home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Business Heaven
/
Business Heaven.iso
/
security
/
pcpl25
/
padlock.doc
< prev
next >
Wrap
Text File
|
1993-08-30
|
32KB
|
945 lines
SHAREWARE NOTICE
All programs and accompanying files which constitute PC Padlock are
copyrighted software, to which Del Mar Software retains all ownership and
rights.
You may freely distribute this software, as long as all files are included and
free of modification. All copyright notices must remain intact.
It is being distributed here as shareware, and Del Mar Software grants you the
right to freely use it for a period of thirty (30) days. If after this trial
period you find it to be of value and wish to continue using it, you must
purchase a copy by registering your shareware.
Failure to abide by the above criteria is a violation of 17 United States Code
sections 101 through 810.
There are several additional benefits gained from registering. These include:
* A professionally printed and bound User's Manual.
* Free automatic updates for a period of six months on minor releases, with
reduced prices on major releases.
* Advance notice and reduced prices on new products.
* Unlimited free technical support via a toll-free telephone number.
Del Mar Software makes no warranties of any kind with regard to the program
or printed matter comprising the product. This includes, but is not limited
to, implied warranties of merchantability, fitness for a particular purpose,
and any damages arising from the use of this product, whether consequential or
incidental.
PC PADLOCK REGISTRATION FORM
Your name : _________________________________________________________________
Company name : ______________________________________________________________
Address : ___________________________________________________________________
City : _____________________________ State : __________ Zip : _______________
Please specify which media you prefer :
[] 5 1/4" DD (360K)
[] 3 1/2" HD (1.44 Meg)
Please send $30.00 in cash, check, or money order to :
Del Mar Software
1551 Old Mill Crossing
Marietta, GA 30062
You may also register through Public (software) Library, using your MC, Visa,
AmEx, or Discover card if desired. Del Mar Software does not accept these
cards directly. To contact PsL :
In USA.....(800) 242-4PsL
Overseas...(713) 524-6394
FAX........(713) 524-6398
CIS........71355,470
Ask for PsL product number 10767.
THESE NUMBERS ARE FOR ORDERING ONLY. Del Mar Software can NOT be reached at
those numbers. For information on dealer pricing, volume discounts, site
licensing, shipment status of your order, latest version number, technical
information, or returns, please write to Del Mar Software directly at the
above address or call (404) 977-0419.
Also, you may register online through CompuServe, by typing "GO SWREG" and
using registration ID #695.
PC PADLOCK (TM)
Copyright (c) 1992,1993 Del Mar Software
USER'S MANUAL
PC PADLOCK (TM) is a trademark of Del Mar Software
CONTENTS
INTRODUCTION 1
SYSTEM REQUIREMENTS 2
INSTALLATION PROCEDURE 3
Installation directory 3
File copying 3
Autoexec.bat modification 3
RUNNING PC PADLOCK 4
The PC Padlock screen 4
Lock 5
Unlock 6
Clear 6
Encrypt 6
Decrypt 7
Purge 8
Quit 8
APPLYING PC PADLOCK 9
Maximum protection 9
Medium protection 9
Minimum protection 9
Special cases 9
Automatic padlock 9
Other uses 10
IN CASE OF DIFFICULTY 11
INTRODUCTION
Thank you for your purchase of PC Padlock from Del Mar Software. PC Padlock
provides the user with a floppy disk security system for DOS-based computers.
Once locked with a password, a disk's contents cannot be viewed, edited,
deleted, or even listed by any DOS command or application program. This is
especially useful in protecting data disks used for word processors,
spreadsheets, desktop publishers, financial software, or any other application
that writes data to a floppy. Any confidential information is safe from
prying eyes with PC Padlock.
In addition to locking, disks may also be encrypted, protecting them from all
disk repair utilities should they be lost or stolen. Disk encryption renders
every active file data area of a disk indecipherable. Would-be thiefs and
snoops with your disk, the expertise, and time on their hands will never see
your confidential data.
Disk clearing is also offered, to handle all inactive file data areas, such as
those left behind when a file is deleted or shortened through editing or
overwriting. The data in these areas is destroyed, and all evidence of any
old files is removed.
PC Padlock also includes individual file encryption, which makes text files
unreadable and program files unexecutable. Wildcards are accepted to allow
encrypting multiple files in a single pass.
And lastly, file purging is available as a secure alternative to the DOS
"delete" command. This works like disk clearing, destroying all the file's
data and removing all traces of it's former existence. Purged files cannot be
undeleted by any DOS command or third party utility.
As part of the total security package, all failed attempts to unlock a disk or
decrypt a file are stored for later notification of the user. The date, time,
drive, and file name (if applicable) are displayed for each attempt.
If you own PC Padlock's companion program, Menu Pro, it will install itself in
Menu Pro's "Setup" pulldown, so it is always available when you need it.
All these features are presented in a full-screen application which offers
mouse support and on-line help. Scrollable file lists and disk information
areas make PC Padlock extremely user-friendly.
Although PC Padlock is a DOS application, it may be run as such from within
Microsoft Windows V3.0 or higher.
You will find many uses for PC Padlock, whether you are carrying disks back
and forth from the office, storing personal information, or protecting
confidential company data.
-1-
SYSTEM REQUIREMENTS
* Any IBM or 100% compatible machine.
* MS-DOS version 2.1 or higher.
* At least 90K of available (free) RAM memory.
* Any monitor, although color is supported if available.
* A hard drive with at least 90K of free disk space.
-2-
INSTALLATION PROCEDURE
INSTALLATION DIRECTORY
First, decide in which directory you want to place the program file. It can
be an existing directory you have already set up for miscellaneous utility
files, or an entirely new one. If you decide to place the file in a new
directory, it is advisable to place it directly under root. For example, if
the name of this new directory is "pcpl", simply enter "mkdir \pcpl" from the
DOS command line.
FILE COPYING
You now need to copy the ".exe" file into the chosen directory. To do this,
first change to the drive and/or directory where the program file is now.
Then, use the copy command from DOS to place it in the proper directory. For
example, let's say the program file is currently in a directory called
"c:\download", and you wish to copy it to the "c:\pcpl" directory. First,
enter "chdir c:\download" from DOS to change to the directory containing the
file. Next, enter "copy padlock.exe c:\pcpl" to copy the file.
AUTOEXEC.BAT MODIFICATION
The path is a list of directories which tells DOS where to search for programs
that aren't contained in the current directory. The path is usually defined
in your autoexec.bat file, which activates it every time you boot your
computer. Including the installation directory in your path enables you to
run the programs regardless of what directory you are currently in. If your
chosen installation directory is not in your current path, you will need to
add it to the path statement in your autoexec.bat file. Using your favorite
text editor, find the line in the file that begins with "path" or "path=".
Then, add ";c:\pcpl" to the end of this line. If no such line appears in your
file, or you have no such file in your root directory, insert the line
"path c:\pcpl", creating the file to hold it if necessary. If your chosen
installation directory is not "pcpl", substitute the correct name in the above
examples.
-3-
RUNNING PC PADLOCK
You may only use PC Padlock on disks that have the same density as the drive
itself. In other words, 360K floppies may not be secured in a 1.2 meg drive,
nor can 720K floppies be secured in a 1.44 meg drive. Attempts to use PC
Padlock on low density disks in a high density drive may result in a loss of
disk contents and integrity.
For a brief description of the command, type "padlock /?" at the DOS prompt
for a help message.
The normal way to start PC Padlock is to simply enter "padlock a:" from the
DOS command line. If the drive containing the disk to be secured is not in
the A drive, replace the "a:" with the appropriate drive letter followed by a
colon. If you enter a non-existent or hard drive letter, you will be informed
that securing this disk is not possible.
If you get a "Bad command or file name" error from DOS, it probably means that
you did not let the installation program modify your path to include the
installation directory, or you have not rebooted your computer since
installation to let the new path take effect. Refer to the INSTALLATION
PROCEDURE chapter preceding this one for the importance of doing these things
and the consequences of not. If you find that you need to modify your path
now, edit your autoexec.bat file located in the hard disk's root directory.
Find the line that begins with "path " or "path=" and then add ";c:\pcpl" to
the end of the line. If no such line exists, add the line "path c:\pcpl" at
the top of the file. (If your installation directory is not "pcpl", enter the
correct directory in the preceding examples.)
THE PC PADLOCK SCREEN
The PC Padlock screen is divided into four main areas - the menu strip, the
file list area, the user interface, and the disk information area. The menu
strip is a row of colored blocks across the top of the screen, displaying the
different functions available. They are Lock, Unlock, Clear, Encrypt,
Decrypt, Purge, and Quit. To use these functions, simply position the mouse
cursor over the desired block and click the left button. Or, you may hit the
keyboard key corresponding to the highlighted capital letter in the block.
Below this, the left half of the screen comprises the file list area. Files
are listed here if the disk is unlocked; otherwise, this area is blank. You
may scroll through the file list a page at a time by clicking left on the
PageUp or PageDn blocks, or hitting the corresponding key on the keyboard.
The Specify block, however, is only active during the Encrypt, Decrypt, and
Purge functions. It will be explained later.
Across from the file list area, the upper right side of the screen is called
the user interface area. The top two lines are usually blank, but display
prompts for user input and error messages when necessary. The next line
displays the disk status, which will either be unlocked, locked, or locked &
encrypted. The last line in this area reminds you the F1 key may be used to
obtain on-line help screens.
Beneath the user interface is the disk information area. For unlocked disks,
-4-
this displays the disk volume label (if present), total disk space, number of
encrypted files on the disk, encrypted file bytes, number of normal files,
normal file bytes, number of deleted files, total number of files, total file
bytes, and the free space left on the disk. For locked disks, the values for
these items are blank.
LOCK
Disk locking is accessed by clicking the left mouse button over the Lock
block, or hitting the L key on the keyboard. Locking prevents a disk's
contents from being viewed, edited, deleted, or even listed by any DOS command
or application. You will be asked for a locking password which cannot exceed
twelve characters in length, and is case sensitive. This means that lower
case letters (such as "abcd") are considered different than upper case ones
(such as "ABCD"). Please be aware of the status of your Caps Lock key as you
enter your password, as the characters you type will not be echoed to the
screen, but displayed as asterisks. You will then be asked to re-enter the
password, to make sure you typed correctly the first time.
NOTE
It is extremely important to remember all passwords used in PC Padlock. If
there is any possibility of forgetting a password, you may want to write it
down somewhere in a safe place away from the computer. Once used, there is no
way of determining PC Padlock passwords. If you should forget one, your only
recourse is to send the floppy disk to Del Mar Software. We will unprotect
the disk and return it to you for a ten dollar service charge.
After locking, you will be asked for permission to encrypt the disk. For
disks containing large or numerous files, this may take a while, but is
absolute protection should the disk be lost or stolen. Why? An expert data
thief with enough private time may be able to use disk repair or sector editor
utilities to bypass DOS and view raw file data. Disk encryption ensures that
if a would-be snoop has the time, expertise, and resources to get that far,
the data he views will be indecipherable.
Disk encryption may not be run on a disk that contains individually encrypted
files (see the "Encrypt" section later in this chapter). If the disk contains
any encrypted files, you will be informed that disk encryption is not
possible.
The entire disk is scanned, and all active file areas are encrypted. This may
take anywhere from a few seconds for one or two small files up to several
minutes for a full high-density disk.
Before this process begins, you are also asked permission to clear the disk.
In contrast, clearing takes care of all inactive file areas, and takes longer
on disks with a lot of free space. These inactive areas contain data left
behind when a file is deleted, shortened through editing, or copied over with
a shorter file of the same name. This abandoned data is completely destroyed,
and all evidence of it's former existence and file names is removed. The
"undelete" command of DOS V5.x, or any other third-party utility, will not be
able to recover these files. Because of this clearing process, you must be
sure there are no deleted files you may want to undelete later. If there are,
you must undelete the files before starting disk clearing.
-5-
As a possible time-saver, you need not run clearing during locking if you are
sure no deleted or shortened files have been added to the disk since the last
clear. As an aid to deciding when to use clearing, check the "Deleted files"
line of the disk information area. If there is just one deleted file on the
disk, you should run clearing to destroy this old data. Be advised, however,
that although a disk may contain no deleted files, it may still contain
inactive file areas from files that were edited or copied. When in doubt, use
clearing for maximum protection.
As the disk is encrypted and/or cleared, a meter will appear in the user
interface area to show you the completion percentage of the process. When
done, the new disk status is displayed, and you are returned to DOS.
UNLOCK
You may unlock a disk by clicking the Unlock block or hitting the U key. This
function returns a disk to it's original condition, just as if PC Padlock had
never been run. You will be asked to enter the same password used to lock the
disk originally. If you are successful, the disk will be unlocked and
automatically decrypted if needed. If not, an entry will be made in the
intrusion file denoting the date, time, and drive of the failed attempt. The
next time you run PC Padlock, you will be notified of these failed attempts.
If you own Menu Pro and have installed PC Padlock in the same directory, these
attempts will instead go into Menu Pro's intrusion file. They will then be
viewed the next time you run Menu Pro.
After unlocking and any needed decryption, the file list and disk information
area will fill with the appropriate data, and you may work further on the disk
if desired.
CLEAR
This function is accessed by clicking the Clear block or hitting the C key on
the keyboard. It operates identically to the clearing offered when locking a
disk, but is offered separately for such jobs as processing old disks. Disks
that have been previously used may contain old data in inactive file data
areas. If you wish to only encrypt files already on these disks, you should
run clearing first to remove this old data. Then individual files may be
encrypted and the disk locked, if desired (clearing during locking is then not
necessary). This ensures no old confidential data will be discovered should
the disk be lost or stolen.
Even reformatting these used disks is no safeguard, as DOS doesn't touch the
file data area when reformatting. When reusing an old disk, you should always
clear the disk after formatting. This can be done either during locking or
separately.
ENCRYPT
Encrypt may be accessed by clicking the Encrypt block or hitting the E key on
the keyboard. Encrypting causes a text file to become unreadable, and a
program file unexecutable. It is safe from prying eyes until decrypted with
the correct password.
-6-
When you choose encryption, a blue bar will highlight the first file in the
file list area. You may use the PageUp or PageDn blocks or keyboard keys as
described earlier until the desired file appears in the list. Then, using the
mouse, you may ignore the bar and click the left button when the cursor is
over the desired file entry. Or, using the keyboard, you may move the bar
with the Up and Down Arrow keys until the desired file is highlighted and then
hit Return.
As an alternative, you can click the Specify block at the top of the file
list, or hit the S key. You will then be asked to enter a file name. This
file name may contain wildcards, to allow encrypting more than one file at a
time. For example, if you wish to encrypt all files with an extension of
".txt", you should enter "*.txt" for the file name. Consult your DOS manual
if you need further assistance using wildcards in file names. As each file is
found that matches your specification, it is moved to the top of the list and
highlighted.
For each file processed by any of the above methods, you will be asked to
enter a password. It cannot exceed eight characters in length, and like a
disk locking password, is case sensitive. You are required to enter the
password again, to confirm you typed correctly the first time.
As the file is processed, a meter in the user interface area will inform you
of the encryption progress. When done, the meter will disappear and the
letter "E" will appear at the end of the file's entry in the file list area.
This lets you look at the file list and instantly know which files are
encrypted.
To stop selecting files for encryption, you may click the right mouse button
or hit the Escape key. This will cause the blue highlight bar to disappear,
and you are then free to choose another function or quit PC Padlock.
Note that individual file encryption does not work like disk locking - the
file may still be viewed, edited, or even deleted. Viewing or editing will do
little good, however, as the data will be indecipherable to the user. For
maximum protection, however, you should lock a disk to prevent file deletion.
You may use standard DOS commands to rename, delete, or change attributes on
an encrypted file. However, you should never copy an encrypted file. If you
do copy one to another name or location, PC Padlock will not identify or
process the file correctly.
DECRYPT
You select decryption by clicking the Decrypt block or hitting the D key.
When doing so, a cyan highlight bar will appear, and file selection is handled
as explained previously in the encryption section. Entry of the correct
password causes the appearance of the progress meter and the decryption of the
file. When done, the letter "E" disappears from the end of the file's entry
in the file list area.
You will be given two chances to input the correct password. After that, the
program records the failed attempt and returns to DOS. The next time you run
PC Padlock, you will be notified of all such intrusion attempts. However, if
you have Menu Pro installed in the same directory as PC Padlock, these failed
-7-
attempts will instead be stored in Menu Pro's intrusion file. In this case,
you will then be notified the next time you run Menu Pro.
PURGE
You may purge a file by clicking on the Purge block or hitting the P keyboard
key. File selection is handled with a brown highlight bar as described
previously. It is the secure alternative to the DOS "delete" or "erase"
command. When DOS deletes a file, it merely marks the space it occupied as
reusable, and flags the file so DOS ignores it. All the file's data remains
on the disk until written over. Purging a file destroys all this data and
completely removes all traces of the file's former existence. It is then
marked with the letter P in the file list area. Purged files cannot be
undeleted.
QUIT
You may quit PC Padlock by clicking the Quit block, or by hitting the Q key on
the keyboard. The Escape key will also end the program.
-8-
APPLYING PC PADLOCK
PC Padlock's features may be used individually or combined, tailoring it's use
to your particular needs. Here are a few suggestions :
MAXIMUM PROTECTION
You have a data disk which contains confidential company information - trade
secrets, formulas, patent information, software source code, or other such
proprietary data. It is not accessed on a daily basis, and therefore stored
somewhere. If not starting with a new, unformatted disk from the box, you
should clear the disk first. Then, keep it locked and encrypted when not in
use, updating the clearing when any files are shortened through editing or
copying. While in use, do not delete files from DOS, but use PC Padlock's
Purge function instead. Your data will be totally safe.
MEDIUM PROTECTION
You have a disk which contains company data - projections, sales, new product
information, or other similar data. It is accessed several times a day, but
never leaves your office. No unauthorized personnel will have access to the
disk for extended periods during the day. You should keep the disk locked and
encrypted overnight, with clearing as needed. During the day while it is
being used, however, you may only opt for locking alone.
MINIMUM PROTECTION
You have personal data on a disk at work or home which you wish to keep
private. It is accessed many times during the day, so you need a protection
scheme that is quick and easy. You only wish to keep the data safe from any
casual users who may inadvertently place the disk in your drive. In this
case, locking only should meet your needs.
SPECIAL CASES
You use a data disk that is used by others, and wish to keep your files on
that disk private. You should individually encrypt the desired files.
You are giving someone a test via floppy disk. The disk contains reference
material, the test itself, and the answers. You need to make sure the user
cannot read the file containing the answers until he has completed the test.
You should encrypt the answer file, and give the user the password to decrypt
the answers when you deem appropriate.
AUTOMATIC PADLOCK
Many users will want to unlock their disk and/or decrypt files, run an
application, and re-secure the disk when done. Instead of entering three
commands from DOS to do this, you may create a batch file to accomplish the
task. Let's say your drive containing the data disk is the A drive, and you
normally type in "spreadsheet info.doc" to run your application. You may
create the following batch file called "spread" with any text editor :
-9-
padlock a:
spreadsheet info.doc
padlock a:
Now all you have to do is enter "spread" from DOS to unprotect your disk, use
your application, and secure the disk again.
If the name of the data file you work on changes periodically, you may replace
the second line of the batch file with "spreadsheet %1". This allows you to
enter "spread filename" from DOS, where "filename" is the name of the desired
data file.
OTHER USES
With a little imagination, the uses for PC Padlock can be limitless. Always
bear in mind, though, that any disk that may fall into unfriendly hands for
extended periods of time needs to be encrypted for maximum protection.
-10-
IN CASE OF DIFFICULTY
DOS GIVES A "Bad command or file name" ERROR WHEN I TRY TO RUN PC PADLOCK.
The directory which contains the program (the installation directory) is
probably not in your current path. To check this, type "path" from the DOS
prompt. If the installation directory does not appear in the list DOS
responds with, you need to add it to your path. Refer to the note at the
beginning of the RUNNING PC PADLOCK chapter on how to do this.
PC PADLOCK DOES NOT RUN, GIVING AN "Abnormal program termination" ERROR.
You may have entered an invalid path name or have a DOS version earlier than
V2.1.
PC PADLOCK WILL NOT RECOGNIZE MY PASSWORD ALTHOUGH I AM SURE IT IS CORRECT.
All passwords used in PC Padlock are case sensitive. That means that lower
case letters, such as "abcdef", are considered different characters from upper
case ones, such as "ABCDEF". Hit the Caps Lock key and try your password
again. If this does not work, it is either the incorrect password, or you may
have mixed lower and upper case letters in the password (although this is
unlikely).
There is absolutely no method to view, edit, or delete the password. Please
refer to the note in the "Lock" section of the RUNNING PC PADLOCK chapter for
more information.
PC PADLOCK GIVES A "cannot read disk" ERROR, BUT I AM SURE IT IS FORMATTED, IN
THE DRIVE, AND THE DRIVE DOOR IS CLOSED.
The floppy disk is probably not the correct density - double density drives
can only secure double density disks, and high density drives can only secure
high density disks. Attempts to secure low density disks in a high density
drive may result in a loss of disk contents and integrity.
I COPIED AN ENCRYPTED FILE AND PC PADLOCK SAYS THE COPY IS NOT ENCRYPTED, BUT
WHEN I VIEW THE FILE, IT IS. HOW MAY I STRAIGHTEN IT OUT?
You should never copy an encrypted file to another name, directory, or drive.
Doing so destroys internal flags that tell PC Padlock the file is encrypted.
The simplest solution is to decrypt the original source file, copy the source
file again to overwrite the damaged file, then encrypt both the original and
the copy.
If this is not feasible (the original source file has been purged, etc.), you
must encrypt the copy of the encrypted file (which will actually decrypt the
file), then copy it to another name. Copying must be used - renaming will not
work. This will return the file to normal, and you can manipulate it with DOS
and/or encrypt it as you wish.
-11-
I CANNOT ACCESS ANY FILES IN SUBDIRECTORIES I HAVE ON MY FLOPPY DISK.
This is normal, as PC Padlock was designed to work on data disks used in word
processors, spreadsheets, and other such applications which don't normally use
subdirectories on their data disks. Although you can use PC Padlock on any
floppy disk, it is not set up to descend the directory structure. You can
protect files in subdirectories, however, by encrypting the entire disk during
locking. This is as safe and secure as individual file encryption.
I AM STILL UNABLE TO SOLVE MY PROBLEM. HOW MAY I RECEIVE TECHNICAL
ASSISTANCE?
Simply call Del Mar Software. In local Atlanta, dial 977-0419. Outside of
the 404 area code, call 1-800-845-9752. Or, you may leave mail on CompuServe
to user ID # 76570,3342.
IS THIS VERSION OF PC PADLOCK COMPATIBLE WITH EARLIER VERSIONS?
Yes and no. This version will unlock and decrypt disks protected with any
earlier version. However, disks secured with V2.1 cannot be unlocked or
decrypted by these earlier versions.
Your conversion from an earlier version is simple - merely unprotect the old
disks with V2.1 and continue to use this new version.
-12-