home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
OS/2 Shareware BBS: 8 Other
/
08-Other.zip
/
blngs2.zip
/
ReadMe.Inf
(
.txt
)
< prev
next >
Wrap
OS/2 Help File
|
1994-01-16
|
11KB
|
211 lines
ΓòÉΓòÉΓòÉ 1. General Information ΓòÉΓòÉΓòÉ
ΓòÉΓòÉΓòÉ 1.1. Description of Program ΓòÉΓòÉΓòÉ
The Belongs2 program is designed to be a Theft Deterrent. The purpose is to
make it harder for someone to sell stolen computer equipment by identifying the
rightful owner of the equipment when the system is started up.
The program is typically installed into a hidden Startup folder so the
information is displayed when the computer is started up. The window will
retain the focus, which means that it will be visible even if other
applications being started have opened windows on top of the Belongs2 window.
After being displayed for a short time, the program terminates and the window
disappears.
ΓòÉΓòÉΓòÉ 1.2. Registration Information ΓòÉΓòÉΓòÉ
This program is being distributed as shareware. The registration fee is $25.00
plus $5.00 per additional line plus $1.00 per additional copy. For example, 100
copies of Belongs2 with two lines would be $129.00 ($25.00 + $5.00 + $1.00 x
99). If one line changes between copies, then they are counted as additional
lines, not as additional copies. For example, 100 copies of Belongs2 for a
company needing 20 copies for each of 5 departments would be $145.00 ($25.00 +
$5.00 x 5 + $1.00 x 19 x 5) if there were two lines, one for the company name
and another for the department name and phone number.
When you register the program, you will receive a version of Belongs2 which
displays the identification you specify. See the next section, Customization
of the Program, for more information.
Send the registration form provided in Form.Txt showing the items (company
name, telephone number, etc) to be used to identify the owner of the hardware
along with the registration fee to the following address:
Robert Simpson
2839 Dolores Drive
Library, PA 15129
U.S.A.
ΓòÉΓòÉΓòÉ 1.3. Customization of the Program ΓòÉΓòÉΓòÉ
The program is customized with the information you provide by modifying a text
file containing the program's resources (strings and timers) and using the
Resource Compiler to merge these resources with the compiled program. The
identifying text which is displayed is encrypted to prevent someone from easily
modifying the text to make it look like they actually own the computer. In
addition to the text which is displayed, the following features are also
implemented as resources:
o Timer for how often to set the focus to bring the window to the top. The
default is 200 ms (two tenths of a second).
o Timer for how long to display the window before closing the window and
terminating the program. The default is 30 seconds.
If the default values are not suitable, you may specify different values when
you send in your registration.
ΓòÉΓòÉΓòÉ 1.4. Additional Information and Support ΓòÉΓòÉΓòÉ
For additional information or support, send your request(s) to the author,
Robert Simpson at one of the following addresses:
CompuServe: 71520,737
Internet: 71520.737@compuserve.com
U.S. mail: 2839 Dolores Drive
Library, PA 15129
U.S.A.
Comments and suggestions are also welcome.
ΓòÉΓòÉΓòÉ 1.5. About the author ΓòÉΓòÉΓòÉ
Until mid-1993, I had been developing DOS programs using Borland C++ under
OS/2. I have now begun developing native 32-bit OS/2 programs. I am planning
to concentrate on shareware for the corporate environment, since OS/2 has not
yet significantly penetrated the home market but is in widespread use in the
corporate environment.
I chose this program, Belongs2, as my first OS/2 program because it is more
practical than "Hello World". Although it is a simple program, I have now
developed the installation procedures that will be needed for distribution of
future programs which will be more ambitious.
See Additional Information and Support for information on how to contact me.
ΓòÉΓòÉΓòÉ 2. File descriptions ΓòÉΓòÉΓòÉ
ReadMe.Cmd
This file can be used to view the Read Me information.
ReadMe.Inf
This file contains the Read Me information. This is the file you are
now viewing.
Sample.Exe
This is the executable file for running the sample program. For
registered users, this file may be replaced by a customized .Exe
file.
B2Inst.Cmd
This command procedure can be used to install the Belongs2 program.
The Belongs2 program is installed in a hidden Startup folder. This
is the recommended method of installing the Belongs2 program. See
Installation into a Startup Folder for instructions.
B2Remove.Cmd
This command procedure can be used to remove the Belongs2 program.
See Removing the Program for instructions.
Startup1.Cmd
This is a sample Startup.Cmd file which can be used as an alternate
method of running the Belongs2 program.
Startup2.Cmd
This is another sample Startup.Cmd file which is equivalent to
Startup1.Cmd but is written in REXX.
Form.Txt
This is the registration form for the software.
Agree.Txt
This is the license agreement which you agree to by using the
software. This is necessary to protect the author, who is currently
unincorporated, as well as registered users of the software.
ΓòÉΓòÉΓòÉ 2.1. Requirements ΓòÉΓòÉΓòÉ
This program requires OS/2 2.0 or above.
The optional REXX support in OS/2 is required to run the .Cmd files which can
be used to install and remove the Belongs2 program.
ΓòÉΓòÉΓòÉ 2.2. Special Considerations ΓòÉΓòÉΓòÉ
In order to make it more difficult to determine how the Belongs2 program is
installed and to prevent it from being easily removed, it is recommended that
the B2Inst.Cmd and B2Remove.Cmd files not be stored on the hard disk. Since
the files which have been distributed only need to be accessed when installing
or removing the Belongs2 program, it is recommended that they be stored on a
floppy disk and executed from there. For systems on a network, the
installation files could be stored in a secure network directory and executed
either manually or as part of a CID automated install.
ΓòÉΓòÉΓòÉ 3. Installing the Program ΓòÉΓòÉΓòÉ
There are two ways to execute the Belongs2 program. It can be installed in a
Startup folder, preferably a hidden folder, or it can be added to Startup.Cmd.
Command procedures for installing it in a hidden startup folder, which is the
recommended method, are included. Sample Startup.Cmd procedures are also
included.
ΓòÉΓòÉΓòÉ 3.1. Installation into a Startup Folder ΓòÉΓòÉΓòÉ
To install the Belongs2 program in a hidden Startup folder, execute the B2Inst
command procedure. The syntax of the B2Inst command is:
B2Inst [d [spath]]
"d" is the target drive letter and "spath" is the source drive path. If you
issue the B2Inst command with no parameters, you will be prompted for the
target drive letter. Both parameters should be included if you are performing
a CID automated install.
ΓòÉΓòÉΓòÉ 3.2. Installation into Startup.Cmd ΓòÉΓòÉΓòÉ
To execute the Belongs2 program from a Startup.Cmd procedure, copy the program
to the hard disk and add the following line to an existing Startup.Cmd file or
create a new Startup.Cmd file.
START /N d:\path\program.EXE
"d:\path" is the drive and path where the program was copied to and "program"
is the name of the program (different names are used since a different version
of the program is generated for each company or individual. Enclose the
command in single quotes (') or double quotes (") if you are using a REXX
Startup.Cmd procedure.
If you created a new Startup.Cmd, you should also add a DOS EXIT command to
your Startup.Cmd procedure, so the Startup.Cmd process terminates after it has
started the Belongs2 program. This command also needs to be enclosed in single
quotes (') or double quotes (") in a REXX procedure, otherwise it will be
interpreted as the REXX EXIT command.
ΓòÉΓòÉΓòÉ 4. Removing the Program ΓòÉΓòÉΓòÉ
If the program was installed into a hidden Startup folder using the B2Inst
command, it may be removed with the following command:
B2Remove [d]
"d" is the drive letter where the Belongs2 program was installed.
If the program was installed manually into a Startup folder or into Startup.Cmd
then it should be removed manually by reversing the procedure which was used to
install it.