home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Monster Media 1994 #1
/
monster.zip
/
monster
/
UTILS2
/
PIGAS103.ZIP
/
DEMO.DOC
next >
Wrap
Text File
|
1994-02-01
|
10KB
|
273 lines
This is an extract of the MANUAL.DOC file. The text here will explain to you
how to use the example files of DATA PROTECTOR.
For your convenience, please print this file, and use the printout while
running the example.
HOW TO AVOID READING THIS USER MANUAL
════════════════════════════════════════════════════════════════
If this is the first time you are using DATA PROTECTOR, you will
probably want to try it before reading the whole user manual.
USING THE FOLLOWING EXAMPLES, IT WILL TAKE A FEW MINUTES TO
UNDERSTAND HOW THE DATA PROTECTOR CAN HELP YOU.
Please print the file demo.doc BEFORE continue reading.
1.1 A DAILY WORK WITH DATA PROTECTOR
════════════════════════════════════════════════════════════════
When you installed DATA PROTECTOR, the installation program
built the following structures on your hard disk :
Directories name File list
C:\
│
└─PIGASTST .......... login.exe , logout.exe .....
│
├─MY_DATA
│ │
│ ├─SECRET ... s1.dat , s2.dat
│ │
│ └─LETTERS ... secret.let,inv.let,pro.let
│
├─SMITH ........ smith.txt
│
├─JONES ........ jones.txt
│
└─PUBLIC ....... common.1 , common.2
The INSTALL program also built the necessary user setups. Later
on , we will explain how to create a user setup, but for the
moment, let's try to see how you can use DATA PROTECTOR to
encrypt/decrypt information.
REMARK:
THE EXAMPLE WILL REFER ONLY THE INFORMATION UNDER
C:\PIGASTST ALL OTHER FILES AND DIRECTORY WILL NOT TAKE
PART IN THE EXAMPLE.
1.1.1. EXAMPLE NO 1: HIDING ALL THE RESTRICTED INFORMATION
In our first example, we will demonstrate how to hide all the
restricted information from an unauthorized user. (Normally ,
you will use this option, before turning the computer off). We
gave the unauthorized user access ONLY to the following
information:
Directories name File list
C:\
│
└─PIGASTST ...........login.exe , logout.exe .....
. │
. └─PUBLIC ....common.1 , common.2
.
.
In other words, we don't mind that anyone using our computer
will have access to the directory c:\PIGASTST with all it's
files, and to C:\PIGASTST\PUBLIC with all it's files BUT this
unauthorized user, should not have access to C:\PIGASTST\MY_DATA
, C:\PIGASTST\SMITH and to C:\PIGASTST\JONES.
Later on, we will show how to create this configuration, but
first let's see how it works:
From the "C:\PIGASTST" directory, type :
LOGOUT <enter>
From now on the only the files under c:\PIGASTST and
c:\pigatst\public are available.
Rebooting from a DOS diskette or using powerful disk utilities
will NOT let you access to the hidden information.
Remark : You are now in the "most restricted user" category.
1.1.2. EXAMPLE NO 2: MR. SMITH IS USING YOUR COMPUTER
You gave a permission to Mr. Smith to work on your computer.
BUT , you want to restrict his access so he will be able to
access only the following information:
C:\
│
└─PIGASTST ..........login.exe , logout.exe .....
│
├─SMITH .....smith.txt
│
└─PUBLIC ....common.1 , common.2
When Smith wants to start working he will type:
(this time, you will type it for him ... )
LOGIN <enter>
>smith 12345678 <enter>
As before, all the restricted files and directories for smith
are now hidden.
Rebooting from a DOS diskette or using powerful disk utilities
will NOT let smith access to the hidden information.
Once Smith has finished working, he should type (before turning
off the computer) :
LOGOUT <enter>
Again, all the confidential information becomes hidden. ("most
restricted user" category ).
1.1.3. EXAMPLE NO 3: MR. JONES IS USING YOUR COMPUTER
You gave a permission to Mr. Jones to work on your computer.
BUT , you want to restrict his access so he will be able to
access only the following information:
C:\
│
└─PIGASTST ..........login.exe , logout.exe ...
│
├─JONES .....jones.txt
│
└─PUBLIC .... common.1 , common.2
When Jones wants to start working he will type:
LOGIN <enter>
>jones 87654321 <enter>
As before, all the restricted files and directories for jones
are now hidden.
Rebooting from a DOS diskette or using powerful disk utilities
will NOT let jones access to the hidden information.
Once Jones has finished working, he should type (before turning
off the computer) :
LOGOUT <enter>
Again, all the confidential information becomes hidden ("most
restricted user" category ).
1.1.4. EXAMPLE NO 4: MR. ROBERT IS USING YOUR COMPUTER
You gave a permission to Mr. Robert to work on your computer.
BUT , you want to restrict his access so he will be able to
access only the following information:
C:\
│
└─PIGASTST .........login.exe , logout.exe .....
│
├─MY_DATA
│ │
│ └─LETTERS .. inv.let , pro.let
│
└─PUBLIC ...... common.1 , common.2
Please pay attention that Robert should NOT have access to the
FILE:
c:\PIGASTST\MY_DATA\LETTERS\secret.let.
When Robert wants to start working he will type:
LOGIN <enter>
>robert friend <enter>
As before, all the restricted files and directories for robert
are now hidden.
Rebooting from a DOS diskette or using powerful disk utilities
will NOT let robert access to the hidden information.
Once robert has finished working, he should type (before turning
off the computer) :
LOGOUT <enter>
Again, all the confidential information becomes hidden("most
restricted user" category ).
1.1.5. EXAMPLE NO 5: YOU ARE USING YOUR COMPUTER
Suppose now that YOU (the master user) would like to work on
your computer. Simply type :
LOGIN <enter>
>master masterp <enter>
(Note : "masterp" here is the original password. Do not
forget to change it when you define all your
users' configuration !)
As a master user, you now have ALL YOUR FILES AND DIRECTORIES
available again (just as if there were no protection
whatsoever).
Once you have finished your work, simply type :
LOGOUT <enter>
Again, all the confidential information becomes hidden.
The above examples illustrates how to execute DATA PROTECTOR.
As you can see, it is very simple to use once you have defined
the users and the data to hide.
1.2 HOW TO CONTINUE FROM HERE
════════════════════════════════════════════════════════════════
Now that you have seen how DATA PROTECTOR really works, you need
to understand how you can create the user's configuration. For
this you need to read chapters:
HOW TO PROTECT FILES AND DIRECTORIES
and
SUGGESTED PROTECTION STRATEGY
While reading these chapter, try to learn from the example we
built, and change them if needed.
After you feel that you understand how to create you own
configuration you can delete the directory C:\PIGASTST and all
it's subdirectories BUT:
1. Remember to copy the PSP.EXE to other directory.
We strongly suggest the you will copy it to C:\PIGAS directory.
2. Remember to copy the LOGIN.EXE & LOGOUT.EXE to other
directory. DO NOT COPY THEM TO A DIRECTORY THAT WILL BE
PROTECTED (otherwise you will not have an access to the
login/logout program. If this will happened you will need to
recover the login.exe program by copying it from the original
diskette by typing: copy a:pigas.01 login.exe)