Enhanced/Dual Powered

Willem EPROM Programmer

User Guide  

 

Willem Package Item Image

Supported IC List

Installation & Configuration

Jumper Configuraton

Self Test Function

Software Interface

FLASH Chip Programming

EPROM Chip Programming

EEPROM Chip Programming

ATMEL Chip Programming

PIC Chip Programming

AVR Chip Programming

ATMEL AT89 Adapter

ATMEL PLCC44 Adapter

TSOP48 Adapter

 

Willem Package Item Image  

Main Board / Cables

Main Board PCB3.5

secure crt 8

 

Main Board PCB4E

secure crt 8

 

Main Board PCB5.0

secure crt 8

 

Main Board PCB5.5C

secure crt 8

 

Parallel Data Cable (Printer extension cable, with male-female 25 pin connector, and pin to pin through)

A-A type USB cable(for power)

secure crt 8

secure crt 8

                                

          

Optional Items:

ATMEL 89 Adapter

ATMEL PLCC 44 Adapter

TSOP 48 Adapter

secure crt 8

secure crt 8

secure crt 8

FWH/HUB PLCC32Adapter

PLCC32 Adapter

SOIC Adapter(Simplified)

On-Board

On-Board

secure crt 8

AC or DC Power Adapter (9V or 12V, 200mA)

SOIC Adapter(Professional)

 

secure crt 8

secure crt 8

 

 

Supported Device List

Secure Crt 8 -

Abstract As organizations increasingly rely on remote access to network devices, servers, and cloud infrastructure, the security of terminal emulation software becomes critical. Secure CRT, developed by VanDyke Software, is a widely used SSH, Telnet, and serial client. Version 8 introduced several significant security improvements, including stronger cryptographic defaults, enhanced key management, FIPS 140-2 compliance, and improved session logging security. This paper analyzes the security architecture of Secure CRT 8, compares it with prior versions, and provides actionable best practices for secure deployment. 1. Introduction Terminal emulators are a foundational tool for system administrators, network engineers, and security professionals. They provide command-line access to remote systems. However, insecure terminal software can expose credentials, session data, and command history to attackers. Secure CRT has long been recognized for its robust SSH implementation. Version 8 (released in 2018) marked a major update with a focus on modern cryptographic standards and enterprise security requirements.

[SSH2] Host Key Algorithm=ssh-ed25519,ecdsa-sha2-nistp256 Encryption=aes256-gcm,aes256-ctr MAC=hmac-sha2-256 Compression=no Authentication=publickey,keyboard-interactive Disable Password Storage=yes FIPS Mode=yes | Feature | Secure CRT 8 | PuTTY | MobaXterm | OpenSSH (CLI) | |---------|--------------|-------|-----------|----------------| | GUI Session Manager | Yes | No | Yes | No | | FIPS 140-2 Mode | Yes | No | No | Yes (custom compile) | | Encrypted Logs | Yes | No | Limited | No | | Hardware Key Support | Yes | Limited | No | Yes | | Scripting Security | VBScript/Python with permission prompts | No | Yes (weak sandbox) | Native | secure crt 8

| Threat | Mitigation in Secure CRT 8 | |--------|-----------------------------| | Man-in-the-middle (MITM) | Host key verification with SHA-256 fingerprints; optional PKI-based host certs | | Replay attacks | SSH2 sequence numbers and session ID | | Session sniffing | Mandatory encryption (no Telnet without warning) | | Key theft | Encrypted key storage, optional TPM/HSM support | | Log tampering | Integrity checks and encrypted logs | | Malicious session logging | User-configurable log redaction | Abstract As organizations increasingly rely on remote access

 

Hardware Installation & Configuration

Installation Steps
  

  • Check the parallel printer port setting in the bios, it should be EPP or Normal.
  • Check there are any active resident programs that use the printer port, such as TWAIN drivers. You may have to remove it.
  • Connect one end of the 25 pin SubD parallel cable  to PC printer port
  • Connect the other end  of parallel cable to 25 Pins port of the programmer
  • Connect USB power cable or AC adaptor (Note: if you are working on the EPROM programming. You may need use a AC adaptor, so that you can get Vcc 5.6V and 6.2V when doing programming)
  • The yellow power normal indicator of the programmer should light up, then the programmer power supply is normal.
  • Run the software
  • Select devices type
  • Click the Willem in toolbar to change to PCB3
  • Set the DIP switch based on the displayed pattern.

          (Note: the LPT port of PC MUST set to ECP or ECP+EPP during BIOS setup. To enter the BIOS setting mode, you need press "Del" key or "F1" key during the computer selftest, which is the moment of computer just power up.)

 

Software Version To Use

The software can be download from download.mcumall.com  

There are board hardware selection jumper on the board. When set the jumper to PCB3B, then user have to use 0.97ja and before version software.

If the board selection set to PCB3.5, PCB5.0, PCB5.5C, then the software 0.98D6 should be used.

 

          The software interface:

 

secure crt 8

 

Hardware Check

After start the program, click test hardwar under Help menu. If the connection and power supply is normal, then appears: "Hardware present"   Otherwise check if the programmer connects well with PC, or power supply is normal.

 

Jumper Configuration

 

PCB3.5/PCB4E

secure crt 8  
(Two PLCC32 adapter is not applied on the PCB4E)

 

PCB5.0

secure crt 8

 

PCB5.5C

 

secure crt 8

Note: the Vcc setting jumper only has effect when you are using AC adaptor as power source. For the USB power only 5V Vcc is available.

For the PCB5.5C, set DIP steps:

1. press DIP Set button twice to check current DIP bit position. Then set it again for ON or OFF.

2. press DIP Bit shift button to shift the DIP bit position to where need to set. And then press DIP Set button twice to check current DIP bit position. Then set it again for ON or OFF.

3. Repeat those steps till all DIP bit ae set  same as software indicated.

For PCB5.5C voltage and Special chip selection:

1. Put back the safety jumper.

2. Press the voltage button and hold for 1 second, the voltage LED should move to next. Repeat till desired voltage LED light up.

3. Press the chip selection button and hold for 1 second, the chip LED should move to next. Repeat till desired LED light up.

4. Remove the safety jumper to lock the selected voltage and chip selection

 

DIP Switch (PCB3.5, PCB5.0)

secure crt 8 

When programming one chip,  follow the program prompt to set DIP switch . 

 

 

Self Test Function 

Abstract As organizations increasingly rely on remote access to network devices, servers, and cloud infrastructure, the security of terminal emulation software becomes critical. Secure CRT, developed by VanDyke Software, is a widely used SSH, Telnet, and serial client. Version 8 introduced several significant security improvements, including stronger cryptographic defaults, enhanced key management, FIPS 140-2 compliance, and improved session logging security. This paper analyzes the security architecture of Secure CRT 8, compares it with prior versions, and provides actionable best practices for secure deployment. 1. Introduction Terminal emulators are a foundational tool for system administrators, network engineers, and security professionals. They provide command-line access to remote systems. However, insecure terminal software can expose credentials, session data, and command history to attackers. Secure CRT has long been recognized for its robust SSH implementation. Version 8 (released in 2018) marked a major update with a focus on modern cryptographic standards and enterprise security requirements.

[SSH2] Host Key Algorithm=ssh-ed25519,ecdsa-sha2-nistp256 Encryption=aes256-gcm,aes256-ctr MAC=hmac-sha2-256 Compression=no Authentication=publickey,keyboard-interactive Disable Password Storage=yes FIPS Mode=yes | Feature | Secure CRT 8 | PuTTY | MobaXterm | OpenSSH (CLI) | |---------|--------------|-------|-----------|----------------| | GUI Session Manager | Yes | No | Yes | No | | FIPS 140-2 Mode | Yes | No | No | Yes (custom compile) | | Encrypted Logs | Yes | No | Limited | No | | Hardware Key Support | Yes | Limited | No | Yes | | Scripting Security | VBScript/Python with permission prompts | No | Yes (weak sandbox) | Native |

| Threat | Mitigation in Secure CRT 8 | |--------|-----------------------------| | Man-in-the-middle (MITM) | Host key verification with SHA-256 fingerprints; optional PKI-based host certs | | Replay attacks | SSH2 sequence numbers and session ID | | Session sniffing | Mandatory encryption (no Telnet without warning) | | Key theft | Encrypted key storage, optional TPM/HSM support | | Log tampering | Integrity checks and encrypted logs | | Malicious session logging | User-configurable log redaction |