home *** CD-ROM | disk | FTP | other *** search
-
-
- USER GUIDE
-
- Net Nanny
- for DOS
-
- Copyright 1994, 1995
-
-
-
- NOTICE
- The information in this document is subject to
- change without notice and does not represent a commitment by
- Net Nanny Ltd. It is against the law to copy the software
- except as specifically allowed in the software license
- agreement. No portion of this manual may be reproduced in
- any form or by any means, electronic or mechanical,
- including photocopying and recording, for any purpose
- without the express written permission of Net Nanny Ltd.
- (C) 1994, 1995 Net Nanny Ltd.
- All rights reserved.
-
-
- Net Nanny Ltd.
-
- C2 - 1122 Fir Avenue 525 Seymour Street
- Blaine, WA Vancouver, B.C.
- USA Canada
- 98230 V6B 3H7
-
- Tel: (604) 662-8522
-
-
-
-
- SOFTWARE LICENSE AGREEMENT
- LICENSE GRANT: Net Nanny Ltd. grants you, the end user, the
- right to use one copy of the enclosed software program (the
- "SOFTWARE") on a single computer.
-
- COPYRIGHT and TRADE SECRET
- The SOFTWARE is owned by Net Nanny Ltd. and protected by
- both United States and Canadian copyright law and by
- International Treaty provisions and all other applicable
- national laws. Any copying of the SOFTWARE, other than a
- single copy for backup purposes, constitutes an
- infringement of Net Nanny Ltd.'s copyright. The SOFTWARE
- incorporates Trade Secret materials.
-
- LIMITED WARRANTY
- NO WARRANTY OF THE SOFTWARE AND DOCUMENTATION IS PROVIDED.
- THE SOFTWARE IS PROVIDED AS IS, WITHOUT ANY WARRANTY OR
- CONDITION, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
- THE IMPLIED WARRANTIES OF MERCHANTABLE QUALITY AND FITNESS
- FOR A PARTICULAR PURPOSE. Without limiting the above, Net
- Nanny Ltd. does not warrant that the operation of the
- SOFTWARE will be uninterrupted or error-free or that the
- SOFTWARE will achieve your intended purpose.
-
- Net Nanny Ltd. does provide a limited warranty for the
- diskettes upon which the SOFTWARE is furnished. The limited
- warranty is that the diskettes will be free from defects in
- material and workmanship under normal use for a period of
- one year from the date of delivery as evidenced by a copy
- of the receipt. Any diskette not meeting Net Nanny Ltd.'s
- limited warranty will be replaced if returned to Net Nanny
- Ltd. or authorized Net Nanny Ltd. software Dealer or
- Distributor with a copy of the receipt. If Net Nanny Ltd.
- is unable to deliver replacement diskettes which are free
- of defects in material and workmanship, you may terminate
- this License by returning the SOFTWARE, as delivered, and
- you will receive a refund.
-
- LIMITATION OF LIABILITY Your sole remedy against Net Nanny
- Ltd., and Net Nanny Ltd.'s entire liability regardless of
- how such liability arises, is limited to replacement of the
- diskette or a refund in accordance with the above limited
- diskette warranty. IN NO EVENT WILL Net Nanny Ltd. BE
- LIABLE TO YOU FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO
- SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES ARISING OUT OF
- THE USE OR INABILITY TO USE THE SOFTWARE. Some States and
- Provinces do not allow the exclusion of implied warranties
- or limitation of incidental or consequential damages, so
- the above limitation or exclusion may not apply to you
-
- This License will be terminated if you fail to comply with
- any term or condition of this License. You agree, upon such
- termination to destroy the SOFTWARE and related
- documentation.
-
- You agree that this License is the complete and sole
- statement of the agreement between us and this license
- supersedes representations made by us or your authorized
- Net Nanny Ltd. software Dealer or distributor or any other
- Agreement, written or oral, or communications between us or
- your authorized Net Nanny Ltd. software Dealer or
- Distributor relating to the subject matter of this License.
-
-
- TABLE OF CONTENTS
-
- System requirements
- Hardware
- Operating System
- Contents of Package
-
- Introduction
- Novice Computer Users
-
- CHAPTER ONE
- Software Installation
- Steps 1 - 9
- Virus Warning
-
- CHAPTER TWO
- Operation & Administration
- Introduction
- Is Net Nanny Working ?
- Using Net Nanny
- Net Nanny Text Editor
- Is Net Nanny Active ?
- Testing 123 ...
-
- CHAPTER THREE
- Install Net Nanny
- View History of Hits
- Frequency of Hits
- Edit Dictionary
- Errors
- Clear History
- Action
- ShutDown
- Disable/Enable
- Remove
- Quit
-
- APPENDIX A
- Installation
- Installation from Backups
- Config.sys File
- Updating Previous Versions
- Using the Dictionary Effectively
- Effective Dictionary Choices
- What Words & Phrases to Monitor
- Dictionary Characters
- MS-DOS Prompt
- Text Editor
- Re Booting the Computer
- Problems and Errors
-
- APPENDIX B
- Viruses
- What are Computer Viruses?
- Boot Sector Viruses
- Program Infector
- Controlling Viruses
- Establishing a Virus Free Computer
- Develop Screening Procedures
- Backing Up Computer
-
-
- Introduction
- Net Nanny was developed in response to concerns expressed
- by parents, educators, law enforcement authorities and
- commercial On-Line service providers. The concern is caused
- by recent publicity surrounding the use of pornographic
- material and the sexual exploitation of children and young
- teenagers using computer On-Line services (modem).
- Net Nanny allows you to MONITOR and take ACTION on DOS
- based computer activity. Net Nanny allows you to set
- standards for "acceptable" behavior on the computer. After
- the program is installed, Net Nanny is automatically
- activated whenever the computer is turned on.
-
- While the Net Nanny program is running, the activity on the
- computer screen is monitored and scanned for the words and
- phrases you have defined as "unacceptable". These words and
- phrases must be entered into the Net Nanny dictionary during
- or after installation of Net Nanny.
-
- Novice Computer Users
- This User Guide is designed for the inexperienced computer
- user and we suggest that you follow the instructions
- carefully. For the experienced user this User Guide may
- contain more information than is necessary. Net Nanny is easy
- to install and use and many users have successfully installed
- and used the software without reference to this Guide.
-
-
-
-
- Chapter One
- Software Installation
- Steps 1 - 9
-
- STEP 1.
- Install from Drive A:
- Place the floppy disk labeled "Net Nanny" in floppy
- drive A and type...
- A:INSTALL
- and press the ENTER key.
-
- Install From Drive B:
- To install Net Nanny from floppy drive B:, put the Net
- Nanny floppy disk in drive B: and type ...
- B:INSTALL
- and press the ENTER key.
-
- STEP 2
- To make Net Nanny fully active and operational you must
- complete the three tasks outlined below:
- 1. Install Net Nanny software.
- 2. Add words to the dictionary.
- 3. Re Boot (re start) the computer.
-
- Choose the CONTINUE option to start the software installation.
- A successful installation will copy the Net Nanny program
- files onto your hard drive.
-
- STEP 3
- Since the purpose of Net Nanny is to monitor the use of
- certain words and phrases appearing on the computer screen,
- these words and phrases MUST be added to the Net Nanny
- DICTIONARY. Without words or phrases in the dictionary Net
- Nanny will not be operational.
-
- STEP 4
- Press the ENTER key to continue and the Main Net Nanny screen
- will appear with the Edit Dictionary ... menu item
- highlighted.
-
- The Status Box shows that Net Nanny is not yet active and the
- number of hits is zero. Net Nanny will become active after you
- add words and phrases to the dictionary and reboot (re-start)
- the computer. Follow the steps below for full instructions.
-
- The Main Net Nanny Menu screen has two other boxes in addition
- to the Menu box. The Net Nanny Program box shows the name of
- the program and the software version. The other box shows the
- Installation status of Net Nanny.
-
- STEP 5
- With the Edit Dictionary ... menu item highlighted, press the
- key to activate the box for entering words and phrases into
- the dictionary.
-
- STEP 6
- To see how Net Nanny works, add a few test words and phrases
- to the dictionary box. At this point, don't worry if you are
- not sure which words and phrases are the right ones. Just make
- sure NOT to use common words or any punctuation which would
- normally appear on your computer screen.
-
- It is important NOT to use words or phrases which may appear
- on your computer screen during normal use.. After testing
- these words, delete the words and phrases and add to the
- dictionary the actual words and phrases you want to monitor.
-
- Please refer to Chapter Two, Using the Dictionary, for
- detailed information on selecting, adding and editing words
- and phrases in the dictionary.
-
- STEP 7
- Save the words and phrases by pressing the ESC key. This will
- activate the Save and Exit box. Press the ENTER key to save
- your entries and return to the main Net Nanny screen.
-
- STEP 8
- The installation is now complete and all the Net Nanny files
- have been copied onto your hard drive, with the exception of
- the main NN.EXE program. The NN.EXE program is left on the
- floppy disk to avoid the unauthorized use of this program from
- your computer. You may run the NN.EXE program from the floppy
- drive to add or edit words and phrases in the dictionary or to
- change other program options. Please refer to Chapter Two for
- detailed information on the continuing operation of Net Nanny.
-
- STEP 9
- You have now completed two of the three tasks required to make
- Net Nanny operational. From the main menu screen press the
- DOWN arrow key to highlight the Quit ... menu item and then
- press the ENTER key. If words or phrases were added to the
- dictionary a screen will appear with "Reboot Now...."
- highlighted. Remove the disk from the floppy drive and press
- the ENTER key to reboot the computer.
-
- You may also choose to exit Net Nanny at this point and add
- words and phrases to the dictionary at a later date, following
- Step 4 to 9 above . In this case, Net Nanny will not be able
- to detect or record any computer screen activity.
-
- VIRUS WARNING
- Viruses are often found on computers using games, On-Line
- services and Bulletin Boards (BBS). It is very important that
- you avoid operating or installing Net Nanny or any other
- software on a computer which is infected with a computer
- virus. If the computer is infected with a virus, your software
- program's operation may be compromised and may cause damage to
- program or data files. We suggest you use a Virus scan program
- to detect and remove any viruses before installing or using
- any software. Please refer to Appendix B, for more information
- on Viruses.
-
-
- CHAPTER TWO
- Operation & Administration
-
- Introduction
- The computer will run normally, after you have finished;
- 1) installing the software
- 2) adding words to the dictionary
- 3) rebooting
-
- Net Nanny is now active and operational. However, you won't
- notice any difference in the way the computer operates. In the
- background, Net Nanny is monitoring all the activity on the
- computer screen. If a word or phrase on the screen matches a
- word or phrase in the dictionary Net Nanny will record this
- information.
-
- This Chapter contains examples which will help you do a few
- quick tests and then try some practical examples of how to use
- Net Nanny .
-
- IS NET NANNY WORKING ?
- As a quick check, at the DOS Prompt, type a word that you
- added to the dictionary during installation. You can type the
- test word while you are at DOS Prompt or in a DOS program.
- After typing a word (which you previously entered in the
- dictionary), run the NN.EXE program from the floppy (insert
- disk in floppy drive and type A:NN) and select the menu item
- "View History of Hits..." . If the word you typed was detected
- and recorded it will appear in the History of Hits box. You
- can also select the menu item "Frequency of Hits...", to see
- how many times the word was detected.
-
-
- NOTE
- Net Nanny does not (in this version) monitor the screen while
- Microsoft Windows is running. While you are in Windows, if you
- temporarily exit to DOS, using the MS-DOS Prompt Icon, Net
- Nanny will be operational. However, any Net Nanny Action
- occurring while at the Windows DOS Prompt may interfere with
- your ability to return to Windows. For example, if the
- computer has a Net Nanny ShutDown while you are at the DOS
- Prompt, in Windows, you may be able to use the CTRL+ALT+DEL
- keys to exit back (wait, as there may be a delay returning) to
- Windows. If you do not return to Windows, you may need to re
- boot your computer. If you do return to Windows you should
- save what you are doing and exit from Windows.
-
-
- NOTE
- If you are not sure what a DOS Prompt is, refer to Appendix A,
- MS-DOS Prompt
-
-
- USING NET NANNY
- A few practical examples are the best way to explain how to
- use the Net Nanny software in the most effective way. The
- examples below describe a few typical ways to set up your
- system to monitor screen activity.
-
- Example: (Simple Test)
- Run the Net Nanny program (NN.EXE) from your floppy drive by
- inserting the disk in a floppy drive and typing "NN" at the A:
- or B: prompt. Select the Edit Dictionary menu option.
-
- Next, add a few words and phrases to the dictionary. For this
- example, use the words and phrases below. Words are
- automatically changed to upper case.
-
- 7 UP
- COKE
- COLA
- LEMONADE
- MOUNTAIN DEW
- ORANGE CRUSH
- PEPSI
- THIS IS A SAMPLE PHRASE
-
- There are four example words and four phrases listed above.
- Any combination letters, characters or numbers, on the same
- line, separated by a space, is considered a phrase. For
- example, @ B and 1 2, are both phrases.
-
- 1. After entering the words and phrases press the ESC
- key to save the entries.
-
- 2. Select Quit ... from the menu by using the down arrow
- key to highlight "Quit ..." or by pressing the Q key.
- With the "Quit ... menu item" selected press the ENTER
- key. Because you made changes to the dictionary, you
- will be asked to re boot the computer to make the
- changes active.
-
- 3. Press the ENTER key to re boot the computer or choose
- "Exit without re boot". The next time the computer is
- restarted, Net Nanny will be active with target words
- or phrases in the dictionary to detect.
-
- NET NANNY TEXT EDITOR
- When using the Net Nanny program (NN.EXE) there are a number
- of places that require you to enter or change information. The
- dictionary entry box is a good example. When you are entering
- data or information in an entry box you are using the Net
- Nanny text editor. The text editor keyboard commands are found
- in Appendix A, Text Editor.
-
- IS NET NANNY ACTIVE ?
- After re booting or re starting the computer, Net Nanny will
- be active and monitoring DOS screen activity. If you run the
- Net Nanny program you will see the Active status in the
- Installation Status box.
-
- TESTING 123 ...
- The quickest way to do a test is type one of the words in the
- dictionary, while at the DOS Prompt right after the computer
- is re booted.
-
- Example 1.
- Computers are often at the DOS Prompt immediately after
- starting up. The cursor will be blinking and C:\> will be on
- the screen. To test Net Nanny type in a word previously
- entered in the dictionary and press enter before re booting.
-
- Run the NN.EXE program from the floppy and select "View
- History of Hits..." and "Frequency of Hits ...." to see if Net
- Nanny recorded the word you typed at the DOS Prompt. If you
- find the word in both places, Net Nanny is working!
-
-
- Example 2: (Test using a Word Processor)
- In the example above we suggested that you test Net Nanny by
- typing in test words at the DOS Prompt. In practice, you will
- want to monitor words and phrases used in communications
- programs accessing On-Line bulletin boards or the Internet
-
- 1. Start a DOS word processor and type a couple of
- paragraphs which contain some or all of the words and
- phrases in your dictionary.
-
- 2. Exit the word processor program.
-
- 3. Run the Net Nanny Program (NN.EXE) from the floppy.
- You may copy the NN.EXE program to your hard drive
- C:\, for speed and convenience while testing.
-
- 4. Select and view the History and Frequency of Hits to
- see if Net Nanny recorded the words and phrases used
- in the word processor.
-
-
- Example 3: (Monitor Computer Startups)
- 1. Re boot the computer.
-
- 2. Run the Net Nanny program and select "View History of
- Hits ..."
-
- 3. The first item will be .... Computer Startup ....
-
- 4. The Date and time of the last time the computer was
- started is also shown.
-
-
- CHAPTER THREE
- Introduction
- This Chapter is a review of all the items appearing on the
- main Net Nanny menu and instructions on how to use each one.
- The menu items are:
- Install Net Nanny . . .
- View History of Hits . . .
- Frequency of Hits . . .
- Edit Dictionary . . .
- Clear History . . .
- Action . . .
- Disable/Enable . . .
- Remove . . .
- Quit . . .
-
- INSTALL NET NANNY
- Selecting this item performs the same function as running the
- Install program (INSTALL.EXE). Instead of running the Install
- program, you can also install Net Nanny by running the main
- Net Nanny program (NN.EXE) from the floppy drive and then
- selecting "Install Net Nanny ..." from the menu item list
- shown above.
-
- VIEW HISTORY OF HITS
- This menu item will display a record of the last 399 hits or
- detected matches to your dictionary list. The display shows
- the last occurrence first. Any hit above 399 falls off the end
- of the display. Use the Up & Down arrow keys to move through
- this screen or the Page Up and Page Down keys to move quickly
- through the screen pages. See the Text Editor in Appendix A,
- for more information on moving in a text display box.
-
- FREQUENCY OF HITS
- This display box shows the number of times each word or phrase
- was detected, in alphabetical order. The history is current
- from the last time Clear History was used.
-
- EDIT DICTIONARY
- Enter or change words and phrases you want to monitor. A word
- could be a phone number (e.g. 945-4233). A phrase could be
- your home address (e.g. 3 - 120 Glacier Street). Avoid using
- words and phrases which would appear on the screen during
- normal use of the computer and during starts up. Avoid using
- words that are part of or appear in any program you normally
- use.
-
- It's a good idea to run a quick test by starting your
- computer and running some common programs to make sure that
- entries in the dictionary are NOT being detected during normal
- use. You don't want "Hits" from the normal operation of the
- computer. This is particularly true if you have turned the
- Action option ON.
-
- Remember (and Net Nanny will remind you) to re boot the
- computer if you make any change to the dictionary. The changes
- are not active until you re boot.
-
- The correct use of the Net Nanny Dictionary is vital to
- successful monitoring of screen activity and to obtain the
- maximum useful information with a minimum of false or
- extraneous "Hits". Please refer to Appendix A, Using the
- Dictionary Effectively, for information on selecting the right
- words and phrases.
-
- ERRORS
- You may be detecting words and phrases in error and may want
- to revise the dictionary before turning the Net Nanny Action
- options ON. For example, if your test monitoring shows a
- number of matches occurring during the normal operation of the
- computer, remove or edit those words and phrases in the
- dictionary. Since every computer is unique and is used in
- different ways, the correct setup of the dictionary may be a
- trial and error process.
-
- CLEAR HISTORY
- This will delete all the hits recorded in the History of Hits
- and Frequency of Hits display boxes.
-
- ACTION
- This menu item will allow you to take action if Net Nanny
- reaches the limit set by you, for words and phrases detected.
- You should not set the limit too low, until you have done
- enough monitor testing. You may be detecting words and phrases
- in error and may want to revise the limit or edit the
- dictionary before turning the Action options on.
-
- SHUTDOWN
- There are three options for the ShutDown action;
- 1. Number of Hits to Trigger ShutDown
- Enter a number between 1 and 99.
-
- Caution
- Avoid using a number lower than 10 to start. For example, if
- you use 1, and Net Nanny detects a word during boot up the
- computer will start and immediately SHUTDOWN.
-
- 2. ShutDown Option
- The keyboard will "LOCK" when Net Nanny detects that
- the number of hits has reached the "Number of Hits
- to Trigger ShutDown" when this option is ON. Use the
- arrow keys and the space bar to toggle the option ON
- or OFF.
-
- If the ShutDown option is triggered the computer will be
- unusable and must be turned OFF and then back ON to get the
- computer working again.
-
- 3. Show Screen Message with ShutDown
- If you turn the above ShutDown Option to ON to lock
- the keyboard, the computer screen will also go
- blank. A box with the message " Net Nanny ShutDown"
- will appear. Select this option and use the arrow
- keys and the space bar to toggle the option ON or
- OFF.
-
- If the ShutDown option is triggered the computer will be
- unusable and must be turned OFF and then back ON to get the
- computer working again.
-
- When Net Nanny is in the ShutDown mode all computer activity
- is "frozen" and you must re start (re boot) the computer to
- get it running normally again. You cannot re boot using the
- CTRL+ALT+DEL keys. See Appendix A, Re Booting the Computer for
- more information on how to re boot a computer.
-
- DISABLE/ENABLE
- Net Nanny defaults to ON. To turn it OFF (disable), use the
- arrows and the space bar k to toggle the indicator to OFF.
- When Net Nanny is disabled like this, it will not monitor or
- ShutDown the computer during the current session. However, if
- you re-boot the computer, Net Nanny will be reset to ON
- automatically even if you set the Action to OFF. The Disable &
- Enable options are valid for the current session only.
-
- REMOVE
- This will remove all traces of Net Nanny. The hidden NN
- directory and its files are deleted and the line
- "DEVICE=C:\NN\NNDRV.SYS" is removed from the computer's
- config.sys file. You can re boot the computer after removing
- Net Nanny to get rid of the Net Nanny TSR (Terminate Stay
- Resident) which is still in memory.
-
- QUIT
- Exit the Net Nanny main administration program.
-
-
-
-
- APPENDIX A
- Installation
- The installation of Net Nanny does the following:
- 1. Creates a directory on your hard drive C: named NN.
- Hides the C:\NN directory.
- 2. Copies the following files into the C:\NN directory
- and hides them.
- NNDRV.SYS
- NN.WPF
- NN.LOG
- 3. Inserts the following line in your config.sys file.
- Device=c:\nn\nndrv.sys
-
- INSTALLATION FROM BACKUPS
- It is possible to install Net Nanny by using the restore
- function of standard backup programs. For example, if the Net
- Nanny files were backed up from a previous installation, you
- may use normal backup/restore methods to re-install Net Nanny
- on the same or different computers.
-
- CONFIG.SYS FILE
- This is a file which contains lines of text. These text lines
- give the computer operating system instructions when the
- computer is started (or re booted). Net Nanny inserts the text
- line "Device=c:\nn\nndrv.sys" into your config.sys file during
- installation. This line gives the computer operating system
- instructions to load the program (device driver) "NNDRV.SYS".
- This line is removed from your config.sys when you choose the
- Remove item on the Net Nanny menu.
-
- UPDATING PREVIOUS VERSIONS
- If you have an older version of Net Nanny already installed on
- your computer, and you have received a more recent release of
- the Net Nanny software, updating is simply a matter of
- installing the new release on top of your existing
- installation. This can be done by placing the updated version
- of Net Nanny into drive A: and typing:
- A:INSTALL
-
- NOTE
- You may also update Net Nanny from floppy drive B: by
- putting the Net Nanny floppy disk in drive B: and typing
- B:INSTALL
-
- USING THE DICTIONARY EFFECTIVELY
- Careful choice of the words and phrases used in the dictionary
- is important for two reasons. First you want to make sure you
- detect what you are trying to monitor and second, you don't
- want to detect something by mistake and take action when it
- isn't necessary or could cause an unwanted ShutDown.
-
- Always start testing and using the software with the Action
- option set to OFF (default) to avoid a unwanted ShutDown and
- to allow time to gather information about what words and
- phrases are being used over a period of time. (see ShutDown,
-
- Effective Dictionary Choices
- In Chapter Three, we suggested that you may want to detect the
- use of your phone number and home address. Assuming your phone
- number is;
- (604) 945-4233
- and your address is;
- 3 - 120 Glacier Street,
-
- The following are variations of what you should enter in your
- dictionary;
- Phone Number
- 945-4233
- 9454233
- 945 4233
- 604945-4233
- 6049454233
- 604)945-4233
- (604) 9454233
- Address
- 3 - 120 Glacier
- 3 120 Glacier
- 3-120 Glacier
- 120 Glacier
-
- WHAT WORDS & PHRASES TO MONITOR
- Many parents worry about their children having access to
- sexually explicit material. They are very concerned about the
- real danger of sexual exploitation. Children who have access
- to computer Bulletin Board Systems, On-Line systems and the
- Internet, may have unrestricted access to pornographic
- material, images, sounds and other information which a parent
- may consider totally unacceptable. They may also "meet"
- strangers On-Line.
-
- To monitor this "unacceptable" activity, a parent should
- select words and phrases to target specific problem areas. For
- example, if you do not want your home phone number and address
- given out On-Line, use the example above. You can also add
- body parts and four letter words to the dictionary. As in the
- example above, you will need to experiment to find the right
- words or combination of words and phrases.
-
- If possible you should use the computer in a trial to test the
- way you might expect your children to use it. We suggest that
- you become more familiar with and watch what BBSs and other
- activities the children use.
-
- DICTIONARY CHARACTERS
- You may use virtually any character you are capable of
- generating with the standard computer keyboard and the ASCII
- characters.
-
- MS-DOS Prompt
- This is when the computer is not running a program and it
- indicates that it is ready to take instructions by flashing a
- cursor. If you are in the root directory (the beginning of the
- hard drive) of the hard drive you should see C:\>.
-
- Using Windows: If you choose to exit to the DOS-Prompt from
- inside Windows by selecting the MS DOS Prompt icon (as shown
- below) while Net Nanny is active , remember, Net Nanny does
- not monitor the screen while Microsoft Windows is running. Any
- Net Nanny Action occurring while at the Windows DOS Prompt may
- interfere with your ability to return to Windows. For example,
- if the computer has a Net Nanny ShutDown while you are at the
- DOS Prompt, in Windows, you may be able to use the
- CTRL+ALT+DEL keys to exit back to Windows (wait for the delay)
- or you may need to re boot your computer. If you return to
- Windows, immediately save what you are doing and exit from
- Windows and re boot the computer.
-
-
- Text Editor
- When using the Net Nanny program (NN.EXE) there are a number
- of places that may require you to add or edit information. The
- dictionary entry box is a good example. When you are entering
- data or information in an entry box you are using the Net
- Nanny text editor. The text editor keyboard commands are as
- follows:
- KEYBOARD RESULT
- ---------------------------------------------------------
- ENTER ends the current line and moves down one line
- CTRL+Y deletes the entire line
- Page Down moves down one full page
- Page Up moves up one full page
- INS toggles inserting or over write text (turn On
- or OFF)
- END moves cursor to end of a line
- HOME moves cursor to beginning of a line
- Arrow Keys move cursor up/down or sideways
-
-
- RE BOOTING THE COMPUTER
- Re boot means to turn off the computer and then start the
- computer up again. DO NOT re boot or re start a computer from
- inside a program. Exit to the DOS Prompt first. There are
- three basic ways to re boot a computer.
-
- Hold down three keys simultaneously and then release the keys.
- The keys to hold down are CTRL+ALT+DEL. This method of re-
- booting the computer will not work when Net Nanny is in the
- ShutDown mode (except when ShutDown has occurred while at the
- DOS Prompt in Windows).
-
- Most computers have a RESET button located on the front of the
- computer. Pressing the RESET button will cause the computer to
- stop and re start.
-
- Turn the power ON/OFF switch to OFF and then back to ON.
-
- PROBLEMS AND ERRORS
- If you have problems getting Net Nanny to work or if you have
- computer errors using Net Nanny, please call our technical
- support department at;
- (604) 662-8522.
-
-
- APPENDIX B
- Viruses
- WHAT ARE COMPUTER VIRUSES?
- A computer virus is a software program that has been designed
- to do two basic things: to create some undesirable symptoms in
- your computer and to replicate itself. The symptoms that can
- be manifested by a virus are many and are only limited by the
- imaginations of their creators. Typically virus symptoms are
- designed to lay dormant for some period of time in order to
- avoid detection.
-
- Since no person would knowingly run programs in their
- computers that would cause problems, a virus program is
- usually disguised or hidden within other software that is run
- on the computer. In that way, the virus software will be
- executed without knowledge when normal software is run.
- Viruses are propagated by a variety of methods, but in general
- when it comes to the PC, there are two fundamental methods by
- which a virus can enter your computer. These two methods allow
- us to classify a virus as either being a "boot sector virus"
- or a "program infector virus".
-
- Boot Sector Viruses
- The BOOT SECTOR virus makes use of the fact that the first
- sector on either a floppy disk in drive A: or the physical
- hard disk, has a special purpose. When the PC is turned on or
- booted by pressing the CTRL ALT DEL keys, the content of the
- first disk sector is loaded into memory and execution control
- is passed onto the computer code contained in that sector.
-
- Normally, the computer program code, contained in sector one,
- is the "boot code". The "boot code" starts loading the DOS
- operating system into the computer. It is a relatively easy
- process for the unscrupulous computer programmer to replace
- the normal boot code on a floppy disk with a virus program
- that appears as if it is a legitimate boot sector. When a PC
- is booted with such a floppy disk, the virus code would be run
- before the normal boot process takes place and the operator
- would be unaware that the virus has been run.
-
- The virus code is usually designed to load itself into
- protected area of memory and then continue the normal boot
- process as if nothing unusual had happened. Since replication
- is its primary mission, the most likely first replication
- would be to copy itself to the first sector on the hard disk.
- Then from that time on, the virus code would be run each time
- the computer is booted from the hard disk.
-
- A BOOT SECTOR virus typically sets itself up so that it
- remains active in memory (TSR) even after the computer is
- fully booted. In this way, it can copy itself onto every
- floppy disk that is made available to the computer. These
- infected disks will then go on to infect other computers. A
- BOOT SECTOR virus infection can spread at a surprising rate.
-
- Important
- It should be emphasized that boot sector viruses are
- introduced into a computer, in 99.9% of the occurrences, by
- booting on a floppy disk that is infected. The floppy disk
- does not have to be a bootable MS-DOS system disk, and in fact
- it is mainly the non-system data disk which is the main
- culprit in the spread of boot sector viruses.
-
- A typical example happens when a floppy data disk gets
- accidentally left in the computer's floppy drive when it is
- turned off. Then, if the computer is later turned on with the
- floppy disk still in drive A:, the computer will attempt to
- boot on that floppy diskette and the virus code will be
- executed. After the virus code is executed, you may see a
- message on the screen similar to the following:
- "Non-System disk or disk error"
- "Replace and press a key to continue"
-
- Once this message appears, it is usually too late to avoid
- infection. The virus at this point has probably already copied
- itself onto your hard drive. Since the Virus replaces the
- normal "boot-code", each time your computer is started the
- first program code to run will be the Virus code. The Virus
- program will therefore become activated every time you boot
- your computer. If you scan for Viruses after the computer is
- booted, the Virus will already have control over the computer.
- The scan program can therefore be "defeated" by a scan program
- run after boot-up. Always boot from a Virus free, trusted DOS
- floppy on A: drive before attempting to scan the hard drive.
-
- Program Infector
- The program infector virus, is a virus program that attaches
- itself to existing innocent programs. The attachment usually
- takes place at object code level, at the easy to find entry
- points such as the beginnings or endings of loadable code
- modules. In this way, whenever an infected program is
- executed, control will pass to the viral code either at the
- beginning or the end of the normal operation. The viral code
- can then do whatever its creators have programmed. The first
- action is usually to set itself up in memory so that the virus
- will be active after the program has completed its operation.
- The second action is usually to attach itself to yet another
- innocent program that may be available on the disk.
-
- Controlling Viruses
- In order to build up some defenses against virus attack you
- should consider the following points:
- 1) start with a virus fee computer
- 2) install virus control software
- 3) develop screening procedures to test floppy disks
- before they are used in your computer.
- 4) develop procedures to make uncontaminated backups of
- your hard disk.
-
- Establishing a Virus Free Computer
- Initially you must determine whether your computer's hard disk
- is virus free. This usually involves the use of some form of
- virus scanning program. When using a virus scan program to
- check a floppy disk or hard disk, it is absolutely essential
- that no viruses are active in the computer at the time of the
- scan. The proper procedure for scanning your hard disk would
- be:
- 1) first obtain a bootable system disk that you are 100%
- certain is free of any virus. This disk should have
- the same DOS version that is present on the hard disk.
- 2) turn the computer off to make sure all memory is cleared
- 3) turn the power back on with the virus free system disk
- in floppy drive A:
- 4) allow the computer to boot on the floppy disk
- 5) then at the DOS prompt run the scan program from the
- floppy drive to check hard drives C:, D: etc.
- 6) if all the drives on the hard disk test negative to
- any viruses, then we have some degree of assurance
- that we are starting with clean system. It should be
- noted that not all viruses will be detected with every
- scan program. Sometimes it can be useful to do
- comparisons to known good programs on original floppy
- disks.
- 7) it should be noted that the best way to avoid the
- transfer of a virus to the original floppy disks is to
- make sure that the write protect tabs are in place. It is
- not possible to write to a floppy disk in a "normal" PC,
- if the diskette is write protected.
-
- Develop Screening Procedures
- It is recommended that all floppy disks be scanned for viruses
- before they are used on your computer. This is especially true
- if you are planning to transfer any software programs from the
- floppy disk to your hard disk.
-
- Backing Up Computer
- It is advisable to separate data files from program files in
- any backup system. Since program files do not tend to change
- once they are installed on your computer and since they are
- the files most susceptible to virus attack, it is best to only
- back them up once at the time of installation. This reduces
- the probability of virus infected programs ending up in your
- backups. Data files on the other hand, tend to change
- frequently and are much less susceptible to virus attack,
- therefore backing up data files on a regular basis should not
- present any problems from a virus point of view.
-
-