home *** CD-ROM | disk | FTP | other *** search
- Chaos Digest Lundi 1 Mars 1993 Volume 1 : Numero 12
-
- Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
- Archiviste: Yves-Marie Crabbe
- Co-Redacteurs: Arnaud Bigare, Stephane Briere
-
- TABLE DES MATIERES, #1.12 (1 Mars 1993)
- File 1--Re: Des adolescents anglais transformes en hackers
- File 2--Piratage sur le reseau Janet
- File 3--Hackers en Coree du Sud
- File 4--Guide d'Utilisation d'un Outil de Securite PC (manuel)
-
- Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from jbcondat@attmail.com. The editors may be
- contacted by voice (+33 1 47874083), fax (+33 1 47877070) or S-mail at:
- Jean-Bernard Condat, Chaos Computer Club France [CCCF], 47 rue des Rosiers,
- 93400 St-Ouen, France
-
- Issues of Chaos-D can also be found on some French BBS. Back issues of
- ChaosD can be found on the Internet as part of the Computer underground
- Digest archives. They're accessible using anonymous FTP from:
-
- * ftp.eff.org (192.88.144.4) in /pub/cud
- * red.css.itd.umich.edu (141.211.182.91) in /cud
- * halcyon.com (192.135.191.2) in /pub/mirror/cud
- * ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD
- * nic.funet.fi (128.214.6.100) in /pub/doc/cud
-
- CHAOS DIGEST is an open forum dedicated to sharing French information among
- computerists and to the presentation and debate of diverse views. ChaosD
- material may be reprinted for non-profit as long as the source is cited.
- Some authors do copyright their material, and they should be contacted for
- reprint permission. Readers are encouraged to submit reasoned articles in
- French, English or German languages relating to computer culture and
- telecommunications. Articles are preferred to short responses. Please
- avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Chaos Digest contributors
- assume all responsibility for ensuring that articles
- submitted do not violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Tue Feb 23 20:06:14 CST 1993
- From: jp-sorlat@altern.com (jp-sorlat )
- Subject: File 1--Re: Des adolescents anglais transformes en hackers
-
-
- NEWS RELEASE
- Press Officer: Martin Herrema: 071 911 5101
-
- February 24, 1993
- Statement on Hacking at PCL
-
-
- The Polytechnic of Central London (now the University of Westminster) was
- affected by a 'hacker' on April 23, 1990. The 'hacker' gained access to
- the polytechnic's computer teaching systems via the academic joint computer
- network JANET, which serves all British universities.
-
- The 'hacker' made some changes to the system, mainly to the on-screen
- start-up messages. These were spotted very quickly on the morning of April
- 23 by staff, who then changeg the public access messages back to the
- correct wording. The University of London Computer Centre, which provides
- network support for JANET, was informed of the situation.
-
- The teaching systems contained a variety of information concerned with
- course administration and delivery, but there was no evidence thet the
- hacker achieved anything other than a change of message. The systems were
- turned completely to normal within a few days, and the incident caused
- minimal disruption to the work of the polytechnic. Since the incident
- further security measures have been built into the University's computer
- systems.
-
- ------------------------------
-
- Date: Wed Feb 24 13:19:23 1993
- From: S15810@PRIME-A.PLYMOUTH.AC.UK (Stuart Wyatt )
- Subject: File 2--Piratage sur le reseau Janet
-
-
- ENGLISH HACKER PROSECUTED
- +++++++++++++++++++++++++
-
- Unlike America and most other countries, England does not have too much to
- show for arresting hackers and bringing them to justice. This means that
- each time a hacker is caught, it makes headline news and creates the same
- foreboding atmosphere that hacking reports created in the early 1980's.
- The latest story is of a young hacker, Paul Bedworth.
-
- Bedworth started hacking at the age of 17, and through the many computers
- he accessed, he teamed up with 2 other hackers 10 years his senior. From
- his bedroom, using his #200 computer he dialed into pad-ports at
- Universities and from there, penetrated Internet. By spending hours at a
- time hacking, he amassed huge telephone bills (one was 34 pages long). Due
- to the BT bills, his parents banned him from using their telephone. This
- however did not stop his antics - He soldered a link from the BT socket
- and ran the wire under the carpet into his bedroom.
-
- By using Janet (The Joint Academic Network) he hacked into many University
- computers with the main intent to delete sensitive files and crash the
- system. His idea of hacking was to disrupt as many computer systems as
- possible. Other computers he attacked were the Financial Times network,
- Lloyds bank, and a whole host of computers spanning France, Germany and
- Luxenbourg.
-
- He got around the problem of running up huge telephone bills by accessing
- the billing computer, and transfering large segments of the bill to
- innocent users at Manchester University.
-
- Bedworth was arrested after another University put a trace on his calls.
- He was charged with three dishonesty charges, which he pleaded not guilty
- in court. The case is continuing at the moment (24 Feb 1993) and I will
- forward any news as and when I get it.
-
- In the U.K., there is a law which prohibits hacking, and hackers can be
- charged with gaining unlawful access to a machine and if any data is
- altered or destroyed, then that is also a criminal offence. It seems
- strange that Bedworth was not charged with gaining unlawful access and
- the destruction of data - But then, unlike the rumours that circulate the
- world, the British judicial system is not all its cracked up to be.
- ________
- -Stuart Wyatt ( )____
- ( Alas, life )
- P.S. I am currently collating information on hacking and( is but an )
- hackers for a forthcoming book. If anyone wishes ( Aardvaark.. )
- to contact me IN THE STRICTEST OF CONFIDENCE then ( __ )
- feel free to email me. . (_____) (____)
- * * * * * * * * * * * * * * * * . ? . ()
- * CHEERS_ THEN - _ _ * __ ()
- * ___/_/______|_|___| |__ * / \ ()
- * |________ _______| |__| * |_ _|
- * / / | | | | | | * |(0)||(0)|
- * / /___ | | | | | | * /|_ \/ _|\
- * /___ / | | | | | | * || | == | ||
- * / / | | \ \__/ / * || \____/ ||
- * / / |_| \____/ * ///\ !! /\\\
- *-*-/_/-*-*-*-*-*-*-*-*-*-*-*-*-=-=-=-=-=-=-=-=-!!!-!-=-=-!-!!!-=-=-=-=-=-=
- >From : Stuart Wyatt (Student, HNDCS1)
- Faculty of Technology, *> Be excellent to everyone - dude <*
- University of Plymouth,
- Drake Circus, Email: S15810@uk.ac.plym.pa (PRIME)
- Plymouth, England. stuartw@uk.ac.plym.cd.zeus (SUN)
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- ------------------------------
-
- Date: 20 Feb 93 06:17:14 GMT
- From: kafka@desert.hacktic.nl (Kafka )
- Subject: File 3--Hackers en Coree du Sud
- Repost from: alt.security
-
- +++++
- COMPUTER HACKER HELD FOR FORING PAPERS
-
- Seoul, Feb. 18 (AFP) - South Korean prosecuters
- have arrested a computer hacker on charges of
- falsifying presidential Blue House documents to
- demand classified data from a dozen financial
- institutions, authorities said today. Prosecuters
- arrested Kim Jae-yol, 23 late yesterday in the
- first such hacker case here on multiple charges of
- forgery of official documents and attempted fraud.
- Kim, an unemployed, self-taught computer wizzard,
- allegedly falsified the Blue House's secret
- computer password and presidential facsimiles to
- demand classified computer information from 12
- financial institutions, includang several
- commercial banks.
- +++++
-
- Mmmm, I wonder how you 'falsify (....) a password'.
-
- (P)
-
- ==== Kafka ======= kafka@desert.hacktic.nl ===== 1st class l00zur =========
- "The Techno Rebels are, whether we recognize it or not, agents of the Third
- Wave. They will not vanish but multiply in the years ahead."
- - The Third Wave, Alvan Toffler
-
- ------------------------------
-
- Date: Mon Feb 8 08:51:00 CST 1993
- From: Cerasela Tanasescu
- Subject: File 4--Guide d'Utilisation d'un Outil de Securite PC (manuel)
- Copyright: DCSIS SA, 1993
-
-
- KHEOPS
- The confidentiality of your PC
-
- USER GUIDE--Version 2.1
-
-
- S.A. DCSIS, Avenue de Cambridge, Technopole CITIS
- 14200 HEROUVILLE SAINT CLAIR, FRANCE
- Phone: (33) 31.06.00.06, Fax :(33) 31.43.79.95
-
-
- WARNING
-
- The DCSIS Company may not be held responsible for the damage that may be
- caused directly or indirectly by this software.
-
-
- PRECAUTION
-
- Any manual installation or uninstallation together with any illegal copy of
- KHEOPS may damage the data on your hard disk.
-
- We strongly recommend performing a backup of your data before installing
- KHEOPS. This backup should be renewed frequently as a prevention against
- fraudulent intrusion attempts which might affect the right functionning of
- KHEOPS.
-
- If this was the case, DCSIS could not be held responsible for any damage.
-
-
-
- 1. PRESENTATION OF KHEOPS
-
- Nowadays, all micro-computers contain sensitive data: client files,
- production figures, programs, payrolls etc... Besides, all this data and
- knowhow are stored on computers that more and more people know how to use,
- whether they are entitled or not. The risk of information leak and file
- copy is growing. Companies must therefore protect themselves.
-
- DCSIS has developped KHEOPS with this in mind. This is an access control
- software for all PC/AT micro-computers running MS/DOS(Versions 3.2x and
- 5.0). This program ensures the safety of the PC whether mono or multi
- users, connected to a network or not, so that maximum confidentiality is
- guaranteed.
-
- Main Functions
-
- - computer access control;
- - computer locking up when the user gets away from his PC;
- - boot control with a diskette.
-
- Besides, with the diskette administrator program:
-
- - users management (up to 31 + administrator)
- - logbook consultation
- - computer unlocking
- - program customization
-
-
- 2. MAIN FUNCTIONS
-
- The security ensured by KHEOPS is strictly software, i.e. there is no need
- of any hardware device.
-
- 2.1. Access control
-
- Computer security conventions specify two terms: user identifier and
- password. Every user is given: (1) a user identifier, hereafter user id,
- which may be structured around the notion of user group, (2) a password.
- This pair user id/password must be unique and known only to the user. The
- password must obviously never be written or communicated to anyone.
-
- Procedure
-
- Access control is carried out by the only program that can run when the hard
- disk is locked up. This program prompts the user to type his user id. and
- password. Once this is done, the pair user id/password is looked up by
- KHEOPS in a user list stored on the disk. This list is coded and is unknown
- to the operating system.
-
- If this control is successful and the password is recognized as valid
- (validity date), then the hard disk is made available and the user can make
- full use of his PC.
-
- On the other hand, if the authentification fails, the user is invited to
- start again. After 'n' unsuccessful attempts, keyboard and hard disk are
- locked up: hard disk reboot is impossible. Diskette boot will not give
- access to hard disk. Only the administrator can put things in order again
- thanks to his KHEOPS diskette.
-
- Hard disk locking will also occur if a user tries to log in with an outdated
- password.
-
- The user list can hold up to 32 entries, that is an administrator plus 31
- users. This makes it possible to share a PC between several users, every
- one of them being answerable for his session.
-
-
- 2.2. Hard disk locking
-
- When the disk is locked up, it is apparently empty. The only response to
- the DIR command is: "NO FILE FOUND". The disk and all its partitions
- (virtual disks D:\, U:\, V:\...) are also locked up. It is impossible to
- copy or delete files, to create directories of to execute programs. Last
- but not least, neither NORTON nor PCTOOLS are able to retrieve the files.
-
-
- 2.3. Resident program
-
- When the PC remains unused for a certain period of time, a small resident
- program is activated after a given period of time. This program locks up
- screen and keyboard, and displays the standard login window. The only
- action that remains possible is to enter user id. and password. The
- resident program is activated due to a temporization or upon user request,
- e.g. by pressing right SHIFT/left SHIFT.
-
-
- 3. SECURITY MANAGEMENT
-
- 3.1. User Identifier and Password
-
- Both user id. and password must be 7 characters long. But contrary to the
- user id. which is permanent, the password must be renewed regularly.
-
- Let us explain the procedure: when anyone runs the access control for the
- first time, he is invited to enter his password twice (to make sure the
- spelling is correct).
-
- This password has a three months validity. During the last 15 days of
- validity the user will be prompted to change his password. A message will
- display the deadline and explain that this change is compulsory. The user
- is free to take no notice of this warning but once the deadline is reached
- the computer disk will be locked up and only the security administrator
- will have power to straighten things up.
-
- If the user decides to change his password, again KHEOPS will invite him
- to type it twice. The new password will only be accepted if it is found to
- be different from the user's last 6 passwords.
-
- The procedure explained above is only valid for "standard users". There
- are two exceptions:
-
- - the administrator for whom there is no password time restriction;
-
- - temporary users. The validity deadline is decided upon by the
- administrator. These password are not renewable. This option allows
- people to work on the PC on a temporary basis.
-
-
- 3.2. Logbook
-
- Like in the case of the user id/password list, the logbook is coded. Only
- the administrator is entitled to consult it. This book is updated at the
- time of access control.
-
- The following information is available:
-
- - successful connexions (and number of attempts);
- - disconnexions and duration of session;
- - PC lock up following 'n' unsuccessful password presentations;
- - PC lock up due to outdated password presentation.
-
- Every entry in the logbook also includes date, time and user id. In the
- case of a system locked up due to 'n' unsuccessful attempts, only the last
- user id. is kept.
-
- The logbook contains up to 127 entries. Once the file is full, new entries
- replace the oldest records.
-
-
- 4. KHEOPS IMPLEMENTATION (Administrator)
-
- 4.1. Installation
-
- KHEOPS installation imperatively requires a floppy disk drive. Use a KHEOPS
- diskette with the adequat format (3.5' or 5.25').
-
- - Insert the KHEOPS diskette into drive a;
- - Boot the PC again (on a:).
-
- The following pull-down menu will then be displayed on the screen:
-
- | MAIN MENU |
- | - Install KHEOPS |
- | - Modify present system |
- | - Uninstall KHEOPS |
-
- On every screen the following warning is displayed for information:
-
- | On all menu |
- | ESC: quit |
- | : preceding item |
- | : next |
- | : item(un)select |
-
- - Validate every option by pressing the ENTER key;
-
- - Choose option "INSTALL KHEOPS". The program will display the following
- message:
-
- "Installation under way. Please wait".
-
- - Another window will pop up:
-
- | Administrator characteristics |
- | User identifier : |
- | Password : |
-
- - Enter administrator user id. and password (7 characters). Both must be
- validated by pressing ENTER key. They will be required on every use of
- the KHEOPS diskette;
-
- - Confirm the password.
-
- Installation will then proceed. Wait for the message:
-
- "KHEOPS is installed"
-
- Program customization is now necessary.
-
- | SYSTEM CUSTOMIZATION |
- | Resident program activation delay (mn) : 5 |
- | Background tasks authorized : 0 |
- | Debugging authorized : 0 |
- | New hot-key : N |
- | Screen backup drive : C |
- | Number of attempts before lock up : 3 |
- | Windows utilization : N |
-
- The administrator can now "add a user".
-
- - Press "ENTER" to type a user id, or
- - Press "ESC" if the user list is complete.
-
- The first user that is created in the list is the administrator.
-
- In order to put an end to KHEOPS installation :
-
- - Press "ESC" key on Main Menu;
- - Remove the KHEOPS diskette (KHEOPS will prompt you to do so);
-
- PC will reboot automatically. On PC reboot, the screen will display the
- standard login screen. Two situations may now occur:
-
- Case #1: The administrator attempts to log in. He can type his id. and
- password,
-
- Case #2: A new user logs in. The program then displays the following
- message:
-
- "Enter new password"
-
- The password must be 7-characters long. This password must be checked as
- typing errors are easily made. This is why the user is prompted to type
- his password once again.
-
- If the two secret codes are identical, access to the PC is authorized.
-
- "KHEOPS installation is complete"
-
-
- 4.2. System Modification
-
- - Insert KHEOPS diskette into drive a:.
- - Type the following, then press "ENTER":
-
- "A:KHEOPS"
-
- A window invites the administrator to type his id. and password.
-
- | Administrator characteristics |
- | User identifier : |
- | Password : |
-
- Following which the main pull-down menu is displayed on the screen:
-
- | MAIN MENU |
- | - Install KHEOPS |
- | - Modify current system |
- | - Uninstall KHEOPS |
-
- Upon selection of "Modify current system" another pull-down menu is
- displayed:
-
- | SYSTEM MODIFICATION |
- | Work on the list |
- | Unlock hard disk |
- | Logbook consultation |
- | System customization |
-
- Work on the list
- ++++++++++++++++
-
- | WORK ON THE LIST |
- | Cancel a user |
- | Add a user |
- | Add a temporary user |
- | Unlock a user |
- | User list consultation |
-
- "Add a user"
-
- This option is used to allow a new user to use the micro-computer. The
- administrator is invited to type the user's name:
-
- | User characteristics |
- | Name : Doherty |
-
- This name is the user id. and must imperatively be 7-characters long.
-
- "Cancel a user"
-
- This option is used to disable a user. The administrator is invited to
- type the user's name:
-
- | User Removal |
- | Name : |
-
- Once the administrator has pressed ENTER, the user no longer stands in the
- list.
-
- "Add a temporary user"
-
- This option makes it possible to add a user to those who have access to the
- PC on a temporary basis.
-
- | Temporary user |
- | Name : |
-
- - Type his user id. and press "ENTER".
-
-
- The program will then invite the administrator to type the user's time limit
- of access to the PC.
-
- | TEMPORARY ACCESS |
- | Validity deadline : |
- | Year : 91 |
- | Month : 07 |
- | Day : 15 |
- | |
- | Confirmation (Y/N) : o |
-
- - Type two digits for year, month and day, then validate your data by
- pressing "Y"es of "N"o.
-
- "Unlock a user"
-
- When a password is outdated (3 months validity period), the PC is
- temporarily locked up. Only the administrator can unlock it thanks to
- this option.
-
- "Display user list"
-
- This option is used to display the list of all users entitled to use the PC.
-
- Unlock Hard Disk
- ++++++++++++++++
-
- After 'n' unsuccessful login attempts the hard disk is locked up. Only the
- administrator has the possibility to unlock it thanks to this function.
-
- Logbook Consultation
- ++++++++++++++++++++
-
- A cyclic logbook containing the last 127 entries is displayed with the
- following data:
-
- - user id.;
- - date and time;
- - action: login, logout, PC locking;
- - description: number of login attempts, duration of connexion, number
- of unsuccessful attempts.
-
- This option makes it possible for the administrator to check who uses the
- micro-computer and for how long.
-
-
- System Customization
- ++++++++++++++++++++
-
- Thanks to this option the administrator can adapt KHEOPS to users need.
-
- | SYSTEM CUSTOMIZATION |
- | Resident program activation delay (mn): 5 |
- | Background tasks authorized : o |
- | Debugging authorized : o |
- | New hot-key : o |
- | Screen backup drive : c |
- | Number of attempts before lock up : 3 |
- | Windows utilization : n |
-
- * "Resident program activation delay"
- The administrator should type the temporization that is desirable before
- the login screen is displayed when the PC remains unused.
-
- * "Background task authorization"
- We strongly recommend using this option in case of intensive use of the
- hard disk (e.g. compilation, printing). Keyboard will be locked up, but
- background tasks will carry on their job. In case your reply is No,
- keyboard, screen and hard disk will be subject to access control.
- Remark: "Background tasks" must be authorized in the case of a network
- server.
-
- * "Debugging authorized"
- The administrator indicates whether or not the use of a debugging tool is
- authorized.
- Remark: Debugging should be authorized in case the PC shows uncontrollable
- reboot problems.
-
- * "New hot-key"
- The hot-key activates the resident program at any time. The default hot-
- key value is "left shift/right shift". Nevertheless the administrator is
- free to change the hot-key value.
-
- * "Screen storage disk"
- This option enables screen backup on a hard or virtual disk (200 KB are
- necessary). The default disk drive is c:.
-
- * "Number of attempts before system lock-up"
- This function makes it possible to customize the number of user id/
- password presentation attempts before hard disk lock-up.
-
- REMARK: Any modification of one of these options will only be taken into
- account once reboot has been performed.
-
- 4.3. Uninstalling
-
- - Insert KHEOPS diskette into drive a:;
- - Type: "A:KHEOPS";
-
- The following window pops up:
-
- | Administrator characteristics |
- | User identifier : |
- | Password : |
-
- Once the administrator id. and password have been validated and checked
- KHEOPS displays the main menu.
-
- | MAIN MENU |
- | - Install KHEOPS |
- | - Modify present system |
- | - Uninstall KHEOPS |
-
- - Choose "Uninstall";
-
- After a few seconds the following message is displayed on the screen:
-
- "The system must be reset"
-
- - Take the KHEOPS diskette out of the drive as the PC will reboot
- automatically.
-
- "KHEOPS has been totally uninstalled"
-
- 4.4. Hard Disk Unlocking
-
- After 'n' unsuccessful user id/password presentations, the following
- message is displayed on the screen:
-
- | Hard disk and keyboard are locked up. |
- | Please phone the administrator. |
-
- The PC will be unable to boot on hard disk. Any attempt to do so will
- result in the screen to display the following message:
-
- "Non system disk".
-
- - Insert KHEOPS diskette into drive a:;
- - Reset the PC so that it boots on the diskette;
- - Type adminitrator id. and password.
-
- The following message is then displayed:
-
- "The system must be reset"
-
- - Leave the diskette in drive a: and reboot. Then, when prompted to, type
- administrator id. and password.
-
- The PC is unlocked.
-
-
- 5. KHEOPS IMPLEMENTATION (Users)
-
- Now that KHEOPS has been installed, your data on the PC's hard disk is
- protected.
-
- 5.1. PC Reset
-
- At boot time, the user is invited to type his id. and password. Having
- done that, he has free access to the resources of the PC.
-
- 5.2. Resident Program Activation
-
- The function of the resident program is to lock up screen, if background
- tasks are not authorized, and keyboard either due to temporization or upon
- user request:
-
- - Temporization: in case the PC has remained unused for 'n' minutes (as
- set up by the administrator in the customization session, screen (if
- background tasks are not authorized) and keyboard action is automatically
- suspended.
-
- KHEOPS displays the standard login window and invites the user to type his
- id. and password. If the same user logs in again, his application is
- restaured. In case another user attempts to connect himself then the PC
- reboots.
-
- - User request: the resident program can be deliberately activated by the
- user by pressing the hot-key.
-
- KHEOPS then displays the following message:
-
- "End of session (Y/N) ?"
-
- * By pressing the letter "Y" the user will ensure that the PC is
- automatically rebooted if another user logs in;
-
- * The user answers "N". This means that he wants to suspend his job
- temporarily. KHEOPS displays the following message:
-
- "Computer in use"
-
- The only id/password acceptable are those of the user who pressed the hot-
- key. Any other user will be rejected.
-
-
- 6. KHEOPS COMPATIBILITY
-
- 6.1. Hardware
-
- KHEOPS can be installed on IBM PC/AT, PS/2 or compatible micro-computers
- running MS/DOS version 3.2 to 5.0. DCSIS has tested this program on the
- following computers: IBM PC/AT & PS/2, COMPAQ DeskPro (286S and 386S) and
- LTE 286, SLT 286 and 386, EPSON EL2 and EL3S, GOUPIL G5 286, HP VECTRA 486,
- OLIVETTI PC 310
-
- 6.2. Software
-
- 6.2.1. Standard software
-
- KHEOPS has been tested and validated by DCSIS with the following programs:
- MICROSOFT C, TURBO C, TURBO PASCAL, PCTOOLS, NORTON, DBASE, LOTUS 1.2.3...
-
- 6.2.2. Graphic software
-
- KHEOPS can handle mouse and keyboard, which ensures compatibility with the
- following programs: WORD 4 and 5, WINDOWS 2 and 3, PAINTBRUSH, PAGE MAKER
-
- 6.2.3. Antivirus software
-
- KHEOPS is compatible with VIRUSAFE+, trademark registered by Eliashim
- Microcomputers, which has been recognized as one of the best antivirus
- programs on the market (VIRUSAFE+ can handle 1400 virus and is wellknown
- for its preventive and curative vocation). The joint use of KHEOPS and
- VIRUSAFE+ ensures maximum micro-computer safety. Install Virusafe+ first
- then KHEOPS (this is imperative).
-
- 6.2.4. Network
-
- It is possible to install KHEOPS on every workstation of a local area
- network (e.g. NOVELL network) so that every station is protected locally.
-
- ------------------------------
-
- End of Chaos Digest #1.12
- ************************************
-