home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-08-12 | 48.9 KB | 2,089 lines |
-
-
-
-
- 1 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- PiGAS SECURITY (tm) - VERSION 1.02 SHAREWARE
- ---------------------------------------------
-
- Contents:
-
- Chapter 1: GENERAL DESCRIPTION . . . . . . . . . . . . . . . . . . . 3
-
- Chapter 2: DISCLAIMER - AGREEMENT . . . . . . . . . . . . . . . . . 4
-
- Chapter 3: INSTALLATION . . . . . . . . . . . . . . . . . . . . . . 6
- 3.1. Installation . . . . . . . . . . . . . . . . . . . . . . . . 6
- 3.2. List of the new directories structure . . . . . . . . . . . 6
- 3.3. How to Continue from here . . . . . . . . . . . . . . . . . 7
-
- Chapter 4: FIRST TIME RUNNING - A SIMPLE EXAMPLE . . . . . . . . . . 8
-
- Chapter 5: HOW TO PROTECT OBJECTS . . . . . . . . . . . . . . . . . 14
- 5.1. Setup protection for objects . . . . . . . . . . . . . . . . 14
- 5.2. Running the protection . . . . . . . . . . . . . . . . . . . 20
-
- Chapter 6: SUGGESTED PROTECTION STRATEGY . . . . . . . . . . . . . . 23
-
- Chapter 7: OPTIMIZATIONS . . . . . . . . . . . . . . . . . . . . . . 25
- 7.1. Speed . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
- 7.2. Disk space . . . . . . . . . . . . . . . . . . . . . . . . . 26
-
- Chapter 8: CONFLICTS WITH OTHER UTILITIES . . . . . . . . . . . . . 27
-
- Chapter 9: RESTORING THE LOGIN.EXE AND PSP.EXE FILES . . . . . . . . 29
-
- Chapter 10: REGISTRATION AND TECHNICAL SUPPORT . . . . . . . . . . . 30
-
- Chapter 11: OMBUDSMAN STATEMENT . . . . . . . . . . . . . . . . . . . 36
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 2 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- IMPORTANT : PLEASE READ THIS FILE CAREFULLY BEFORE USING THE
- --------- PiGAS SECURITY.
-
- IF YOU HAVE ANY QUESTIONS, PLEASE CONTACT US AT THE FOLLOWING ADDRESS :
-
- PIGAS INC.
- 459 COLUMBUS AVENUE #314
- NEW YORK, NY 10024
- U.S.A.
- CIS: 72172,2063
-
-
- ┌---------┐
- ┌-----┴---┐ │ (R)
- --│ │o │------------------
- │ ┌-----┴╨--┐ │ Association of
- │ │ │-┘ Shareware
- └---│ o │ Professionals
- ------│ ║ │--------------------
- └----╨----┘ MEMBER
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 3 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 1. GENERAL DESCRIPTION
- ----------------------
-
- PiGAS SECURITY (tm) allows to protect the information in your PC
- against unauthorized access. The protected information becomes
- totally unavailable to the unauthorized user, even when using a
- powerful disk utility or booting from a diskette.
-
- MAIN FEATURES
- -------------
-
- - Hide any kind of data on your disk with sophisticated
- protection scheme. The hidden data becomes totally unavailable
- to the unauthorized user, even when using a powerful disk
- utility or booting from a diskette.
-
- - Unlimited number of users, each one having a unique password.
-
- - Full report about authorized/unauthorized activity in the system.
-
- - Simple call to login/logout program to start or end a user session.
-
- - Fast hide/open operation.
-
- - Easy configuration program to allow selection of data to hide.
-
- - Mouse support.
-
- - No need for the program to be resident.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 4 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 2. DISCLAIMER - AGREEMENT
- -------------------------
-
- Any user of PiGAS SECURITY program must accept this disclaimer of warranty:
-
- PiGAS SECURITY IS SUPPLIED AS IS. PIGAS Inc. DISCLAIMS ALL WARRANTIES,
- EXPRESSED OR IMPLIED, INCLUDING WITHOUT LIMITATION, THE WARRANTIES OF
- MERCHANTABILITY AND OF FITNESS FOR ANY PURPOSE.
- YOU HAVE BEEN NOTIFIED THAT IN A CASE OF A FAILURE IN PiGAS SECURITY,
- UNRECOVERABLE DAMAGE TO YOUR DATA MIGHT OCCUR.
- IF YOU USE PiGAS SECURITY, YOU ASSUME EXCLUSIVE RESPONSIBILITY AND
- LIABILITY FOR ANY LOSS OR DAMAGE DIRECTLY OR INDIRECTLY ARISING OUT
- OF THE USE OF THE PROGRAM.
- PIGAS Inc. ASSUMES NO LIABILITY FOR ANY DAMAGES, INDIRECT, CONSEQUENTIAL,
- OR INCIDENTAL WHICH MAY RESULT FROM THE USE OF PiGAS SECURITY.
- IN NO EVENT SHALL PIGAS Inc. AND/OR ANYONE ELSE BE LIABLE FOR ANY DAMAGE
- EVER EXCEEDING THE PRICE PAID FOR THE LICENSE TO USE THE PiGAS SECURITY.
- SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR
- CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT
- APPLY TO YOU.
- THE DISCLAIMER - AGREEMENT SHALL BE CONSTRUED, INTERPRETED AND
- GOVERNED BY THE LAWS OF THE STATE OF NEW YORK.
-
- PiGAS SECURITY is a "SHAREWARE program" and is provided at no charge
- to the user for evaluation.
- Feel free to share it with your friends, but please do not give it away
- altered or as part of another system. The essence of "user-supported"
- software is to provide personal computer users with quality software
- without high prices, and, at the same time, provide incentive for
- programmers to continue to develop new products.
-
- Any user of the PiGAS SECURITY program must register (see section 6)
- and pay for his copy within 30 days of first use, or their license
- will be withdrawn.
-
- The $25 registration fee will license one copy for use on any computer
- at any one time. You must treat this software just like a book. For
- example, this software may be used by any number of people and may be
- freely moved from one computer location to another, so long as there is
- no possibility of it being used at one location while it's being used
- at another. Just as a book cannot be read by two different persons
- at the same time.
-
-
-
-
-
-
-
-
-
-
- 5 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
-
- Site-License arrangements may be made by contacting PiGAS INC.
-
- Anyone distributing the PiGAS SECURITY program for any kind of
- remuneration should follow our distribution policy (see file VENDOR.DOC)
-
- You are encouraged to pass a copy of the PiGAS SECURITY program along
- to your friends for evaluation. Please encourage them to register
- their copy if they find out that they can use it.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 6 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 3. INSTALLATION
- ---------------
-
- 3.1 - Installation
- ------------------
-
- PiGAS SECURITY has been tested very extensively in order to be
- error-free. However, it is recommended to make a system backup
- before starting the installation.
-
-
- TO INSTALL PiGAS SECURITY - RUN THE INSTALL.EXE PROGRAM AND
- FOLLOW THE INSTRUCTIONS.
-
-
-
-
- 3.2 - List of the new directories structure
- -------------------------------------------
- C:\PIGAS
- C:\PIGAS\INFO
- These directories are for internal use.
- Do not alter their name and their contents.
-
-
- C:\PIGASTST
- C:\PIGASTST\SMITH
- C:\PIGASTST\JONES
- These directories contain demo files.
- You can delete them whenever you like, but remember to move
- the files LOGIN.EXE LOGOUT.EXE and PSP.EXE before deleting.
-
- C:\PIGASTST\LOGIN.EXE
- C:\PIGASTST\LOGOUT.EXE
- All users will use these programs.
- You can move these programs to any other directory but DO NOT
- DELETE THEM FROM THE DISK AS LONG AS YOU ARE USING PiGAS
- SECURITY.
-
- C:\PIGASTST\PSP.EXE
- The master user will use this program (see section 5.)
- You can move this program to any other directory but DO NOT
- DELETE IT FROM THE DISK AS LONG AS YOU ARE USING PiGAS SECURITY.
-
-
-
-
-
-
-
-
-
- 7 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
- 3.3 - How to Continue from here
- -------------------------------
-
- Read section 4 - FIRST TIME RUNNING - A SIMPLE EXAMPLE, in order
- to see how to run the example.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 8 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 4. FIRST TIME RUNNING - A SIMPLE EXAMPLE.
- -----------------------------------------
-
-
- Let's try an example which will help you in understanding the main
- features and ideas behind PiGAS SECURITY.
-
- When you installed the PiGAS SECURITY, the installation program built
- the following structures:
-
- c:\pigastst - A new directory
- c:\pigastst\jones.txt - A new file
- c:\pigastst\smith.txt - A new file
- c:\pigastst\smith - A new directory
- c:\pigastst\jones - A new directory
-
- c:\pigastst\demo.doc - The demo documentation.
- c:\pigastst\pigas.doc - The PiGAS SECURITY documentation.
- c:\pigastst\login.exe - The PiGAS SECURITY login program.
- c:\pigastst\logout.exe - The PiGAS SECURITY logout program.
- c:\pigastst\psp.exe - The PiGAS SECURITY configuration program.
- c:\pigastst\register.doc - Our registration file.
- c:\pigastst\vendor.doc - Our distribution policy.
-
-
- You can use the commands DIR and TYPE in order to study this structure.
-
- In our example there are four different users :
-
- 1. You - you are the master user, there is no hidden
- information from you.
-
- 2. Smith - one of the users.
- Smith HAS ACCESS to the following information:
-
- c:\pigastst\demo.doc
- c:\pigastst\pigas.doc
- c:\pigastst\login.exe
- c:\pigastst\logout.exe
- c:\pigastst\psp.exe
- c:\pigastst\smith.txt
- c:\pigastst\smith
- c:\pigastst\register.doc
-
-
-
-
-
-
-
-
-
- 9 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- c:\pigastst\vendor.doc
-
- Smith HAS NO ACCESS to the following information:
-
- c:\pigastst\jones.txt
- c:\pigastst\jones
-
- 3. Jones - one of the users.
- Jones HAS ACCESS to the following information:
-
- c:\pigastst\demo.doc
- c:\pigastst\pigas.doc
- c:\pigastst\login.exe
- c:\pigastst\logout.exe
- c:\pigastst\psp.exe
- c:\pigastst\jones.txt
- c:\pigastst\jones
- c:\pigastst\register.doc
- c:\pigastst\vendor.doc
-
- Jones HAS NO ACCESS to the following information:
-
- c:\pigastst\smith.txt
- c:\pigastst\smith
-
- 4. Others - Anyone who is trying to use the computer without
- your permission, HAS ACCESS to the following information:
-
- c:\pigastst\demo.doc
- c:\pigastst\pigas.doc
- c:\pigastst\login.exe
- c:\pigastst\logout.exe
- c:\pigastst\psp.exe
- c:\pigastst\register.doc
- c:\pigastst\vendor.doc
-
- and HAS NO ACCESS to the following information:
-
- c:\pigastst\smith.txt
- c:\pigastst\smith
- c:\pigastst\jones.txt
- c:\pigastst\jones
-
-
-
-
-
-
-
-
-
-
- 10 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
-
- The install program built the necessary setup for these users and gave
- each user an id and a password as follows:
-
- For you - the user id is master and the password is masterp
- For smith - the user id is smith and the password is 12345678
- For jones - the user id is jones and the password is 87654321
- For others - there is no special setup.
-
- A. First, we will hide all the confidential information.
- Type :
-
- LOGOUT <enter>
-
- Now everybody has access only to:
-
- demo.doc
- pigas.doc
- login.exe
- logout.exe
- psp.exe
- register.doc
- vendor.doc
-
- but no access to:
-
- smith.txt
- smith
- jones.txt
- jones
-
-
- WARNING
- -------
-
- You will not succeed accessing the hidden files and directories,
- even if you try to boot the computer, or use a sophisticated disk
- utility .
-
-
- B. Suppose Smith wants to start a session.
- He will type:
-
-
-
-
-
-
-
-
-
- 11 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
- LOGIN <enter>
- >smith 12345678 <enter>
-
- Now Smith has only access to:
-
- demo.doc
- pigas.doc
- login.exe
- logout.exe
- psp.exe
- smith.txt
- smith
- register.doc
- vendor.doc
-
-
- and has no access to the following information:
-
- jones.txt
- jones
-
- Once Smith has finished his work - and before turning off
- the computer - he should type:
-
- LOGOUT <enter>
-
- Again, all the confidential information becomes hidden.
-
- C. Suppose Jones wants to start a session.
- He will type:
-
- LOGIN <enter>
- >jones 87654321 <enter>
-
- Now Jones should have access only to:
-
- demo.doc
- pigas.doc
- login.exe
- logout.exe
- psp.exe
- jones.txt
-
-
-
-
-
-
-
-
-
- 12 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- jones
- register.doc
- vendor.doc
-
- and not be able to access the following information:
-
- smith.txt
- smith
-
- Once Jones has finished his work - and before turning off
- the computer - he should type:
-
- LOGOUT <enter>
-
- Again, all the confidential information becomes hidden.
-
- C. Suppose that YOU (the master user) want to start a session.
- Type:
-
- LOGIN <enter>
- >master masterp <enter>
-
- You will have access to all the information:
-
- demo.doc
- pigas.doc
- login.exe
- logout.exe
- psp.exe
- jones.txt
- jones
- smith.txt
- smith
- register.doc
- vendor.doc
-
- D. Any other user has no reason for using the Login program.
- If he tries and enters a wrong user id or password, the Login
- program will call the Logout program which will hide all
- confidential information.
-
-
- In this chapter we demonstrated the daily use of the PiGAS SECURITY -
-
-
-
-
-
-
-
-
-
- 13 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- using the Login and Logout programs in order to start, and end,a session.
- However, the "master user" (you) should also need to know how to create,
- change or delete a user setup. This is done using the PSP program and
- it is explained in the next chapter.
-
- Before continuing, make sure to log in as master by typing:
-
- LOGIN <enter>
- >master masterp <enter>
-
-
- IMPORTANT :
- -----------
-
- All other users cannot use the PSP program.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 14 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 5. HOW TO PROTECT OBJECTS
- -------------------------
-
- In order to protect objects in the computer, you should first define the
- computer users and their restricted objects.
- (Note : In this SHAREWARE version, objects refer to files and directories.)
-
- In the PiGAS SECURITY program, computer users are divided in two categories
- - MASTER USER
- - NORMAL USER
-
- A "MASTER USER" is a user who has access to all the objects in the computer,
- whereas a "NORMAL USER" refers to users who have a restricted access to some
- objects in the computer.
-
- Thus, PiGAS SECURITY contains three different programs :
- - PSP.EXE
- - LOGIN.EXE
- - LOGOUT.EXE
-
- PSP.EXE can be used only by the "MASTER USER" in order to create, change or
- delete a user setup. (Section 5.1 describes this program.)
-
- LOGIN.EXE can be used by a "NORMAL USER" and a "MASTER USER" in order to
- start a session. (Section 5.2 describes this program.)
-
- LOGOUT.EXE can be used by a "NORMAL USER" and a "MASTER USER" in order to
- end a session. (Section 5.2 describes this program.)
-
- 5.1 SETUP PROTECTION FOR OBJECTS (PSP.EXE program)
- --------------------------------------------------
-
- In order to protect objects in the computer, the MASTER USER (you) defines
- the different users and their access/restriction list. This is done by the
- PSP.EXE program, which allows the MASTER USER to create, change, or delete
- the user configuration.
-
- 5.1.1 STARTING THE PSP PROGRAM
- ------------------------------
-
- To start the PSP program, simply type :
-
- PSP
-
-
-
-
-
-
-
-
-
- 15 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
- (We assume that the current directory is C:\PIGASTST)
-
- The MAIN MENU appears. Press <ALT S> to have access to the setup
- options. The following sections will explain in detail each option
- of the program.
-
-
- 5.1.2 CREATING THE USER SETUP
- -----------------------------
-
- To create the user setup, press <F3> from the main menu.
- A dialog box appears.
-
- (Note : For your convenience, you can see in the dialog box a list of all
- the existing user names that you cannot select.)
-
- Type the new user name (4 to 8 characters maximum: from a to z, numbers
- are allowed) and press <Enter>. The USER SETUP appears. (Section 5.1.4
- describes how to use the USER SETUP and how to define the user password.)
-
-
- 5.1.3 CHANGING THE USER SETUP
- -----------------------------
-
- To change the user setup, press <F4> from the main menu.
- A dialog box appears. Select the user name by placing the cursor on a
- name from the list in the dialog box and press <Enter>.
- The USER SETUP appears. (Section 5.1.4 describes how to use the USER
- SETUP.)
-
-
- 5.1.4 USER SETUP
- ----------------
-
- The USER SETUP contains the following elements:
-
- 1. User Name - displays the user name and allows to change it.
- In order to change the user name, place the cursor on the user name
- field by pressing <ALT U>. Then type the new user name.
- In case you are changing an old user name to a new one, the program
- will create a new copy for the new user name. The old user setup will
- not be deleted.
-
-
-
-
-
-
-
-
-
- 16 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- A User name can contain from 4 to 8 characters maximum, from a to z
- (numbers can be included).
-
- 2. Password - displays the user password and allows to change it.
- In order to change the user password, place the cursor on the user
- password field by pressing <ALT P>. Then type the new user password.
- The User Password can contain from 6 to 11 printable characters
- (with case sensitivity).
-
- 3. Dir Tree - displays all the directories of a drive and allows
- to add or remove protection for the directories.
- In order to activate this window, press <ALT T>.
-
- Adding or removing a protection to a directory
- ----------------------------------------------
-
- IMPORTANT: DO NOT PROTECT A DIRECTORY WHICH CONTAINS
- ---------- LOGIN.EXE OR LOGOUT.EXE
-
- Use the <arrow-up> or <arrow-down> to place the cursor on the selected
- directory.
- Press <+> on the numeric pad in order to add a protection to the
- directory.
- Press <-> on the numeric pad in order to remove a protection to the
- directory.
-
- (Note : A protected directory will always be displayed in
- parentheses.)
-
- Changing current drive displayed in directory tree menu
- -------------------------------------------------------
-
- In order to change the current drive, press <ALT D> then select from
- the list the new drive by placing the cursor on it. Press <ALT D>
- again.
-
- 4. File list - displays the files list and allows to add or remove
- protection for the files.
- In order to activate this window, press <ALT L>.
-
-
- Adding or removing a protection to a file
- -----------------------------------------
-
-
-
-
-
-
-
-
-
- 17 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
- IMPORTANT: DO NOT PROTECT THE FILES:
- ---------- LOGIN.EXE, LOGOUT.EXE.
-
- Use the <arrow-up> or <arrow-down> to place the cursor on the selected
- file.
- Press <+> on the numeric pad in order to add a protection to a file.
- Press <-> on the numeric pad in order to remove a protection to a file.
-
- (Note : A protected file will always be displayed in parentheses.)
-
- 5. Dir name - displays the current directory name and allows to change
- it.
- In order to change the current directory, press <ALT N> then type the
- new directory name and press <Enter> or <ALT S>.
- If you do not type a full path name, the first directory that matches
- the dir name field will become the current directory.
-
- 6. File name - selects the file name to be displayed.
- In order to change the file name to be displayed, press <ALT F> then
- type the new file name and press <Enter> or <ALT S>.
-
- 7. Cancel - in order to quit this menu without saving the last changes,
- press <Esc> or <ALT C>.
-
- 8. OK - press <ALT O> in order to save all the changes and quit.
-
- 9. Show - is used after changing the dir name field or the file name
- field as described above for elements #5 and #6.
-
- 10. Select Drive - is used to change the default drive for the directory
- tree menu as described above for element #3.
-
-
- 5.1.5 DELETING THE USER SETUP
- -----------------------------
-
- To delete the user setup, press <F5> from the main menu.
- A dialog box appears. Select the user name by placing the cursor on a
- name from the list in the dialog box and press <Enter>. A confirmation
- message appears. Press <Enter> to confirm the delete operation or <TAB>
- and <Enter> in order to cancel it.
-
-
-
-
-
-
-
-
-
-
- 18 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
- 5.1.6 MASTER PASSWORD
- ---------------------
-
- To have access to the master password, press <F6> from the main menu.
- The message "CHANGE MASTER PASSWORD" appears.
- Type a new master password from 6 to 11 printable characters (with
- case sensitivity). and press <Enter>.
- The message "ENTER MASTER PASSWORD AGAIN " appears.
- Type the new master password again and press <Enter>.
- (Note : Entering the new password again is done in order to make sure
- that no mistake has been made while typing the password.)
-
- It is recommended to change the default password - masterp.
-
- PLEASE REMEMBER THIS PASSWORD; OTHERWISE, YOU WILL NOT HAVE THE
- ABILITY TO HAVE ACCESS TO THE PROTECTED OBJECTS.
-
-
- 5.1.7 ENCRYPTION METHOD
- -----------------------
-
- To select the encryption method, press <ALT S> then <e> from
- the main menu. A dialog box appears.
-
- The Fast option - allows Fast encryption during the Login program.
- Fast is the default option.
-
- The Secure option - allows a better security encryption method
- during the Login program (at the expense of speed).
-
- Press <ALT F> to select Fast.
- Press <ALT S> to select Secure.
-
- After selecting the encryption method, press <Enter>.
-
-
- 5.1.8 GENERAL REPORT
- --------------------
-
- To produce a general report, press <F7> from the main menu.
- A report about all the users appears.
- Use the <arrow-up> or <arrow-down> to read the report.
-
-
-
-
-
-
-
-
-
- 19 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- Press <Esc> to exit from the report.
-
-
- 5.1.9 USER REPORT
- -----------------
-
- To produce a user report, press <F8> from the main menu.
- A dialog box appears. Select the user name by placing the cursor
- on a name from the list in the dialog box and press <Enter>.
- A report about the selected user appears.
- Use the <arrow-up> or <arrow-down> to read the report.
- Press <Esc> to exit from the report.
-
-
- 5.1.10 HIDDEN FILES/DIRECTORIES REPORT
- --------------------------------------
-
- To obtain a report about all the hidden files and directories on the
- screen, press <F9> from the main menu.
- Use the <arrow-up> or <arrow-down> to read the report.
- Press <Esc> to exit from the report.
-
-
- 5.1.11 LOG REPORT
- -----------------
-
- To generate a log report on the screen, press <ALT R> then <l> from
- the main menu.
- A log report about all the calls to LOGIN.EXE and LOGOUT.EXE appears.
- Use the <arrow-up> or <arrow-down> to read the report.
- Press <Esc> to exit from the report.
-
-
- 5.1.12 DELETE LOG
- -----------------
-
- To delete the log report, press <ALT R> then <d> from the main menu.
- A confirmation message appears. Press <Enter> to continue the delete
- operation or <TAB> and <Enter> in order to cancel it.
-
-
- 5.1.13 EXITING FROM THE PROGRAM
- -------------------------------
-
-
-
-
-
-
-
-
-
- 20 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
- To exit from the program, press <ALT X> from the main menu.
-
-
- 5.1.14 REMARKS
- --------------
-
- - All the internal information of the program is kept under the
- directories c:\pigas and c:\pigas\info.
-
- DO NOT ALTER THE NAMES AND CONTENTS OF THESE DIRECTORIES.
-
- - The pigas directories (c:\pigas and c:\pigas\info) are protected
- by default and are not accessible to all the NORMAL USERS.
- You can remove this protection (see section USER SETUP) but a
- user cannot have any protected object without having a protection
- on the pigas directories.
- (When that happens, the PSP program will automatically add a
- protection to the user setup on the pigas directories.)
-
-
- 5.2 RUNNING THE PROTECTION (LOGIN.EXE and LOGOUT.EXE programs)
- --------------------------------------------------------------
-
- After creating the user's configuration, as explained in section 5.1,
- each user can use the LOGIN.EXE program, together with his user name
- and password in order to start a working session, and the LOGOUT.EXE
- program in order to end a working session.
-
- LOGIN.EXE - used to start a user session. It protects the objects
- according to the user's configuration.
-
- You can execute LOGIN.EXE in two different ways :
-
- 1. Enter directly the parameters (user name and password):
-
- login <username> <password> <Enter>
-
- or
-
- 2. Call the program without parameters.
- The system will prompt you for the user name and password.
- (Note : This method is more secure because the password does not appear
-
-
-
-
-
-
-
-
-
- 21 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- on the screen).
-
- Login <Enter>
- Login 1.02 SHAREWARE, Copyright (c) 1993 by PiGAS Inc.
- > <username> <password> <Enter>
-
-
- LOGOUT.EXE - used to end a user session. It protects ALL the objects
- that were selected by PSP.EXE.
-
- To execute LOGOUT.EXE, simply type:
-
- Logout <Enter>
-
-
- IMPORTANT
- ---------
-
- 1. The MASTER USER can start a session as follows:
-
- Login <Enter>
- Login 1.02 SHAREWARE, Copyright (c) 1993 by PiGAS Inc.
- > master masterp <Enter>
-
- If you changed the MASTER USER password, type:
-
- Login <Enter>
- Login 1.02 SHAREWARE, Copyright (c) 1993 by PiGAS Inc.
- > master <new master password> <Enter>
-
- 2. Any time a user enters the wrong user id or password, ALL the
- objects that were selected by PSP.EXE become protected.
-
- 3. It is recommended to put a call to LOGIN.EXE or LOGOUT.EXE in the
- autoexec.bat file.
- Any attempt to enter a wrong user id or password (or entering
- an empty user id by pressing <Enter> ) during the system boot will
- automatically protect ALL the selected objects.
-
- 3. The following call:
-
- Login <Enter>
- <Enter>
-
-
-
-
-
-
-
-
-
- 22 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
- Is equivalent to
-
- Logout <Enter>
-
- 4. The best way to start - and to end - a user session is, as follows:
-
- - Start the session by calling LOGIN.EXE:
-
- Login user1 password1
-
- (do your work .....)
-
- - End the session by calling LOGOUT.EXE:
-
- Logout <Enter>
-
- All selected objects will be protected.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 23 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 6. SUGGESTED PROTECTION STRATEGY
- --------------------------------
-
- This chapter will help you define your own protection strategy.
- We assume that you have read the chapter HOW TO PROTECT OBJECTS.
-
- To define your own protection strategy you need to decide:
-
- 1. From which persons (users) you want to hide the information.
-
- 2. Which information (files and directories) you want to hide from
- each one of the users.
-
- When you think about these problems, normally you will come up with three
- "GROUPS" or "TYPES" of users:
-
- 1. "ANY USER" TYPE - These are users whom you do not want to work on
- your computer. For example: people in your office who pass near
- your computer and "accidentally" snoop on your data.
- It is up to you to decide which information these people can, or cannot,
- see. If you want, you can hide all the directories on the disks,
- but normally you are only worried about your personal data, and you do
- not mind if someone has access to other common utilities on the disk.
-
- Again it is up to you to decide.
-
- 2. "MASTER USER" TYPE - This is you. You have access to all the
- information in the disk.
-
- 3. "SPECIAL USER" TYPE - This refers to other people who can have more
- access than ANY USER, but less access than the MASTER USER.
- You can have different users here.
-
-
- Having these three groups in mind, it is quite simple to decide for
- each group which file(s) and directory(ies) needs to be protected or not.
-
- Now you can create the users' configuration.
-
- 1. For the "ANY USER" TYPE.
- You create a new user (by using the PSP program).
- For example: user name: ANYUSER and password: DONTCARE.
- Then you mark the restricted files and directories.
-
-
-
-
-
-
-
-
-
- 24 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- From that point on, anytime someone (master user or "special user") types
- LOGOUT (or logs in with the wrong password), all the files and
- directories that have been selected as such will be unavailable.
-
- 2. For the MASTER USER, the configuration is ready and does not need to be
- changed (except for the MASTER password, if you want).
-
-
- 3. "SPECIAL USERS" - For each special user, you create a new user setup
- and select the hidden files and directories for him.
- If you have many users with the same configuration, you can give to
- all of them the same name and password so you do not need to copy
- the configuration.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 25 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 7. OPTIMIZATIONS
- ----------------
-
- 7.1. SPEED
- ----------
-
- Try to avoid "nested encryption" in the user setup. It works fine,
- but causes an unnecessary overhead. For example, if you have the
- following disk structure :
-
- c:\example
- c:\example\one
- c:\example\one\file
- c:\example\two
- c:\example\two\file
-
- and you select only "c:\example" to be hidden:
-
- c:--
- |
- |
- --(example)
-
- All the subdirectories and files of "c:\example" also become hidden
- for this user. It is unnecessary to select each one to be hidden.
-
- On the other hand, sometimes it is necessary to use "nested encryption".
- For example, if you have the following disk structure :
-
- c:\example - a directory
- c:\example\one - a directory
- c:\example\one\file - a file
-
- By selecting only the directory "c:\example" to be hidden, as explained
- above, "c:\example\one" and "c:\example\one\file" will also become
- unavailable.
- However, someone may try to use some low level disk utilities and find
- some sectors that contain the information in the file
- "c:\example\one\file".
- To avoid this, you also need to select the "c:\example\one\file" to be
- hidden (and to select the secure protection method in the dialog box
- protection method).
-
-
-
-
-
-
-
-
-
-
- 26 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- You do not need to use a "nested encryption" if you do not suspect
- that someone is going to spend a few hours working on your computer
- in order to decrypt your data. But if your data is very sensitive, it is
- recommended to use the "safe" solution of nested encryption.
-
-
- 7.2 DISK SPACE
- --------------
-
- The login.exe and logout.exe programs are identical. You can save some
- disk space by deleting the logout.exe.
- In this case, the user will log out by typing :
-
- LOGIN <cr> <cr>.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 27 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 8. CONFLICTS WITH OTHER UTILITIES
- ---------------------------------
-
- Some low level disk utilities (like CHKDSK.COM, NDD.EXE, etc.)
- might report the hidden information as a disk problem and ask
- if you want to correct these problems.
-
- BEFORE LETTING THE UTILITIES CORRECT THE DISK, YOU MUST BE SURE THAT
- YOU ARE THE MASTER USER.
-
- This can be done by:
-
- 1. log in as a master user
-
- or
-
- 2. try to access "c:\pigas" - which is accessible only to the master
- user.
-
- To help you avoid this conflict, PiGAS SECURITY will automatically
- hide these low level disk utilities from the normal user. So if a user
- did not log in as a master user, he will not able to run these utilities.
- However, you, as a master user, can run these utilities and obtain the
- correct results as required.
-
- AGAIN - BEFORE LETTING ANY PROGRAM CORRECT DISK ERRORS, BE SURE THAT
- YOU HAVE LOGGED IN AS MASTER USER.
-
-
- REMARK : The automatic hiding is done as follows:
-
- During the installation, a special scan routine searches in the
- disk for all the known utilities that might have a conflict with
- PiGAS SECURITY, and creates a file ("c:\pigas\info\conflict.dat")
- that contains a list of all the utilities that have been found.
- Then, each time you create or change a user configuration, all these
- utilities are added to the protected files list for this user.
-
- ADDING FILES TO THE AUTOMATIC HIDDEN LIST
-
- There might be utilities that have not been added automatically to
- the file "conflict.dat" (utilities that are not in the list of the
- install program.). You can add these utilities to "conflict.dat" by
-
-
-
-
-
-
-
-
-
- 28 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- using any text editor - and typing their full path.
- After updating the file "conflict.dat", call the program PSP.EXE
- once. Type:
-
- PSP /u
-
- The PSP program will update automatically all the users' setup.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 29 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 9. RESTORING THE LOGIN.EXE AND PSP.EXE FILES
- --------------------------------------------
-
- You can always restore the LOGIN.EXE and PSP.EXE files from the original
- diskette of PiGAS SECURITY:
-
- Insert the PiGAS SECURITY in drive A.
-
- Type:
-
- COPY A:PIGAS.01 C:LOGIN.EXE <cr>
- COPY A:PIGAS.02 C:PSP.EXE <cr>
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 30 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- 10. REGISTRATION AND TECHNICAL SUPPORT
- --------------------------------------
-
- In order to register the PiGAS SECURITY, fill in the REGISTRATION FORM.
-
- FRENCH, BELGIAN and SWISS users can register through the DP Tool club
- using the FRENCH REGISTRATION FORM.
-
- Once you are registered, you will receive a receipt, a registration
- number, and you will benefit from the following advantages :
-
- 1. A registered version of PiGAS SECURITY with a UNIQUE INTERNAL KEY !.
-
- This unique key provides another level of security : even if someone
- discovers the encryption method of the unregistered version, he
- will still need to know your unique internal key in order to
- decrypt your data.
-
- The registered and unregistered versions are the same in terms of
- operation and speed (but the registration reminder screens will not
- appear on the registered version ...).
-
- 2. A C++ source code of PiGAS FILE ENCRYPTION program.
-
- This is the source code of a fully functional and powerful file
- encryption program (different from the encryption method used
- in PiGAS SECURITY).
- The registered user can use the code to create a file encryption
- program (simple compilation and linking needed) or link it with
- his own application.
-
- 3. A printed manual.
-
- The user manual contains a special article about computer security
- and encryption methods that does not exist in the PiGAS.DOC.
-
- 4. Technical support :
-
- By MAIL : For six months from the date of registration.
- Please send any letter to :
-
- PIGAS INC.
- 459 COLUMBUS AVENUE #314
- NEW YORK, NY 10024
-
-
-
-
-
-
-
-
- 31 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- U.S.A.
-
- By COMPUSERVE: Up to 30 minutes of support on Compuserve
-
- CIS: 72172,2063
-
- Support will be provided to non-registered users and users beyond
- the free support period on a time basis fee.
-
- 5. Information update about new PiGAS SECURITY products.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 32 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- REGISTRATION FORM
-
- NAME: _____________________________________________________________
-
- (COMPANY): _____________________________________________________________
-
- ADDRESS : ___________________________ CITY/TOWN______________________
-
- STATE : _____________________ ZIP CODE_________ COUNTRY_____________
-
- TELEPHONE: _____________________
-
-
- Remit to : PIGAS INC.
- 459 COLUMBUS AVENUE #314
- NEW YORK, NY 10024
- U.S.A.
-
- Price : US $25
-
- Payment method:
- [ ] CHECK (USA BANK)
- [ ] INTERNATIONAL POSTAL MONEY ORDER
- [ ] UNITED STATES CURRENCY
- [ ] AMERICAN EXPRESS INTERNATIONAL MONEY ORDER
- [ ] VISA / MASTERCARD
-
- CARD NO _____________________
-
- EXPIRATION DATE __________
-
- SIGNATURE _____________________ DATE __________
-
- v1.02
- -----------------------------------------------------------------------------
-
- CUSTOMER COMMENTS
-
- How did you first learn of PiGAS SECURITY ? _________________________
-
- How did you get this version ? ______________________________________
-
- How can this product be improved ?___________________________________
-
-
-
-
-
-
-
-
-
- 33 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
- _____________________________________________________________________
-
- _____________________________________________________________________
-
- _____________________________________________________________________
-
-
- Any other comment or suggestion _____________________________________
-
- _____________________________________________________________________
-
- _____________________________________________________________________
-
- _____________________________________________________________________
-
-
- THANK YOU FOR YOUR HELP
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 34 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- FRENCH REGISTRATION FORM
-
- NAME: _____________________________________________________________
-
- (COMPANY): _____________________________________________________________
-
- ADDRESS : _____________________________________________________________
-
- _____________________________________________________________
-
- TELEPHONE: _____________________
-
-
- Remit to : DP Tool Club.
- B.P. 745
- 59657 Villeneuve d'Ascq
- FRANCE
-
- Price : 140FF TTC
-
- Payment method:
- [ ] CHECK (FRENCH BANK)
- [ ] POSTAL MONEY ORDER
- [ ] CARTE BLEUE / MC
-
- CARD NO _____________________
-
- EXPIRATION DATE __________
-
- SIGNATURE _____________________ DATE __________
- v1.02
- -----------------------------------------------------------------------------
-
- CUSTOMER COMMENT
-
- How did you first learn of PiGAS SECURITY ? _________________________
-
- How did you get this version ? ______________________________________
-
- How can this product be improved ? __________________________________
-
- _____________________________________________________________________
-
-
-
-
-
-
-
-
-
-
- 35 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
- _____________________________________________________________________
-
- _____________________________________________________________________
-
-
- Any other comment or suggestion ____________________________________
-
- ____________________________________________________________________
-
- ____________________________________________________________________
-
- ____________________________________________________________________
-
-
- THANK YOU FOR YOUR HELP
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 36 PiGAS SECURITY v1.02 User Manual
-
-
-
-
-
-
-
- 11. OMBUDSMAN STATEMENT.
- ------------------------
-
-
- This program is produced by a member of the Association of Shareware
- Professionals (ASP). ASP wants to make sure that the shareware principle
- works for you. If you are unable to resolve a shareware-related problem
- with an ASP member by contacting the member directly, ASP may be able to
- help. The ASP Ombudsman can help you resolve a dispute or problem with an
- ASP member, but does not provide technical support for members' products.
- Please write to the ASP Ombudsman at 545 Grover Road, Muskegon, MI 49442 or
- send a CompuServe message via CompuServe Mail to ASP Ombudsman 70007,3536.
-
-
-
-
- ACKNOWLEDGEMENTS
- ----------------
-
- PiGAS SECURITY Copyright (c) 1993, PiGAS INC. , New York , NY.
-
- Any specific hardware or software names used in this user manual
- are the (registered) trademarks of specific companies.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-