You can download the zip file from the link on the Download's page. It contains both Yull.exe and YullG.exe (the Console and GUI versions), along with some folders containing practice source files, a Guide to Yull pdf, a READMEFIRST text file and a start YullOptions file.
Most people do not feel their data is at risk, or that the risk is very low, and hopefully they are correct. If there is nothing on your computer you wouldn't mind sharing with the world, then don't bother with encryption. Encryption can definitely have an impact on your work pattern. BUT if you have data you really want to keep private, you absolutely need to keep private, encryption is the way to go. There are many encryption products available, but obviously I think Yull is better than them all.
For instance, if you store sensitive data on the Cloud which is potentially accessible by unauthorized entities (as has been noted in news articles), you should consider encypting it first. If you share sensitive data with co-workers or others, using YULL you can easily send them the encrypted options file so they can decrypt your data.
For one, Yull encrypts its data millions or even billions of times, depending on the settings and the size of the data. Also, if you use Yull's Personal Data feature and keep that private (which is explained on the Guide page), someone could steal all your data, Yull itself, your encrypted files, the key, your settings, all of it and your data will still be safe.
Nothing. If you have created a default key and folder for Yull, you can easily delete them. Yull otherwise does not alter your computer in any way. If you so choose, it will create an optional Default Folder and key. And these are just folders and files you can easily delete. The only thing secret with Yull is your data.
In other words you can just delete the executables. Of course, make sure before you do that all encrypted files are either decrypted or you are totally certain they do not need to be. That is to say, you have a back up of the orginals or you were only working with my test files.
Absolutely not. The government has blessed an encryption algorithm called AES (Advanced Encryption Standard), based on an algorithm called Rijndael, a cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen. There are several other standards. Yull uses it's own encryption algorithms combined with Blowfish. Additionally, if you are from a school or any institution, and want to see the source code, please just ask (and I might say yes). Yull has six encryption modes (and you can set up your own), which control the read size and some other features. At the highest mode, MAX, some files undergo billions of encryptions.
No and nothing. Yull is entirely a desktop application. There is no backdoor. There are no cryptokeys. Yull does output a history of what you do but you can stop that, you can delete the history file, you can encrypt your history file, but besides the history file (which is for your convenience), there is no way to track what Yull does. So, again, there is no backdoor to it and there are no "cryptokeys" to it. Yull sends no data to the Internet and doesn't use the Internet at all. In other words, no one will ever know you use Yull or what you do with it.
Some people ask if it's an acronym, or it means something in a language. Perhaps it does. I wouldn't know. I tried to think of something like Blue this or that which sounds cool or Encryptor which sounds like it's from a movie, or maybe something with funky wIErd capitalization. I think most of the good names are taken, so "yull" just came to me as a name that hopefully no meaning. Think of it as "yull never have to worry about your data."
Because certain "entities" can break into almost anything, you cannot be too careful.
Please validate your copies of Yull.exe, Yullg.exe and the Yull zip file by comparing the SHA-1
hash after downloading them to the ones in the zip file and on the web site.
I used the File Checksum Integrity Verifier version 2.05. and ran it this way, in DOS (the CLI) or Powershell, for example:
fciv -sha yull.exe
The numbers and letters you get for yull.exe (or any hash) should match what is here.
You will find information on fciv from a web search. You can go directly to this page:
Microsoft Support for FCIV
The zip file
YullExtras.zip contains 115 test files in the
SAMPLESOURCEFILES folder which are useful in getting up to speed with Yull without impacting your own data.
The files in the source folder are various types: ASCII, non-ASCII (i.e., just binary data), 0 length files, tiny files, etc.