007 STARR PC & Internet Monitor User Manual |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content
» The 007 security tools series » Frequently Asked Questions (FAQ)
Email: support@iOpus.com Web: http://www.iOpus.com Note: This electronic manual is a single HTML file and can be printed easily. It gives you a 15 pages paper manual. Press "Ctrl+P" to print it.
|
x |
x STARRtm is the award-winning, highly flexible, all-round monitoring solution used by concerned parents, small businesses, and "Fortune 500" companies alike. STARR is also popular for many special tasks like usability testing or scientific studies of PC usage.
Tip: An online version of this manual can be found at http://www.iOpus.com/starr-help.htm
Invisible Installation of STARR Basically there a two scenarios where an invisible deployment of STARR is used:
The STARR installation wizard automatically creates an invisible installation for you. Remember, if you installed STARR invisible there is NO menu entry to start the STARR Commander. Instead, type "starrcmd" in the RUN menu. For added security you can also rename the starrcmd.exe file and/or passwort-protected the STARR Commander. For more information, go to the Security section of this manual. In addition to the automatic invisible installation, system administrators can further customize the installation of STARR to suit their needs, for example files can be renamed and/or the installation can by automated using the STARR One-Click Installation. If you are not a system administrator, you can continue reading here
Detailed overview of the files needed for a manual installation: (You'll find all these files in the Starr home directory after a standard installation.)
Note: When you try to locate these file, please keep in mind that in most file managers (e.g. the Microsoft Windows Explorer) you need to enable the "display hidden / system files" option (or similar function) in order to see the "DLL" files. In the MS Explorer this option is located at View > Folder Options > View Tab > Go to the "Hidden Files" option and select "Show all".
The purpose of the STARR Commander utility is to help you with an easy setup of the logging engine configuration (What to log, how to log and where to send the log file) and also to decrypt and view the STARR log file that is created by the STARR logging engine. The logging engine itself runs invisibly in the background. The logging engine is either started manually by pressing the START button in the STARR Commander or automatically every time Windows is started, depending on the "Autostart" settings on the "Surveillance" part of the STARR Commander. The following section describes step-by-step, the different options that the STARR Commander offers. On the dashboard page, you have full control over the logging engine, which runs in the background. It is not visible in the taskbar or the task list. Start / Stop will start or stop the logging engine. The current state is displayed beside the buttons. STARR report: Press VIEW to decrypt the STARR log file and create the report. The output can be formatted as HTML text (the option preferred by most users), or as spreadsheet (e.g. Excel or as plain text. Depending on your selection, the STARR Commander starts your default browser, spreadsheet or text editor to display the report. For the display of plain text, Notepad is typically the default viewer. If the log file is too large for notepad, WordPad is automatically used. Hint: If you do not like the default formatting of WordPad, press "Ctrl + A" to mark the complete text and change the WordPad font to "Courier New", then everything has the same formatting as in notepad. If you select "STARR log" the STARR Commander decrypts the raw log only. This is typically only of interest if you want to use the STARR log as input to another application. Delete both log files on exit: This options helps you to leave no trace if you decrypt & view a log file directly on a target PC (i.e. a PC under surveillance). Once you exit the STARR Commander, both log files are automatically deleted, so there is no chance of leaving a decrypted log file on the PC. Note: If you use your browser to view the log file, the viewed HTML log might be stored in the browser's cache (depending on your browsers settings). This means a copy of the report log may be accessible even though STARR deleted the original file. Solution: If the log file contains sensitive data, make sure that the web browser's cache is cleared before you leave the PC so no unauthorized person can view the output using the browser's "history". Send Email: Tests the Email settings. Sends the log file immediately. Useful for testing your email settings. On this page, you can decide what kind of information you want STARR to log (The examples are based on the HTML log file conversion).
You also instruct the logging engine from the surveillance tabstrip, whether it should automatically start with every PC Boot. Security and Installation Settings: A major feature of STARR is its ability to run invisibly in the background if required. This ability has made it a favorite tool with IT managers supervising PCs, PC support staff, employers, concerned parents and many others. This page allows you to customize the STARR background operation and protect it against manipulation: Popup : Built-in customizable message to notify the PC user that she / he is working under a monitoring program. You can customize the text of the popup to your needs. To make this popup more attractive and useful to the user, it also displays the time and date of the last logon. Please note that iOpus believes that individuals who may be recorded with STARR should be informed in advance that they may be recorded and we STRONGLY encourage that you inform anyone whom you may record with iOpus surveillance software, e.g. by using this popup. Some countries may require this by law. Backdating: A standard way that PC power users attempt to find out what happens on a PC, is to search for files created within the last x hours or days. With "backdating" STARR can escape this detection since the log file always has an "old" date - even when currently in use!. Use internal buffer: By default, STARR uses the internal buffer of the windows operating system itself, to provide maximum security and speed. However, on some PCs this buffer is disabled (i.e. its size is 0), so every keystroke would be written directly to the hard disk. In this case, you can use STARR internal buffer which accumulates up to 200 keystrokes before it writes them to the hard disk. It never hurts to have this option on. The only drawback is, if your PC crashes for any reason, a maximum of 200 characters might be lost, since they may have not been written to the log file. Backup log file size is bigger than xxx Bytes: For installations of STARR that run unattended for long periods, the log file can grow large. To avoid running out of space on the hard disk STARR copies the current log file to a backup file (named <your log file name> + "2") in the same directory as the current log file. Once backed up, the current log file will be reset to zero. If there is already a previous backup log file, it will be overwritten. That way you always have a log of the last xxx Bytes available without the worry that your hard disk might run out of space. Please note that you need to reserve at least twice xxx Bytes space on your hard disk (The maximum size of the log file plus the maximum size of the backup log file). The size of the STARR log file is checked roughly every minute to avoid unnecessary hard disk access. So the backup occurs with a slight delay. Note: The size of the log file always refers to the STARR log (not the converted reports). PASSWORDS: One MASTER PASSWORD can be used for several security features: Log file encryption: A must if you want to prevent manipulation of the STARR log file: Even if the log file is detected, no unauthorized user can read it without using the STARR Commander and the correct password to decrypt it. If you do not enter a password, STARR uses an internal default. Note: Unlike with the password for the STARR Commander, there will be no popup asking for your password if you decrypt / display the log file, BECAUSE the log file itself is encrypted! This means the decryption is done always, but only if you have the correct password entered in the box, will the decryption produce a meaningful (readable) output. The password is Case sensitive ! STARR Commander Protection: To make sure only authorized persons can use the STARR Commander you can password protect it. Note: This is a separate password from the one used for the encryption of the log file (of course, you could use the same word if you like). The password is Case sensitive ! ZIP file password protection: Protect the emailed ZIP file with a password so only you can open it!
ADVANCED Installation settings: Here you can adjust details of your STARR installation, e.g. to prepare STARR for a manual installation. STARR log file: This is the log file created during the logging process. It can be plain ASCII text (i.e. viewable with any text editor) or a totally scrambled text if you choose to encrypt it (-> security settings). You can enter a path directly or use the BROWSE button. If you transfer a STARR log file from another PC to your administrator PC, you need to load it into the STARR Commander as a STARR log file in order to decrypt and display it (see also the Email section). Path names: The invisible activity monitoring module ("Logging engine") consists of an executable and a so-called dynamic link library which contains program code used by STARR. You are totally free to rename both files. You could rename "wsys.exe" to "nice.day" and "wsys.dll" to "sunshine.hot" to hide them even from someone who might know the STARR filenames themselves. Once you have changed the names of these two files and / or their directory, all you have to do is change two path names in the STARR Commander. Generate One-Click-Installation File: Click the button and STARR Commander generate the file needed for the One-Click-Installation. Uninstall STARR: Click here to remove STARR from the PC. Renaming starrcmd.exe: The file starrcmd.exe (the STARR Commander) is copied to your Windows directory (typically c:\Windows or c:\WinNT). You can easily rename this file: Example: You rename the file to GoodMorning.exe. Then you need to type "GoodMorning" into the RUN menu in order to start the STARR Commander. Email Reporting: STARR is able to email the log file straight to your doorstep, i.e. your email box, using any standard SMTP / POP Internet email account. On the top half of the first page, you enter where to email to log file to and specify the frequency, i.e. email it every (x) hours/minutes or email it whenever it has grown by a certain size (recommended option). The size of the log file refers to the STARR log (as opposed to the converted reports). STARR only emails the log file if the PC is online. If the PC is offline, STARR does NOT connect to the Internet. It waits until the PC is online and connects then. Enter any email addresses you'd like to send your log file email TO. Multiple recipients can be entered. Separate addresses using a comma. You can add <PC>, <USER>, <DATE>, <TIME> tags to the email subject. STARR will automatically replace them with the current PC name, user name, date or time. To minimize the size of the log file, STARR can ZIP (compress) it automatically. This reduces the size of the file by a factor of 80-90% and increases the emailing speed. You can use any standard ZIP utility to unzip the log file again once received. If you want to know more about ZIP utilities, check out our GUIDE page at http://www.iopus.com/guides/zip.htm which also lists the TOP5 zip utilities. In ADVANCED SETTINGS (click button on the lower half of the screen) you can tell STARR which email server to use. You can either use the built-in email settings (which uses an iOpus email account to send the files) or enter the settings of your own email account. This can be the address of your usual email account or the address of a second email account. In the first case you are basically emailing the file to yourself on this account. In the latter case the second email account then serves as a "relay" to receive the file from STARR and emails it to your standard email account.
b.) Your own email account: Two account option
c.) Your own email account: One account option (store the email directly in your account)
Settings: Tip: If you aren't sure of your email settings, look in the setup of your email client program (like Eudora or Outlook) or ask your system administrator. If you are using the "built-in email" option (a) you do not have to enter these settings. SMTP: (always necessary) (SMTP: stands for "Simple Message Transfer Protocol". The standard email protocol used to send emails on the Internet.) Send from: Where does the email come from, the address of the email account you are using to send the email. (e.g. username@yahoo.com) SMTP server: address of your SMTP server. Check with your email provider for this address, typically it says something like mail.provider.com or smtp.provider.com .
POP3: (sometimes necessary) (POP3 : stands for "Post Office Protocol". The standard email protocol used to receive emails) "Normally" you would only need to enter the SMTP settings of your email account (since STARR only sends mail and does not receive it. However, some email service providers (e. g Yahoo Email) ask the user to check their mail first before sending. They do this for authentication purposes. If you need to check your mail first before you can send, you need to also enter your POP3 settings and check the box "Unlock account box". Otherwise leave the box unchecked. POP3 server: address of your POP server. Check with your email provider for this address. Sometimes this is the same name as the SMTP server, but mostly not! POP3 username: typically this is the first part of your email address (e.g. "username"). POP3 password: The password to access your POP3 account. Your email provider will tell you this. STARR itself stores your password encrypted for added security. Tip: You can test your email settings by using the "Send email" button in the STARR Commander. This will send the current log file immediately.
If you purchased a registration code, you have to enter it into the Commander on this page, and press the registration button. This disables the registration reminder popup, so you have a fully functional version. Registration fee: $49.95 (single-user license) Volume discounts and site licenses are available. Please see http://www.iopus.com/register.htm or the RegNow order page for details and pricing. Further discounts are available for educational and non-profit organizations (NP). Please check with us at sales@iopus.com for details of our NP discounts. Upgrade: If you have already
purchased an earlier version of STARR or SAM security software, you will find
upgrade information at http://www.iOpus.com/starr-upgrade.htm Click here to display the fax
order form in register.txt. (E) Other Options For the most current list of all registration options
please visit our homepage at http://www.iOpus.com/registration.htm
. This page displays the version number of your copy of the STARR software in addition to the version and name of your windows operating system. For support please be sure to include this information. Press the HELP button on this page to start the browser with this HTML based help file. The also features a "Check for Upgrades" button that will start your browser, connect to the iOpus Website and displays the newest information about STARR.
--- The 007 security family --- The 007 security office family, currently consists of 4 products and is growing:
--- The 42 Internet family --- The 42 Internet family consists currently of a single product :) - others are in development.
If you are interested in reselling our software, please visit the partner section on our web page.
The free iOpus Software newsletter:
Frequently Asked Questions (FAQ): 1. Purchasing: Q: Is ordering online safe? (the registration code) A: Yes. And here is why: To provide you with a fast, secure and professional solution for ordering online, we work together with a dedicated e-commerce software vendor: REGNOW. REGNOW has a state-of-the-art secure web site and handle registrations for a wide variety of software companies. All credit card transaction done by REGNOW use strong encryption. Q: I would like to purchase and download STARR on the computer I am currently using, but install it on another computer. Is this possible? A: Yes. The STARR installation file is compact and will fit on a single floppy disk. You may purchase and download on a computer and copy it to floppy disk, and then later install on another computer. Please note that the single user software license for STARR allows for one installation per purchase. Please also note that you are only allowed to install STARR on a computer you own. If you would like to install STARR on more than one computer, we offer multi-user and site licenses with great discounts. Q: How do you count the licenses for the multi-user license ? A: The installations are counted by the "STARR logging engine". Example: You have 10 PC's with the logging engine running and two PC's with (only) the STARR Commander to convert and read the log file. In this case you need the 10-user license. Installations of STARR Commander are free. 2. Installing: Q: Am I allowed to install this software on somebody else's computer? A: You may only install STARR on a computer that you own. Before you install the software, you must agree to use it only on a computer you own. Q. Should I inform my employees or others that they are being monitored? A: Yes. Some countries may require this by law. STARR has a built-in popup for this. 3. Operation: Q: Does STARR log every application title, path etc.? A: Yes, to our knowledge, the title and path of every application is logged. Q: Does STARR log every keystroke ? A. STARR logs almost every keystroke, with a few exceptions. Some applications do not allow for keystrokes to be logged, but these are very rare. The only ones currently known of are: the password fields in Pretty Good Privacy (PGP) and the NT / Win 2000 logon screen. If you come across any others, please let us know. Q: Is the Win 95 / 98 / ME logon password recorded ? A. Yes, it is (Please make sure that only authorized persons have access to the log file). Q: Is the Win NT / Win 2000 logon password recorded ? A. No. Q: I received the log file via email but it looks "weird". What is wrong ? A. Probably nothing! You probably choose the option "send STARR log". In this case STARR sends the raw, probably encrypted STARR log file . Choose "HTML", "Spreadsheet" or "Plain text" in order to receive "ready-to-use" reports. Q: The spreadsheet report is not imported correctly into Excel ? A. Excel can import Text files, which are stored in the comma separated value (CSV) format. Such a file contains the data in lines, whilst the fields are separated by commas. In normal cases Excel reads and converts this format automatically. Unfortunately there is a problem with Excel. Depending on the local Windows settings the separator may be either a semicolon or a comma. In German Excel the CSV file must contain a semicolon as a separator, to import the fields within the records into different columns of the worksheet. 4. Email: Q: Can STARR also send the log files via AOL ? A: Email options (a) and (b) work fine with AOL. AOL uses its own proprietary email protocol and unfortunately not the Internet standard SMTP. Therefore you can not use option (c). Q: Can you recommend any free email accounts for use with STARR ? A. Yes, check out our TOP 5 list of free SMTP / POP3 Email accounts at http://www.iopus.com/guides/bestpopsmtp.htm Q: Does STARR transmit any information back to an outside web site like some other Internet utilities do ? A: No, of course not! The only information that STARR ever sends out is the STARR report or the STARR log file to YOUR email address if you choose to have the log file emailed. In addition, before emailing the log file, STARR determines if a PC is online. Technically STARR does this by trying to access an outside web site. This is done to make sure that no dial-up popup appears and the email process can run completely undetected. Technically this is the same a reading a web site with your browser, so no sensitive information is transmitted during this process. If you activate the function "Assume PC is always online" STARR skips this online check. If you disable the "Email log file" function, STARR does not perform *any* Internet activity at all. 5. Security: Q: How discrete is STARR ? Can anyone detect it? A. If you select the log file backdating and rename the files (-> Security) it is VERY discrete and almost impossible to detect since it does not appear on the task bar or even in the task list. For an invisible manual installation simply follow the step-by-step guide in this manual. Q: If people know STARR is installed, can they circumvent or manipulate the software without me knowing ? A: STARR has many security features to prevent this: When installed invisibly, STARR does not show up as an icon, does not appear in the Windows system tray, does not appear in Windows Programs, does not show up in the Windows task list, cannot be uninstalled without the STARR Commander password which you can specify, and STARR does not slow down the operation of the computer it is recording. If the log file is emailed out or saved on a network server it is not accessible for the user of the local PC and can not be deleted. Even when stored locally, it is impossible to manipulate the log file without breaking the STARR encryption scheme first. But as with any filter, surveillance or security software, a computer expert could ultimately disable or delete the STARR installation, but this will not go unnoticed by you. Q: Why is STARR so small ? Other apps which do similar things need a 7.0 MB download ? A. STARR is written in "pure" C/C++ code, which can be compiled into very small, yet powerful executables (Remember, only about ten years ago a whole operating system did not need more then 16 Kbytes!). Secondly, STARR is designed to make as much use of the Windows operating system as possible. The advantages are obvious: The more we utilize the Windows operating system itself, the smaller and more discrete STARR becomes. 6. Miscellany: Q: Where can I find more information ? A: You can find more information on the iOpus homepage, for example:
About iOpus Software products: iOpus' field
of expertise includes Internet-based applications and
Windows security. Our software is developed based on the needs and
requirements of users like yourself as we always keep an eye open as we
scout for new and fresh ideas to incorporate in our product development. If you have suggestions or questions, please do not hesitate to contact us at support@iOpus.com !
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
© 2001 iOpus Software GmbH |