home *** CD-ROM | disk | FTP | other *** search
- WinProxy Read Me File Contents:
-
- 1) WinProxy Product Description
- 2) Installation
- 3) Known Bugs
- 4) Ositis Software Contact Information and Support Options
- 5) Quick Start Guide
- 6) License Agreement
-
- __________________________________________________________________________
-
-
- WinProxy Version 1.0 Beta 3
- Ositis Software
-
- WinProxy is a Windows 95/NT based proxy server that supports most
- popular internet protocols. WinProxy can be used as an external
- firewall, an internal firewall (securing one subnet from another), or
- to create a subnet that is connected to the internet with only one IP
- address.
-
- To use WinProxy you will need a serial number. The Beta test serial
- number is:
-
- 1970-ODZ9NZQS-078
-
- To test WinProxy Lite, enter the following serial number:
-
- 1970-ODZ3WF5H-315
-
- The WinProxy Lite serial number allows only three users simultaneous
- to be connected simultaneously.
-
- These numbers will be valid through November 30, 1996. At that time you
- will need to connect to http://www.ositis.com to receive a new serial
- number as well as the next release of WinProxy. We encourage you to
- check our web page before the software expires in order to receive
- additional Beta releases.
-
- WinProxy will be available for purchase after the Beta test period.
- Please check the web page often for newer versions of WinProxy and
- additional products from Ositis Software.
- __________________________________________________________________________
-
- Installation:
-
- Please read the complete license agreement before installing this
- software, by installing this software you agree to the conditions of that
- agreement.
-
- To install WinProxy, unzip the entire .ZIP file into a temporary
- directory and execute INSTALL.EXE. This will guide you through the
- installation of WinProxy and its components. This will also create a
- WinProxy program group containing WinProxy, this file, the logging
- application and an un-installer in case you later want to remove the
- program.
-
- __________________________________________________________________________
-
- Known Bugs:
-
- 1) There are currently no known bugs or security risks in WinProxy.
- 2) The CERN FTP proxy does not retrieve directories properly.
- 3) Logging of SOCKS FTP Proxy activity is incomplete.
- 4) The CERN FTP proxy does not support passive FTP.
- 5) The SOCKS FTP Proxy does not support passive FTP.
-
- __________________________________________________________________________
-
- Contacting Ositis Software
-
- For additional information, support questions, bug reports or feature
- requests, please send mail to:
-
- Info@Ositis.COM
-
- For support questions or bug reports, please send e-mail to:
-
- Support@Ositis.COM
-
- Please include the following information:
- - Your name, company name, e-mail address, telephone number and postal address.
- - The WinProxy version number (from the About box).
- - Your WinProxy serial number (even if it is an evaluation number).
- - The operating system and type of computer you are using.
-
- We will not respond to support requests without the above information.
-
- Product updates and future beta releases will be available on our web
- page at:
-
- WWW.OSITIS.COM
-
- Postal Mail:
- Ositis Software
- 19364 Stanton Pl.
- Castro Valley, CA 94546
-
- __________________________________________________________________________
-
- Quick Start Guide
-
- 1. Configuring a secure firewall:
-
- The usual configuration for WinProxy is as an internet firewall. In this
- instance, WinProxy is run on a Windows NT or Windows Æ95 computer that
- has one IP address connected to the internet, and another connected to the
- internal network. WinProxy listens for connections on the internal IP
- address, and makes requests on the internet on behalf of the users behind
- the network. The users on the network must configure their browsers to
- proxy through WinProxy.
-
- To setup a Windows 95 or NT computer as a firewall, routing should be
- disabled (if using NT), the external network card should be configured to
- support TCP/IP, but not NetBEUI or IPX. You should not any TCP/IP services
- other than WinProxy. If you send and receive electronic mail from an
- external post office (SMTP & POP3) you should configure WinProxy to use it,
- otherwise you may choose to run a post office server and SMTP (Simple Mail
- Transport Protocol) server along with WinProxy.
-
- For added security the internal IP addresses can be set to invalid numbers
- on the internet, so that it is impossible for them to be used, even if a
- hacker managed to enable routing on the firewall.
-
-
-
- 2. Configuring a secure subnet:
-
- If you want to secure an internal network from another network, but still
- provide the ability for that network to connect to the outside, then you
- should use the cascading capabilities of WinProxy. In this case people
- behind the secure subnet will connect to WinProxy, which will connect them
- directly to another external proxy server. From there they can access the
- internet, essentially tunneling through another subnet. This will cause
- the secure subnet to have slower access than the other network, but it
- will also provide additional security for that workgroup.
-
-
-
- 3. Connecting a subnet to the internet with a single IP address:
-
- Many access providers do not allow an entire workgroup to connect to the
- internet because they only provide a single IP address. WinProxy can
- solve that problem by acting as a proxy for several users. In order to do
- this WinProxy should be configured as if it was acting as a firewall, but
- many of the security features can be disabled if security is not a primary
- concern.
-
- When a user behind the firewall requests a document through WinProxy,
- another request is made from the proxy computer, from the one valid IP
- address. The response is forwarded back and as far as the remote server
- is concerned, the request came from the proxy server. As far as the
- requesting application is concerned, the response came from the proxy
- server.
-
-
-
- 4. Logging
-
- WinProxy provides the ability to log all proxy activity. This is done by
- sending messages to an external logging application. A sample logging
- application, complete with source code is provided with WinProxy to enable
- network administrators to more easily monitor network activity. The
- logging application can be run on the same computer as WinProxy or on a
- separate computer inside the firewall. WinProxy can not be configured to
- transmit logging information externally.
-
-
- _____________________________________________________________________________
-
-
- Ositis Software excessively comprehensive BETA License Agreement:
-
- CAREFULLY READ THE TERMS AND CONDITIONS OF
- THIS AGREEMENT. BY USING THIS SOFTWARE, YOU
- ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO
- THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS
- OF THIS AGREEMENT, DO NOT USE THIS SOFTWARE.
-
- 1. Ositis Software grants to you a non-exclusive, non-sublicensable, license
- to use this Beta version of WinProxy for Windows (the "Software"), in binary
- executable form for evaluation and trial use purposes only. THIS SOFTWARE
- CONTAINS CODE THAT DISABLES MOST OF ITS FEATURES AFTER
- SEPTEMBER 30, 1996.
-
- 2. OSITIS SOFTWARE MAKES NO REPRESENTATIONS ABOUT THE
- SUITABILITY OF THIS SOFTWARE OR ABOUT ANY CONTENT OR
- INFORMATION MADE ACCESSIBLE BY THE SOFTWARE, FOR ANY
- PURPOSE. THE SOFTWARE IS PROVIDED 'AS IS' WITHOUT
- EXPRESS OR IMPLIED WARRANTIES, INCLUDING WARRANTIES OF
- MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE OR
- NONINFRINGEMENT. THIS SOFTWARE IS PROVIDED GRATUITOUSLY
- AND, ACCORDINGLY, OSITIS SOFTWARE SHALL NOT BE LIABLE
- UNDER ANY THEORY OR ANY DAMAGES SUFFERED BY YOU OR ANY
- USER OF THE SOFTWARE. OSITIS SOFTWARE WILL NOT SUPPORT
- THIS SOFTWARE AND WILL NOT ISSUE UPDATES TO THIS SOFTWARE.
-
- 3. All content accessed through the Software is the
- property of the applicable content owner and may be
- protected by applicable copyright law. This License
- gives you no rights to such content.
-
- 4. While Ositis Software intends to distribute a commercial
- release of the Software, Ositis Software reserves the right at
- any time not to release a commercial release of the
- Software or, if released, to alter prices, features,
- specifications, capabilities, functions, licensing terms,
- release dates, general availability or other
- characteristics of the commercial release.
-
- 5. Title, ownership rights, and intellectual property
- rights in and to the Software shall remain in Ositis
- Software and/or its suppliers. You agree to abide by the
- copyright law and all other applicable laws of the United
- States including, but not limited to, export control
- laws. You acknowledge that the Software in source code
- form remains a confidential trade secret of Ositis Software
- and/or its suppliers and therefore you agree not to
- modify the Software or attempt to decipher, decompile,
- disassemble or reverse engineer the Software, except to
- the extent applicable laws specifically prohibit such
- restriction.
-
- 6. Ositis Software may terminate this License at any
- time by delivering notice to you and you may terminate
- this License at any time by destroying or erasing your
- copy of the Software. Upon termination of this License,
- or in any event within thirty (30) days following Ositis
- SoftwareÆs release of a commercial version of the
- Software, you agree to destroy or erase the Software.
- In the event of termination, the following sections of
- this License will survive: 2, 3, 4, 5, 6 and 7. This
- License is personal to you and you agree not to assign
- your rights herein. This License shall be governed by
- and construed in accordance with the laws of the State
- of California and, as to matters affecting copyrights,
- trademarks and patents, by U.S. federal law. This
- License sets forth the entire agreement between you
- and Ositis Software.
-
- 7. Use, duplication or disclosure by the Government is
- subject to restrictions set forth in subparagraphs (a)
- through (d) of the Commercial Computer-Restricted Rights
- clause at FAR 52.227-19 when applicable, or in
- subparagraph (c) (1) (ii) of the Rights in Technical Data
- and Computer Software clause at DFARS 252.227-7013, and
- in similar clauses in the NASA AR Supplement.
- Contractor/ manufacturer is Ositis Software, 19364 Stanton Pl.,
- Castro Valley, CA 94546.
-
- 8. OSITIS SOFTWARE OR ITS SUPPLIERS SHALL NOT BE LIABLE FOR (a)
- INCIDENTAL, CONSEQUENTIAL, SPECIAL OR INDIRECT DAMAGES OF
- ANY SORT, WHETHER ARISING IN TORT, CONTRACT OR OTHERWISE,
- EVEN IF OSITIS SOFTWARE HAS BEEN INFORMED OF THE POSSIBILITY
- OF SUCH DAMAGES, OR (b) FOR ANY CLAIM BY ANY OTHER PARTY.
- THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY
- FOR DEATH OR PERSONAL INJURY TO THE EXTENT APPLICABLE LAW
- PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME STATES DO
- NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR
- CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION
- MAY NOT APPLY TO YOU.
-
- 9. HIGH RISK ACTIVITIES. THE Software is not
- fault-tolerant and is not designed, manufactured or
- intended for use or resale as on-line control equipment
- in hazardous environments requiring fail-safe
- performance, such as in the operation of nuclear
- facilities, aircraft navigation or communication systems,
- air traffic control, direct life support machines, or
- weapons systems, in which the failure of the Software
- could lead directly to death, personal injury, or severe
- physical or environmental damage ("High Risk
- Activities"). Ositis Software and its suppliers specifically
- disclaim any express or implied warranty of fitness for
- High Risk Activities.
-
-