home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
United Public Domain Gold 2
/
United Public Domain Gold 2.iso
/
utilities
/
pu657.dms
/
pu657.adf
/
Lock-Out.DOC
< prev
next >
Wrap
Text File
|
1992-09-02
|
15KB
|
618 lines
*************************************************************************
************ ***********
************ LOCK-OUT HARD DRIVE SECURITY SYSTEM ***********
************ ***********
*************************************************************************
VERSION 2.1c
P.D
(C)1992/3/4 SceptreSoft
By C.Partridge
Compatible with all Commodore Amigas
Released 1/8/94
-------------------------------------------------------------------------
Welcome to LOCK-OUT, an integrated hard drive security system.
Lock-Out is PUBLIC DOMAIN and freely distributable.
Lock Out offers the following features:
- Multiple Users with seperate passwords
- Manager access and password
- Launchable scripts
- Configurable write access to hard drive
- User Logging
- Message Board
- Fully configurable
AND MORE!
Version 3.0 (see below) offers much more, including:
- Electronic mail between users
- Invisible passwords
- Hidden config file
- Up to 100 users (currently 10)
- More configurable
- Incorporates suggestions from current users
- Greater protection
- Logging off
- Analysis of usage
- 'Thoughts for the Day'
and any other reasonable suggestions suggested by YOU if you write
to me.
Version 3 is available from January 1995 and will offer even more
features and advanced security. To obtain version three, a fee of £4.00
is required to be sent to the address found later on, along with details
of computer type and any other details. (see later on in .doc for full
details on obtaining version). I cannot emphasize how MUCH BETTER version
3 is - just look at all those features!!!
CONTENTS:
---------
1. Important notes.
2. Compatibility.
3. Installing Lock-Out and setting up.
4. Configuration.
5. Using Lock-Out.
6. Logging off.
7. Security hints and tips.
8. Other programs available.
9. Manual installation.
10. Credits and address.
1. IMPORTANT NOTES
==================
If you do not intend on reading all the manual and you wish to go
and try out the program straight away, please take heed of the following
important notes which are essential to securing your computer. Without
them you may find your program unusable!
1. CAPITAL AND LOWER CASE LETTERS ARE TREATED DIFFERENTLY IN
IDENTITIES AND PASSWORDS! - i.e: 'cAt' is different to
'caT'.
2. YOU MUST HAVE ADDED THE TWO LINES MENTIONED LATER AND ON
INSTALLATION TO YOUR STARTUP SEQUENCE.
3. THE DEFAULT MASTER IDENTITY AND PASSWORD IS 'MANAGER' AND
'PASSWORD'. (without the quotation marks)
Right! Rush away and try it out if you must, but if I were you,
I'd read the documentation!...
2. COMPATIBILITY
================
Lock-Out has been tested and works on an Amiga 500 and an Amiga
1200. I cannot vouch for compatibility with other models, but can see no
reason why it shouldn't work.
System requirements:
HARD DRIVE
1 Mb MINIMUM OF MEMORY
3. INSTALLING LOCK-OUT AND SETTING UP
=====================================
Lock-out is a self-installing program, and requires minimum manual
work. Follow these steps to install Lock-Out onto your Amiga:
1. BOOT YOUR COMPUTER FROM HARD DRIVE TO WORKBENCH.
2. INSERT THE LOCK-OUT FLOPPY DISK.
3. DOUBLE CLICK ON THE DISK ICON.
4. DOUBLE CLICK ON THE 'INSTALLER' ICON.
5. FOLLOW THE INSTALLATION INSTRUCTIONS.
6. WHEN FINISHED, ADD THE SPECIFIED LINES TO YOUR STARTUP
SEQUENCE, OR YOUR USER-STARTUP FILE.
7. EDIT THE CONFIGURATION FILE AS SHOWN BELOW.
8. REMOVE FLOPPY DISK.
9. RE-BOOT YOUR COMPUTER.
10. ENJOY, THEN GET SOME MORE PROGRAMS FROM SCEPTRESOFT.
(SEE SECTION 8 FOR FULL DETAILS)
This should give you a complete working version of lock-out. In
case of any problems, section 9 details manual installation of the
program.
5. CONFIGURATION
================
Next you must configure your program by editing the configuration
file, which is called LOCK-OUT.CONFIG and is found in the S: directory of
your hard disk after installation.
The configuration file contains notes on what each line contains,
and these notes MUST NOT BE REMOVED UNDER ANY CIRCUMSTANCES. Doing so
will result in your program refusing to work.
If you make an error in installation and wish to return to the
original setup, then you should re-copy the file from floppy disk. It is
held in the S directory on floppy.
Follow the notes to change all the identities and passwords of the
users. The first identity/password is for the master user of the computer
(probably YOU) - this will give exclusive access to writing to the hard
drive and running all scripts (see later on)
The next five identities/passwords are those of five users who
will have WRITE ACCESS to all devices. In simple English,
this means that these users will be allowed to save data and write
anything/ delete anything from/to all of your hard drive.
The final five users after these have NO write access to the
partitions specified at the end of the config. file. This means that they
will NOT be able to delete programs or save their own data to the
partitions that you have specified. You can protect up to THREE device
names from being written to by these users.
Finally, there are the names of the three devices that you wish to
stop the final five users from writing to. If you do not wish to use any
of the three, simply leave blank lines in place of the last one or two
devices. Leaving three blank lines will therefore give all users write
access to the hard drive.
EXAMPLES OF PROTECTED DEVICES:
line 1 DH0:
line 2 DH1:
line 3 DH2:
The last five users will not be able to
write to DH0, DH1 or DH2.
line 1 DH0:
line 2 DH1:
line 3
The last five users will not be able to
write data to DH0 or DH1.
line 1 DH0:
line 2
line 3
The last five users will not be able to
write data to DH0. (If DH1, etc... exist,
the users WILL be able to write to them)
line 1
line 2
line 3
All users can write to any devices
available.
line 1 DH1:
line 2 DH1:
line 3 DH1:
The last five users may not write to DH1:
I hope this makes clear the structure of the configuration file.
It is important to note that when entering identities or passwords,
CAPITAL letters are clearly distinguished from lower case letters, i.e:
THEY ARE TREATED DIFFERENTLY.
5. USING LOCK-OUT
=================
Now comes the easy bit! To use lock-out, simply re-boot the
program, and the lines in your startup sequence will launch the program.
With some luck you will be faced with a log-on screen, with two gadgets
into which you should type in your identity and password, WITH APPROPRIATE
CAPITAL LETTERS.
After doing this, click on proceed. The message 'CHECKING...'
will briefly appear, and if your details are correct, the program will
switch to the main menu. If your details are incorrect, the message 'Data
Invalid' will be displayed.
MAIN MENU
---------
The main menu features an array of buttons:
SCRIPT 1: This attempts to execute an AmigaDos script held
in S: and called PROG-1
This could be used to launch a program, record
data, check a diary, or anything else.
SCRIPT 2: This is the same as Script 1, except it executes
a script held in S: and called PROG-2
User Log: This enters the user log screen, where a list of
all users who have logged on since the log was
cleared is displayed, and can be printed out.
Messages: This enters the notice board, which displays the
text file 'messages' found wherever you have
put your main program file.
This can be edited via the CLI and is used to give
info. to all users.
Exit: This leaves the program.
Restricted
Access Script: This will execute an AmigaDos script held in S:
called 'MANAGER', but will only do so if it is
the system manager who has logged on.
This could be used to perform a special function
via DOS, such as clearing the user log or running
a program - it's up to you.
This should give you enough insight into the program to enable you
to use it fairly competently.
6. LOGGING OFF
==============
From version 3 onwards, a seperate program for the user to log
OFF with will be available, which would record the time logged off, and
then re-boot the computer.
This could be used for a manager who was charging his users for
time spent on the computer, and wished to know at what time they stopped
using it.
An analysis program to analyse the user log and display charges/
statistics, graphs, etc... based on it will be available along with
version 3 too. (Early 1995)
7. SECURITY HINTS AND TIPS
==========================
Obviously no system can be completely secure, and the security
offered by Lock-Out does not pretend to be amazingly secure. Lock-Out
will allow you to analyse use of your computer, and will also deter the
casual miscreant who simply wants to cause trouble/ look at your files /
format your hard disk, etc...
The sooner in your startup sequence that you run LOCK-OUT the
better, because this gives the user less time available to try and break
out of the startup sequence.
Try not to draw any attention to the configuration file, which
obviously contains the passwords and identities - this is a potential
source of security breach. Version 3 will allow this file to be encrypted
so that it cannot be looked at, but users of this version should be
careful!
8. OTHER PROGRAMS AVAILABLE / COMING SOON
=========================================
- Also available
--------------
Radbench - SPEED UP YOUR WORKBENCH LOADING TIME
BY 70 % - AND MAKE IT RAM RESIDENT!
RADBENCH DOES ALL THIS, AND IS PACKED
FULL OF USEFUL UTILITIES FOR ALL!
IT'S LIKE HAVING A SUPER-FAST HARD DRIVE!
AVAILABLE AS SHAREWARE FROM ALL GOOD
PD LIBRARIES (17 BIT, MAGNETIC FIELDS,
FOR EXAMPLE)
Lock-Out - YOU APPEAR TO HAVE IT.
- New
---
*********
TIMEZONER
*********
TimeZoner - A text and graphical adventure from Sceptresoft.
Move around the many locations; explore different time zones,
and solve the puzzles to return to your own time and
complete the game!
[Controls by mouse; similar to Monkey Island type of game.]
Features:
-Mouse controlled - direction buttons, command
buttons, object buttons.
-User Friendliness by the bucket load!
-Fully interactive - talk to people and respond
from a choice of answers.
-Groovy music.
-Loads of locations and objects.
-Understands a variety of different verbs.
-On-line interactive help.
-Fiendish puzzles.
-Keeps you up all night for that one 'last
attempt'...
Simply the best product ever to come out of the
SceptreSoft label as yet! A must for all.
WARNING: This game has an extremely wicked sense of humour - not
for those who don't enjoy a good laugh, and a good
game...
RELEASE DATES:
Part One: NOW AVAILABLE Public Domain
WHERE TO GET IT:
===============
TimeZoner is available from all good public domain libraries.
- Coming Soon
-------------
- ZULU! You're in charge of the British Army
in zululand. Can you successfully
defend your base and fight off the
hoards of attacking zulus?
Arcade/Strategy 'dune2' style game.
Fast-paced, frantic action combined
with terrifyingly realistic sound fx!
COMING SOON DIRECT FROM SCEPTRESOFT...
(see demo on THIS DISK)
ZULU WILL BE AVAILABLE FROM JANUARY 1995 AS LICENSWARE - WRITE TO
SCEPTRESOFT FOR FULL INFORMATION.
MAKE SURE YOU GET YOUR COPY!
---------------
9. MANUAL INSTALLATION
======================
For those of you who wish to copy the files needed to run lock-out
manually, here are the instructions...
The following files are copied.
FROM TO FILES INFO
df0:s s: lock-out.config CONFIGURATION FILE
df0:s s: current.user NAME OF CURRENT USER
df0:c c: lock LOCKS PARTITIONS
df0:lock-out **** ALL FILES IN DIRECTORY MAIN PROGRAM FILES
df0:fonts fonts: ALL FILES IN DIRECTORY FONTS FOR PROGRAM
- copy these last but one files to a directory of your choice.
- you should then put a line in your startup sequence / user-startup to
ASSIGN the name Security: to this directory where your main files are.
EXAMPLE LINE:
ASSIGN SECURITY: DH0:programs/lockoutfiles
- after this line in your startup sequence, you should put the command to
launch the program lock-out (do not RUN it) from this directory, using the
line:
SECURITY:LOCK-OUT
This completes manual installation. You should now edit the
configuration file - see section 4.
10. ADDRESS + CREDITS
=====================
All correspondance should be addressed to:
SCEPTRESOFT,
C/O C.PARTRIDGE,
9 WESTBOURNE AVE.,
WREA GREEN,
NR. PRESTON,
LANCS.,
PR4 2PL
If you are expecting version 3 back (early 1994 onwards), you
should also enclose a cheque / postal order for £4.00 sterling - overseas
£6.00, payable to C.Partridge.
Whilst every effort has been made to ensure that this program
works perfectly and has no harmful effects, I will not be held responsible
for any damage incurred whilst using this program - this program is used
at your own risk...
THANX AND GREETZ TO:
--------------------
(deep breath)
Voodoo (MW) , Chris , Mick , Stuart O'B ,
Dave Gee , Andy G , Rupert S , Jim Lad ,
Tref. , Al. 'tastes like goat' , Mr. Cheeps ,
Stevo - o , Mum. , Dad. , Jenny , Ann ,
Tim Forster, Polly, 17 Bit, Magnetic Fields
Jonny , Chloe , Fifi and everyone else I know...
LONG LIVE THE AMIGA! I WANT AN A1400 NOW!!! // __
--- // /
\\ // | ==
\ \\/ | ==
\ \__
\/
/\
Sceptre
o
f \
t \
\____________________(C)1993______15/4/94____