home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Collection of Tools & Utilities
/
Collection of Tools and Utilities.iso
/
dskut
/
thegate.zip
/
GATE.TXT
< prev
next >
Wrap
Text File
|
1994-05-05
|
6KB
|
222 lines
***VIKTOR INSTRUCTONAL TOOLS.
11915 Maplewood Ave.,
Edmonds, WA 98026.
(206) 742-3502.
THE GATE.
The Gate is a low-security flexible package that allow to
filter access to computer and/or to the separate applications run by
batch files.
The Gate creates log of the users, their passwords,
dates, time of start and finish, and time spent, either on the
whole computer or separate applications, run by batch files.
In order to operate The Gate, the commands lines need to be inserted
at least once or, in order to get time of finish, twice, into
the batch files that run applications.
Format of the command line that initiates welcome screen:
gate start <parameters>
where parameters:
w[atch] - supress welcome screen; in the log file record
created with generic name INTRUDER;
integer 0-9 - number of unsuccessful attempts allowed;
s[ound] - sound alarm generated after number of unsuccessful
attempts;
m[essage] - message displayed on the welcome screen after
number of unsuccessful attempts;
the source of the message is text file
VIKMESS.TXT, residing in the current
directory;
parameters can be used in any order.
If the parameter w[atch] is used, all the other parameters are
ignored. Instead words watch, sound or message any other words
can be used that start with the corresponding characters.
Format of the command line that concludes the session:
gate
The command lines can be residing in the different batch files.
The first command line of the duplex displays welcome screen that
asks first, last name and password.
If the file VIKCONTR.TXT is present in the current directory,
program checks input against content of the file.
Format of the file:
last name (up to 15 characters);
first name (up to 15 characters);
password (optional, up to 5 characters).
The fields can be separated by one or several spaces, commas, tabs,
semicolons.
If password is absent in the corresponding record, the welcome
screen accepts any password or no password at all.
The successful input along with computer clock date and time then
is recorded in the file VIKCUST.TXT:
First Name; Last Name; Password; Date; Time of Start;
The second line of the duplex adds 2 fields to the
the record:
time of finish; time spent.
If during the session the command line GATE (without parameters)
is encountered, program adds time of finish and time spent
fields; time spent counted from the beginning of the session.
To provide unsophisticated user the with easy way to install or delete
The Gate in the most common case, that is to secure the whole
computer, two additional commands introduced:
gate install <parameters>
and
gate delete .
Instructions to install:
a) insert program diskette in the drive A or B;
b) gate install <parameters>.
Program updates AUTOEXEC.BAT file with the first line
gate start <parameters> and saves the old AUTOEXEC.BAT
under name AUTOEXEC.OLD. It also copies program GATE.EXE
into the root directory.
c) using any text editor, create VIKCONTR.TXT file in
the root directory. format:
last name (up to 15 characters);
first name (up to 15 characters);
password (optional, up to 5 characters);
as separators can be used spaces, colons, semicolons, tabs;
d) using any text editor, create VIKMESS.TXT file containing message
to be displayed after unsuccessful attempts (optional, cannot
be used with parameter W[atch]).
Instructions to delete:
issue command GATE DELETE at the DOS prompt.
****
Synopsis:
The Gate is a small but hard working program. In can wear several
hats. For example it can display Welcome Screen and ask name and
password of the user. The answer, along with date and time, is
placed into log file. When the user finishes the application, the
gate silently add to his record time of the finish and the time span.
If the control file is not present in the current directory any
input into the Welcome Screen are accepted; but, if the file is
present, the name and password are checked.
Some records in the control file may contain only first and last
names. In that situations any password or no password input from
the user is acceptable.
In some situations the computer owner may use The Gate as silent
watchman:
no screen displayed, but activity is registered in the log
file under generic name Intruder. Some owners, paranoid and
otherwise, may be curious if anybody tinkered with their
computers after hours.
The program offers the user a variable number of attempts to enter
his/her names and passwords, but then it send process to the
security routine.
The security can make hapless user to stare for variable time span at
appropriate variable message, or emit a wailing siren. After 30
seconds the cycle is repeated.
With approprate setting of batch files the program can be used as a
punch clock to check attendance, or it can provide management with
tool to obtain statistics of the usage of computer and/or
applications.
***
NOTE: In the shareware version of the program the <CTRL+C> key is enabled.