyone who wants to use the data in your encrypted files will need to know
the password to decrypt them.
h. Click Start and then Finish to encrypt the files you selected.
i.
Click Close to close the Wizard.
5. The Universal Shield window displays the files you encrypted.
Universal Shield displays
the status of each object
6. Using Microsoft Word, or other software that is appropriate for the kind of file you have encrypted
such as Adobe Reader® for .PDF files, open the encrypted file. If you try, either the file will not open
or the file opens and appears scrambled an unusable.
ENCRYPT FILE
Encrypt File lets you encrypt a file that is already protected and listed in the Universal Shield window. To
use this feature:
Page 38
Universal Shield User’s Guide
Note: The items you selected to encrypt remain encrypted until you decrypt them. Even if
you DISABLE protection and delete the file from the Universal Shield window, the
encryption remains in-place. For more information, see “How to Decrypt a File” on page
19.
1. Select a file that is in your Universal Shield window and that has Encryption set to No.
Universal Shield displays
the status of each object
2. Click Encryption > Encrypt File, or right-click on the item on the protection list and select Encrypt
File. The Encryption dialog box opens.
3. Select the Algorithms you want to use from the drop-down list.
4. Set your Password. Anyone who wants to use the data in your encrypted files will need to know the
password to decrypt them.
5. Click Start and then Close to encrypt the files you selected.
DECRYPT FILE
Note: You need the encryption password to decrypt a file; you cannot decrypt a file
without the required password.
Decryption is the only way to make encrypted data usable again. The file you want to decrypt has to be in
the Universal Shield window; you can drag-and-drop the file there from Windows Explorer. Select
Encryption > Decrypt File to remove encryption from a file, and enter the password when prompted.
For more information, see “How to Decrypt a File” on page 23.
Universal Shield User’s Guide
Page 39
Security
The Security menu lets you access the following features:

“Toggle Protection” on page 40

“Trusted Processes” on page 40

“Change Password” on page 41

“Go to Stealth Mode” on page 41

“Go to Visible Mode” on page 41
TOGGLE PROTECTION
Toggle Protection lets you enable and disable protections on objects that are selected in the Universal
Shield window.
You add protections using File > Protect Object or File > Universal Shield Wizard. For those
protections to be enforced, protection has to be ENABLED. You enforce protection by clicking
the Unlocked button or selecting Security > Toggle Protection. Enabling protection enforces
the Read, Write, Delete, and Visibility protections.
If a selected object is protected, the padlock icon appears closed and the words Protection Is ENABLED
display in the status bar. Otherwise, the padlock icon appears open and Protection Is DISABLED.
Protection is Enabled for the
selected object
TRUSTED PROCESSES
Trusted Processes are applications or software that can see all protected objects; nothing is hidden from
trusted processes. You should consider setting up certain applications as trusted processes, such as antivirus software that needs to check protected files for computer viruses or backup software that needs to
archive your data. Use this feature to select those processes and software applications that are trusted.
For more information, see “How to Set Up Trusted Processes” on page 30.
Page 40
Universal Shield User’s Guide
CHANGE PASSWORD
Change Password lets you establish or change a password for the Universal Shield software itself. This
password is needed to run the software and to remove the software during uninstallation. This password is
a safeguard against somebody getting around your protections by using or uninstalling Universal Shield.
To activate password protection in Universal Shield, you'll need to ensure that the Security > Password
Protection option is enabled. For more information, see “Password Protection” on page 42.
For more information, see “How to Password Protect the Universal Shield Software” on page 27 and
“Password Best Practices” on page 47.
GO TO STEALTH MODE
In Stealth Mode, the Universal Shield installation becomes invisible to all users—the desktop shortcut,
Start menu shortcut, and Program Files folder for Hide Menu all become hidden.You must use the hot
key functions of Universal Shield to access the program in this mode (see “How to Set Hot Keys” on page
30 and “Set Hot Keys” on page 42). For more information, see “How to Use Stealth Mode” on page 31.
When using Stealth Mode, make sure you remember your hot key combination, as you cannot start
Universal Shield from the Start menu or Program Files folder. If you use Stealth Mode and forget your
hot-key combination, you’ll need to contact Universal Shield technical support for assistance (see
“Universal Shield Support” on page 48).
GO TO VISIBLE MODE
Go to Visible Mode turns Stealth Mode off, making the Universal Shield icons and program files visible
again. Turn off Stealth Mode if you want to access Universal Shield from a desktop shortcut or the Start
menu, but be aware the presence of these icons may let others know how you are protecting your drives,
folders, and files.
Options
The Options menu lets you access the following features:

“Always on Top” on page 42

“Protect after Exit” on page 42

“Protect on Windows Start” on page 42

“Password Protection” on page 42

“Set Hot Keys” on page 42

“Font” on page 43

“Language” on page 43
Universal Shield User’s Guide
Page 41
ALWAYS ON TOP
Always on Top lets you make sure that Universal Shield stays on top of all your other desktop
applications, so it never gets hidden by another window.
PROTECT AFTER EXIT
Protect after Exit enforces your protections after you close Universal Shield. You should select this option
for complete protection, especially if you are using Stealth Mode (see “Go to Stealth Mode” on page 41).
PROTECT ON WINDOWS START
Protect on Windows Start automatically enables Universal Shield protection of any items in the protection
list every time Windows is started. This prevents someone from rebooting Windows to disable your
protections and you should select this for enhanced security.
PASSWORD PROTECTION
Password Protection turns on the password prompt for Universal Shield. After you enable this feature,
you will be prompted for a password every time you run Universal Shield and when you try to uninstall
Universal Shield. Using a password to protect Universal Shield prevents others from using or uninstalling
Universal Shield to bypass your protections.
To enforce password protection of Universal Shield, you must also set up a password using Security >
Change Password, otherwise this selection is turned off when you close Universal Shield. For more
information, see “Change Password” on page 41.
SET HOT KEYS
Hot keys are an integral part of using Universal Shield, because they let you run Universal Shield in
Stealth Mode. Hot keys are keyboard combinations that activate a certain task, or process, such as a key
combination that causes the Universal Shield software to run.
Enable Hot Keys
Page 42
Select Enable hot keys to turn on the feature. You must set hot keys
to use Universal Shield in Stealth Mode (see “Go to Stealth Mode” on
page 41).
Universal Shield User’s Guide
Ask for Password…
Selecting Ask for Password when changing the protection mode
causes a password prompt to open if you use a hot-key combination to
turn protection on or off. This prevents someone else from using your
hot-key combination to circumvent your protections.
Open Universal Shield
Set the hot-key combination that opens Universal Shield. This works
when Universal Shield is not running and is the only way to access
Universal Shield in Stealth Mode.
Toggle Protection Mode
Set the hot-key combination that turns Universal Shield protection on
and off. Protection enforces the Read, Write, Delete, and Visible
settings for an object.
Enable Protection Keys
Enable protection keys lets you set a hot-key combination that only
enables protection.
Disable Protection Keys
Disable protection keys lets you set a hot-key combination that only
disables protection.
Using separate hot keys for enabling and disabling protection may
provide you more security than using one hot-key combination to
toggle protection.
Notify About Changes…
Selecting Notify about changes to the protection mode causes a
message box to open when you change the security mode and alert
you with information about the current security mode (ENABLED or
DISABLED).
For more information, see “How to Set Hot Keys” on page 30.
FONT
Font lets you change the font used by the list of objects in the Universal Shield main window.
LANGUAGE
Language lets you change the language of the Universal Shield interface. It does not change the language
of the online help. Also, your operating system must be set up to accommodate the language change,
otherwise the language may not display correctly at all. After you change the language, you must close
and restart Universal Shield for the changes to take effect.
Help
The Help menu lets you access the following features:

“Help” on page 44

“Context Help” on page 44

“Tip of the Day” on page 44

“Buy Now” on page 44
Universal Shield User’s Guide
Page 43

“Register” on page 44

“About” on page 44
HELP
Help opens the online help at the default page. In addition to accessing the online help from the menu,
you can press F1 at any time while using Universal Shield to display the online help.
CONTEXT HELP
Use Help > Context Help to display a brief tooltip of text about an item you select.
TIP OF THE DAY
Use Help > Tip of the Day to display a useful hint about the Universal Shield software. Select the Show
tips at startup check box to display a tip when Universal Shield opens. Deselect the check box to turn off
these tips.
BUY NOW
Click Help > Buy Now to open a Web page on which you can pay for Universal Shield. If you are not
connected to the Internet, this will not work. For more information, see “Universal Shield Support” on
page 48 and “Registering Universal Shield” on page 9.
REGISTER
Click Help > Register to enter your registration code for the software. For more information, see “Registering Universal Shield” on page 9.
ABOUT
About gives you information about Universal Shield, provides some HTML links and gives you another
way to register the Universal Shield software.
Page 44
Universal Shield User’s Guide
Algorithms
Universal Shield lets you use the following powerful encryption algorithms:

Blowfish

CAST

Cobra 128

PC1

Rijndael

Serpent

TMS

triple-DES

Twofish.
These algorithms provide you with high level, commercial-grade encryption protection. We recommend
you use the full range of algorithms provided, rather than always using the same algorithm. Using
multiple encryption algorithms will increase your overall security. For more information about these
algorithms, including technical descriptions, we recommend you search the Worldwide Web, using a
search engine such as http://www.google.com.
Universal Shield User’s Guide
Page 45
Hints and Frequently Asked Questions
Drag-and-drop
Don't hide critical system files
You can drag and drop files and folders to Universal Shield.
Don’t hide folders that contain critical system files. If Windows needs
a file that exists only in one of your hidden folders, it won't be able to
find it until you make the folder visible.
If you accidentally hide important system files, it is very possible that
your computer won't boot correctly, and you'll need to restore the
system manually. You might be able to work around this by setting
certain system processes as trusted (for more information, see “How
to Set Up Trusted Processes” on page 30).
Locking removable media
If you do not want people running programs from CD-ROM drives or
floppy drives, set only visibility access to them. This will prevent
users from opening files from CD-ROMS and running programs from
floppies. (For more information, see “How to Hide Files and Folders”
on page 14.)
What if Universal Shield
crashes?
If Universal Shield crashes for some reason, or a malicious user
somehow closes the program, your folders will still be protected for
the entire Windows session. The only way to unprotect them while
Windows is running is to startup Universal Shield and access setup,
which is why we recommend you password-protect Universal Shield
(see “Password Protection” on page 42).
Can I protect network folders?
Universal Shield lets you protect folders both on local and network
drives. The dialog box used for adding folders will also let you
browse network paths.
How secure is Universal Shield?
We have tried our best to make this version as secure as we could. We
take the security provided by Universal Shield very seriously. If you
have found a security related bug in the program, please contact us
(see “Universal Shield Support” on page 48), so that we can
investigate it. If you are looking for more generic tools to protect your
PC contact us.
If you think that we have missed out an important FAQ that everyone else would be interested knowing
about and it should end up in this list, please feel free to contact us and let us know so that we can add it
to this list (see “Universal Shield Support” on page 48).
Page 46
Universal Shield User’s Guide
Password Best Practices
Here are some suggestions for creating passwords to use with Universal Shield:

Use passwords with more than 6 characters, preferably more than eight.

Mix the case of letters throughout your password.

Mix alphanumeric characters and include special characters, where supported by the operating
system, such as the ones above the number keys: ! @ # $ % ^ & * ( ) _ -.

Change passwords regularly. You might change only a couple of characters that increment.

Do not use a password that would appear in a dictionary.

Do not use your name in the password, any dates (birthdates), vehicle license plates, pet names,
mother’s maiden name, etc.

Do not use network logins.

Do not write the password down and store it nearby the computer.

Do not save the password in a file, such as an e-mail, on your computer.

Do not share accounts or tell anyone your password.

If you forget your password, contact technical support. See “Universal Shield Support” on page 48.
Universal Shield User’s Guide
Page 47
Universal Shield Support
Universal Shield support is provided online, at http://www.everstrike.com/support.htm.
Before contacting technical support, have the following information available as it will help us answer
your question:

Version of Universal Shield (select Help > About)

Version of Windows NT/2000/XP version, including service packs and other fixes installed (select
Control Panel > System > General tab), and whether it's the US or an international version

Your Order Number or Registration Key (If you have already purchased a license)

Description of your problem (as much information as possible to retrieve the problem)-it's a good
idea to type this into a word processing file (such as Microsoft Word or even Notepad) so you can
reuse the text
Everstrike Software Home Page:
http://www.everstrike.com
Technical Support:
support@everstrike.com
Sales and Upgrades:
sales@everstrike.com
General Questions and
Enquiries:
info@everstrike.com
Our U.S. address:
Pacific Business Centre
Att: Everstrike Software
P.O. Box 34069 #381
Seattle, WA 98124-1069
USA
Our Canadian address:
Pacific Business Centre
Att: Everstrike Software
#101 - 1001 W. Broadway
Suite 381
Vancouver, BC V6H 4E4
Canada
FAX:
206-984-3919
(+1 309) 276 60 69
VOICE: +1-866-70-80-900
Page 48
Universal Shield User’s Guide
Uninstalling Universal Shield
The uninstall process can only be carried out if Universal Shield is not running. If you have passwordprotected Universal Shield, you will need to know the password to be able to uninstall the software. (For
more information, see “Password Protection” on page 42.)
1. Close Universal Shield.
2. Use the Windows Add/Remove Programs tool in the Control Panel to perform a clean uninstallation
of Universal Shield.
3. If Universal Shield is password protected, enter the password when prompted.
Universal Shield User’s Guide
Page 49
Glossary
Algorithms
An algorithm is a method of encryption. Universal Shield lets you use
the following algorithms: CAST, Cobra 128, PC1, Rijndael, Serpent,
TMS, tri-ple-DES, and Twofish.
For more information, see “Algorithms” on page 45.
Cancel
Clicking the Cancel button lets you exit a dialog box without saving
or applying any changes you made.
Hide
Hide means to make invisible so that somebody cannot see an object
using Windows tools, such as Windows Explorer or in a File Open
dialog box.
Hot Keys
Hot keys are keyboard combinations that activate a certain task, or
process, such as a key combination that causes the Universal Shield
software to run.
For more information, see “How to Set Hot Keys” on page 30.
OK
Clicking the OK button lets you exit a dialog box and save or apply
any changes you made.
Password
The Universal Shield software often requires you enter a password.
Type your password into the Password text box. Then, type the same
password into the Confirm text box. The Universal Shield software
requires that you enter the same password in both places, to protect
against typographical errors.
For more information, see “Password Best Practices” on page 47.
Click Next after you finish entering your password.
Trusted Process
A trusted process can see all protected objects. You might want to set
such applications as anti-virus software as a trusted process, so the
software can see protected files.
For more information, see “How to Set Up Trusted Processes” on
page 30.
Wildcards
Windows uses the asterisk (*) and question mark (?) as wild cards. In
searches, the asterisk (*) stands for any number of unknown
characters, whereas the question mark (?) stands for exactly one
unknown character.
For more information, see “How to Use File Mask to Select Multiple
Files” on page 28.
Page 50
Universal Shield User’s Guide
Index
Symbols
encryption menu 36
* 30
? 30
F
A
about 44
access permissions 14
address 48
algorithms 45
allowing some software to see hidden files 30
alt key 30
always on top 42
anti-virus 30
B
backup software 30
Blowfish 45
M
FAQ 46
favorites 25
file menu 32
find 36
find object 36
font 43
frequently asked questions 46
full access 33
G
D
date⁄time settings 25
decrypt file 39
decrypting 14
delete 34, 35
documentation 1
See also online help.
E
edit menu 35
e-mail 48
encrypt file 36
encrypting 14
encryption 20
masks 28
menus
edit 35
encryption 36
file 32
help 43
options 41
security 40
my documents 25
getting started 11
go to stealth mode 41
go to visible mode 41
N
H
O
help 43
online help 1
opening Universal Shield: See
running.
options menu 41
other access 33
C
CAST 45
change password 41
clear all 36
Cobra 128 45
combo keys: See hot keys.
contact 48
contacting us 48
context help 44
control panel 25
copy 35
ctrl key 30
customizing protection 27
launching Universal Shield: See
running.
help menu 43
help: Press F1 at any time.
hidden files
exceptions 30
hide 14
hiding
multiple files 28
Universal Shield 31
hiding files in several directories 28
hints 46
history 25
hot keys 30
stealth mode 31
how to
encrypt 20
hide a file 14
register 9
set permissions 18
set read only 18
show a hidden file 17
unhide a file 17
how to install 6
how to uninstall 49
I
Installing
how 6
Internet history 25
no access 33
P
password protection 42
PC1 45
permissions 18
phone number 48
properties 36
protect
control panel 25
data⁄time settings 25
favorites 25
history 25
my documents 25
protect after exit 42
protect included files 32
protect object 32
protect on Windows start 42
protecting Universal Shield 31
protections
customizing 27
editing 27
Q
quickly 14, 18, 25
L
language 43
Universal Shield User’s Guide
Page 51
R
V
read 33
read-only 18
register 44
registering
how 9
removing Universal Shield from
your computer 49
Rijndael 45
running Universal Shield
visibility 14, 17, 34
visible mode 31
W
Web site 48
wildcards 28
asterisk 29
question mark 29
write 34
S
sales 48
security menu 40
security tricks 25, 34
select
drive 32
Mask 32
path 32
Serpent 45
set hot keys 30
setting access 14
shift key 30
show 17
software license 6
stealth mode 31
support 48
T
technical support 48
tip of the day 44
tips 44
TMS 45
toggle protection 40
triple-DES 45
trusted processes 30, 40
turning off tips of the day 44
Twofish 45
U
unhide 17
uninstalling
how 49
Universal Shield
hiding 31
protecting 31
Universal Shield wizard 34
upgrades 48
URL 48
user guide 1
using Universal Shield 14
Page 52
Universal Shield User’s Guide