EnSC: How to secure your shortcuts?

Installation:

1. Check if your system matches the system requirements.
2. Download the ZIP package.
3. Extract the program in convinient place for you (e.g. C:\EnSC, C:\Program Files\EnSC, D:\EnSC...)
(there will be installer with the next version)
4. Start the EnSC.exe for first time
Encrypted Shortcuts Request Code

5. Copy the Request Code and get a free Response Code.
6. Choose your own Master Code. The harder it is, the hard it will take to someone to crack your encrypted shortcut.
7. Start using EnSC!
You can also check:
Great review on AddictiveTips
It is with screenshots and full explanation. Better than mine here.
Also in Spanish: NeoTeo (Spanish)

Important: When you create your first shortcut it will look like shortcut.ensc.
When you try to open it, you should point the EnSC.exe and you can assosiate this filetype to be opened always with EnSC.exe for your convinience.
OR You can use the following content for ".reg" file modified for your needs and your ensc program path:

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Classes\rsc.ensc.v1\shell\open\command]
@="D:\\EnSC\\ensc.exe \"%1\""
[HKEY_CURRENT_USER\Software\Classes\.ensc]
@="rsc.ensc.v1"

Manual:

Encrypted Shortcuts with Passwords

1. Enter your parameters in the empty text boxes.
2. Use the Test button to test if they are working.
3. Use the Create Encrypted Shortuct button to create your shortcut in the EnSC working dir.
4. Open your shortcut with EnSC

Soon, there will be version of EnSC that can be used in batch files as command line tool to open some shortcut packed with it.
This will give System administrators the ability to create elevated installation packages or batch jobs and use them across lots of computers.

Usage Examples:

"Path:" = "Program Path:" in EnSC

Map Network Drive with Username and Password:

Path: C:\Windows\system32\net.exe
Arguments: use x: \\server\share /USER:"username" "password"
(without the quotes)

Map Network Printer to LPT port with Username and Password:

Path: C:\Windows\system32\net.exe
Arguments: use lpt2 \\pserver\laser1 /persistent:yes /USER:"username" "password"
(without the quotes)

Elevated Notepad:

Path: C:\Windows\system32\notepad.exe
User:"your PC Administrator Username"
Pass:"your PC Administrator Pass"
(without the quotes)

Novell GroupWise Notify/Client Username and Password Switches:

Path: C:\Program Files\Novell\GroupWise\grpwise.exe
Arguments: /@u-"your username" /pwd-"your password"
(without the quotes)

Guild Wars password in shortcut

Path: C:\Program Files\Guild Wars\Gw.exe
Arguments: -password "PASSWORDHERE"
(without the quotes)

Folder Guard password in shortcut to unlock folder

Path: C:\Program Files\Folder Guard\FGKey.exe
Arguments: /UNLOCK:"C:\My Private Files" /PASSWORD:green

UltraVNC shortcut with password

Path: c:\program files\ultravnc\winvnc.exe
Arguments: -autoreconnect -connect 12.34.56.78 -password MyPASS

Open Access MDB file with user and password shortcut

Path: C:\Program Files\Microsoft Office\Office\msaccess.exe
Arguments: /wrkgrp "X:\WorkgroupFile.mdw" "Y:\Database.mdb" /user UserName /pwd Password