home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Cream of the Crop 1
/
Cream of the Crop 1.iso
/
UTILITY
/
SENTRY20.ARJ
/
PCSENTRY.DOC
< prev
next >
Wrap
Text File
|
1992-02-10
|
65KB
|
1,915 lines
________________________________________________
| |
| |
PC-SENTRY USER DOCUMENTATION | |
| |
Copyright (c) - 1991 | |
Solid Oak Software Inc. | |
All Rights Reserved | |
| |
________________________________________________ | |
Solid Oak Software Inc. Solid Oak Software Inc.
P.O. Box 31004
Santa Barbara, CA 93130
805-682-3202 FAX 805-569-0451
Table of Contents Table of Contents
License Information.............................................2
Introduction....................................................3
Distribution Disk Contents......................................5
Notes on Program Usage..........................................6
Installation....................................................7
Operation.......................................................8
SENTRY.EXE......................................................9
PCS.EXE........................................................10
LOGENTRY.EXE...................................................13
VIEWLOG.EXE....................................................14
PRINTLOG.EXE...................................................15
MAINTLOG.EXE...................................................16
PRINLOCK.EXE...................................................17
FLOPLOCK.EXE...................................................18
FILELOCK.EXE...................................................19
LOCKIT.EXE.....................................................21
SENTRYID.EXE...................................................22
PCSLOAD.EXE....................................................23
Appendix A Log File Entries..................................24
Appendix B TSR Program Usage Notes...........................27
Appendix C Known Conflicts...................................28
Appendix D Important Considerations..........................29
Appendix E Technical Support Policies........................30
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 1
Information on Licenses Information on Licenses
Corporate and Governmental Site License Corporate and Governmental Site License
This type of license allows use of the software within your
company or government agency, and is not transferable. This
allows internal use and copying of the software for as many sites
/ computers as contracted for. An unlimited Site License allows
unlimited copying of the PC-SENTRY software for internal use by _________
your company or government agency. Distributing, repackaging, or
reselling of the software to third parties is not allowed.
Private Use Private Use
A single user license is required for any person using PC-SENTRY. _________
A single user license is granted to the individual, registered,
user. The individual, registered, user may use PC-SENTRY on any _________
computer, and install PC-SENTRY on any number of computers, as _________
long as PC-SENTRY is run on only one computer at a time. Under no _________
circumstances is an individual user allowed to run PC-SENTRY on _________
more than one computer concurrently.
DISCLAIMER DISCLAIMER
SOLID OAK SOFTWARE INC. hereby disclaims all warranties relating
to this software, whether express or implied, including without
limitation any implied warranties of merchantability or fitness
for a particular purpose. SOLID OAK SOFTWARE INC. will not be
liable for any special, incidental, consequential, indirect or
similar damages due to loss of data or any other reason, even if
SOLID OAK SOFTWARE INC. or an agent of SOLID OAK SOFTWARE INC.
has been advised of the possibility of such damages. In no event
shall SOLID OAK SOFTWARE INC.'s liability for any damages ever
exceed the price paid for the license to use the software,
regardless of the form of the claim. The person using the
software bears all risk as to the quality and performance of the
software.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 2
Introduction Introduction
PC-SENTRY is a collection of utilities designed to provide __________
various levels of system security, activity logging,
productivity analysis, job costing, and data protection.
PC-SENTRY provides the user with the capability to prevent _________
the removal or copying of sensitive data or programs, and
automatic logging of system activities, all running
invisibly in the background, taking up a minimum of memory.
PC-SENTRY is a commercial product consisting of several _________
utilities. The shareware version is distributed with a
logging utilities ( PCS ), a setup program ( SENTRY ), and a
log file reading/printing utility ( PRINTLOG ).
PCS is the main module of the PC-SENTRY collection. It is a ___
small ( 9K ), memory resident ( TSR ) program, that allows
the user to maintain a daily log file of activities that
take place on his or her computer. PCS will automatically ___
keep a record of all programs run, files copied, files
deleted, files created, and files opened, as well as the
date and time that each activity occurred. PCS also keeps a ___
record of each command line entry. PCS has many potential ____
uses including security, productivity, diagnostics, job
costing, etc. All monitoring and logging activities are
performed COMPLETELY in the background. The user will not
even be aware of it.
PCS also monitors keyboard usage. It monitors periods of ___
keyboard inactivity in 15 minute increments, as well as
average keystrokes per minute.
There are many situations where this type of logging can be
useful. If you like, you can determine how much time was
spent on a particular project by examining the log files.
If you are an employer, you might want to check the log
files periodically to determine the quantity or type of work
that was done, or even check to see if your employee was
playing space invaders or writing a letter to Aunt Jane
while they were supposed to be working.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 3
In some business environments, activity logging can play an
even more important role. It can easily be determined if a
program, or sensitive data, was copied to a floppy disk, of
if unauthorized access was made to sensitive files or
programs. Many large corporations have policies against
illegal copying of software, and regularly check computer
systems to ensure that the users are not using programs they
are not licensed to use. PCS can make that job easier, by ___
creating records of any file that was added to the system,
or copied or removed from the system. Since PCS is active at ___
all times, records are kept of ALL computer activity, even
after business hours, or on weekends.
Of course most expert computer operators could defeat the
PC-SENTRY programs, if they knew they were installed, and _________
what they do. In the normal environment, however, the user
would never have a clue that their activities were being
logged. PCS only writes to the log file when other disk ___
activities are being performed. So it makes it almost
impossible to tell that it is working, even if you are aware
that they are installed.
All of the PC-SENTRY programs are designed to operate as _________
transparently as possible. All but the most sophisticated
users will notice no difference in normal day to day
computer operation. All while the PC-SENTRY programs are _________
providing complete records of all activities silently in the
background.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 4
Distribution Disk Contents Distribution Disk Contents
Shareware and Commercial Versions: __________________________________
SENTRY.EXE..........Installation Program
PCS.EXE.............Activity and Keyboard Logging Program
PRINTLOG.EXE........Log Printing Program
Commercial Version: ___________________
LOGENTRY.EXE........Command Line Log Comment Program
VIEWLOG.EXE.........Log Viewing Program
MAINTLOG.EXE........Log Maintenance Program
PRINLOCK.EXE........Printer Lock-out Program
FLOPLOCK.EXE........Floppy Drive Lock-out Program
FILELOCK.EXE........File Encryption Program
LOCKIT.EXE..........Hard Disk Lockout Program
SENTRYID.EXE........Provides System ID Information
PCSLOAD.EXE.........Automatic Application Loading Program
Shareware Version: __________________
ORDER.DOC...........Shareware Order Form
PCSENTRY.DOC........This File
May be included with either version: ____________________________________
README.DOC..........Text file containing revision, ordering or
other information
ERRATA.DOC..........Text file containing corrections to
documentation
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 5
Notes on Program Usage Notes on Program Usage
It may seem at first, that there are too many individual programs
where the same results could have been accomplished by fewer
programs that had more features. To some extent this may be
true, but the PC-SENTRY collection is designed to be as flexible
and provide as secure an environment as possible.
In designing PC-SENTRY, we focused mainly on the corporate and _________
governmental environment. There are many potential uses for PC- ___
SENTRY, and in each case the level of security desired will be ______
different. Log viewing and maintenance were broken up into their
component parts for instance, to allow the PC Manager to remove
any or all of the utilities from a particular computer, to allow
the user of that computer full, limited, or no access to log
files.
In the case of the TSR ( memory resident ) programs, it would
have been possible to combine many of the different programs into
one larger program that would use different command line
parameters to set the options that might be required. This would
have created a program that used considerably more memory, and
would have slowed execution speed as well. There is another
benefit in that while there are more program names to call, there
are less options to remember, and, in most cases, none at all.
Except where noted, all programs can work separately or together.
The programs that use log files, all will use the same log file
for that day. Programs that use internal password functions all
use the same internal password.
All PC-SENTRY programs can all be RENAMEd if desired, to provide _________
additional protection against unauthorized usage. All files
created by the commercial version of PC-SENTRY are either hidden, _________
encrypted, or protected from viewing, printing, copying, and
deletion, without the appropriate PC-SENTRY utility. _________
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 6
Installation Installation
To install PC-SENTRY, simply place the distribution
diskette in a floppy drive, A: for instance, and type
A:SENTRY.
You will be prompted for a drive and directory where
you want the PC-SENTRY programs installed. The
directory should be one that is included in your DOS
PATH statement in your AUTOEXEC.BAT file. If you
specify a directory that doesn't exist, it will be
created for you. You should then remember to add the
new directory to your DOS PATH statement. SENTRY will
copy all the necessary files to your hard drive, create
the PC-SENTRY.SYS file in the root of drive C:, and the
directory for your log files. In the commercial
version, all system files and log files are completely
hidden from view. Users will not be able to access them
or delete them. Additionally, the log files are
maintained in a totally encrypted form. They cannot be
read without the program VIEWLOG or PRINTLOG, which are
included on the distribution diskette.
The Shareware version of PC-SENTRY requires only that _________
you run the installation program, SENTRY, from your ______
hard disk prior to using any of the PC-SENTRY _________
utilities. This needs to be done one time only. You can
optionally copy the files to a floppy disk and install
as outlined above.
The PC-SENTRY collection of utilities is very simple to __________ _
use. Remember, all logging utilities are date and
time sensitive, so the date and time must be set to the date and time must be set
correct values prior to running the program.
It is recommended that you call the desired logging
utility from your autoexec.bat file. Any of the logging
utilities used will automatically create new log files
daily.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 7
Operation of Programs Operation of Programs
The following pages detail the operation of each
program in the PC-SENTRY collection. All programs that
make use of the log files, are capable of being run by
themselves. They each will create the daily log file if
necessary, so the user need not be concerned about
loading, unloading, or changing programs. Log file
entries are created each time a PC-SENTRY logging
program is loaded, or unloaded. Is addition, all log
entries are time stamped with the system time in a 24
hour time format. All logging utilities are "Midnight
Smart", meaning if they are active at midnight, a new
log file is automatically created for the new day.
Please read the discussion in Appendix B on TSR program Please read the discussion in Appendix B on TSR program
usage before using any of the PC-SENTRY TSR utilities. usage before using any of the PC-SENTRY TSR utilities.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 8
Program: SENTRY.EXE SENTRY.EXE
Versions: Shareware and Commercial
Type: Command Line Utility ( Non memory resident )
Syntax: [ drive: ] SENTRY
Description:
SENTRY is an auto sensing program that creates ______
the necessary system files, log file
directory, and performs necessary installation
procedures automatically. Please see the
previous section on installation.
SENTRY knows that when it is run from a floppy ______
drive, that it is an installation mode, and
will create the log file directory, and
necessary system files, prompting you for
information whenever there is a user choice to
be made.
When it is run from the hard disk, it checks
system files, and updates them if they were
accidentally erased, of if hardware changes
have been made.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 9
Program: PCS.EXE PCS.EXE
Versions: Shareware and Commercial
Type: TSR ( Memory resident )
Syntax: PCS [ options ]
Options: /Q - Install in QUIET mode ( No installation
message ).
/U - De-install PCS.
/K - Turn off KB logging.
/O - Turn off "OPEN" files.
Description:
PCS maintains log files of system activity. It ___
reports items such as creation of files and
directories, deletion of files and
directories, copying of files, changing of
system time, all command line operations, and
executable programs run. It can optionally log
the names of all files opened. This will
create log entries indicating access to data
files, word processing files, etc. The number
of data files accessed during a normal working
day can be enormous, so when using this
option, be prepared to have very large log
files.
PCS also creates log entries for every 15 ___
minutes of keyboard inactivity. It also
creates a log entry every 15 minutes
indicating the average keystrokes per minute
from the time it was installed.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 10
Program: LOGENTRY.EXE LOGENTRY.EXE
Versions: Commercial
Type: Command Line Utility ( Non memory resident )
Syntax: LOGENTRY Sentence
Example: LOGENTRY This is a log entry.
Description:
LOGENTRY allows the user to manually insert ________
time stamped entries into the log file. This
is useful in batch files where you might want
to create a record of when a certain
application was run. For example, if you
wanted to keep a record of when a tape backup
was run, you could create the following batch
file called TAPE.BAT.
PCS /d ( De-install PCS if running )
LOGENTRY Tape backup run.
TAPE
PCS ( Re-install PCS )
This would insert a comment into the log file
that the backup was run.
No punctuation characters are needed (
quotation marks, commas, slashes etc. ), and
if used are considered part of the log entry.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 11
Program: VIEWLOG.EXE VIEWLOG.EXE
Versions: Commercial
Type: Command Line Utility ( Non memory resident )
Syntax: VIEWLOG [ File name ]
Description:
VIEWLOG will allow viewing of any log file in _______
a scrolling display mode. Used without any
command line parameters, VIEWLOG will display _______
the log file for the current day. You can also
specify a particular file to view by calling
VIEWLOG with a date parameter. For example if _______
you wanted to examine the log file for
September 1, 1991, you would run VIEWLOG as _______
follows:
VIEWLOG 09011991
The date parameter MUST be 8 digits long, and
consists of two digits for the month ( 01 to
12 ), two digits for the day ( 01 to 31 ), and
four digits for the year ( i.e. 1991 ).
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 12
Program: PRINTLOG.EXE PRINTLOG.EXE
Versions: Shareware and Commercial
Type: Command Line Utility ( Non memory resident )
Syntax: PRINTLOG [ File name ] [ /Printer port no. ]
Description:
PRINTLOG is supplied as a line by line log ________
file reading utility. PRINTLOG differs from ________
VIEWLOG in that the file is simply displayed _______
to the screen without scrolling capabilities.
It also can be redirected to your printer
using the following syntax:
PRINTLOG /1 ( Print to LPT1: )
Or:
PRINTLOG /2 ( Print to LPT2: )
Or:
PRINTLOG /3 ( Print to LPT3: )
Used without any command line parameters,
PRINTLOG will display the log file for the ________
current day. You can also specify a particular
file to view by calling PRINTLOG with a date ________
parameter. For example if you wanted to
examine the log file for September 1, 1991,
and print to LPT1:, you would run PRINTLOG as ________
follows:
PRINTLOG 09011991 /1
The date parameter MUST be 8 digits long, and
consists of two digits for the month ( 01 to
12 ), two digits for the day ( 01 to 31 ), and
four digits for the year ( i.e. 1991 ).
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 13
Program: MAINTLOG.EXE MAINTLOG.EXE
Versions: Commercial
Type: Command Line Utility ( Non memory resident )
Syntax: MAINTLOG [ date ] [ options ] [ drive ]
Options: < Date > - Perform operations on all files
previous to date.
/D - Delete all log files
/A - Archive all log files to floppy disk.
Example: MAINTLOG 01011991 /a/d b:
Archives to drive B: then deletes all log
files PRIOR to 01-01-1991.
Description:
MAINTLOG is used to delete and/or archive old ________
log files. You will receive on screen
instructions. WE RECOMMEND THAT LOG FILE
MAINTENANCE BE DONE WEEKLY.
The date parameter MUST be 8 digits long, and
consists of two digits for the month ( 01 to
12 ), two digits for the day ( 01 to 31 ), and
four digits for the year ( i.e. 1991 ).
The destination drive is optional, and will
default to drive A: if not specified. You can
also archive to a hard disk, but the full
drive and path name must be specified.
Example:
MAINTLOG 01011991 /a/d c:\oldlogs
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 14
Program: PRINLOCK.EXE PRINLOCK.EXE
Versions: Commercial
Type: TSR ( Memory resident )
Syntax: PRINLOCK
Options: /Q - Install in QUIET mode ( No installation
message ).
/U - De-install PRINLOCK.
Description:
PRINLOCK disables printing capabilities from ________
ANY program to ANY local printer. Applications
will function normally without printer errors.
All data normally sent to the printer is
intercepted, and sent off to the "Twilight
Zone". Neither the user or the application
will detect any problem other than nothing
happens at the printer.
This program is also useful for programmers
and developers who are testing the printing
routine portion of an application, but have no
need to actually see or produce printed
output.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 15
Program: FLOPLOCK.EXE FLOPLOCK.EXE
Versions: Commercial
Type: TSR ( Memory resident )
Syntax: FLOPLOCK
Options: /Q - Install in QUIET mode ( No installation
message ).
/U - De-install FLOPLOCK.
Description:
FLOPLOCK disables all floppy drive access. Any ________
time a floppy drive is accessed, a standard
DOS error condition is created, and the error
is returned to DOS. DOS or the currently
running application will report a disk error,
and the operation will not be allowed to
continue.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 16
Program: FILELOCK.EXE FILELOCK.EXE
Versions: Commercial
Type: Command Line Utility ( Non memory resident )
Syntax: FILELOCK filespec [ /password ]
Example: FILELOCK *.doc /myname
This example will encrypt ( or decrypt ) all
files in the current directory with the
extension .DOC, and use the optional password
myname. ______
Description:
FILELOCK is a file encryption/decryption ________
utility. You can use any valid DOS file
specification including drive letters, path
names, and wild card characters. The password
is optional, and if none is used, a password
unique to your machine. The password is
generated from various internal settings on
each computer. It is highly unlikely that any
two computers would generate the same internal
password.
PLEASE NOTE: The internal password is
generated from an algorithm that checks
certain hardware and operating system
components on your computer to create a unique
password for your system. If you use the
internal password, and anticipate changing the
hardware configuration or operating system on
your computer, you should decrypt all
encrypted files, then encrypt them again when
the modifications are complete. The computer
will generate a different password after
modifications are made, and your encrypted
files will not be able to be successfully
decrypted.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 17
If you change hardware frequently or are
especially concerned about data security, we
recommend that you use the optional password
feature. The main use of the internal
password is for quick and dirty file
encryption / decryption where the main concern
is copying or viewing of files by an
unauthorized user.
You should also run SENTRYID and do a Print Print ________
Screen of the output. The PC-SENTRY ID number Screen
is used for the internal password. You should
save the number in a secure place for possible
future use.
FILELOCK is intelligent, and knows to decrypt ________
an encrypted file, and vice-versa.
An excellent use of FILELOCK is in a batch ________
file to secure sensitive data.
For example, if you run a payroll program, and
do not want your data to be usable by anyone
else, you could write a batch file called
PR.BAT similar to the following:
ECHO OFF
CD\PAYROLL
FILELOCK *.DAT
PR
FILELOCK *.DAT
CD\
This batch file would decrypt all .DAT files (
typical data files ), run your PR ( payroll )
program, and encrypt the data files when you
exit the payroll program. You would, of
course, have to encrypt the data files prior
to using this batch file.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 18
Program: LOCKIT.EXE LOCKIT.EXE
Versions: Commercial
Type: Command Line Utility ( Non memory resident )
Syntax: LOCKIT
Description:
LOCKIT is a utility that actually makes your ______
hard disk unusable, even with a DOS boot disk.
To use LOCKIT, you must be using a 286, 386, ______
or 486 computer, DOS 3.0 or higher, and have a
blank formatted disk ready for drive A:.
LOCKIT is very simple will provide on screen ______
instructions for its use. LOCKIT will prepare ______
a special boot disk for your system. Your
system will not recognize any installed hard
disks after that boot disk is created.
LOCKIT re-configures your CMOS drive table to ______
indicate that no hard drives are installed,
and saves the real drive table to the special
boot disk. The next time your computer is
booted, it will not recognize that any hard
drives are installed. By booting with the
specially created boot disk, the proper drive
table information is restored, and your
computer will again function normally.
IMPORTANT! You MUST use your special boot disk IMPORTANT
the next time you boot up your computer. Do
not lose it! Your installed floppy drives will
still function normally.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 19
Program: SENTRYID.EXE SENTRYID.EXE
Versions: Commercial
Type: Command Line Utility ( Non memory resident )
Syntax: SENTRYID
Description:
SENTRYID gives the user information about ________
their system, and hardware, as well as a
unique PC-SENTRY ID number. This number is
used for internal passwords, and in naming the
PC-SENTRY log file directory.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 20
Program: PCSLOAD.EXE PCSLOAD.EXE
Versions: Commercial
Type: Command Line Utility ( Non memory resident )
Syntax: PCSLOAD
Description:
PCSLOAD looks in the root directory for a file _______
called PCS.DAT. The PCS.DAT file can be
created with any word processor ( saved as an
ASCII text file ) or editor. PCSLOAD is _______
normally called from your AUTOEXEC.BAT file.
Just add the line PCSLOAD to your _______
AUTOEXEC.BAT. The PCS.DAT file can contain any
PC-SENTRY program name you want to run at boot
up. It can contain the names of any other
multiple of programs or batch files, in any
order, that you want to run as well. This
provides an extra level of secrecy and
convenience when using the PC-SENTRY programs.
It allows you to disguise program loading, and
further isolates the user from the PC-SENTRY
system.
Example of PCS.DAT file:
PCS /s
FLOPLOCK /s
MENU ( or any other program/s you might wish )
This file would run PCS and FLOPLOCK in the ___ ________
quiet modes. It would then run a user batch
file to call your menu program. The user
would be completely unaware of the PC-SENTRY
programs being loaded, and examination of
their AUTOEXEC.BAT would not reveal any clues.
PCSLOAD can be RENAMEd to further disguise its _______
operation.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 21
Appendix A Appendix A
Log Files Log Files
PCS log file entries: _____________________
WARNING: time changed WARNING: time changed
This log entry indicates that someone has changed the
system time, possibly in an effort to confuse the PCS ___
program. Some programs check the system time by
calling the DOS set time function. This can leave an
erroneous entry in your log file.
Create File: < drive:\path\filename.ext > Create File: < drive:\path\filename.ext >
This log entry indicates that the specified file was
created. This could either be a new file, updated file,
or a copied file.
Delete File: < drive:\path\filename.ext > Delete File: < drive:\path\filename.ext >
This log entry indicates that a file was deleted from
within an application. This entry is not created when within
the DOS command DEL is issued. Please see the section
on the log entry Command Run: for more detail. Command Run:
Create Dir: < drive:\path > Create Dir: < drive:\path >
This log entry indicates that a sub directory was
created.
Example: MD \mydir
Remove Dir: < drive:\path > Remove Dir: < drive:\path >
This log entry indicates that a sub directory was
removed.
Example: RD \mydir.
Rename File: < drive:\path\filename.ext > Rename File: < drive:\path\filename.ext >
This log entry indicates the specified file was
renamed.
Example: REN myfile.doc yourfile.doc.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 22
Open File: < drive:\path\filename.ext > Open File: < drive:\path\filename.ext >
This log entry indicates that the specified file was
opened for reading, writing, or both. DOS and most
applications open an incredible number of files during
the course of a normal day. This log entry will only
appear when PCS is started with the /O option.
Command Run: < command > Command Run: < command >
This log entry is created when you type anything at the anything
DOS prompt and hit enter. The exact command is
recorded. This is useful for recording internal DOS
commands that the other log entry options can't record.
The actual log entry isn't inserted into the log until
after the command has executed and terminated. after
NO keyboard activity for 1 hours and 15 minutes NO keyboard activity for 1 hours and 15 minutes
This log entry indicates a period of keyboard
inactivity. This does NOT mean that the computer was
totally inactive during that period of time, only that
no keys were pressed. Other tasks, such as report
printing, may have been occurring. These entries are
made after every 15 minutes ( or the selected interval
) of keyboard inactivity.
Avg keys per minute: 101 - Elapsed time: 4 hours 32 Avg keys per minute: 101 - Elapsed time: 4 hours 32
minutes. minutes.
This log entry indicates an overall average rate of key
presses per minute at the time the log entry was made
was 101. The average keys per minute rate is
constantly updated internally, and each entry shows the
average for the total or elapsed time indicated. In a
business environment, the most significant entry would
be the last one of the day, assuming that PCS was ___
loaded at the beginning of the work day, and terminated
at the end of the same day. These entries are made
automatically at the selected interval, or as soon
thereafter as is it safe to do so.
LOGENTRY log file entries: __________________________
These can be whatever you like. One recommended use is
in your AUTOEXEC.BAT file to indicate when the computer
is booted up. You might want to make it eye-catching,
so it is easier to pick out of large log files when the
computer has been re-booted during the day.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 23
Example: LOGENTRY ******** Computer Boot-up
********
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 24
Appendix B Appendix B
TSR ( Memory Resident ) Program Usage TSR ( Memory Resident ) Program Usage
In designing the TSR programs included in the PC-SENTRY _________
package, every effort has been made to make them as
safe as possible when running with other types of
software.
As any other TSR software developer will recommend, we
also recommend that you install as few TSR programs as
possible, and if possible, only ours. We have tested
the memory resident programs as thoroughly as possible,
under as many different situations as possible. If you
must use other TSR software, try to install PCS last. ___
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 25
Appendix C Appendix C
Known Conflicts Known Conflicts
SIDEKICK 2.0 and PCS ___
Sidekick must be loaded AFTER PCS as it causes the _____
keystroke counters to be suspended while it is active.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 26
Appendix D Appendix D
Important Considerations Important Considerations
IMPORTANT: CERTAIN PROGRAMS SHOULD NOT BE RUN WHILE ANY OF THE
TSR PROGRAMS ARE ACTIVE. THEY COULD CAUSE SERIOUS PROBLEMS OR
CAUSE THE SYSTEM TO "HANG" AND NEED TO BE RE-BOOTED.
Disk optimization and unfragmenting programs.
Disk diagnostic programs.
High speed tape and disk backup programs.
If you are running any of the TSR programs in a situation where
the operator is unaware of their operation and there is a
possibility that any of the these program types will be run, you
can still allow the user access to these programs if you use the
following procedure:
For instance, if you wanted to run Norton Speed Disk on a regular
basis, you could run it safely like this:
First, RENAME SD.EXE _SD.EXE
Then create this batch file called SD.BAT.
PCS /D
_SD%1
PCS
This will unload PCS before running Speed Disk, then reload it ___
afterwards. This method can be used to run almost any utility
without problems.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 27
Appendix E Appendix E
Technical Support Policies Technical Support Policies
Shareware Users _______________
Unregistered shareware users are not entitled to technical
support.
Registered shareware users are entitled to technical support by
one of 4 methods.
1. Telephone - 805-682-3202 between the hours of 9:00 AM and Telephone
4:00 PM Pacific Time.
2. FAX - Our FAX number is 805-569-0451. FAX
3. Compuserve - Our Compuserve ID is 75500,2610 Compuserve
4. Mail - You may write us anytime with a problem, suggestion, or Mail
observation. We appreciate and solicit suggestions for
improvement and added functionality.
Solid Oak Software Inc. Solid Oak Software Inc.
P.O. Box 31004
Santa Barbara, CA 93130
Commercial Version Users ________________________
Commercial version users can use any of the above methods plus
are given a toll free number to use for support. Commercial
version users are given priority for support.
PC-SENTRY Copyright (c) Solid Oak Software Inc. 1991 Page - 28