-------------------------------------------------------------------------------
Operation Manual for Comarch         
                                            Ver.0.50Beta      05/10/1996
-------------------------------------------------------------------------------
                                          Kazuki Komagome / komagome@tsukuda.jp
-------------------------------------------------------------------------------

0. Introduction
What is Comarch?
Comarch is short for Communication Archiver. Maybe most of you are not familiar
with the term "Communication Archiver". It can be briefly explained as an
archiver designed for the use on communication (electric traffic and
distribution). This is to explain how Comarch is different from those well-
known archivers such as ZIP and LHA.

Comarch has the following advantages:
1) The resultant archived file itself is encrypted, so that no other people
   than the user can decode it.
2) Directory structure can be stored into the archive.
3) Without decoding the archive, the contents can be directly executed as the
   archive is regarded as a drive (folder).
4) With its security function, many new applications can be considered

=================================================================
Some Tips on Comarch Usage:

*It's safe to exchange confidential mails/letters through internet or public
 domain BBS's.
*The hierarchical structure for individual users on a large scale server can
 be simplified, and yet even the system administrator cannot access to the 
 information contained in the archive made by other than him.
*Pay data such as video and PC software can be stored as an archive on a
 network or CD-ROM, so that the seller can lease such to the customer on an
 hour or time basis.  
*Even non-executable files can be controlled by the password. It can simplify 
 the distribution of demonstration files or files containing secret individual
 information to be exchanged on the purchase of, for example, software or any
 other commodity.
*Even those who are not capable of programming or do not have a server, can 
 open an e-shop.
*There are many other possible applications considered depending on your idea. 

1. How to use the archived file:
This is to explain how one can make use of the archived file made from ComArc.
The extension of the archived file ends with "*.cac".

 A. How to put the network redirector of Comarch as TSR (for DOS, Windows3.1, 
    Windows95):
      Add the following line preferably to the bottom of AUTOEXEC.BAT: 

            [drive:] [path]comarc.exe

After rebooting, the redirector becomes usable. Why it should be put into the
AUTOEXEC.BAT for Windows95 is because it must be loaded into the global memory.

 B. How to map to a local drive:

	In the case of DOS:
          Run the following line at the DOS prompt:

             carcatds.exe [drive:] [cac file] ["user_id" password]

*If ID is not used, make sure to insert "" (two double quatations)before
 password. 


	In the case of Windows3.1/Windows95:
          From "Choose File and Run" or File Manager or Explorer, run
          "carcatch.exe".  Then, follow the instruction on the screen.
          Drag&drop function is supported. *.cac files can be searched.
          It is advisable to relate the *.cac to the carcatch.exe. Once it is
          mapped, the mapping information can be memorized, so that the 
          archive will be automatically and permanently mapped to the
          designated drive on the subsequent startup.
 

*After the mapping, you can use the archive just as a conventional local drive.
(Common for DOS and Windows3.1/95).There are cases where mapping can not be 
done if any other redirector has reserved any drive that Comarch can not 
recognize.

2. How to make an archived file:
Comarch makes an archive by archiving a multiple number of files/directories.

+Archiving
   For DOS:

Format:
 usage  : KOMA [options] archname.CAC structfile
 options: [-u][-g][-k key][-p passwd][-v validate][-t timeout][-c count]
     -u : Unpack
     -g : use Auto-Generate password function
     -k : specify Generate-key (Max:16bytes)
     -p : specify Password (Max:16bytes)
     -v : specify Validate time (yyyy-mm-dd/hh:mm:ss(GMT))
     -t : specify trial Timeout (nnS,nnM,nnH,nnD,nnMO,nnY)
     -c : specify usage Count limit (counts)
 structfile : filename attr (See stru_smp.txt)

Example:
koma -p Password -v 1997-01-01/00:00:00 -t 14d sample1.cac filelst.txt

An example of structfile
# [#] comments out.
#On each line, you can set a file name and attribute.
#Format: \path\filename attr
#
#*The following file attributes can be set:
#You can apply the following attributes to each file and directory .
#
#	D: 	Demo mode(readable under General/Restricted Mode only)
#	P: 	Product mode(readable under Registerd Mode only)
#	E: 	Expire mode(readable under Expired Mode only)
#   (none)	always readable
#
#More complicated options are available, but these are not disclosed as of
#this release.
#
#body
.\test\readme.txt 
.\test\sample.exe D
.\test\real.exe P
.\test\data P
.\test\data\contents.dat P
.\test\register.doc E
[eof]


  For Windows3.1/Windows95

>From File Manager or Explorer etc., you can drag and drop a file to respective
 attributed boxes.
When the security function is not used, you can freely drag and drop files
 from, for example, File Manager into General mode box.

Security and Access Level Setting
When to use the security function, you need to enter a password.  This
will control the security throughout the Comarch operation.


*Any other file attributes and user modes than above will not be 
disclosed for an unforeseeable period of time.


[Useage of Auto-Generate Password Function]

When to use the Auto-Generate Password Function, run carcmake.exe and click the
 "create". Then, check the box named "Use Auto-Generate Password Function", and
 specify Generate Key. When to distribute the auto-generated password to
 respective users, you need to obtain an exclusive ID (16 letters, max.) from
 each user, and then run the keygen.exe to process the passwords.

How to use keygen.exe:
Format:
keygen.exe generatekey user-ID

At here, the generratekey means the one that was used at the time of 
processing *.cac file(s). The user-ID here is an ID that authorizes the use of
registered mode. It is suggested that you use an exclusive ID (eg. your name,
telephone number, mailing address, etc.), otherwise anyone who uses the same 
ID may have the same password.


List of Files in Comarch:

Comarc.EXE=Comarch Redirector for DOS/Win
CARCATCH.EXE=Comarch Attach Manager for Windows
CARCATDE.DLL=Comarch Attach Manager's DLL for English
CARCATDJ.DLL=Comarch Attach Manager's DLL for Japnanes
CARCATDS.EXE=Comarch Attach Manager for DOS 
CARCMAKE.EXE=Comarch Archive Maker for Windows
KOMA.EXE=Comarch Archive Maker for DOS
KEYGEN.EXE=Comarch Password Generator
STRU_SMP.TXT=Usage structfile
README.TXT=This file
READMEJ.TXT=readme.txt Japanese edition
VERSION.txt=Version information
VERSIONJ.TXT=Version information Japanese edition


Files to be added after the release of the formal version (subject to change): 

Ecashagt.EXE=Electlic Commerce Agent for Windows
SETUP.EXE=Comarch Installer

3. License Agreement
You can use this software as long as the usage is limited to non-profitable
purposes. We, however, do claim that we retain the copy rights and any other
intellectual properties pertaining to this software.  The following conditions
must be observed, otherwise you must give up using this software:

1)  Do not modify the copyrights indication.
2)  When to distribute for non-profitable purposes, all these files must be
    included in the distribution file.
3)  Any modification, conversion, betterment or reverse engineering of Comarch
    is not permitted whatsoever.
4)  We are free from any liabilities to possibly arise from the usage of this
    software. In no case, the user shall file a any damage claim with us.
5)  The programmer(s) of this software are not responsible for correcting any
    possible bug(s) for this software.
6)  When to re-distribute this software attached or bundled to media such as 
    magazines and hardware, the copyrights must be clearly and visibly
    indicated on the recording media or packages.

When your planned usage may possibly infringe the copy rights and/or 
intellectual property, you must contact us via E-mail before you actually
start using this software. In most of the cases, we will try our best to meet
your proposal.

4. Contact
You are advised to feel free to send us at the following addresses, your
report on how good or bad this software is, any bugs observed, etc.:


   E-mail
          E-mail:GGH00623@niftyserve.or.jp

   Postal Mail
          (Mr.) Kazuki Komagome
          1-10-11 Tsukuda, Chuo-ku, Tokyo 104 Japan
    @    

5. Introduction to Authors
   Kazuki Komagome:  He happened to come up with the idea of this software.
                     He is a terrible PC maniac!
   Suminobu Akiba :  He designed the algorism of this software.
                     He is a classic wine enthusiast.
   Masamichi Kuma :  He is the main programmer of this software.
                     He is a high-tech equipment collector.


*Credits
Special thanks go to those who cooperated with us in making this software.
Especially, we thank Attchan Nakamura for making splendid GUI's for this
program, Yas (JA8SCD) for supervising English text translation. Mr.Yukawa, 
Mr.Asai and Mr.Morita for pleasingly(?) backing us up throughout the making
of this software.


Copyright(c)Kazuki Komagome, Suminobu Akiba, Masamichi Kuma 1995,1996 
All rights reserved