home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Shareware Overload
/
ShartewareOverload.cdr
/
database
/
db3secur.zip
/
SECURE.DOC
< prev
next >
Wrap
Text File
|
1987-04-02
|
4KB
|
89 lines
SECURE
Writen by: Juan L. Romero, 1987.
SECURE is a very good security program specially designed for dBASE III,
dBASE III PLUS or FOXPLUS Data Base Manager.
Being a dBASE III user, programer and consultant I soon had the need to keep
track of authorized users that had previously being active in the application.
I achieved my idea in designing SECURE from a Mainframe application called
ROSCOE which if any of you are familiar with, you now how helpful it could
become at times.
SECURE starts off by using the following files.
USERS.DBF - Contains all authorized user ids' and their password.
USED.DBF - Keeps track of dBASE III system use by tracking logon attempts
by issuing a status for that attempt:
(IN = successfully logged-on)
(OUT = successfully logged-off)
(TRY # = logon attempt which after 3 attempts quits dBASE III)
- Keeps track of the entered ID name or number
- Keeps track of successfully logged-on system time.
- Keeps track of successfully logged-off system time and the amount
of logon time in dBASE III.
SECURE.PRG - Security program.
SECTIMER.PRG - This program is to be merged into which ever menu program you
currently have installed in your system, just before the step
where you issue dBASE III to exit to DOS.
Example:
CASE(option)='X'
==> merge sectimer.prg HERE! <==
QUIT
* This step allows you to keep track of whatever time you user
logged-off from dBASE III.
SECFILES.MEM - Is a memory file that issues variables the value of your
USERS.DBF & USED.DBF.
============================= INSTALLATION =================================
1. Copy SECURE.PRG,USERS.DBF,USED.DBF and SECFILES.MEM to your dBASE III
current directory.
2. Enter dBASE III Mode, USE users.dbf
APPEND
[Enter your authorized ids & passwords]
Ctrl-W to Save.
QUIT
3. (OPTIONAL, BUT SMART) If you have a file HIDE or UNHIDE utility, I suggest
that you hide the following files: SECFILES.MEM, USERS.DBF, USED.DBF.
4. Modify you CONFIG.DB file to contain the following command.
COMMAND = DO SECURE.PRG
5. Now you must tell SECURE what program you wish to chain or call in
after a user has successfully signed-on.
Use a true ASCII file editor and modify SECURE.PRG at the following
line where you see these comments.
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* IMPORTANT Access is allowed,enter file to chain below.*
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* DO [filename]
^ ^
| |_______ Specify path and file name to chain.
|____ Remember to Example: DO \db3/main.prg
remove this *
BINGO!! SIMPLE AS THAT!!!
From now on your USED.DBF file keeps track of all your users.
** IF YOU HAVE ANY QUESTIONS OR ANY SUGGESTIONS TOWARDS THIS UTILITY PLEASE
FEEL FREE TO CONTACT ME, JUAN L. ROMERO AT (201) 863-4959 OR LEAVE ME A
MESSAGE ON THIS BBS. **
==============================================================================