home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
CICA 1995 May
/
cica_0595_4.zip
/
cica_0595_4
/
UTIL
/
LOCKAP22
/
USERMAN.TXT
< prev
next >
Wrap
Text File
|
1994-12-01
|
8KB
|
391 lines
Lock Tools User Manual
Steve Clarke
May 1994
Lock User Manual Page 2
INTRODUCTION
The Lock Tools are provided as network independent tools
which are used together to provide license limiting support
to applications which are stored on a network file server.
The tools work by attempting to book out a copy of an
application when you select it, and then book the
application back in when you have finished with it.
PROGRAMS
There are two user utilities provided to help in using the
locked applications. These are:
LOCKINFO
LOCKRM
These applications are discussed in the following sections.
05/17/94
Lock User Manual Page 3
LOCKINFO
This application is used to enquire which applications are
in use, and by whom. The program has three modes of
operation:
i. General Enquiry Mode
Simply type lockinfo, and you will be presented with a list
of applications, how many are available, and how many of
those applications are being used. The output of this mode
will look something like this:
L:\LOGIN>lockinfo
WIN: 0 copies running. Maximum 5 copies
LOTUS: 0 copies running. Maximum 3 copies
WINWORD: 1 copies running. Maximum 2 copies
BC: 0 copies running. Maximum 2 copies
The program list the applications available, shows how many
of those applications are in use, and how many copies of the
applications are stored on the network. When the list is
more than one screen long, the output is paused - hit any
key to continue.
ii. Specific Enquiry Mode
To find out who and where people are who are using a
specific application, type:
lockinfo appname
Where appname is the name of the application as displayed in
the General Enquiry Mode. The output of this mode will look
something like this:
L:\LOGIN>lockinfo winword
Microsoft Word for Windows Version 2.0c
Steve_Clarke D Sat May 14 13:43:57 1994
Diane_Clarke E Sat May 14 13:05:12 1994
2 copies running. Maximum 8 copies
L:\LOGIN>
The output is split into three main sections, the first is
the line which specifies the application name (in this case
Word for Windows Version 2.0c), The next section is
05/17/94
Lock User Manual Page 4
a series of lines, one for each copy of the application
which is booked out. These lines are made up of the user
name, a one or two letter machine identification string, and
the date that the application was run. The final section is
a summary specifying how many copies have been used, and how
many copies are on the system.
iii. Silent Mode
This mode is provided for use in batch files. It enables
the batch file to find out if there are any applications
free, by returning (in the DOS errorlevel variable) the
number of available copies of a specific program.
The following example shows how the program can be set up to
run Windows 3.1, and if there are no copies left, run
Windows 3.0.
@echo off
lockinfo -s win31
if errorlevel 1 goto Ok31
lockinfo -s win30
if errorlevel 1 goto Ok30
echo There are no copies of Windows 3.1 or Windows 3.0
available
goto Fin
:Ok31
L:\WIN31\WIN31
goto Fin
:Ok30
echo There are no copies of Windows 3.1 available, running
ver 3.0
L:\WIN30\WIN30
:Fin
For Windows users, LOCKINWIN has been written by David
Morris.
05/17/94
Lock User Manual Page 5
LOCKRM
One of the things that the locking system does, is not to
allow the same user on the same machine to run the same
program more than once. This is done to avoid the user
taking out two lock tokens unnecessarily.
If the machine crashes whilst running the application, and
the only way to get out of the situation is to reboot, any
application which was being run at the time will still be
locked out.
Removing the locks for the machine involve the user logging
in again, and typing:
LOCKRM
This will remove any locks, and then force the user to
reboot the machine.
Depending on the network type, the locks may be removed by:
The Original User on the Original Machine
Any User on the Original Machine
The System Manager on Any Machine
Please check with your system manager to find out which one
of the above applies.
05/17/94
Lock User Manual Page 6
ERROR MESSAGES
The following error messages are due to an inconsistency in
the system configuration. Report them immediately to your
System Administrator.
Unrecognised Machine Identification
Unable to Find Overlay Application
Unable to Create Application Lock
Unable to Remove Application Lock
Unable to Execute Application
- Invalid Program Path
- Invalid or Corrupt Program
- WinExec Error nn
Unable to Access INI Data
INIFile Error: ...
Unable to Execute Application - Insufficient Memory
This error message may be generated if you are attempting to
load too many programs (or too large a program) into a
Windows session. To avoid the error message, shut down some
running applications. If this does not solve the problem,
seek help from the System Administrator.
This Application is Already Running on This Machine
Either the application is running on the machine (another
Windows application, a DOS application in a DOS Window, or a
DOS application in an application DOS shell), or the machine
has crashed when an application was running. Either use the
running application, or use LOCKRM to remove the incorrect
locks.
Too Many Copies. Try Again Later
You have attempted to book out one more copy of an
application than has been allowed. Use LOCKINFO to find out
who and where the applications are being used, and wait.
05/17/94
Lock User Manual Page 7
05/17/94