home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-02-10 | 63.5 KB | 1,915 lines |
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- ________________________________________________
- | |
-
- | |
- PC-SENTRY USER DOCUMENTATION
- | |
-
- | |
- Copyright (c) - 1991
- | |
- Solid Oak Software Inc.
- | |
- All Rights Reserved
- | |
-
- | |
- ________________________________________________
- | |
-
-
-
-
-
-
-
- Solid Oak Software Inc.
- Solid Oak Software Inc.
- P.O. Box 31004
- Santa Barbara, CA 93130
- 805-682-3202 FAX 805-569-0451
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Table of Contents
- Table of Contents
-
-
- License Information.............................................2
-
- Introduction....................................................3
-
- Distribution Disk Contents......................................5
-
- Notes on Program Usage..........................................6
-
- Installation....................................................7
-
- Operation.......................................................8
-
- SENTRY.EXE......................................................9
-
- PCS.EXE........................................................10
-
- LOGENTRY.EXE...................................................13
-
- VIEWLOG.EXE....................................................14
-
- PRINTLOG.EXE...................................................15
-
- MAINTLOG.EXE...................................................16
-
- PRINLOCK.EXE...................................................17
-
- FLOPLOCK.EXE...................................................18
-
- FILELOCK.EXE...................................................19
-
- LOCKIT.EXE.....................................................21
-
- SENTRYID.EXE...................................................22
-
- PCSLOAD.EXE....................................................23
-
- Appendix A Log File Entries..................................24
-
- Appendix B TSR Program Usage Notes...........................27
-
- Appendix C Known Conflicts...................................28
-
- Appendix D Important Considerations..........................29
-
- Appendix E Technical Support Policies........................30
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 1
-
-
-
-
-
-
-
-
-
-
- Information on Licenses
- Information on Licenses
-
-
- Corporate and Governmental Site License
- Corporate and Governmental Site License
-
- This type of license allows use of the software within your
- company or government agency, and is not transferable. This
- allows internal use and copying of the software for as many sites
- / computers as contracted for. An unlimited Site License allows
- unlimited copying of the PC-SENTRY software for internal use by
- _________
- your company or government agency. Distributing, repackaging, or
- reselling of the software to third parties is not allowed.
-
-
- Private Use
- Private Use
-
- A single user license is required for any person using PC-SENTRY.
- _________
- A single user license is granted to the individual, registered,
- user. The individual, registered, user may use PC-SENTRY on any
- _________
- computer, and install PC-SENTRY on any number of computers, as
- _________
- long as PC-SENTRY is run on only one computer at a time. Under no
- _________
- circumstances is an individual user allowed to run PC-SENTRY on
- _________
- more than one computer concurrently.
-
-
- DISCLAIMER
- DISCLAIMER
-
- SOLID OAK SOFTWARE INC. hereby disclaims all warranties relating
- to this software, whether express or implied, including without
- limitation any implied warranties of merchantability or fitness
- for a particular purpose. SOLID OAK SOFTWARE INC. will not be
- liable for any special, incidental, consequential, indirect or
- similar damages due to loss of data or any other reason, even if
- SOLID OAK SOFTWARE INC. or an agent of SOLID OAK SOFTWARE INC.
- has been advised of the possibility of such damages. In no event
- shall SOLID OAK SOFTWARE INC.'s liability for any damages ever
- exceed the price paid for the license to use the software,
- regardless of the form of the claim. The person using the
- software bears all risk as to the quality and performance of the
- software.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 2
-
-
-
-
-
-
-
-
-
-
- Introduction
- Introduction
-
-
-
- PC-SENTRY is a collection of utilities designed to provide
- __________
- various levels of system security, activity logging,
- productivity analysis, job costing, and data protection.
-
-
- PC-SENTRY provides the user with the capability to prevent
- _________
- the removal or copying of sensitive data or programs, and
- automatic logging of system activities, all running
- invisibly in the background, taking up a minimum of memory.
-
-
- PC-SENTRY is a commercial product consisting of several
- _________
- utilities. The shareware version is distributed with a
- logging utilities ( PCS ), a setup program ( SENTRY ), and a
- log file reading/printing utility ( PRINTLOG ).
-
-
- PCS is the main module of the PC-SENTRY collection. It is a
- ___
- small ( 9K ), memory resident ( TSR ) program, that allows
- the user to maintain a daily log file of activities that
- take place on his or her computer. PCS will automatically
- ___
- keep a record of all programs run, files copied, files
- deleted, files created, and files opened, as well as the
- date and time that each activity occurred. PCS also keeps a
- ___
- record of each command line entry. PCS has many potential
- ____
- uses including security, productivity, diagnostics, job
- costing, etc. All monitoring and logging activities are
- performed COMPLETELY in the background. The user will not
- even be aware of it.
-
-
- PCS also monitors keyboard usage. It monitors periods of
- ___
- keyboard inactivity in 15 minute increments, as well as
- average keystrokes per minute.
-
-
- There are many situations where this type of logging can be
- useful. If you like, you can determine how much time was
- spent on a particular project by examining the log files.
- If you are an employer, you might want to check the log
- files periodically to determine the quantity or type of work
- that was done, or even check to see if your employee was
- playing space invaders or writing a letter to Aunt Jane
- while they were supposed to be working.
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 3
-
-
-
-
-
-
-
- In some business environments, activity logging can play an
- even more important role. It can easily be determined if a
- program, or sensitive data, was copied to a floppy disk, of
- if unauthorized access was made to sensitive files or
- programs. Many large corporations have policies against
- illegal copying of software, and regularly check computer
- systems to ensure that the users are not using programs they
- are not licensed to use. PCS can make that job easier, by
- ___
- creating records of any file that was added to the system,
- or copied or removed from the system. Since PCS is active at
- ___
- all times, records are kept of ALL computer activity, even
- after business hours, or on weekends.
-
-
- Of course most expert computer operators could defeat the
- PC-SENTRY programs, if they knew they were installed, and
- _________
- what they do. In the normal environment, however, the user
- would never have a clue that their activities were being
- logged. PCS only writes to the log file when other disk
- ___
- activities are being performed. So it makes it almost
- impossible to tell that it is working, even if you are aware
- that they are installed.
-
-
- All of the PC-SENTRY programs are designed to operate as
- _________
- transparently as possible. All but the most sophisticated
- users will notice no difference in normal day to day
- computer operation. All while the PC-SENTRY programs are
- _________
- providing complete records of all activities silently in the
- background.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 4
-
-
-
-
-
-
-
-
-
-
- Distribution Disk Contents
- Distribution Disk Contents
-
-
- Shareware and Commercial Versions:
- __________________________________
-
- SENTRY.EXE..........Installation Program
-
- PCS.EXE.............Activity and Keyboard Logging Program
-
- PRINTLOG.EXE........Log Printing Program
-
-
- Commercial Version:
- ___________________
-
- LOGENTRY.EXE........Command Line Log Comment Program
-
- VIEWLOG.EXE.........Log Viewing Program
-
- MAINTLOG.EXE........Log Maintenance Program
-
- PRINLOCK.EXE........Printer Lock-out Program
-
- FLOPLOCK.EXE........Floppy Drive Lock-out Program
-
- FILELOCK.EXE........File Encryption Program
-
- LOCKIT.EXE..........Hard Disk Lockout Program
-
- SENTRYID.EXE........Provides System ID Information
-
- PCSLOAD.EXE.........Automatic Application Loading Program
-
-
- Shareware Version:
- __________________
-
- ORDER.DOC...........Shareware Order Form
-
- PCSENTRY.DOC........This File
-
-
- May be included with either version:
- ____________________________________
-
- README.DOC..........Text file containing revision, ordering or
- other information
-
- ERRATA.DOC..........Text file containing corrections to
- documentation
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 5
-
-
-
-
-
-
-
-
-
-
- Notes on Program Usage
- Notes on Program Usage
-
-
- It may seem at first, that there are too many individual programs
- where the same results could have been accomplished by fewer
- programs that had more features. To some extent this may be
- true, but the PC-SENTRY collection is designed to be as flexible
- and provide as secure an environment as possible.
-
- In designing PC-SENTRY, we focused mainly on the corporate and
- _________
- governmental environment. There are many potential uses for PC-
- ___
- SENTRY, and in each case the level of security desired will be
- ______
- different. Log viewing and maintenance were broken up into their
- component parts for instance, to allow the PC Manager to remove
- any or all of the utilities from a particular computer, to allow
- the user of that computer full, limited, or no access to log
- files.
-
- In the case of the TSR ( memory resident ) programs, it would
- have been possible to combine many of the different programs into
- one larger program that would use different command line
- parameters to set the options that might be required. This would
- have created a program that used considerably more memory, and
- would have slowed execution speed as well. There is another
- benefit in that while there are more program names to call, there
- are less options to remember, and, in most cases, none at all.
-
- Except where noted, all programs can work separately or together.
- The programs that use log files, all will use the same log file
- for that day. Programs that use internal password functions all
- use the same internal password.
-
- All PC-SENTRY programs can all be RENAMEd if desired, to provide
- _________
- additional protection against unauthorized usage. All files
- created by the commercial version of PC-SENTRY are either hidden,
- _________
- encrypted, or protected from viewing, printing, copying, and
- deletion, without the appropriate PC-SENTRY utility.
- _________
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 6
-
-
-
-
-
-
-
-
-
-
- Installation
- Installation
-
-
-
-
- To install PC-SENTRY, simply place the distribution
- diskette in a floppy drive, A: for instance, and type
- A:SENTRY.
-
- You will be prompted for a drive and directory where
- you want the PC-SENTRY programs installed. The
- directory should be one that is included in your DOS
- PATH statement in your AUTOEXEC.BAT file. If you
- specify a directory that doesn't exist, it will be
- created for you. You should then remember to add the
- new directory to your DOS PATH statement. SENTRY will
- copy all the necessary files to your hard drive, create
- the PC-SENTRY.SYS file in the root of drive C:, and the
- directory for your log files. In the commercial
- version, all system files and log files are completely
- hidden from view. Users will not be able to access them
- or delete them. Additionally, the log files are
- maintained in a totally encrypted form. They cannot be
- read without the program VIEWLOG or PRINTLOG, which are
- included on the distribution diskette.
-
- The Shareware version of PC-SENTRY requires only that
- _________
- you run the installation program, SENTRY, from your
- ______
- hard disk prior to using any of the PC-SENTRY
- _________
- utilities. This needs to be done one time only. You can
- optionally copy the files to a floppy disk and install
- as outlined above.
-
- The PC-SENTRY collection of utilities is very simple to
- __________ _
- use. Remember, all logging utilities are date and
- time sensitive, so the date and time must be set to the
- date and time must be set
- correct values prior to running the program.
-
-
- It is recommended that you call the desired logging
- utility from your autoexec.bat file. Any of the logging
- utilities used will automatically create new log files
- daily.
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 7
-
-
-
-
-
-
-
-
-
-
-
- Operation of Programs
- Operation of Programs
-
-
-
-
-
-
-
- The following pages detail the operation of each
- program in the PC-SENTRY collection. All programs that
- make use of the log files, are capable of being run by
- themselves. They each will create the daily log file if
- necessary, so the user need not be concerned about
- loading, unloading, or changing programs. Log file
- entries are created each time a PC-SENTRY logging
- program is loaded, or unloaded. Is addition, all log
- entries are time stamped with the system time in a 24
- hour time format. All logging utilities are "Midnight
- Smart", meaning if they are active at midnight, a new
- log file is automatically created for the new day.
-
-
- Please read the discussion in Appendix B on TSR program
- Please read the discussion in Appendix B on TSR program
- usage before using any of the PC-SENTRY TSR utilities.
- usage before using any of the PC-SENTRY TSR utilities.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 8
-
-
-
-
-
-
-
-
-
-
-
- Program: SENTRY.EXE
- SENTRY.EXE
-
- Versions: Shareware and Commercial
-
- Type: Command Line Utility ( Non memory resident )
- Syntax: [ drive: ] SENTRY
-
- Description:
- SENTRY is an auto sensing program that creates
- ______
- the necessary system files, log file
- directory, and performs necessary installation
- procedures automatically. Please see the
- previous section on installation.
-
- SENTRY knows that when it is run from a floppy
- ______
- drive, that it is an installation mode, and
- will create the log file directory, and
- necessary system files, prompting you for
- information whenever there is a user choice to
- be made.
-
- When it is run from the hard disk, it checks
- system files, and updates them if they were
- accidentally erased, of if hardware changes
- have been made.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 9
-
-
-
-
-
-
-
-
-
-
-
- Program: PCS.EXE
- PCS.EXE
-
- Versions: Shareware and Commercial
-
- Type: TSR ( Memory resident )
-
- Syntax: PCS [ options ]
-
- Options: /Q - Install in QUIET mode ( No installation
- message ).
-
- /U - De-install PCS.
-
- /K - Turn off KB logging.
-
- /O - Turn off "OPEN" files.
-
-
- Description:
- PCS maintains log files of system activity. It
- ___
- reports items such as creation of files and
- directories, deletion of files and
- directories, copying of files, changing of
- system time, all command line operations, and
- executable programs run. It can optionally log
- the names of all files opened. This will
- create log entries indicating access to data
- files, word processing files, etc. The number
- of data files accessed during a normal working
- day can be enormous, so when using this
- option, be prepared to have very large log
- files.
-
- PCS also creates log entries for every 15
- ___
- minutes of keyboard inactivity. It also
- creates a log entry every 15 minutes
- indicating the average keystrokes per minute
- from the time it was installed.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 10
-
-
-
-
-
-
-
-
-
-
-
- Program: LOGENTRY.EXE
- LOGENTRY.EXE
-
- Versions: Commercial
-
- Type: Command Line Utility ( Non memory resident )
-
- Syntax: LOGENTRY Sentence
-
- Example: LOGENTRY This is a log entry.
-
- Description:
- LOGENTRY allows the user to manually insert
- ________
- time stamped entries into the log file. This
- is useful in batch files where you might want
- to create a record of when a certain
- application was run. For example, if you
- wanted to keep a record of when a tape backup
- was run, you could create the following batch
- file called TAPE.BAT.
-
- PCS /d ( De-install PCS if running )
- LOGENTRY Tape backup run.
- TAPE
- PCS ( Re-install PCS )
-
- This would insert a comment into the log file
- that the backup was run.
-
- No punctuation characters are needed (
- quotation marks, commas, slashes etc. ), and
- if used are considered part of the log entry.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 11
-
-
-
-
-
-
-
-
-
-
-
- Program: VIEWLOG.EXE
- VIEWLOG.EXE
-
- Versions: Commercial
-
- Type: Command Line Utility ( Non memory resident )
-
- Syntax: VIEWLOG [ File name ]
-
- Description:
- VIEWLOG will allow viewing of any log file in
- _______
- a scrolling display mode. Used without any
- command line parameters, VIEWLOG will display
- _______
- the log file for the current day. You can also
- specify a particular file to view by calling
- VIEWLOG with a date parameter. For example if
- _______
- you wanted to examine the log file for
- September 1, 1991, you would run VIEWLOG as
- _______
- follows:
-
- VIEWLOG 09011991
-
- The date parameter MUST be 8 digits long, and
- consists of two digits for the month ( 01 to
- 12 ), two digits for the day ( 01 to 31 ), and
- four digits for the year ( i.e. 1991 ).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 12
-
-
-
-
-
-
-
-
-
-
-
- Program: PRINTLOG.EXE
- PRINTLOG.EXE
-
- Versions: Shareware and Commercial
-
- Type: Command Line Utility ( Non memory resident )
-
- Syntax: PRINTLOG [ File name ] [ /Printer port no. ]
-
- Description:
- PRINTLOG is supplied as a line by line log
- ________
- file reading utility. PRINTLOG differs from
- ________
- VIEWLOG in that the file is simply displayed
- _______
- to the screen without scrolling capabilities.
- It also can be redirected to your printer
- using the following syntax:
-
- PRINTLOG /1 ( Print to LPT1: )
-
- Or:
-
- PRINTLOG /2 ( Print to LPT2: )
-
- Or:
-
- PRINTLOG /3 ( Print to LPT3: )
-
- Used without any command line parameters,
- PRINTLOG will display the log file for the
- ________
- current day. You can also specify a particular
- file to view by calling PRINTLOG with a date
- ________
- parameter. For example if you wanted to
- examine the log file for September 1, 1991,
- and print to LPT1:, you would run PRINTLOG as
- ________
- follows:
-
- PRINTLOG 09011991 /1
-
- The date parameter MUST be 8 digits long, and
- consists of two digits for the month ( 01 to
- 12 ), two digits for the day ( 01 to 31 ), and
- four digits for the year ( i.e. 1991 ).
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 13
-
-
-
-
-
-
-
-
-
-
-
- Program: MAINTLOG.EXE
- MAINTLOG.EXE
-
- Versions: Commercial
-
- Type: Command Line Utility ( Non memory resident )
-
- Syntax: MAINTLOG [ date ] [ options ] [ drive ]
-
- Options: < Date > - Perform operations on all files
- previous to date.
-
- /D - Delete all log files
-
- /A - Archive all log files to floppy disk.
-
-
- Example: MAINTLOG 01011991 /a/d b:
-
- Archives to drive B: then deletes all log
- files PRIOR to 01-01-1991.
-
- Description:
- MAINTLOG is used to delete and/or archive old
- ________
- log files. You will receive on screen
- instructions. WE RECOMMEND THAT LOG FILE
- MAINTENANCE BE DONE WEEKLY.
-
- The date parameter MUST be 8 digits long, and
- consists of two digits for the month ( 01 to
- 12 ), two digits for the day ( 01 to 31 ), and
- four digits for the year ( i.e. 1991 ).
-
- The destination drive is optional, and will
- default to drive A: if not specified. You can
- also archive to a hard disk, but the full
- drive and path name must be specified.
- Example:
-
- MAINTLOG 01011991 /a/d c:\oldlogs
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 14
-
-
-
-
-
-
-
-
-
-
-
- Program: PRINLOCK.EXE
- PRINLOCK.EXE
-
- Versions: Commercial
-
- Type: TSR ( Memory resident )
-
- Syntax: PRINLOCK
-
- Options: /Q - Install in QUIET mode ( No installation
- message ).
-
- /U - De-install PRINLOCK.
-
- Description:
- PRINLOCK disables printing capabilities from
- ________
- ANY program to ANY local printer. Applications
- will function normally without printer errors.
- All data normally sent to the printer is
- intercepted, and sent off to the "Twilight
- Zone". Neither the user or the application
- will detect any problem other than nothing
- happens at the printer.
-
- This program is also useful for programmers
- and developers who are testing the printing
- routine portion of an application, but have no
- need to actually see or produce printed
- output.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 15
-
-
-
-
-
-
-
-
-
-
-
- Program: FLOPLOCK.EXE
- FLOPLOCK.EXE
-
- Versions: Commercial
-
- Type: TSR ( Memory resident )
-
- Syntax: FLOPLOCK
-
- Options: /Q - Install in QUIET mode ( No installation
- message ).
-
- /U - De-install FLOPLOCK.
-
- Description:
- FLOPLOCK disables all floppy drive access. Any
- ________
- time a floppy drive is accessed, a standard
- DOS error condition is created, and the error
- is returned to DOS. DOS or the currently
- running application will report a disk error,
- and the operation will not be allowed to
- continue.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 16
-
-
-
-
-
-
-
-
-
-
-
- Program: FILELOCK.EXE
- FILELOCK.EXE
-
- Versions: Commercial
-
- Type: Command Line Utility ( Non memory resident )
-
- Syntax: FILELOCK filespec [ /password ]
-
- Example: FILELOCK *.doc /myname
-
- This example will encrypt ( or decrypt ) all
- files in the current directory with the
- extension .DOC, and use the optional password
- myname.
- ______
-
- Description:
- FILELOCK is a file encryption/decryption
- ________
- utility. You can use any valid DOS file
- specification including drive letters, path
- names, and wild card characters. The password
- is optional, and if none is used, a password
- unique to your machine. The password is
- generated from various internal settings on
- each computer. It is highly unlikely that any
- two computers would generate the same internal
- password.
-
- PLEASE NOTE: The internal password is
- generated from an algorithm that checks
- certain hardware and operating system
- components on your computer to create a unique
- password for your system. If you use the
- internal password, and anticipate changing the
- hardware configuration or operating system on
- your computer, you should decrypt all
- encrypted files, then encrypt them again when
- the modifications are complete. The computer
- will generate a different password after
- modifications are made, and your encrypted
- files will not be able to be successfully
- decrypted.
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 17
-
-
-
-
-
-
-
- If you change hardware frequently or are
- especially concerned about data security, we
- recommend that you use the optional password
- feature. The main use of the internal
- password is for quick and dirty file
- encryption / decryption where the main concern
- is copying or viewing of files by an
- unauthorized user.
-
- You should also run SENTRYID and do a Print
- Print
- ________
- Screen of the output. The PC-SENTRY ID number
- Screen
- is used for the internal password. You should
- save the number in a secure place for possible
- future use.
-
- FILELOCK is intelligent, and knows to decrypt
- ________
- an encrypted file, and vice-versa.
-
- An excellent use of FILELOCK is in a batch
- ________
- file to secure sensitive data.
-
- For example, if you run a payroll program, and
- do not want your data to be usable by anyone
- else, you could write a batch file called
- PR.BAT similar to the following:
-
- ECHO OFF
- CD\PAYROLL
- FILELOCK *.DAT
- PR
- FILELOCK *.DAT
- CD\
-
- This batch file would decrypt all .DAT files (
- typical data files ), run your PR ( payroll )
- program, and encrypt the data files when you
- exit the payroll program. You would, of
- course, have to encrypt the data files prior
- to using this batch file.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 18
-
-
-
-
-
-
-
-
-
-
-
- Program: LOCKIT.EXE
- LOCKIT.EXE
-
- Versions: Commercial
-
- Type: Command Line Utility ( Non memory resident )
-
- Syntax: LOCKIT
-
-
- Description:
- LOCKIT is a utility that actually makes your
- ______
- hard disk unusable, even with a DOS boot disk.
- To use LOCKIT, you must be using a 286, 386,
- ______
- or 486 computer, DOS 3.0 or higher, and have a
- blank formatted disk ready for drive A:.
- LOCKIT is very simple will provide on screen
- ______
- instructions for its use. LOCKIT will prepare
- ______
- a special boot disk for your system. Your
- system will not recognize any installed hard
- disks after that boot disk is created.
-
- LOCKIT re-configures your CMOS drive table to
- ______
- indicate that no hard drives are installed,
- and saves the real drive table to the special
- boot disk. The next time your computer is
- booted, it will not recognize that any hard
- drives are installed. By booting with the
- specially created boot disk, the proper drive
- table information is restored, and your
- computer will again function normally.
-
- IMPORTANT! You MUST use your special boot disk
- IMPORTANT
- the next time you boot up your computer. Do
- not lose it! Your installed floppy drives will
- still function normally.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 19
-
-
-
-
-
-
-
-
-
-
-
- Program: SENTRYID.EXE
- SENTRYID.EXE
-
- Versions: Commercial
-
- Type: Command Line Utility ( Non memory resident )
-
- Syntax: SENTRYID
-
-
- Description:
- SENTRYID gives the user information about
- ________
- their system, and hardware, as well as a
- unique PC-SENTRY ID number. This number is
- used for internal passwords, and in naming the
- PC-SENTRY log file directory.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 20
-
-
-
-
-
-
-
-
-
-
-
- Program: PCSLOAD.EXE
- PCSLOAD.EXE
-
- Versions: Commercial
-
- Type: Command Line Utility ( Non memory resident )
-
- Syntax: PCSLOAD
-
-
- Description:
- PCSLOAD looks in the root directory for a file
- _______
- called PCS.DAT. The PCS.DAT file can be
- created with any word processor ( saved as an
- ASCII text file ) or editor. PCSLOAD is
- _______
- normally called from your AUTOEXEC.BAT file.
- Just add the line PCSLOAD to your
- _______
- AUTOEXEC.BAT. The PCS.DAT file can contain any
- PC-SENTRY program name you want to run at boot
- up. It can contain the names of any other
- multiple of programs or batch files, in any
- order, that you want to run as well. This
- provides an extra level of secrecy and
- convenience when using the PC-SENTRY programs.
- It allows you to disguise program loading, and
- further isolates the user from the PC-SENTRY
- system.
-
- Example of PCS.DAT file:
-
- PCS /s
- FLOPLOCK /s
- MENU ( or any other program/s you might wish )
-
- This file would run PCS and FLOPLOCK in the
- ___ ________
- quiet modes. It would then run a user batch
- file to call your menu program. The user
- would be completely unaware of the PC-SENTRY
- programs being loaded, and examination of
- their AUTOEXEC.BAT would not reveal any clues.
-
- PCSLOAD can be RENAMEd to further disguise its
- _______
- operation.
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 21
-
-
-
-
-
-
-
-
- Appendix A
- Appendix A
-
- Log Files
- Log Files
-
-
- PCS log file entries:
- _____________________
-
- WARNING: time changed
- WARNING: time changed
-
- This log entry indicates that someone has changed the
- system time, possibly in an effort to confuse the PCS
- ___
- program. Some programs check the system time by
- calling the DOS set time function. This can leave an
- erroneous entry in your log file.
-
-
- Create File: < drive:\path\filename.ext >
- Create File: < drive:\path\filename.ext >
-
- This log entry indicates that the specified file was
- created. This could either be a new file, updated file,
- or a copied file.
-
-
- Delete File: < drive:\path\filename.ext >
- Delete File: < drive:\path\filename.ext >
-
- This log entry indicates that a file was deleted from
- within an application. This entry is not created when
- within
- the DOS command DEL is issued. Please see the section
- on the log entry Command Run: for more detail.
- Command Run:
-
-
- Create Dir: < drive:\path >
- Create Dir: < drive:\path >
-
- This log entry indicates that a sub directory was
- created.
-
- Example: MD \mydir
-
-
- Remove Dir: < drive:\path >
- Remove Dir: < drive:\path >
-
- This log entry indicates that a sub directory was
- removed.
-
- Example: RD \mydir.
-
-
- Rename File: < drive:\path\filename.ext >
- Rename File: < drive:\path\filename.ext >
-
- This log entry indicates the specified file was
- renamed.
-
- Example: REN myfile.doc yourfile.doc.
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 22
-
-
-
-
-
-
-
-
- Open File: < drive:\path\filename.ext >
- Open File: < drive:\path\filename.ext >
-
- This log entry indicates that the specified file was
- opened for reading, writing, or both. DOS and most
- applications open an incredible number of files during
- the course of a normal day. This log entry will only
- appear when PCS is started with the /O option.
-
-
- Command Run: < command >
- Command Run: < command >
-
- This log entry is created when you type anything at the
- anything
- DOS prompt and hit enter. The exact command is
- recorded. This is useful for recording internal DOS
- commands that the other log entry options can't record.
- The actual log entry isn't inserted into the log until
- after the command has executed and terminated.
- after
-
-
- NO keyboard activity for 1 hours and 15 minutes
- NO keyboard activity for 1 hours and 15 minutes
-
- This log entry indicates a period of keyboard
- inactivity. This does NOT mean that the computer was
- totally inactive during that period of time, only that
- no keys were pressed. Other tasks, such as report
- printing, may have been occurring. These entries are
- made after every 15 minutes ( or the selected interval
- ) of keyboard inactivity.
-
- Avg keys per minute: 101 - Elapsed time: 4 hours 32
- Avg keys per minute: 101 - Elapsed time: 4 hours 32
- minutes.
- minutes.
-
- This log entry indicates an overall average rate of key
- presses per minute at the time the log entry was made
- was 101. The average keys per minute rate is
- constantly updated internally, and each entry shows the
- average for the total or elapsed time indicated. In a
- business environment, the most significant entry would
- be the last one of the day, assuming that PCS was
- ___
- loaded at the beginning of the work day, and terminated
- at the end of the same day. These entries are made
- automatically at the selected interval, or as soon
- thereafter as is it safe to do so.
-
-
- LOGENTRY log file entries:
- __________________________
-
- These can be whatever you like. One recommended use is
- in your AUTOEXEC.BAT file to indicate when the computer
- is booted up. You might want to make it eye-catching,
- so it is easier to pick out of large log files when the
- computer has been re-booted during the day.
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 23
-
-
-
-
-
-
- Example: LOGENTRY ******** Computer Boot-up
- ********
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 24
-
-
-
-
-
-
-
-
- Appendix B
- Appendix B
-
- TSR ( Memory Resident ) Program Usage
- TSR ( Memory Resident ) Program Usage
-
-
- In designing the TSR programs included in the PC-SENTRY
- _________
- package, every effort has been made to make them as
- safe as possible when running with other types of
- software.
-
- As any other TSR software developer will recommend, we
- also recommend that you install as few TSR programs as
- possible, and if possible, only ours. We have tested
- the memory resident programs as thoroughly as possible,
- under as many different situations as possible. If you
- must use other TSR software, try to install PCS last.
- ___
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 25
-
-
-
-
-
-
-
-
- Appendix C
- Appendix C
-
- Known Conflicts
- Known Conflicts
-
-
- SIDEKICK 2.0 and PCS
- ___
-
- Sidekick must be loaded AFTER PCS as it causes the
- _____
- keystroke counters to be suspended while it is active.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 26
-
-
-
-
-
-
-
-
- Appendix D
- Appendix D
-
- Important Considerations
- Important Considerations
-
-
- IMPORTANT: CERTAIN PROGRAMS SHOULD NOT BE RUN WHILE ANY OF THE
- TSR PROGRAMS ARE ACTIVE. THEY COULD CAUSE SERIOUS PROBLEMS OR
- CAUSE THE SYSTEM TO "HANG" AND NEED TO BE RE-BOOTED.
-
-
- Disk optimization and unfragmenting programs.
-
- Disk diagnostic programs.
-
- High speed tape and disk backup programs.
-
-
- If you are running any of the TSR programs in a situation where
- the operator is unaware of their operation and there is a
- possibility that any of the these program types will be run, you
- can still allow the user access to these programs if you use the
- following procedure:
-
- For instance, if you wanted to run Norton Speed Disk on a regular
- basis, you could run it safely like this:
-
- First, RENAME SD.EXE _SD.EXE
-
- Then create this batch file called SD.BAT.
-
- PCS /D
- _SD%1
- PCS
-
- This will unload PCS before running Speed Disk, then reload it
- ___
- afterwards. This method can be used to run almost any utility
- without problems.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 27
-
-
-
-
-
-
-
-
- Appendix E
- Appendix E
-
- Technical Support Policies
- Technical Support Policies
-
-
-
-
- Shareware Users
- _______________
-
- Unregistered shareware users are not entitled to technical
- support.
-
- Registered shareware users are entitled to technical support by
- one of 4 methods.
-
- 1. Telephone - 805-682-3202 between the hours of 9:00 AM and
- Telephone
- 4:00 PM Pacific Time.
-
- 2. FAX - Our FAX number is 805-569-0451.
- FAX
-
- 3. Compuserve - Our Compuserve ID is 75500,2610
- Compuserve
-
- 4. Mail - You may write us anytime with a problem, suggestion, or
- Mail
- observation. We appreciate and solicit suggestions for
- improvement and added functionality.
-
-
- Solid Oak Software Inc.
- Solid Oak Software Inc.
- P.O. Box 31004
- Santa Barbara, CA 93130
-
-
-
-
- Commercial Version Users
- ________________________
-
- Commercial version users can use any of the above methods plus
- are given a toll free number to use for support. Commercial
- version users are given priority for support.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 28
-
-
-