A system for manipulating a computer file and/or program. The system
includes a serving device having access to a computer file and/or program
which is unencrypted and which can encrypt the unencrypted computer file
and/or program to become an encrypted computer file and/or program and
transfer it. The system includes a connector connected to the serving
device on which the encrypted computer file and/or program travels and to
which the serving device transfers the encrypted computer file and/or
program. The system includes a client device which receives the encrypted
computer file and/or program and decrypts the encrypted computer file
and/or program back to the unencrypted computer file and/or program. The
client device does not allow intervention to the encrypted computer file
and/or program during a time when the encrypted computer and/or file
program is received. The serving device is separate, apart and distinct
from the client device. A method for manipulating a computer file and/or
program. The method includes the steps of suspending intervention by a
user at a client device of the client device. Then there is the step of
encrypting an unencrypted computer file and/or program at the server
device to form an encrypted computer file and/or program. Next there is
the step of transferring the encrypted computer file and/or program to
the client device along a connector connected to the client device and
the server device. Then there is the step of reestablishing the
intervention of the client device by the user.