home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Tech Arsenal 1
/
Tech Arsenal (Arsenal Computer).ISO
/
tek-07
/
secutil2.zip
/
README.TXT
< prev
next >
Wrap
Text File
|
1991-07-20
|
5KB
|
99 lines
Fillimerica Computer Utility Package
(what a name!)
Enclosed are three small but powerful utility programs that the staff at
Fillimerica has written over the years to solve customer problems and to
enhance the usefulness of MS-DOS and LANtastic.
While most of these programs were written with the LANtastic Network in mind,
they all work equally as well on non-networked computers.
DISCLAIMER: FILLIMERICA INCORPORATED MAKES NO CLAIMS AS TO THE STABILITY OR
OPERATION OF THESE PROGRAMS. USE THEM SOLELY AT YOUR OWN RISK! WHILE WE BELIEVE
THAT THEY PERFORM THEIR INTENDED FUNCTION AS OUTLINED IN THIS DOCUMENT,
FILLIMERICA WILL NOT BE RESPONSIBLE FOR ANY ADVERSE REACTIONS WHICH MAY BE
CAUSED BY THEIR USE.
Of course, if you experience a problem using these utilities, we would like to
know about it. If you find these programs of value, Fillimerica would
appreciate a small donation ($10) for the time and effort we have expended
writing these programs.
A. DISTRIBUTION FILES
README.TXT -This file.
KILLCTRC.COM -Kill Ctrl-C Program.
LOCKDRV.COM -DriveLock Program.
TEF.COM -SuperTEF Program.
B. KILLCTRC.COM - Kills Ctrl-C processing in primary COMMAND.COM Level
This program disables Ctrl-C processing in the current command processor. It is
most useful when called first in the AUTOEXEC.BAT file. Once the program is
run, all subsequent Ctrl-C requests that would normally be handled by the
command processor are ignored. This means that batch file execution will be
uninterruptable. Application software's use of Ctrl-C is unaffected by this
program and batch files which run from a second invocation of COMMAND.COM will
break correctly. The program was written to prohibit users from breaking out of
a LANtastic LOGIN.BAT file, but will work equally as well in non-networked
situations.
The program can be run multiple times with no ill effects and it leaves no
memory image (it is not a TSR). The program accepts no parameters and always
returns ERRORLEVEL=0 (success).
C. LOCKDRV.COM - Prohibits use of local physical media.
Invocation form: LOCKDRV {A-Z}:
example: D:\>LOCKDRV C:
This program disables the use of the indicated physical floppy or hard disk
drive. Network and previously defined SUBSTituted drive redirections will still
behave normally. In a network environment, the locked out physical drive letter
can be redirected to other resources. This program was written to strengthen
the security of non-dedicated LANtastic LANS which have the local hard drive as
the shared network drive. It can also be used to prevent unauthorized access to
physical floppy drives present in the computer.
This program can be run ONCE for each physical drive in the computer. The
software will verify that the drive that is being locked is really a physical
drive (or pseudo-physical like disk manager partitions). There is a way during
a session to revive a locked drive [the unlock], but Fillimerica has decided
that distribution of such a program would defeat LOCKDRV's intended purpose.
Once the computer is rebooted, however, the physical drive will again be
available. The program changes the internal DOS structures in RAM, but does not
alter any information on the physical volume itself.
Returns DOS ERRORLEVEL set as follows:
0 = Drive Successfully Locked
1 = Unsupported DOS Version
2 = Drive Not Lockable (Not A Physical Volume)
3 = Command Parameter Not Recognized
(Security Note: This program is intended to make it impossible for the normal
DOS user to gain access to the physical device. It is not foolproof for the
experienced assembly language programmer or a skilled or determined thief.)
D. TEF.COM - Executes a simple string at a predetermined time each day.
Invocation form: TEF [hours:mins] [string<7 characters]
example: TEF 1:00 BAKUP
This program is a 1K TSR that executes a simple string less than seven
characters long at a predetermined time during the day (or night). A typical
use may involve a scheduled backup in the middle of the night, or a database
reconstruction after the close of business. TEF will execute the string as if
it was typed at the keyboard followed by the <ENTER> key. It will automatically
reset itself for execution at the same time the following day. TEF is tiny, and
can be invoked many times to schedule many different events. The most logical
place for TEF to run is from the DOS prompt, and the most common string is a
batch file which will execute the desired task.
Users who send in their donation ($10), will receive if requested a more
powerful version of this program that expands the maximum string length to
hundreds of characters. These strings can contain multiple command sequences,
and be able to feed application software with control characters and function
keys to complete program tasks internally.
If you need to contact us for any reason, or would like to send a donation, you
may reach us by the following means:
Fillimerica Incorporated
277 Fairfield Road -- Suite 306
Fairfield, NJ 07004
CIS User ID: 75665,440