home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
High Voltage Shareware
/
high1.zip
/
high1
/
DIR4
/
PIGAS102.ZIP
/
PIGAS.DOC
< prev
next >
Wrap
Text File
|
1993-08-12
|
50KB
|
2,089 lines
1 PiGAS SECURITY v1.02 User Manual
PiGAS SECURITY (tm) - VERSION 1.02 SHAREWARE
---------------------------------------------
Contents:
Chapter 1: GENERAL DESCRIPTION . . . . . . . . . . . . . . . . . . . 3
Chapter 2: DISCLAIMER - AGREEMENT . . . . . . . . . . . . . . . . . 4
Chapter 3: INSTALLATION . . . . . . . . . . . . . . . . . . . . . . 6
3.1. Installation . . . . . . . . . . . . . . . . . . . . . . . . 6
3.2. List of the new directories structure . . . . . . . . . . . 6
3.3. How to Continue from here . . . . . . . . . . . . . . . . . 7
Chapter 4: FIRST TIME RUNNING - A SIMPLE EXAMPLE . . . . . . . . . . 8
Chapter 5: HOW TO PROTECT OBJECTS . . . . . . . . . . . . . . . . . 14
5.1. Setup protection for objects . . . . . . . . . . . . . . . . 14
5.2. Running the protection . . . . . . . . . . . . . . . . . . . 20
Chapter 6: SUGGESTED PROTECTION STRATEGY . . . . . . . . . . . . . . 23
Chapter 7: OPTIMIZATIONS . . . . . . . . . . . . . . . . . . . . . . 25
7.1. Speed . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
7.2. Disk space . . . . . . . . . . . . . . . . . . . . . . . . . 26
Chapter 8: CONFLICTS WITH OTHER UTILITIES . . . . . . . . . . . . . 27
Chapter 9: RESTORING THE LOGIN.EXE AND PSP.EXE FILES . . . . . . . . 29
Chapter 10: REGISTRATION AND TECHNICAL SUPPORT . . . . . . . . . . . 30
Chapter 11: OMBUDSMAN STATEMENT . . . . . . . . . . . . . . . . . . . 36
2 PiGAS SECURITY v1.02 User Manual
IMPORTANT : PLEASE READ THIS FILE CAREFULLY BEFORE USING THE
--------- PiGAS SECURITY.
IF YOU HAVE ANY QUESTIONS, PLEASE CONTACT US AT THE FOLLOWING ADDRESS :
PIGAS INC.
459 COLUMBUS AVENUE #314
NEW YORK, NY 10024
U.S.A.
CIS: 72172,2063
┌---------┐
┌-----┴---┐ │ (R)
--│ │o │------------------
│ ┌-----┴╨--┐ │ Association of
│ │ │-┘ Shareware
└---│ o │ Professionals
------│ ║ │--------------------
└----╨----┘ MEMBER
3 PiGAS SECURITY v1.02 User Manual
1. GENERAL DESCRIPTION
----------------------
PiGAS SECURITY (tm) allows to protect the information in your PC
against unauthorized access. The protected information becomes
totally unavailable to the unauthorized user, even when using a
powerful disk utility or booting from a diskette.
MAIN FEATURES
-------------
- Hide any kind of data on your disk with sophisticated
protection scheme. The hidden data becomes totally unavailable
to the unauthorized user, even when using a powerful disk
utility or booting from a diskette.
- Unlimited number of users, each one having a unique password.
- Full report about authorized/unauthorized activity in the system.
- Simple call to login/logout program to start or end a user session.
- Fast hide/open operation.
- Easy configuration program to allow selection of data to hide.
- Mouse support.
- No need for the program to be resident.
4 PiGAS SECURITY v1.02 User Manual
2. DISCLAIMER - AGREEMENT
-------------------------
Any user of PiGAS SECURITY program must accept this disclaimer of warranty:
PiGAS SECURITY IS SUPPLIED AS IS. PIGAS Inc. DISCLAIMS ALL WARRANTIES,
EXPRESSED OR IMPLIED, INCLUDING WITHOUT LIMITATION, THE WARRANTIES OF
MERCHANTABILITY AND OF FITNESS FOR ANY PURPOSE.
YOU HAVE BEEN NOTIFIED THAT IN A CASE OF A FAILURE IN PiGAS SECURITY,
UNRECOVERABLE DAMAGE TO YOUR DATA MIGHT OCCUR.
IF YOU USE PiGAS SECURITY, YOU ASSUME EXCLUSIVE RESPONSIBILITY AND
LIABILITY FOR ANY LOSS OR DAMAGE DIRECTLY OR INDIRECTLY ARISING OUT
OF THE USE OF THE PROGRAM.
PIGAS Inc. ASSUMES NO LIABILITY FOR ANY DAMAGES, INDIRECT, CONSEQUENTIAL,
OR INCIDENTAL WHICH MAY RESULT FROM THE USE OF PiGAS SECURITY.
IN NO EVENT SHALL PIGAS Inc. AND/OR ANYONE ELSE BE LIABLE FOR ANY DAMAGE
EVER EXCEEDING THE PRICE PAID FOR THE LICENSE TO USE THE PiGAS SECURITY.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT
APPLY TO YOU.
THE DISCLAIMER - AGREEMENT SHALL BE CONSTRUED, INTERPRETED AND
GOVERNED BY THE LAWS OF THE STATE OF NEW YORK.
PiGAS SECURITY is a "SHAREWARE program" and is provided at no charge
to the user for evaluation.
Feel free to share it with your friends, but please do not give it away
altered or as part of another system. The essence of "user-supported"
software is to provide personal computer users with quality software
without high prices, and, at the same time, provide incentive for
programmers to continue to develop new products.
Any user of the PiGAS SECURITY program must register (see section 6)
and pay for his copy within 30 days of first use, or their license
will be withdrawn.
The $25 registration fee will license one copy for use on any computer
at any one time. You must treat this software just like a book. For
example, this software may be used by any number of people and may be
freely moved from one computer location to another, so long as there is
no possibility of it being used at one location while it's being used
at another. Just as a book cannot be read by two different persons
at the same time.
5 PiGAS SECURITY v1.02 User Manual
Site-License arrangements may be made by contacting PiGAS INC.
Anyone distributing the PiGAS SECURITY program for any kind of
remuneration should follow our distribution policy (see file VENDOR.DOC)
You are encouraged to pass a copy of the PiGAS SECURITY program along
to your friends for evaluation. Please encourage them to register
their copy if they find out that they can use it.
6 PiGAS SECURITY v1.02 User Manual
3. INSTALLATION
---------------
3.1 - Installation
------------------
PiGAS SECURITY has been tested very extensively in order to be
error-free. However, it is recommended to make a system backup
before starting the installation.
TO INSTALL PiGAS SECURITY - RUN THE INSTALL.EXE PROGRAM AND
FOLLOW THE INSTRUCTIONS.
3.2 - List of the new directories structure
-------------------------------------------
C:\PIGAS
C:\PIGAS\INFO
These directories are for internal use.
Do not alter their name and their contents.
C:\PIGASTST
C:\PIGASTST\SMITH
C:\PIGASTST\JONES
These directories contain demo files.
You can delete them whenever you like, but remember to move
the files LOGIN.EXE LOGOUT.EXE and PSP.EXE before deleting.
C:\PIGASTST\LOGIN.EXE
C:\PIGASTST\LOGOUT.EXE
All users will use these programs.
You can move these programs to any other directory but DO NOT
DELETE THEM FROM THE DISK AS LONG AS YOU ARE USING PiGAS
SECURITY.
C:\PIGASTST\PSP.EXE
The master user will use this program (see section 5.)
You can move this program to any other directory but DO NOT
DELETE IT FROM THE DISK AS LONG AS YOU ARE USING PiGAS SECURITY.
7 PiGAS SECURITY v1.02 User Manual
3.3 - How to Continue from here
-------------------------------
Read section 4 - FIRST TIME RUNNING - A SIMPLE EXAMPLE, in order
to see how to run the example.
8 PiGAS SECURITY v1.02 User Manual
4. FIRST TIME RUNNING - A SIMPLE EXAMPLE.
-----------------------------------------
Let's try an example which will help you in understanding the main
features and ideas behind PiGAS SECURITY.
When you installed the PiGAS SECURITY, the installation program built
the following structures:
c:\pigastst - A new directory
c:\pigastst\jones.txt - A new file
c:\pigastst\smith.txt - A new file
c:\pigastst\smith - A new directory
c:\pigastst\jones - A new directory
c:\pigastst\demo.doc - The demo documentation.
c:\pigastst\pigas.doc - The PiGAS SECURITY documentation.
c:\pigastst\login.exe - The PiGAS SECURITY login program.
c:\pigastst\logout.exe - The PiGAS SECURITY logout program.
c:\pigastst\psp.exe - The PiGAS SECURITY configuration program.
c:\pigastst\register.doc - Our registration file.
c:\pigastst\vendor.doc - Our distribution policy.
You can use the commands DIR and TYPE in order to study this structure.
In our example there are four different users :
1. You - you are the master user, there is no hidden
information from you.
2. Smith - one of the users.
Smith HAS ACCESS to the following information:
c:\pigastst\demo.doc
c:\pigastst\pigas.doc
c:\pigastst\login.exe
c:\pigastst\logout.exe
c:\pigastst\psp.exe
c:\pigastst\smith.txt
c:\pigastst\smith
c:\pigastst\register.doc
9 PiGAS SECURITY v1.02 User Manual
c:\pigastst\vendor.doc
Smith HAS NO ACCESS to the following information:
c:\pigastst\jones.txt
c:\pigastst\jones
3. Jones - one of the users.
Jones HAS ACCESS to the following information:
c:\pigastst\demo.doc
c:\pigastst\pigas.doc
c:\pigastst\login.exe
c:\pigastst\logout.exe
c:\pigastst\psp.exe
c:\pigastst\jones.txt
c:\pigastst\jones
c:\pigastst\register.doc
c:\pigastst\vendor.doc
Jones HAS NO ACCESS to the following information:
c:\pigastst\smith.txt
c:\pigastst\smith
4. Others - Anyone who is trying to use the computer without
your permission, HAS ACCESS to the following information:
c:\pigastst\demo.doc
c:\pigastst\pigas.doc
c:\pigastst\login.exe
c:\pigastst\logout.exe
c:\pigastst\psp.exe
c:\pigastst\register.doc
c:\pigastst\vendor.doc
and HAS NO ACCESS to the following information:
c:\pigastst\smith.txt
c:\pigastst\smith
c:\pigastst\jones.txt
c:\pigastst\jones
10 PiGAS SECURITY v1.02 User Manual
The install program built the necessary setup for these users and gave
each user an id and a password as follows:
For you - the user id is master and the password is masterp
For smith - the user id is smith and the password is 12345678
For jones - the user id is jones and the password is 87654321
For others - there is no special setup.
A. First, we will hide all the confidential information.
Type :
LOGOUT <enter>
Now everybody has access only to:
demo.doc
pigas.doc
login.exe
logout.exe
psp.exe
register.doc
vendor.doc
but no access to:
smith.txt
smith
jones.txt
jones
WARNING
-------
You will not succeed accessing the hidden files and directories,
even if you try to boot the computer, or use a sophisticated disk
utility .
B. Suppose Smith wants to start a session.
He will type:
11 PiGAS SECURITY v1.02 User Manual
LOGIN <enter>
>smith 12345678 <enter>
Now Smith has only access to:
demo.doc
pigas.doc
login.exe
logout.exe
psp.exe
smith.txt
smith
register.doc
vendor.doc
and has no access to the following information:
jones.txt
jones
Once Smith has finished his work - and before turning off
the computer - he should type:
LOGOUT <enter>
Again, all the confidential information becomes hidden.
C. Suppose Jones wants to start a session.
He will type:
LOGIN <enter>
>jones 87654321 <enter>
Now Jones should have access only to:
demo.doc
pigas.doc
login.exe
logout.exe
psp.exe
jones.txt
12 PiGAS SECURITY v1.02 User Manual
jones
register.doc
vendor.doc
and not be able to access the following information:
smith.txt
smith
Once Jones has finished his work - and before turning off
the computer - he should type:
LOGOUT <enter>
Again, all the confidential information becomes hidden.
C. Suppose that YOU (the master user) want to start a session.
Type:
LOGIN <enter>
>master masterp <enter>
You will have access to all the information:
demo.doc
pigas.doc
login.exe
logout.exe
psp.exe
jones.txt
jones
smith.txt
smith
register.doc
vendor.doc
D. Any other user has no reason for using the Login program.
If he tries and enters a wrong user id or password, the Login
program will call the Logout program which will hide all
confidential information.
In this chapter we demonstrated the daily use of the PiGAS SECURITY -
13 PiGAS SECURITY v1.02 User Manual
using the Login and Logout programs in order to start, and end,a session.
However, the "master user" (you) should also need to know how to create,
change or delete a user setup. This is done using the PSP program and
it is explained in the next chapter.
Before continuing, make sure to log in as master by typing:
LOGIN <enter>
>master masterp <enter>
IMPORTANT :
-----------
All other users cannot use the PSP program.
14 PiGAS SECURITY v1.02 User Manual
5. HOW TO PROTECT OBJECTS
-------------------------
In order to protect objects in the computer, you should first define the
computer users and their restricted objects.
(Note : In this SHAREWARE version, objects refer to files and directories.)
In the PiGAS SECURITY program, computer users are divided in two categories
- MASTER USER
- NORMAL USER
A "MASTER USER" is a user who has access to all the objects in the computer,
whereas a "NORMAL USER" refers to users who have a restricted access to some
objects in the computer.
Thus, PiGAS SECURITY contains three different programs :
- PSP.EXE
- LOGIN.EXE
- LOGOUT.EXE
PSP.EXE can be used only by the "MASTER USER" in order to create, change or
delete a user setup. (Section 5.1 describes this program.)
LOGIN.EXE can be used by a "NORMAL USER" and a "MASTER USER" in order to
start a session. (Section 5.2 describes this program.)
LOGOUT.EXE can be used by a "NORMAL USER" and a "MASTER USER" in order to
end a session. (Section 5.2 describes this program.)
5.1 SETUP PROTECTION FOR OBJECTS (PSP.EXE program)
--------------------------------------------------
In order to protect objects in the computer, the MASTER USER (you) defines
the different users and their access/restriction list. This is done by the
PSP.EXE program, which allows the MASTER USER to create, change, or delete
the user configuration.
5.1.1 STARTING THE PSP PROGRAM
------------------------------
To start the PSP program, simply type :
PSP
15 PiGAS SECURITY v1.02 User Manual
(We assume that the current directory is C:\PIGASTST)
The MAIN MENU appears. Press <ALT S> to have access to the setup
options. The following sections will explain in detail each option
of the program.
5.1.2 CREATING THE USER SETUP
-----------------------------
To create the user setup, press <F3> from the main menu.
A dialog box appears.
(Note : For your convenience, you can see in the dialog box a list of all
the existing user names that you cannot select.)
Type the new user name (4 to 8 characters maximum: from a to z, numbers
are allowed) and press <Enter>. The USER SETUP appears. (Section 5.1.4
describes how to use the USER SETUP and how to define the user password.)
5.1.3 CHANGING THE USER SETUP
-----------------------------
To change the user setup, press <F4> from the main menu.
A dialog box appears. Select the user name by placing the cursor on a
name from the list in the dialog box and press <Enter>.
The USER SETUP appears. (Section 5.1.4 describes how to use the USER
SETUP.)
5.1.4 USER SETUP
----------------
The USER SETUP contains the following elements:
1. User Name - displays the user name and allows to change it.
In order to change the user name, place the cursor on the user name
field by pressing <ALT U>. Then type the new user name.
In case you are changing an old user name to a new one, the program
will create a new copy for the new user name. The old user setup will
not be deleted.
16 PiGAS SECURITY v1.02 User Manual
A User name can contain from 4 to 8 characters maximum, from a to z
(numbers can be included).
2. Password - displays the user password and allows to change it.
In order to change the user password, place the cursor on the user
password field by pressing <ALT P>. Then type the new user password.
The User Password can contain from 6 to 11 printable characters
(with case sensitivity).
3. Dir Tree - displays all the directories of a drive and allows
to add or remove protection for the directories.
In order to activate this window, press <ALT T>.
Adding or removing a protection to a directory
----------------------------------------------
IMPORTANT: DO NOT PROTECT A DIRECTORY WHICH CONTAINS
---------- LOGIN.EXE OR LOGOUT.EXE
Use the <arrow-up> or <arrow-down> to place the cursor on the selected
directory.
Press <+> on the numeric pad in order to add a protection to the
directory.
Press <-> on the numeric pad in order to remove a protection to the
directory.
(Note : A protected directory will always be displayed in
parentheses.)
Changing current drive displayed in directory tree menu
-------------------------------------------------------
In order to change the current drive, press <ALT D> then select from
the list the new drive by placing the cursor on it. Press <ALT D>
again.
4. File list - displays the files list and allows to add or remove
protection for the files.
In order to activate this window, press <ALT L>.
Adding or removing a protection to a file
-----------------------------------------
17 PiGAS SECURITY v1.02 User Manual
IMPORTANT: DO NOT PROTECT THE FILES:
---------- LOGIN.EXE, LOGOUT.EXE.
Use the <arrow-up> or <arrow-down> to place the cursor on the selected
file.
Press <+> on the numeric pad in order to add a protection to a file.
Press <-> on the numeric pad in order to remove a protection to a file.
(Note : A protected file will always be displayed in parentheses.)
5. Dir name - displays the current directory name and allows to change
it.
In order to change the current directory, press <ALT N> then type the
new directory name and press <Enter> or <ALT S>.
If you do not type a full path name, the first directory that matches
the dir name field will become the current directory.
6. File name - selects the file name to be displayed.
In order to change the file name to be displayed, press <ALT F> then
type the new file name and press <Enter> or <ALT S>.
7. Cancel - in order to quit this menu without saving the last changes,
press <Esc> or <ALT C>.
8. OK - press <ALT O> in order to save all the changes and quit.
9. Show - is used after changing the dir name field or the file name
field as described above for elements #5 and #6.
10. Select Drive - is used to change the default drive for the directory
tree menu as described above for element #3.
5.1.5 DELETING THE USER SETUP
-----------------------------
To delete the user setup, press <F5> from the main menu.
A dialog box appears. Select the user name by placing the cursor on a
name from the list in the dialog box and press <Enter>. A confirmation
message appears. Press <Enter> to confirm the delete operation or <TAB>
and <Enter> in order to cancel it.
18 PiGAS SECURITY v1.02 User Manual
5.1.6 MASTER PASSWORD
---------------------
To have access to the master password, press <F6> from the main menu.
The message "CHANGE MASTER PASSWORD" appears.
Type a new master password from 6 to 11 printable characters (with
case sensitivity). and press <Enter>.
The message "ENTER MASTER PASSWORD AGAIN " appears.
Type the new master password again and press <Enter>.
(Note : Entering the new password again is done in order to make sure
that no mistake has been made while typing the password.)
It is recommended to change the default password - masterp.
PLEASE REMEMBER THIS PASSWORD; OTHERWISE, YOU WILL NOT HAVE THE
ABILITY TO HAVE ACCESS TO THE PROTECTED OBJECTS.
5.1.7 ENCRYPTION METHOD
-----------------------
To select the encryption method, press <ALT S> then <e> from
the main menu. A dialog box appears.
The Fast option - allows Fast encryption during the Login program.
Fast is the default option.
The Secure option - allows a better security encryption method
during the Login program (at the expense of speed).
Press <ALT F> to select Fast.
Press <ALT S> to select Secure.
After selecting the encryption method, press <Enter>.
5.1.8 GENERAL REPORT
--------------------
To produce a general report, press <F7> from the main menu.
A report about all the users appears.
Use the <arrow-up> or <arrow-down> to read the report.
19 PiGAS SECURITY v1.02 User Manual
Press <Esc> to exit from the report.
5.1.9 USER REPORT
-----------------
To produce a user report, press <F8> from the main menu.
A dialog box appears. Select the user name by placing the cursor
on a name from the list in the dialog box and press <Enter>.
A report about the selected user appears.
Use the <arrow-up> or <arrow-down> to read the report.
Press <Esc> to exit from the report.
5.1.10 HIDDEN FILES/DIRECTORIES REPORT
--------------------------------------
To obtain a report about all the hidden files and directories on the
screen, press <F9> from the main menu.
Use the <arrow-up> or <arrow-down> to read the report.
Press <Esc> to exit from the report.
5.1.11 LOG REPORT
-----------------
To generate a log report on the screen, press <ALT R> then <l> from
the main menu.
A log report about all the calls to LOGIN.EXE and LOGOUT.EXE appears.
Use the <arrow-up> or <arrow-down> to read the report.
Press <Esc> to exit from the report.
5.1.12 DELETE LOG
-----------------
To delete the log report, press <ALT R> then <d> from the main menu.
A confirmation message appears. Press <Enter> to continue the delete
operation or <TAB> and <Enter> in order to cancel it.
5.1.13 EXITING FROM THE PROGRAM
-------------------------------
20 PiGAS SECURITY v1.02 User Manual
To exit from the program, press <ALT X> from the main menu.
5.1.14 REMARKS
--------------
- All the internal information of the program is kept under the
directories c:\pigas and c:\pigas\info.
DO NOT ALTER THE NAMES AND CONTENTS OF THESE DIRECTORIES.
- The pigas directories (c:\pigas and c:\pigas\info) are protected
by default and are not accessible to all the NORMAL USERS.
You can remove this protection (see section USER SETUP) but a
user cannot have any protected object without having a protection
on the pigas directories.
(When that happens, the PSP program will automatically add a
protection to the user setup on the pigas directories.)
5.2 RUNNING THE PROTECTION (LOGIN.EXE and LOGOUT.EXE programs)
--------------------------------------------------------------
After creating the user's configuration, as explained in section 5.1,
each user can use the LOGIN.EXE program, together with his user name
and password in order to start a working session, and the LOGOUT.EXE
program in order to end a working session.
LOGIN.EXE - used to start a user session. It protects the objects
according to the user's configuration.
You can execute LOGIN.EXE in two different ways :
1. Enter directly the parameters (user name and password):
login <username> <password> <Enter>
or
2. Call the program without parameters.
The system will prompt you for the user name and password.
(Note : This method is more secure because the password does not appear
21 PiGAS SECURITY v1.02 User Manual
on the screen).
Login <Enter>
Login 1.02 SHAREWARE, Copyright (c) 1993 by PiGAS Inc.
> <username> <password> <Enter>
LOGOUT.EXE - used to end a user session. It protects ALL the objects
that were selected by PSP.EXE.
To execute LOGOUT.EXE, simply type:
Logout <Enter>
IMPORTANT
---------
1. The MASTER USER can start a session as follows:
Login <Enter>
Login 1.02 SHAREWARE, Copyright (c) 1993 by PiGAS Inc.
> master masterp <Enter>
If you changed the MASTER USER password, type:
Login <Enter>
Login 1.02 SHAREWARE, Copyright (c) 1993 by PiGAS Inc.
> master <new master password> <Enter>
2. Any time a user enters the wrong user id or password, ALL the
objects that were selected by PSP.EXE become protected.
3. It is recommended to put a call to LOGIN.EXE or LOGOUT.EXE in the
autoexec.bat file.
Any attempt to enter a wrong user id or password (or entering
an empty user id by pressing <Enter> ) during the system boot will
automatically protect ALL the selected objects.
3. The following call:
Login <Enter>
<Enter>
22 PiGAS SECURITY v1.02 User Manual
Is equivalent to
Logout <Enter>
4. The best way to start - and to end - a user session is, as follows:
- Start the session by calling LOGIN.EXE:
Login user1 password1
(do your work .....)
- End the session by calling LOGOUT.EXE:
Logout <Enter>
All selected objects will be protected.
23 PiGAS SECURITY v1.02 User Manual
6. SUGGESTED PROTECTION STRATEGY
--------------------------------
This chapter will help you define your own protection strategy.
We assume that you have read the chapter HOW TO PROTECT OBJECTS.
To define your own protection strategy you need to decide:
1. From which persons (users) you want to hide the information.
2. Which information (files and directories) you want to hide from
each one of the users.
When you think about these problems, normally you will come up with three
"GROUPS" or "TYPES" of users:
1. "ANY USER" TYPE - These are users whom you do not want to work on
your computer. For example: people in your office who pass near
your computer and "accidentally" snoop on your data.
It is up to you to decide which information these people can, or cannot,
see. If you want, you can hide all the directories on the disks,
but normally you are only worried about your personal data, and you do
not mind if someone has access to other common utilities on the disk.
Again it is up to you to decide.
2. "MASTER USER" TYPE - This is you. You have access to all the
information in the disk.
3. "SPECIAL USER" TYPE - This refers to other people who can have more
access than ANY USER, but less access than the MASTER USER.
You can have different users here.
Having these three groups in mind, it is quite simple to decide for
each group which file(s) and directory(ies) needs to be protected or not.
Now you can create the users' configuration.
1. For the "ANY USER" TYPE.
You create a new user (by using the PSP program).
For example: user name: ANYUSER and password: DONTCARE.
Then you mark the restricted files and directories.
24 PiGAS SECURITY v1.02 User Manual
From that point on, anytime someone (master user or "special user") types
LOGOUT (or logs in with the wrong password), all the files and
directories that have been selected as such will be unavailable.
2. For the MASTER USER, the configuration is ready and does not need to be
changed (except for the MASTER password, if you want).
3. "SPECIAL USERS" - For each special user, you create a new user setup
and select the hidden files and directories for him.
If you have many users with the same configuration, you can give to
all of them the same name and password so you do not need to copy
the configuration.
25 PiGAS SECURITY v1.02 User Manual
7. OPTIMIZATIONS
----------------
7.1. SPEED
----------
Try to avoid "nested encryption" in the user setup. It works fine,
but causes an unnecessary overhead. For example, if you have the
following disk structure :
c:\example
c:\example\one
c:\example\one\file
c:\example\two
c:\example\two\file
and you select only "c:\example" to be hidden:
c:--
|
|
--(example)
All the subdirectories and files of "c:\example" also become hidden
for this user. It is unnecessary to select each one to be hidden.
On the other hand, sometimes it is necessary to use "nested encryption".
For example, if you have the following disk structure :
c:\example - a directory
c:\example\one - a directory
c:\example\one\file - a file
By selecting only the directory "c:\example" to be hidden, as explained
above, "c:\example\one" and "c:\example\one\file" will also become
unavailable.
However, someone may try to use some low level disk utilities and find
some sectors that contain the information in the file
"c:\example\one\file".
To avoid this, you also need to select the "c:\example\one\file" to be
hidden (and to select the secure protection method in the dialog box
protection method).
26 PiGAS SECURITY v1.02 User Manual
You do not need to use a "nested encryption" if you do not suspect
that someone is going to spend a few hours working on your computer
in order to decrypt your data. But if your data is very sensitive, it is
recommended to use the "safe" solution of nested encryption.
7.2 DISK SPACE
--------------
The login.exe and logout.exe programs are identical. You can save some
disk space by deleting the logout.exe.
In this case, the user will log out by typing :
LOGIN <cr> <cr>.
27 PiGAS SECURITY v1.02 User Manual
8. CONFLICTS WITH OTHER UTILITIES
---------------------------------
Some low level disk utilities (like CHKDSK.COM, NDD.EXE, etc.)
might report the hidden information as a disk problem and ask
if you want to correct these problems.
BEFORE LETTING THE UTILITIES CORRECT THE DISK, YOU MUST BE SURE THAT
YOU ARE THE MASTER USER.
This can be done by:
1. log in as a master user
or
2. try to access "c:\pigas" - which is accessible only to the master
user.
To help you avoid this conflict, PiGAS SECURITY will automatically
hide these low level disk utilities from the normal user. So if a user
did not log in as a master user, he will not able to run these utilities.
However, you, as a master user, can run these utilities and obtain the
correct results as required.
AGAIN - BEFORE LETTING ANY PROGRAM CORRECT DISK ERRORS, BE SURE THAT
YOU HAVE LOGGED IN AS MASTER USER.
REMARK : The automatic hiding is done as follows:
During the installation, a special scan routine searches in the
disk for all the known utilities that might have a conflict with
PiGAS SECURITY, and creates a file ("c:\pigas\info\conflict.dat")
that contains a list of all the utilities that have been found.
Then, each time you create or change a user configuration, all these
utilities are added to the protected files list for this user.
ADDING FILES TO THE AUTOMATIC HIDDEN LIST
There might be utilities that have not been added automatically to
the file "conflict.dat" (utilities that are not in the list of the
install program.). You can add these utilities to "conflict.dat" by
28 PiGAS SECURITY v1.02 User Manual
using any text editor - and typing their full path.
After updating the file "conflict.dat", call the program PSP.EXE
once. Type:
PSP /u
The PSP program will update automatically all the users' setup.
29 PiGAS SECURITY v1.02 User Manual
9. RESTORING THE LOGIN.EXE AND PSP.EXE FILES
--------------------------------------------
You can always restore the LOGIN.EXE and PSP.EXE files from the original
diskette of PiGAS SECURITY:
Insert the PiGAS SECURITY in drive A.
Type:
COPY A:PIGAS.01 C:LOGIN.EXE <cr>
COPY A:PIGAS.02 C:PSP.EXE <cr>
30 PiGAS SECURITY v1.02 User Manual
10. REGISTRATION AND TECHNICAL SUPPORT
--------------------------------------
In order to register the PiGAS SECURITY, fill in the REGISTRATION FORM.
FRENCH, BELGIAN and SWISS users can register through the DP Tool club
using the FRENCH REGISTRATION FORM.
Once you are registered, you will receive a receipt, a registration
number, and you will benefit from the following advantages :
1. A registered version of PiGAS SECURITY with a UNIQUE INTERNAL KEY !.
This unique key provides another level of security : even if someone
discovers the encryption method of the unregistered version, he
will still need to know your unique internal key in order to
decrypt your data.
The registered and unregistered versions are the same in terms of
operation and speed (but the registration reminder screens will not
appear on the registered version ...).
2. A C++ source code of PiGAS FILE ENCRYPTION program.
This is the source code of a fully functional and powerful file
encryption program (different from the encryption method used
in PiGAS SECURITY).
The registered user can use the code to create a file encryption
program (simple compilation and linking needed) or link it with
his own application.
3. A printed manual.
The user manual contains a special article about computer security
and encryption methods that does not exist in the PiGAS.DOC.
4. Technical support :
By MAIL : For six months from the date of registration.
Please send any letter to :
PIGAS INC.
459 COLUMBUS AVENUE #314
NEW YORK, NY 10024
31 PiGAS SECURITY v1.02 User Manual
U.S.A.
By COMPUSERVE: Up to 30 minutes of support on Compuserve
CIS: 72172,2063
Support will be provided to non-registered users and users beyond
the free support period on a time basis fee.
5. Information update about new PiGAS SECURITY products.
32 PiGAS SECURITY v1.02 User Manual
REGISTRATION FORM
NAME: _____________________________________________________________
(COMPANY): _____________________________________________________________
ADDRESS : ___________________________ CITY/TOWN______________________
STATE : _____________________ ZIP CODE_________ COUNTRY_____________
TELEPHONE: _____________________
Remit to : PIGAS INC.
459 COLUMBUS AVENUE #314
NEW YORK, NY 10024
U.S.A.
Price : US $25
Payment method:
[ ] CHECK (USA BANK)
[ ] INTERNATIONAL POSTAL MONEY ORDER
[ ] UNITED STATES CURRENCY
[ ] AMERICAN EXPRESS INTERNATIONAL MONEY ORDER
[ ] VISA / MASTERCARD
CARD NO _____________________
EXPIRATION DATE __________
SIGNATURE _____________________ DATE __________
v1.02
-----------------------------------------------------------------------------
CUSTOMER COMMENTS
How did you first learn of PiGAS SECURITY ? _________________________
How did you get this version ? ______________________________________
How can this product be improved ?___________________________________
33 PiGAS SECURITY v1.02 User Manual
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Any other comment or suggestion _____________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
THANK YOU FOR YOUR HELP
34 PiGAS SECURITY v1.02 User Manual
FRENCH REGISTRATION FORM
NAME: _____________________________________________________________
(COMPANY): _____________________________________________________________
ADDRESS : _____________________________________________________________
_____________________________________________________________
TELEPHONE: _____________________
Remit to : DP Tool Club.
B.P. 745
59657 Villeneuve d'Ascq
FRANCE
Price : 140FF TTC
Payment method:
[ ] CHECK (FRENCH BANK)
[ ] POSTAL MONEY ORDER
[ ] CARTE BLEUE / MC
CARD NO _____________________
EXPIRATION DATE __________
SIGNATURE _____________________ DATE __________
v1.02
-----------------------------------------------------------------------------
CUSTOMER COMMENT
How did you first learn of PiGAS SECURITY ? _________________________
How did you get this version ? ______________________________________
How can this product be improved ? __________________________________
_____________________________________________________________________
35 PiGAS SECURITY v1.02 User Manual
_____________________________________________________________________
_____________________________________________________________________
Any other comment or suggestion ____________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
THANK YOU FOR YOUR HELP
36 PiGAS SECURITY v1.02 User Manual
11. OMBUDSMAN STATEMENT.
------------------------
This program is produced by a member of the Association of Shareware
Professionals (ASP). ASP wants to make sure that the shareware principle
works for you. If you are unable to resolve a shareware-related problem
with an ASP member by contacting the member directly, ASP may be able to
help. The ASP Ombudsman can help you resolve a dispute or problem with an
ASP member, but does not provide technical support for members' products.
Please write to the ASP Ombudsman at 545 Grover Road, Muskegon, MI 49442 or
send a CompuServe message via CompuServe Mail to ASP Ombudsman 70007,3536.
ACKNOWLEDGEMENTS
----------------
PiGAS SECURITY Copyright (c) 1993, PiGAS INC. , New York , NY.
Any specific hardware or software names used in this user manual
are the (registered) trademarks of specific companies.