home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Club Amiga de Montreal - CAM
/
CAM_CD_1.iso
/
files
/
616.lha
/
SecurityControl_v1.3
/
SecurityControl.doc.pp
/
SecurityControl.doc
Wrap
Text File
|
1992-02-06
|
10KB
|
212 lines
Security Control V1.3
Copyright © 1992 By Robert Marlbrough
All Rights Reserved.
Intro
Security Control is a program designed to be used by computers with a
hard drive. It allows multiple users to log on with an account name and
password, and keeps a daily log file of system activity. If an
unauthorized user attempts to use the computer in the program will log this
as well. It can be used by schools with open access to their computers, or
for individuals who have a need for security. It includes an account file
editor, accessable only after entering a correct password, as well as being
able to delete old log files, as log files are saved on a day to day basis.
Shareware
This program is shareware, which means if you appreciate the work
put into the program and think it's something of value, you can contribute
to the author to encourage updates or to implement any suggestions or
improvments you may have. Please send any donations for this program to
the address below. For shareware to work, trust is the key. Those that do
not send in their share discourage the writers of useful software.
Remember, it's not the amount that's important, it's the thought that matters.
** Version 2.1 Available To Registered Users Only **
Registered users can have Version 2.1 mailed to them. This version includes
digitized samples that are played if users are authorized or not. For example,
if a user types in the wrong name or password, the computer simulates a
computer voice and responds "Negative." If an unauthorized user is logged,
the computer responds "Access Denied!". If the user is accepted, the computer
responds, "Acknowledged." By sending a donation of more than fifteen dollars,
I will mail back this version on disk as thanks!
Address: Robert Marlbrough
28 South "U" Avenue
National City, CA. 91950-2061.
GEnie address: R.MARLBROUGH
Please do not alter this program or it's related files in any
way. A fee cannot be charged for distributing this program, other than
downloading charges incurred or costs for disks to duplicate. If you wish
to distribute this program, the original archive must remain intact and
unaltered, with no files missing. Enough of this stuff.
Usage
Move the program to a directory you feel comfortable with. It will find
the files it needs as long as you properly install them in the correct
place.
Version 1.3 no longer needs a DH0: drive. The program will accept any
assignment of SECURE: to any drive. For example, "assign SECURE: dh1:"
will allow the program to use DH1: as the source drive. If no assignment
is used, the program defaults to the DH0: drive. The program still uses
the S and C directories for the file storage, since these directories
are needed for the startup-sequence anyway. A directory in S called
"LogEntrys" no longer needs to be present for the program to run. It will
create one automatically.
Move the file called "np" to the C directory on your drive. This
file contains the initial Account name and password to start you off.
Each account name and password is encrypted each time it's stored to disk,
so no one can just read the file and have instant access.
If the data file for accounts is no longer present, simply read
the documentation after you run the program the first time. It will
explain the default prodcedures used, and explain how to proceed.
To use Security Control, simple place the command Security in your
Startup-Sequence, near the beginning, but after the Setclock Load command,
if you have one. If not, anywhere near the front will work. This is so the
Log files will have the correct date assigned to them. You can use a
command of "Run [drive]:[dir]/Security", and place the setclock load command
after that, which will load the clock while Security is loading. Since the
user is trapped in the program anyway, using a run command will not hurt.
* For the first time, enter a logon of New, password of New. Then hit ESC
to enter the Account editor. Select number 2 to create your own account
names and passwords. Simple.
** Type Help as Logon for information on the program **
** Program Messages **
If the program tells you "System File Not Found. See Documentation", you
are missing the file "np" in your C directory. The program will then
create one for you. Simply reboot your computer, and use the following
default logon and password:
Logon:Xrtredo ** Note: Guard this documentation carefully, as
Password:Uraqt only one person should see it. You.
These will only work if you see the message stated above.
This will give you access to the Account file editor, where you can create
a completely new account file.
Account Editor
Just follow the instructions. When entering passwords you will have to
re-enter them to verify you have typed the correct password. Then after
looking over the data you entered and making sure it's correct, the
program will save it in the correct place. * A later version will support
different levels of access for creating a new account if there is enough
support for this shareware program. *
To change just your name or password, select that option from the editor
menu. This is the same process as creating a new account, except only one
account name and password will be saved. The rest will be unaltered.
Unauthorized Logons
If someone attempts to guess an account name, the program gives the user
three trys to account for typos, then shuts down. The program will inform
the user to reboot the computer. There is no way out of this stage of the
program. * A later version will reboot the computer automatically, ensuring
security, if this shareware program is supported. *
Version 2.1 speaks! By registering yourself as a user of this program,
you will be entitled to have V2.1 mailed back to you upon arrival of your
check for $15. This version will respond with digitized messages like:
"Negative" - for an unauthorized name or password.
"Access Denied!" - for an unauthorized user logged on.
"Acknowledged" - for an authorized log on.
Log File Messages
The log files show the activity of your computer grouped into files for
each day. The following messages can appear in your log:
[name] logged in at [time] on [date].
-- A successful logon.
[name] changed logon to [name] at [time] on [date].
-- A user logged on and then changed his name or password. If only the
password was changed for security reasons, the two names shown will be the
same.
[name] created new account file at [time] on [date].
-- File has N new accounts.
-- A user logged on and then created a new account file with N accounts.
*** Unauthorized User Attempt logged in at [time] on [date].
Logged in using [name]...Searching for Authorized Names.
-- Someone attempted to log in but did not find an account that was in
the system file. This warns the System Manager to be cautious with his
account file and his computer.
*** Unauthorized User Attempt logged in at [time] on [date].
Logged in using [name]...Tried the following passwords:
pswd1 - pswd2 - pswd3
-- Someone attempted to log in, found an account name, and is trying to
guess the correct password. It shows which three passwords were tried
before the system shut down, seperated by dashes. This warns the System
Manager to change that account name and warn the user it belongs to.
Comments
If you want to make suggestions or comments, all are welcome. This is
only version 1.0, so many improvements can be made. It is a test of the
waters to see if anyone needs this type of program or like the direction
its going. I have seen about 4 or 5 other "password" protection programs,
and none satisfied me. So I wrote my own. My address is at the beginning
if you would like to send real mail. My GEnie mail address is
R.MARLBROUGH. On local BBS's in San Diego I can be reached by leaving
mail to Robert Marlbrough.
Background
This program is written and compiled using AMOS, version 1.3. There are a
few problems with it still, but it works far better than any other
programming language I've tried (or know). Security Control can be
improved as AMOS improves, so if you find a need for this program a
donation to the author will improve the chances of a newer version. The
program is about 12,000 bytes in AMOS text, but when compiled together
with the AMOS libraries and requesters and such, it becomes a whopping
80,000 bytes. By using the squash option in the AMOS compiler, it came
down to under 60,000 bytes, which is not too bad.
Credits
Written by Robert Marlbrough as his second AMOS creation. He is currently
programming as part of his study for an Informations Systems major at San
Diego State University, where he is a senior. He is looking for work in a
computer store as a salesperson, preferably at an Amiga dealership in San
Diego. This program was written to educate and to help decrease the cost
of a Postscript laser printer.
Beta Tested by Ray Marlbrough as his first beta test. He is currently
looking for beginning work as a beta tester in San Diego for games on the
Amiga or IBM, and will consider volunteer work to prove his worth.
Version 2.1 speaks! By registering yourself as a user of this program,
you will be entitled to have V2.1 mailed back to you upon arrival of your
check for $15. This version will respond with digitized messages like:
"Negative" - for an unauthorized name or password.
"Access Denied!" - for an unauthorized user logged on.
"Acknowledged" - for an authorized log on.
Look for more Shareware coming soon to a BBS or GEnie library near you.
Thanks for your support B)