File Protector version 1.60b documentation ----------------------------------------- New to version 1.60b -------------------- - Create File Protector Shortcut Icon on Desktop option New to version 1.60 ------------------- - Express setup - Auto deactivate on enter, auto activate on exit - Configurable configuration file location This is suitable for remote configuration file administration New to version 1.55 ------------------- - Some minor changing / enhancement - Registration information on program New to version 1.54 ------------------- - Enhance GUI, more user friendly - Add file[s] inside folder automatically for folder protection (previous version must be done manually) New to version 1.53 ------------------- - Add disable create directory feature (in Disable Create/Overwrite) New to version 1.52 ------------------- - File Protector dialog box maximize feature - User interface enhancement New to version 1.51 ------------------- - Fixing minor bugs found in Profile Manager v1.50 New to version 1.50 ------------------- - Features added : * Single and multi users / profiles * Profile Manager to manage users / profiles * Auto deactivate on login OK (check in only) * Turn on/off File Protector * Auto turn off File Protector when it detects conflicts. - Fixing some bugs found in version 1.11 : * Protections disappeared on certain conditions. (Protections not working on certain conditions). New to version 1.11 ------------------- - Fixing some minor bugs New to version 1.10 ------------------- - Features added : * Auto protection activation on start-up * Auto protection activation on idle New to version 1.01 ------------------- - Fixing problems : * Sometimes instable in Windows 98 * Long file name issue * Deletion with wild cards in Windows DOS box can delete the protected file[s] 1. What is File Protector ? --------------------------- File Protector is a utility to protect your files and or folders. Protecting can be done in various ways. You can hide them, make them undeleteable, unrenameable, unreadable, unmodifiable, unappendable, unexecutable, just make them invisible, or just keep their attributes as is (cannot be changed). Both files and folders including the sub- directories inside them can be protected. WILD CARDS are allowed. With the wild cards feature, you can protect, for example all EXE or DLL files to be unmodifiable and unappendable. And you may also set all files to have their attributes unmodifiable, so keeping read only files remain read only, hidden files remain hidden. Or for certain files or folders you want them to be unseen, as if they didn't exist, you can do it too! Besides, you can protect log files of applications (such as KeyKey) to continue logging, yet cannot be accessed by unauthorized user. File Protector works silently in background. Why do you ever want to protect your files ? There are many reasons. - You may concern your executable files (EXE, DLL, VXD, COM, etc) not to be infected by virus. File Protector can prevent them from being modified. - You may want to have your files attributes cannot be changed, so have your read only files remain read only, etc. - You may want to have your important files to be unseen by others. In other words, you want your files to be hidden. - You just want to protect your files in case of unintentional dele- tion. - Work together with KeyKey! With File Protector you can make KeyKey log file to be invisible, to be unreadable, to be unmodifiable, but appendable !! So the log file can continue logging, yet cannot be accessed by unauthorized user !! Now, you know why you want to protect your files / folders. Then why choose File Protector ? - File Protector supports many protection features. Users can combine the options supported to meet their needs, including hidden, invi- sible, undeleteable, unmodifiable, unappendable, unexecutable, make file attribute unchangeable, etc. - File Protector can protect both folders and files. - File Protector supports wild cards. This way, you can protect all files in all directories / folders of your choice. - File Protector supports abosolute and relative path. - File Protector supports hot key. File Protector Monitor can be launched just by pressing hot key of your choice. - File Protector works in background, and invisible. - Password protection to access File Protector Monitor and settings. - Multi users/profiles supported. Each user/profile can have his/her own settings. This can useful for computer sharing. - Configurable configuration files. With this feature, configuration file can be put somewhere on the network, thus make administration easier. - For your convenience, File Protector supports auto turn off on conflict. With this feature, if File Protector happens to conflict with your existing software (very rare, the known ones are ZipMagic and FreeSpace), you can still reboot in normal mode, since File Protector will turn itself off automatically. Then you can choose which software you want to use. File Protector protects files on local hard disk drive. Files on net- work drive may also be protected, but limited. Only several functions work for network drive (they are : Disable Create/Overwrite, Disable Open, Disable Execute, Disable Rename, Disable Delete, and Disable Set Attribute. 2. Files provided ----------------- - VFTD.VXD --> the File Protector driver - FILEPROT.EXE --> the File Protector Monitor program - PROFILE.EXE --> Profile Manager, to create / edit users / profiles - READ_ME.TXT --> this file - ORDER.TXT --> how to order / register File Protector - INSTALL.EXE --> Installation program - UNINST.EXE --> Uninstallation program You just need to launch FILEPROT.EXE to change settings or control the File Protector. To create users/profiles, launch PROFILE.EXE. 3. How to use ------------- File Protector runs on Windows 95 and Windows 98 but not on NT. You have to install File Protector before you can use it. Launch INSTALL.EXE program to install File Protector. You have to reboot your computer after installing File Protector in order for File Pro- tector to work. To install File Protector with express-install, just launch the install.exe with parameter : install install_dir config_dir where : install_dir = File Protector installation directory config_dir = File Protector configuration file Example : C:\>install C:\FILEPROT G:\FILEPROT\CONFIG\FP.CFG Now, after installing File Protector and rebooting, launch FILEPROT.EXE. This is the File Protector Monitor program. A message box asking for registration will appear. Press the Skip button and you'll see the main menu of File Protector Monitor program. Here, you can enter file name / folder name in the edit field at the top. You can use wild cards. Please note that I differentiate the '*' and '*.*'. '*' means all files. '*.*' means all files containing '.' (dot). And then you can check as many protection options as you like. You can disable read, disable write, etc. Please note that ' Make Invisible' is different from 'Make Hidden'. 'Make Invisible' only make files / folders to be unseen, but can still be accessed, while 'Make Hidden' make folders / files to be unseen, unopenable, uncreatable, undeleteable, unrenamable, ... basically as if the files didn't exist at all. Active check box.. this should be checked to make the protection active. Recursive check box.. check this box if you want all the sub- folders included. For example : You put in 'C:\TEMP\*.EXE'. If you do not check 'Recursive', you just protect all EXE files in C:\TEMP fol- der. If you check 'Recursive', you protect all EXE files in C:\TEMP directories including the subdirectories such as C:\TEMP\TEST\A.EXE. To hide folders including their subdirectories, check 'Make Hid- den', 'Active'. For example, if you want to hide C:\TEMP and their sudirectories and files. Put in : C:\TEMP with check on 'Make Hidden', and 'Active'. Press 'Add to List' button or 'Insert' button. After adding it to list, press 'Apply' button to start protecting files in the new list / settings. You'll see that File Protector will actually add 2 items, the second item is added automatically : C:\TEMP\* with check on 'Make Hidden', 'Active', and 'Recursive'. If you want to edit an item, just double clicking the item on the list. The item will move from list to edit area. You can then change the protection option. After that, press 'Add to List' or 'Insert' button to add it back to the list. Reload button will reload the current settings from database. Standard Prot button will suggest standard protection for exec- utable files. To modify the settings, press 'Settings...' button. There you can change your password, activate / deactivate File Protector, set- ting hot key, uninstall File Protector, and create rescue disk. You may need to create rescue disk in case you forget your password. If you forget your password, just insert your rescue disk. This rescue disk act as if it were the password. You can just create one rescue disk. If you want to back up your rescue disk, just copy the file 'RESCUE.BIN' created on your disk. Each time you create your rescue disk, the previous 'RESCUE.BIN' will not be valid any more. Uninstalling. To uninstall, just launch File Protector Monitor and press button 'Settings...' and then 'Uninstall File Protector'. Example : *. To hide C:\TEMP directory : - Enter File : C:\TEMP Check : Make Hidden Active - Enter File : C:\TEMP\* --> this step is unnecessary for version 1.54 or above, since it is done automatically. Check : Make Hidden Active Recursive *. To make KeyKey log file continue logging but unaccessible by unau- thorized user : - Enter File : C:\KEYKEY\LOG\KEYKEY.SCN Check : Disable Read Disable Write (Modify) Disable Delete Disable Rename Make Invisible Active Note that, to be able to work properly, set the size of the log file to be unlimited and also set windows session to be unlimited. *. To protect executable files (e.g. EXE files) from being infected : - Enter File : *.EXE Check : Disable Create / Overwrite Disable Write (Modify) Disable Write (Append) Disable Rename Disable Delete Disable Set Attribute Active However, using these protections, new EXE file cannot be created. Also beware if the executable programs create temporary EXE files, since the EXE files cannot be created. You should deactive this item, if you want to install new soft- ware. When you deactivate the item, the protections are disabled. *. To disable read in relative path : - Enter File : TEST\SECRET.TXT Check : Disable Read Active This will protect secret.txt in directory test, e.g. : - C:\FOLDER\TEST\SECRET.TXT - D:\DATA\TEST\SECRET.TXT To protect on certain drive you can set : Enter File : H:TEST\SECRET.TXT This will protect secret.txt in directory test in drive H, e.g : - H:\FOLDER\TEST\SECRET.TXT - H:\DATA\TEST.SECRET.TXT ********** A note on protection : - Do not hide / protect folder "My Documents". You may protect / hide the files in the folder, but don't hide the folder. - Do not hide / protect the File Protector files. *** Auto activation at start-up *** File Protector activates protection automatically on start-up if you have set 'Activate protection at start-up' option. This option is available for both single user and multi users. For multi users, it will effect on the user setting this option. *** Auto activation on idle time *** File Protector can be set to auto-activate protections on idle time. This option is only available on single user. *** Auto deactivate when login OK *** With this option set, you can just login to deactivate all protect- ions. *** Multi users / profiles *** When you first install File Protector, it is in single user mode. You can switch to multi user mode, when you create an active administra- tor with Profile Manager. When there is at least one active adminis- trator, the File Protector switched to multi user mode, if not, then it's in single user mode. *** Creating users / profiles *** Launch Profile Manager to create or edit users / profiles. In this menu, you can create user with authorization : - Enable profile/user admin --> Administrator user - Enable edit items --> Users may edit item in File Protector - Active --> Set user to be active - Maximum item[s] --> Maximum item[s] assigned to users. You can also set password for each user. In the settings menu, you can activate or stop File Protector pro- tection by pressing 'Active' or 'Stop' button. All items for all users are affected. With the 'Advanced...' button you can turn on/off File Protector. If conflicts found, you should turn off File Protector. File Protector can also turned itself off automatically on conflict if you set the 'Auto turn off on conflict'. *** About 'Activate' and 'Stop' button *** Activate and stop button will activate and stop File Protector pro- tections on items. Activate and stop button in File Protector Monitor program will activate or stop all items' protection on that user (for multi user) and all items' protection on single user. Activate and stop button in Profile Manager will stop all items' pro- tection (for single user and multi users). *** About Turn on and Turn off File Protector *** Turning off File Protector will disable File Protector from protect- ing. If you check 'Auto turn off on conflict' option, File Protector will turn itself off when it detects conflict. File Protector detects conflicts by watching if 'blue screen' error appears. If it appears, File Protector concludes that there is a conflict (maybe conflict with File Protector, maybe not). If this is the first time you install File Protector, the default values are : - Auto turn off File Protector on conflict : Enabled - File Protector protection status : On If you have already installed previous version of File Protector, the default values are : - Auto turn off File Protector on conflict : Disabled. - File Protector protection status : Off, so you must turn it on to make File Pro tector works. *** Configurable configuration file location *** You can configure the configuration file location. Just press the "Settings..." button, and after the "Settings..." box appears, click "Advanced..." button. An "Advanced Settings..." box appears. There you can set configuration directory to "Custom" and provide the con- figuration file name. This is how File Protector works on start-up : - At start-up, File Protector tries to find default configuration file, and do the protection if File Protector can find it. - Then, after processing login box (if you need to login to your network), File Protector will launch "File Protector Checker". - This "Checker" will find "Custom configuration file" if defined. If the "Checker" found the "Custom configuration file", it will copy it to default configuration file (e.g. overwrite the default one). File Protector then reloads the new configuration file. Any changes will only affect the default local configuration file, and do not change the "Custom configuration file". This is where "Save configu ration file changes" option comes in handy. If you check this opt- ion, File Protector will copy any changes to "Custom configuration file". - If File Protector cannot find the "Custom configuration file", al- though it is defined, File Protector will do one of the actions : * That's OK --> File Protector does nothing, just create default. * Make all files invisible * Make all files invisible and ask for password However, you don't need to worry, if File Protector cannot find the "Custom configuration file", since if File Protector ever succeeded loading the "Custom configuration file" before, the file actually already resided on the local default file, and the protection al- ready activated. 4. Known bugs, conflicts, incompatibility ----------------------------------------- - File Protector might conflict with some available software in the market. The known ones are products : ZipMagic, FreeSpace. Both are from Mijenix. Please do not install ZipMagic or FreeSpace if you have already installed File Protector and vice versa. File Protector does have a feature which can turn itself off auto- matically when it found a conflict, however, don't try to install File Protector if you have already installed software which already known to conflict with File Protector (and vice versa) : * ZipMagic * FreeSpace - The hot key feature works properly on most application. However, there might be certain applications, whenever active, make the hot key feature couldn't work properly (e.g couldn't launch File Protector Monitor). 5. Legal-stuff -------------- This software is a shareware and (c) Copyright 1998, 1999 by Mikko Adhipurna Jodana. The unregistered copy may be freely distributed provided all files are included. You may try the software in a 30-day period. After 30-day you are encouraged to register if you would like to continue using the soft- ware. Limitation of Liability: In no event shall I be liable for any incidental, consequential, or punitive damages whatsoever arising out of the use of File Protector. 6. Contact address ------------------ If you have any questions, suggestions or bug reports, please do not hesitate to contact me. Name : Mikko Adhipurna Jodana Email : mikkoaj@mikkoaj.hypermart.net Homepage : http://mikkoaj.hypermart.net/index.html http://www.fortunecity.com/business/ballmer/3/index.html Please visit homepage for the latest version of the software and other products. 7. Registering -------------- The differences between unregistered and registered version are as follows : Unregistered version : * Protection only up to 6 items for single user mode and 4 items for items for multi user mode. Registered version : * Protection up to 127 items (total). File Protector v1.60 is free for the registered users of previous ver sion of File Protector. File Protector pricing information : Please see order.txt for pricing detail. For newest version of File Protector or other products, please visit : http://mikkoaj.hypermart.net/index.html http://www.fortunecity.com/business/ballmer/3/index.html Enjoy the product, and thanks to all File Protector customers for their ideas and support to the author.