home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Libris Britannia 4
/
science library(b).zip
/
science library(b)
/
SECURITY
/
3932.ZIP
/
DEMO.DOC
< prev
next >
Wrap
Text File
|
1993-09-03
|
7KB
|
238 lines
This is an extract of the PIGAS.DOC file. The text here will explain to you
how to use the example files of PiGAS SECURITY.
For your convenience, please print this file, and use the printout while
running the example.
FIRST TIME RUNNING - A SIMPLE EXAMPLE.
--------------------------------------
Let's try an example which will help you in understanding the main
features and ideas behind PiGAS SECURITY.
When you installed the PiGAS SECURITY, the installation program built
the following structures:
c:\pigastst - A new directory
c:\pigastst\jones.txt - A new file
c:\pigastst\smith.txt - A new file
c:\pigastst\smith - A new directory
c:\pigastst\jones - A new directory
c:\pigastst\demo.doc - The demo documentation.
c:\pigastst\pigas.doc - The PiGAS SECURITY documentation.
c:\pigastst\login.exe - A PiGAS SECURITY login program.
c:\pigastst\logout.exe - A PiGAS SECURITY logout program.
c:\pigastst\psp.exe - A PiGAS SECURITY configuration program.
c:\pigastst\register.doc - Our registration file.
c:\pigastst\vendor.doc - Our distribution policy.
You can use the commands DIR and TYPE in order to study this structure.
In our example there are four different users :
1. You - you are the master user, there is no hidden
information from you.
2. Smith - one of the users.
Smith HAS ACCESS to the following information:
c:\pigastst\demo.doc
c:\pigastst\pigas.doc
c:\pigastst\login.exe
c:\pigastst\logout.exe
c:\pigastst\psp.exe
c:\pigastst\smith.txt
c:\pigastst\smith
c:\pigastst\register.doc
c:\pigastst\vendor.doc
Smith HAS NO ACCESS to the following information:
c:\pigastst\jones.txt
c:\pigastst\jones
3. Jones - one of the users.
Jones HAS ACCESS to the following information:
c:\pigastst\demo.doc
c:\pigastst\pigas.doc
c:\pigastst\login.exe
c:\pigastst\logout.exe
c:\pigastst\psp.exe
c:\pigastst\jones.txt
c:\pigastst\jones
c:\pigastst\register.doc
c:\pigastst\vendor.doc
Jones HAS NO ACCESS to the following information:
c:\pigastst\smith.txt
c:\pigastst\smith
4. Others - Anyone who is trying to use the computer without
your permission, HAS ACCESS to the following information:
c:\pigastst\demo.doc
c:\pigastst\pigas.doc
c:\pigastst\login.exe
c:\pigastst\logout.exe
c:\pigastst\psp.exe
c:\pigastst\register.doc
c:\pigastst\vendor.doc
and HAS NO ACCESS to the following information:
c:\pigastst\smith.txt
c:\pigastst\smith
c:\pigastst\jones.txt
c:\pigastst\jones
The install program built the necessary setup for these users and gave
each user an id and a password as follows:
For you - the user id is master and the password is masterp
For smith - the user id is smith and the password is 12345678
For jones - the user id is jones and the password is 87654321
For others - there is no special setup.
A. First, we will hide all the confidential information.
Type :
LOGOUT <enter>
Now everybody has access only to:
demo.doc
pigas.doc
login.exe
logout.exe
psp.exe
register.doc
vendor.doc
but no access to:
smith.txt
smith
jones.txt
jones
ATTENTION
---------
You will not succeed accessing the hidden files and directories,
even if you try to boot the computer, or use a sophisticated disk
utility .
B. Suppose Smith wants to start a session.
He will type:
LOGIN <enter>
>smith 12345678 <enter>
Now Smith has only access to:
demo.doc
pigas.doc
login.exe
logout.exe
psp.exe
smith.txt
smith
register.doc
vendor.doc
and has no access to the following information:
jones.txt
jones
Once Smith has finished his work - and before turning off
the computer - he should type:
LOGOUT <enter>
Again, all the confidential information becomes hidden.
C. Suppose Jones wants to start a session.
He will type:
LOGIN <enter>
>jones 87654321 <enter>
Now Jones should have access only to:
demo.doc
pigas.doc
login.exe
logout.exe
psp.exe
jones.txt
jones
register.doc
vendor.doc
and not be able to access the following information:
smith.txt
smith
Once Jones has finished his work - and before turning off
the computer - he should type:
LOGOUT <enter>
Again, all the confidential information becomes hidden.
C. Suppose that YOU (the master user) want to start a session.
Type:
LOGIN <enter>
>master masterp <enter>
You will have access to all the information:
demo.doc
pigas.doc
login.exe
logout.exe
psp.exe
jones.txt
jones
smith.txt
smith
register.doc
vendor.doc
D. Any other user has no reason for using the Login program.
If he tries and enters a wrong user id or password, the Login
program will call the Logout program which will hide all
confidential information.
In this chapter we demonstrated the daily use of the PiGAS SECURITY -
using the Login and Logout programs in order to start, and end,a session.
However, the "master user" (you) should also need to know how to create,
change or delete a user setup. This is done using the PSP program and
it is explained in the next chapter.
Before continuing, make sure to log in as master by typing:
LOGIN <enter>
>master masterp <enter>
IMPORTANT :
-----------
All other users cannot use the PSP program.