home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Software Vault: The Diamond Collection
/
The Diamond Collection (Software Vault)(Digital Impact).ISO
/
cdr34
/
pigas.zip
/
DEMO.DOC
next >
Wrap
Text File
|
1995-02-01
|
20KB
|
629 lines
1 DATA PROTECTOR FOR DOS & WINDOWS 2.00
QUICK START
===========
1.1 DAILY WORK WITH DATA PROTECTOR FOR WINDOWS USERS . . . . . 3
1.1.1 STEP 1: STARTING A WINDOWS SESSION BY THE "MASTER" USER 4 3
1.1.2 STEP 2: STARTING A WINDOWS SESSION BY AN UNAUTHORIZED
USER . . . . . . . . . . . . . . . . . . . . . 5
1.1.3 STEP 3: STARTING A WINDOWS SESSION -- AUTHORIZED USER
(SMITH) . . . . . . . . . . . . . . . . . . . 5
1.1.4 STEP 4: STARTING A WINDOWS SESSION -- AUTHORISED USER
(JONES) . . . . . . . . . . . . . . . . . . . 6
1.1.5 STEP 5: STARTING A WINDOWS SESSION -- AUTHORISED USER
(ROBERT) . . . . . . . . . . . . . . . . . . . 7
1.2 A DAILY WORK WITH DATA PROTECTOR FOR DOS USERS . . . . . . 8
1.2.1 HIDING ALL THE RESTRICTED INFORMATION. . . . . . . . . 8
1.2.2 MR. SMITH IS USING YOUR COMPUTER . . . . . . . . . . . 9
1.2.3 MR. JONES IS USING YOUR COMPUTER . . . . . . . . . . . 10
1.2.4 MR. ROBERT IS USING YOUR COMPUTER. . . . . . . . . . . 11
1.2.5 YOU ARE USING YOUR COMPUTER. . . . . . . . . . . . . . 11
1.3 HOW TO CONTINUE FROM HERE. . . . . . . . . . . . . . . . . 12
3 DATA PROTECTOR FOR DOS & WINDOWS 2.00
1. QUICK START
---------------
If this is the first time you are using DATA PROTECTOR, you will
probably want to try it before reading the entire user manual.
USING THE FOLLOWING EXAMPLES, IT WILL TAKE ONLY A FEW MINUTES TO
UNDERSTAND HOW THE DATA PROTECTOR CAN HELP YOU.
Please print the file demo.doc before reading any further.
If your working environment is Windows, you can skip reading the
section, DAILY WORK WITH DATA PROTECTOR FOR DOS USERS.
1.1 DAILY WORK WITH DATA PROTECTOR FOR WINDOWS USERS
----------------------------------------------------
The general idea of DATA PROTECTOR FOR WINDOWS is that when users
begin WINDOWS sessions, they must enter their own user ID and
password in order to have access to data. Typing a wrong password
will cause access to the protected information to be denied -- and
if needed, the user will not have access to Windows at all. When
the user quits Windows, all the data becomes protected again.
When you installed DATA PROTECTOR, the installation program built
the following structures on your hard disk :
Directories name File list
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---MY_DATA
| |
| +---SECRET S1.DAT S2.DAT
| |
| +---LETTERS SECRET.LET INV.LET PRO.LET
|
+---SMITH SMITH.TXT
|
+---JONES JONES.TXT
|
+---PUBLIC COMMON.1 COMMON.2
The INSTALL program also built the necessary user setups. Later,
we will explain how to create a user setup, but for the moment,
let's see how you can use DATA PROTECTOR to encrypt/decrypt
information.
4 DATA PROTECTOR FOR DOS & WINDOWS 2.00
NOTE:
THE EXAMPLE WILL REFER ONLY TO THE INFORMATION UNDER C:\PIGASTST.
NO OTHER FILES AND DIRECTORIES ARE IN THE EXAMPLE.
1.1.1 Step 1: Starting a Windows session by the "MASTER" user
(you).
-----------------------------------------------------------------
In order to start a Windows session type:
W <enter>
At the prompt, "Login>" type:
master <CR>
then, at the prompt, "Password>" type:
masterp <CR>
If you type correctly the above user ID and password, Windows is
started automatically. You can use any Windows file manager
program to check that all the files and sudirectories of
C:\PIGASTST are available to you as a master user.
The next step is to quit the Windows program. Please note that
the logout program is called automatically.
You have just finished the first user session with DATA PROTECTOR.
From now on, only you -- as a "master user" -- will have access to
the restricted information (see the following section). Anyone who
tries to run Windows by typing WIN will have no access to the
restricted information.
Note: In our default setup, the restricted information is:
Directories:
C:\PIGASTST\MY_DATA\SECRET
C:\PIGASTST\SMITH
C:\PIGASTST\JONES
File:
C:PIGASTST\MY_DATA\SECRET.LET
In other words, someone trying to snoop on your DATA will have
access only to the following information:
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---PUBLIC COMMON.1 COMMON.2
5 DATA PROTECTOR FOR DOS & WINDOWS 2.00
1.1.2 Step 2: Starting a Windows session by an unauthorized
user
---------------------------------------------------------------
In this step we will examine what happens if someone wants to
snoop on your data.
The intruder will turn on your computer and type:
WIN
All the restricted information is unavailable. Now you have access
only to:
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---PUBLIC COMMON.1 COMMON.2
You can try to run your Windows file manager in order to be sure
that the restricted information is well encrypted.
Please keep in mind that the restricted information default setup
is only a simple example. Later on, you will change this setup
according to your real needs.
1.1.3 Step 3: Starting a Windows session -- authorized user
(Smith).
--------------------------------------------------------------
In this step we will examine how an authorised user works with
DATA PROTECTOR for Windows.
You gave a permission to Mr. Smith to work on your computer. BUT,
you want to restrict his access to the following information:
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---SMITH SMITH.TXT
|
+---PUBLIC COMMON.1 COMMON.2
To start a Windows session, Smith will type:
W <enter>
6 DATA PROTECTOR FOR DOS & WINDOWS 2.00
At the prompt, "Login>" type:
smith <CR>
then, at the prompt, "Password>" type:
12345678
If you type correctly the above user ID and password, Windows
starts automatically. But this time, Smith will have access only
to files and directories he is authorised to access. You can use
any Windows file manager program to ensure the restricted
information is unavailable.
When Smith quits Windows, all the restricted information becomes
unavailable again. You can try to repeat step two in order to be
sure that there is no restricted information available.
1.1.4 Step 4: Starting a Windows session -- authorised user
(Jones).
--------------------------------------------------------------
In this step we will see how another authorised user, with a
different access restriction, works with DATA PROTECTOR for
Windows.
You gave permission also to Mr. Jones to work on your computer.
BUT, you want to restrict his access only to the following
information:
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---JONES JONES.TXT
|
+---PUBLIC COMMON.1 COMMON.2
Please note that Mr. Jones has a different access restriction than
Mr. Smith.
To start a Windows session, Jones will type:
W <enter>
At the prompt, "Login>" type:
jones <CR>
then, at the prompt, "Password>" type:
7 DATA PROTECTOR FOR DOS & WINDOWS 2.00
87654321
If you type correctly the above user ID and password, Windows
starts automatically. But as before, Jones will not have access to
all the files and directories. You can use any Windows file
manager to check that the restricted information for Jones is
unavailable.
As before, when Jones quits the Windows program, the restricted
information becomes unavailable again. You can try to repeat Step
2, to be sure no restricted information is available.
1.1.5 Step 5: Starting a Windows session -- authorised user
(Robert).
--------------------------------------------------------------
In the previous steps, all the restricted information was
directories, but DATA PROTECTOR allows you to protect also files.
In this step we will see that Mr. Robert has access to the
directory:
c:\PIGASTST\MY_DATA\LETTERS
but does not have access to the file:
c:\PIGASTST\MY_DATA\LETTERS\secret.let
Mr. Robert has access to the following information:
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---MY_DATA
| |
| +---LETTERS INV.LET PRO.LET
|
+---PUBLIC COMMON.1 COMMON.2
In order to start a Windows session, Robert will type:
W <enter>
At the prompt, "Login>" type:
robert <CR>
then, at the prompt, "Password>" type:
friend
8 DATA PROTECTOR FOR DOS & WINDOWS 2.00
If you type correctly the above user ID and password, Windows
program starts automatically. Robert will not have access to
restricted information.
As before, when Robert quits Windows, the restricted information
becomes unavailable.
You can try to repeat Step 2 in order to ensure no restricted
information is available.
1.2 A DAILY WORK WITH DATA PROTECTOR FOR Dos USERS
--------------------------------------------------
When you installed DATA PROTECTOR, the installation program built
the following structures on your hard disk :
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---MY_DATA
| |
| +---SECRET S1.DAT S2.DAT
| |
| +---LETTERS SECRET.LET INV.LET PRO.LET
|
+---SMITH SMITH.TXT
|
+---JONES JONES.TXT
|
+---PUBLIC COMMON.1 COMMON.2
The INSTALL program also built the necessary user setups. Later
on, we will explain how to create a user setup, but for the
moment, let's try to see how you can use DATA PROTECTOR to
encrypt/decrypt information.
REMARK:
THE EXAMPLE WILL REFER ONLY THE INFORMATION UNDER C:\PIGASTST ALL
OTHER FILES AND DIRECTORY WILL NOT TAKE PART IN THE EXAMPLE.
1.2.1 HIDING ALL THE RESTRICTED INFORMATION
----------------------------------------------
In our first example, we will demonstrate how to hide all the
9 DATA PROTECTOR FOR DOS & WINDOWS 2.00
restricted information from an unauthorized user. (Normally, you
will use this option, before turning the computer off). We gave
the unauthorized user access ONLY to the following information:
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---PUBLIC COMMON.1 COMMON.2
In other words, we don't mind that anyone using our computer will
have access to the directory c:\PIGASTST with all it's files, and
to C:\PIGASTST\PUBLIC with all it's files BUT this unauthorized
user, should not have access to C:\PIGASTST\MY_DATA ,
C:\PIGASTST\SMITH and to C:\PIGASTST\JONES.
Later on, we will show how to create this configuration, but first
let's see how it works:
From the "C:\PIGASTST" directory, type :
LOGOUT <enter>
From now on the only the files under c:\PIGASTST and
c:\pigatst\public are available.
Rebooting from a DOS diskette or using powerful disk utilities
will NOT let you access to the hidden information.
Remark : You are now in the "most restricted user" category.
1.2.2 MR. SMITH IS USING YOUR COMPUTER
-----------------------------------------
You gave a permission to Mr. Smith to work on your computer. BUT ,
you want to restrict his access so he will be able to access only
the following information:
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---SMITH SMITH.TXT
|
+---PUBLIC COMMON.1 COMMON.2
When Smith wants to start working he will type:
(this time, you will type it for him ... )
10 DATA PROTECTOR FOR DOS & WINDOWS 2.00
LOGIN <enter>
>smith 12345678 <enter>
As before, all the restricted files and directories for smith
are now hidden.
Rebooting from a DOS diskette or using powerful disk utilities
will NOT let smith access to the hidden information.
Once Smith has finished working, he should type (before turning
off the computer) :
LOGOUT <enter>
Again, all the confidential information becomes hidden. ("most
restricted user" category ).
1.2.3 MR. JONES IS USING YOUR COMPUTER
-----------------------------------------
You gave a permission to Mr. Jones to work on your computer. BUT,
you want to restrict his access so he will be able to access only
the following information:
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---JONES JONES.TXT
|
+---PUBLIC COMMON.1 COMMON.2
When Jones wants to start working he will type:
LOGIN <enter>
>jones 87654321 <enter>
As before, all the restricted files and directories for jones are
now hidden.
Rebooting from a DOS diskette or using powerful disk utilities
will NOT let jones access to the hidden information.
Once Jones has finished working, he should type (before turning
off the computer) :
LOGOUT <enter>
Again, all the confidential information becomes hidden ("most
restricted user" category ).
11 DATA PROTECTOR FOR DOS & WINDOWS 2.00
1.2.4 MR. ROBERT IS USING YOUR COMPUTER
------------------------------------------
You gave a permission to Mr. Robert to work on your computer. BUT,
you want to restrict his access so he will be able to access only
the following information:
C:\PIGASTST DEMO.DOC MANUAL.DOC LOGIN.EXE LOGOUT.EXE
| PSP.EXE REGISTER.DOC VENDOR.DOC W.BAT
|
+---MY_DATA
| |
| +---LETTERS INV.LET PRO.LET
|
+---PUBLIC COMMON.1 COMMON.2
Please pay attention that Robert should NOT have access to the
FILE:
c:\PIGASTST\MY_DATA\LETTERS\secret.let.
When Robert wants to start working he will type:
LOGIN <enter>
>robert friend <enter>
As before, all the restricted files and directories for robert are
now hidden.
Rebooting from a DOS diskette or using powerful disk utilities
will NOT let robert access to the hidden information.
Once robert has finished working, he should type (before turning
off the computer) :
LOGOUT <enter>
Again, all the confidential information becomes hidden("most
restricted user" category ).
1.2.5 YOU ARE USING YOUR COMPUTER
------------------------------------
Suppose now that YOU (the master user) would like to work on your
computer. Simply type :
12 DATA PROTECTOR FOR DOS & WINDOWS 2.00
LOGIN <enter>
>master masterp <enter>
(Note : "masterp" here is the original password. Do not forget to
change it when you define all your users' configuration !)
As a master user, you now have ALL YOUR FILES AND DIRECTORIES
available again (just as if there were no protection whatsoever).
Once you have finished your work, simply type :
LOGOUT <enter>
Again, all the confidential information becomes hidden.
The above examples illustrates how to execute DATA PROTECTOR.
As you can see, it is very simple to use once you have defined the
users and the data to hide.
1.3 HOW TO CONTINUE FROM HERE
-----------------------------
Now that you have seen how DATA PROTECTOR really works, you need
to understand how you can create the user's configuration. For
this you need to read chapters:
HOW TO PROTECT FILES AND DIRECTORIES
and
SUGGESTED PROTECTION STRATEGY
While reading these chapter, try to learn from the example we
built, and change them if needed.
After you feel that you understand how to create you own
configuration you can delete the directory C:\PIGASTST and all
it's subdirectories BUT:
1. Remember to copy the PSP.EXE to other directory.
We strongly suggest the you will copy it to C:\PIGAS directory.
2. Remember to copy the LOGIN.EXE & LOGOUT.EXE to other directory.
DO NOT COPY THEM TO A DIRECTORY THAT WILL BE PROTECTED (otherwise
you will not have an access to the login/logout program. If this
will happened you will need to recover the login.exe program by
copying it from the original diskette by typing: copy a:pigas.01
login.exe)