home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Cream of the Crop 20
/
Cream of the Crop 20 (Terry Blount) (1996).iso
/
disk
/
hdm504.zip
/
HDM504.INS
/
SECURITY.DOC
< prev
next >
Wrap
Text File
|
1996-01-01
|
14KB
|
236 lines
Understanding Security Levels In HDM 5 by Dr. File Finder
Hard Disk Menu (HDM) version 5 offers a greatly expanded security
system compared to earlier versions. This is especially useful in
a business environment or on systems that are running a network.
When many users are involved and/or there is a need for security,
HDM's expanded security options can be very useful.
We recognize that many new or inexperienced users might find the
advanced security options a bit confusing. To enhance your
enjoyment of HDM and to eliminate frustration, this special
section is designed to explain the security options so that they
can be easily used and understood. We'll examine the Master
Password Table, the User ID Table, and see how they work by using
examples.
SECURITY OR NOT?
In setting up HDM the first thing you should decide is if you
want or need to use the security options. This is a case where
YOU have to analyze how your system is setup, who uses it, how
much experience they have, and the like.
You may want to run a completely "open" system. This would mean
that individual users would not log on using a password. All
users would use the same menus and have the same selections. It
would also mean that any and all users could access the Top Menu,
change menu options, Timed Execution, and so on. This would be a
system with no restrictions of any kind. Having this type of HDM
setup would generally assume that all users of the system were
"computer literate" -- that all users were comfortable with DOS
commands, etc. It would also assume that all users wanted to work
with the same menus, have the same colors, etc.
HDM comes with ALL security levels set to a default of "00". If
you want to have a totally "open" system than you need not change
any of the security levels. You will not need to use the Master
Password Table or the User ID Table.
SECURING YOUR SYSTEM
Another type of setup would be one that we could call "partially
secure." Perhaps this is a home computer that the family uses.
You are the primary user and the one who is setting up HDM. The
other members of the family are not comfortable with DOS
commands, directory structures, and the like. In this instance,
you might setup different menus for different family members. A
set of menus for yourself, another set for your wife/husband, and
another set for your children. Each user would log on and get
their own personalized menu.
You might also want to restrict their access to the Top Menu --
so that nothing could be altered accidentally. In effect, you
would be a "system manager" and would create a friendly HDM
environment for the rest of the family. This is a common type of
setup.
Let's take this last scenario and break it down into simple terms
as it relates to HDM's enhanced security functions.
THE MASTER PASSWORD TABLE
Load HDM and press F10 to access the Top Menu. Press "S" to
access the Security options. If you press "M" you'll access the
Master Password Table. This table displays the numbers 1 through
99 and allows you to have 99 different "security levels." The key
to working with "security levels" is this:
"With any given security level you can access all things that
have a security level equal to or LESS than your own. You can NOT
access any item that has a security level GREATER than your own."
Thus, if you give yourself a security level of 50, you can access
ANYTHING that has a security level of 50 or below. If you gave
the Top Menu a security level of 99, YOU would NOT be able to
access it! From the Master Password Table let's see how to set up
HDM safely for the "family" in the scenario mentioned above.
SETTING UP SECURITY
Based on the assumption that you are setting up HDM and that you
will be the "system manager" for our hypothetical family, enter
99 at the Master Password Table. You will be prompted for a
password. Enter a password that you will remember, but that no
one else will easily guess. You will be asked to enter the
password again to verify that there was no mistake. A password is
now "set" for security level 99. To access anything that has that
security level, a person would have to know the password that you
just assigned to level 99.
Access the Security section of the Top Menu again. Select "U" to
access the User ID Table. Enter a user name for yourself. Your
next option is to enter the number of the menu page that you
start at. You can then enter a menu entry that you want to
automatically run each time you access HDM. Next you assign
yourself a security level. Since you are to be the 'system
manager', give yourself a 99. In this way you insure that you can
access ANYTHING because there is no higher security level. Your
last option is to set a logon password. Using our example, you
would select a logon password for yourself. Once again you will
be requested to enter it again to make sure that there is no
error.
NOTE: Each individuals logon password is totally independent of
the password assigned to their particular security level. For
example, say you assigned a password of TEST to security level 99
in the Master Password Table. You can select any password you
like for your personal logon password. The password of TEST is
only needed to access functions that are protected by a security
level of 99. By using varying security levels you can restrict
what the other users can see and do. An example might be helpful.
Still using our 'family' scenario, let's say that you gave your
wife/husband a security level of 90 and each of your children a
security level of 50 when you set them up in the User ID Table.
The table might look like this:
╔══════════════════════════════════════════════════════════════╗
║ User Identification │ Menu File │ Run! │ Security │ Password ║
╠══════════════════════════════════════════════════════════════╣
║ Bob │ 300 │ │ 99 │ √ ║
║ Brenda │ 299 │ A1 │ 90 │ √ ║
║ Melissa │ 150 │ A5 │ 50 │ √ ║
║ Kathy │ 100 │ B7 │ 50 │ √ ║
║ │ │ │ │ ║
║ │ │ │ │ ║
║ │ │ │ │ ║
║ │ │ │ │ ║
║ │ │ │ │ ║
║ │ │ │ │ ║
╠══════════════════════════════════════════════════════════════╣
║ Enter=Change Esc=Cancel F2=Save Ins=Add Del=Delete ║
╚══════════════════════════════════════════════════════════════╝
You can see that each user has their own menu pages, each has a
different security level, and each has a logon password. You