home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
DP Tool Club 19
/
CD_ASCQ_19_010295.iso
/
vrac
/
0151ter2.zip
/
0151TER2._XE
/
rar
/
MANUAL.EXE
/
USERSSET.HLP
< prev
Wrap
Text File
|
1994-11-30
|
14KB
|
315 lines
There are 10 different user profiles that can be used in 3 ways:
When calling systems with the autodialer
When calling systems with the pointsystem
Setting up users for the hostmode
^m╒═══════════╤════════════════════════════════╡^t Users/IEMSI ^m╞╕
│ │ ^m│
│^r User 1 ^m│^b■ ^hBo Bendtsen ^m│
│ ^nUser 2 ^m│ ^hGuest ^m│
│ ^nUser 3 ^m│ ^hTerminat ^m│
│ ^nUser 4 ^m│ │
│ ^nUser 5 ^m│ │
│ ^nUser 6 ^m│ │
│ ^nUser 7 ^m│ │
│ ^nUser 8 ^m│ │
│ ^nUser 9 ^m│ │
│ ^nUser 10 ^m│ │
│ │ │
│ ^nIEMSI ^m│ ^hOn ^m│
│ ^nInfo time ^m│ ^h10 ^m│
│ ^nLocation ^m│ ^hLondon, United Kingdom ^m│
│ ^nPhone # ^m│ ^h42643827 ^m│
│ ^nPrg. Pwd ^m│ ^hOff ^m│
│ ^nBirthday ^m│ ^h02-Apr-1965 29 years old (10818 days) ^m│
│ ^nSecurity ^m│ │
│ │ ^n■ Active user ^m│
╘═══════════╧═══════════════════════════════════════════════╛^n
^hEdit user profiles^n
^m╒═══════════╤═══════════════╤════════════════════════╡^t User profile ^m╞╕
│ │^r Username ^m│ ^hBo Bendtsen ^m│
│ ^nUser 1 ^m│ ^nPassword ^m│ ^h...... ^m│
│ ^nUser 2 ^m│ ^nPrg/host Pwd ^m│ ^m│
│ ^nUser 3 ^m│ ^nAddress ^m│ ^h2:231/111.9999 ^m│
│ ^nUser 4 ^m│ ^nComment ^m│ │
│ ^nUser 5 ^m│ ^nHost settings ^m│ ^m│
│ ^nUser 6 ^m├───────────────┴────────────────────────────────────────┤
│ ^nUser 7 ^m│ ^nIEMSI Profile (Interactive Elec. Mail Standard Id.) ^m│
│ ^nUser 8 ^m├───────────────┬────────────────────────────────────────┤
│ ^nUser 9 ^m│ ^nHandle ^m│ ^m│
│ ^nUser 10 ^m│ ^nZmodem 8k ^m│ ^hYes ^m│
│ ^m│ ^nHot-keys ^m│ ^hYes ^m│
│ ^nIEMSI ^m│ ^nQuiet ^m│ ^hNo ^m│
│ ^nInfo time ^m│ ^nPausing ^m│ ^hYes ^m│
│ ^nLocation ^m│ ^nEditor ^m│ ^hYes ^m│
│ ^nPhone # ^m│ ^nNews ^m│ ^hYes ^m│
│ ^nPrg. Pwd ^m│ ^nNew mail ^m│ ^hYes ^m│
│ │ ^nNew files ^m│ ^hNo ^m│
│ │ ^nScreen Clr ^m│ ^hYes ^m│
│ │ ^nAuto chat ^m│ ^hYes ^m│
╘═══════════╧═══════════════╧════════════════════════════════════════╛^n
^hUsername^n
The name of the user to use at logins and to show in the mail session,
and for a user calling Terminate in hostmode.
^hPassword^n
Default password to send if no password is defined in the phonebook. Maybe
you have a lot of places where you use the same password. You may think it
does not matter, but you will never be sure who uses or abuses your user
record in other places. If you use random passwords it is almost guaranteed
that only you, and the persons that have access directly to the hardware
will know your password, but ONLY ON THAT SYSTEM. If you use the same
password all over, maybe a person that is angry with you could use it
to call up and write angry letters to the sysop in your name.
^hPrg/host Pwd^n
Program password can be asked when starting up Terminate to ensure that
only you and nobody else uses your machine while you are gone for lunch.
This password is also used when this person logs into the hostmode.
Smart people could look inside TERMINAT.CFG so it is advised to also set
encryption on phonebooks and the configuration file.
^hAddress^n
The mailer address is explained in point setup - it is used together with
the mailer system. Remember the address for user 1 is your ^hMAIN ADDRESS^n
^hComment^n
Any comment you want to remember about this user.
^hHost settings^n
^m╒════════════════╤═══════════════╡^t Host settings ^m╞╕
│ ^nAccess ^m│ ^hSupervisor ^m│
│ ^nCallback ^m│ ^hNo ^m│
│ ^nDial prefix ^m│ ^hATDT ^m│
│ ^nPhone number ^m│ ^m│
╘════════════════╧════════════════════════════════╛^n
^hAccess^n
Either Supervisor or normal. A supervisor has complete access to your
computer. A normal user only has limited access. More info in hostmode.
For security reasons a Supervisor must always have a password defined.
If there is no password defined in ^hPrg/host Pwd^n the Supervisor
option cannot be turned on.
^hCallback^n
When a user has callback enabled, Terminate will hangup the line
and call back the user. If you choose Ask, Terminate will ask online
which number to call and dial that number.
^hDial prefix^n
What prefix to use with this callback record
^hPhone number^n
The number to callback
^hUser IEMSI settings^n
When you call a system that supports IEMSI logins, you can set these
parameters before calling the system:
Handle Also known as alias
Zmodem 8k When logging on with IEMSI and this function is enabled
then a 'ZAP' flag will also be presented in protocol flags,
'ZAP,ZMO,KER' without this enabled only 'ZMO,KER'.
When receiving the server package Terminate will test for
the 'ZAP' flag in capabilities and then enable the
ZedZap (Zmodem 8k) protocol instead of the normal Zmodem.
At the present time only RemoteAccess 2.00 (release ver.)
will support this. Then when autodownloading ZedZap will be
selected. When uploading Terminate will place the menubar
on ZedZap to inform you that this protocol is needed.
Hot-keys Use hotkey on the system
Quiet Turn on/off online messages from other users
Pausing Turn the MORE Yes/no etc. prompts on/off
Editor Use fullscreen editor
News Watch the NEWS bulletins at login
New mail Search for new mail at login
New files Search for new files at login
Screen Clr Allow system to send screen clears
Auto chat Allow the fullscreen chatter to be used automatically
^hIEMSI^n
Allow Terminate to try logging on with IEMSI. You can also use a login
script with the !I parameter if you do not want to globally turn off
IEMSI logins.
^hInfo time^n
When a IEMSI connection results, how long you want the information to be
shown on screen in 1/10 seconds. You can always recall the window by
pressing Alt-F4.
^hLocation^n
Your city and country. This will be transferred in the IEMSI and
EMSI (mail) sessions.
^hPhone #^n
Your phone number can also be transfered in IEMSI and EMSI sessions.
^hPrg. Pwd^n (Program password)
Ask for password when starting Terminate. All 10 Prg.Pwd can be used. If
you forget your password and have set encryption on configuration and
phonebooks, just delete the configuration file, then the phonebooks will be
decrypted.
^hBirthday^n
On many systems that you call for the first time, you will be asked for
your birth date. This is done for several reasons: to see how old you
are; to be able of sending you a birthday note or to check if you really
who you say you are and not someone who has stolen someone else's
account. Soon, when you log into a new system Terminate will send the
birthday, so you don't have to type it in yourself everytime you log into
a new system for the first time.
Please note that this is only supported by a few systems like RemoteAccess.
^hSecurity^n
Prevent unauthorised users (particularly in corporate and network
environments) from tampering with approved settings or using
unauthorised 'phonebooks.
^m╒═══════════════════╤═══════════╡^t Security ^m╞╕
│ ^nConfiguration ^m│ │
│ ^nPhonebook ^m│ │
│ ^nPoint system ^m│ │
│ ^nFile manager ^m│ │
│ ^nScreen blanker ^m│ │
│ ^nSecurity menu ^m│ │
│ ^nSystem Searcher ^m│ │
│ ^nEncrypt logfile ^m│ │
│ ^nNetwork lock ^m│ │
╘═══════════════════╧═══════════════════════╛^n
^hConfiguration^n
If you enter a password here, then all users will be prompted
for this password whenever they press Alt-O. Remember that if
YOU forget this password your entire setup will be lost. You
must enter a password HERE if you want to protect the following
menus:
^hPhonebook^n
Whenever the user wants to use a new phonebook or change anything in
an existing phonebook this password must be entered.
^hPoint system^n
When pressing Alt-F7 to enter the point system, this password must be
known by the user.
^hFile manager^n
When pressing Alt-F to enter the file manager, this password must be
known by the user.
^hScreen blanker^n
If the screen blanker activates, this password must be entered to
defeat it - for example if you leave your machine for an
unexpectedly long period.
^hSystem Searcher^n
Protect the Alt-F8 menu with an extra password
^hSecurity menu^n
If you want users to have access to the configuration, but not to this
menu, just enter any password here.
^hEncrypt logfile^n
^m╒════════════════════════╤═════════════════════════╡^t Encrypted logfile ^m╞╕
│ ^nSecondary logfile ^m│ ^hF:\SYSTEM\LOGFILES\T-USER%NET%.LOG ^m│
│ ^nPassword ^m│ ^hSECRET ^m│
│ ^nDecrypt/View logfile ^m│ │
╘════════════════════════╧══════════════════════════════════════════════╛^n
^hSecondary logfile^n
If you want to keep an extra logfile of the users activity, you can
enter the filename in here. If you are on a network like Novell, then
the user should only have Create/Write access to this directory where
your extra logfiles are located. When you are using a network with
several users, you should always have an environment variable for each
machine with a number like: SET NET=07. This would create a file called
T-USER07.LOG in F:\SYSTEM\LOGFILES.
^hPassword^n
If you also want to encrypt this secondary logfile, you can enter
a password here.
^hDecrypt/View logfile^n
This extra logfile is written in a database format. If it is encrypted
the only way to view it is from this menu. Remember to protect at least
the Security Menu with a password as well.
^hNetwork lock^n
^m╒══════╤═════════════════════════════════════════════╡^t Network lock ^m╞╕
│ ^nLock ^m│ │
│ ^nEXE ^m│ ^h\\DANBBS\SYS\DANBBS\TERMINAT\TERMINAT.EXE ^m│
│ ^nKEY ^m│ ^h\\DANBBS\SYS\DANBBS\TERMINAT\TERMINAT.KEY ^m│
│ ^nCFG ^m│ ^h\\DANBBS\SYS\DANBBS\TERMINAT\TERMINAT.CFG ^m│
╘══════╧═════════════════════════════════════════════════════════════╛^n
^hLock^n
Lock TERMINAT.EXE so it only can be started from a path that you define.
This is very useful so users cannot move the Terminate files to a local
drive and change the configuration.
^hEXE^n
Complete path (or network-path) and filename to TERMINAT.EXE.
^hKEY^n
Complete path (or network-path) and filename to TERMINAT.KEY.
With this function you can hide the keyfile anywhere on the network.
It is suggested that you rename TERMINAT.KEY to a random filename,
like 'ABCDEFGH.IJK' or simular. Then place this file on a network
path where the users only have READ access to.
^hCFG^n
Only allow this configuration file to be used with Terminate.
If you just want to lock the EXE and KEY, just leave this field
blank then you still are allowed to use the /C: on the commandline.
You can also use environment variabels:
SET TERCFG=0001
\\DANBBS\SYS\DANBBS\TERMINAT\TER-%TERCFG%.CFG
Would be expanded to
\\DANBBS\SYS\DANBBS\TERMINAT\TER-0001.CFG
SET TCONFIG=0050
F:\TERMINAT\TER-%TCONFIG%.CFG
Would be expanded to
F:\TERMINAT\TER-0050.CFG