home *** CD-ROM | disk | FTP | other *** search
- Path: white.lambton.on.ca!not-for-mail
- From: 93004794@white.lambton.on.ca (C Lambert)
- Newsgroups: comp.lang.c++
- Subject: The dreaded KEYCOPY dilemma!
- Date: 20 Feb 1996 13:21:17 -0500
- Organization: Lambton College, Sarnia, CANADA
- Message-ID: <4gd3et$btn@white.lambton.on.ca>
- NNTP-Posting-Host: white.lambton.on.ca
- X-Newsreader: TIN [version 1.2 PL2]
-
- From 93004794@lambton.on.caTue Feb 20 13:19:48 1996
- Date: Tue, 20 Feb 1996 13:19:14 -0500 (EST)
- From: C Lambert <93004794@lambton.on.ca>
- To: Glenn Grotzinger <ggrotz@sutm.2sprint.net>
- Subject: Re: HELP! Stopping KeyCopy
-
- > Well direct that output to a text file, scan it for "KEYCOPY", disallow
- > logon to network if that string appears in the memory register. Then delete
- > that output afterwards. Effectively it *WOULD* disable usage of machines
- > which have that program on.
-
- Ok, how does this look:
-
- if exists c:\keycopy goto :kill
- if not exists c:\keycopy goto :end
- :kill
- attrib c:\keycopy -r -h -a
- del c:\keycopy
- :end
-
- Very nice I know. But this is a temporary and hack fix at very
- best, I want to do the following:
-
- 1) redirect "mem /c > mem.txt" into a file, easily done I agree.
- 2) scan this .txt for KEYCOPY (ie> strtok from a stream?), ok a little
- more involved, but mainly just typing, no problem.
- 3) compare the UNKNOWN TSR's to a list, stored on the server (where it is
- reletively safe) in z:\\orange\\knowntsr.dat - no prob.
- 4) REMOVE the TSR's from memory, either by UNLOADING them or overwriting
- their contents, NO SO EASY! I get plenty of feedback telling me how to
- do this, but seriously doubt any of the offerers have any clue how to
- really do this. Its nice to get a reply, but some of these people
- simply blast ya for stupidity and yet have no clue themselves <G>.
-
- > As I saw someone else suggest in Usenet, if the floppies are absolutely
- > unnecessary, DISABLE them.
-
- This is a college, and unfortunately that solution is not available
- to us. We must allow for the tranferring of data from a hard drive or
- virtual drive to floppy.
-
- > Major thing, find the perpetrator, make him a public example, and be sure
- > everyone knows he was dealt with SEVERELY.
- >
- Not my domain, but I am sure the CS people would be more than happy
- to correct the problem ;)
-
- Thanks for the feedback!
-
- Christopher Lambert
- 93004794@white.lambton.on.ca
-
-
-