home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-10-20 | 65.6 KB | 1,813 lines |
-
-
-
-
-
-
-
-
-
-
-
- Disk Sweeper Version 2.0
- Unregistered Shareware Version
- User's Guide and Reference Manual
- October 1993
-
-
-
- May Be Freely Distributed For Evaluation Purposes
-
-
-
- Information Age
- Post Office Box 651
- Canton, NC 28716
- (704) 648-8585
-
-
-
-
-
-
-
-
- Table Of Contents
-
- Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
- System Requirements. . . . . . . . . . . . . . . . . . . . . . . . 1
- Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
- Printing This Manual . . . . . . . . . . . . . . . . . . . . . . . 1
- What is Disk Sweeper?. . . . . . . . . . . . . . . . . . . . . . . 2
- Reporting Missing Files. . . . . . . . . . . . . . . . . . . . . . 2
- How Does Disk Sweeper Work?. . . . . . . . . . . . . . . . . . . . 3
- How Do I Use Disk Sweeper? . . . . . . . . . . . . . . . . . . . . 3
- A Warning About Copy-Protected Software. . . . . . . . . . . . . . 4
- Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . 5
- Copyright. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
- Distribution Policy. . . . . . . . . . . . . . . . . . . . . . . . 6
- How To Register. . . . . . . . . . . . . . . . . . . . . . . . . . 6
- The Lab/Network Version. . . . . . . . . . . . . . . . . . . . . . 6
- What You Get When You Register . . . . . . . . . . . . . . . . . . 7
-
- Using CAPTURE and SWEEP . . . . . . . . . . . . . . . . . . . . . . . . 8
- Command-Line Parameters. . . . . . . . . . . . . . . . . . . . . . 8
- Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
- Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
- Canceling The Programs . . . . . . . . . . . . . . . . . . . . . . 8
- The CAPTURE Program. . . . . . . . . . . . . . . . . . . . . . . . 8
- Examples of Using the CAPTURE Program. . . . . . . . . . . . . . . 9
- The SWEEP Program. . . . . . . . . . . . . . . . . . . . . . . . . 9
- Examples of Using the SWEEP Program. . . . . . . . . . . . . . . . 11
- Excluding Directories. . . . . . . . . . . . . . . . . . . . . . . 13
- Excluding Directories With Indirection Files . . . . . . . . . . . 13
- Embedding Comments In an Indirection File. . . . . . . . . . . . . 14
- Using /EXCLUDE and /MISSING Together . . . . . . . . . . . . . . . 14
- Using /SILENT and /VERIFY Together . . . . . . . . . . . . . . . . 14
- Other Conflicting Switches . . . . . . . . . . . . . . . . . . . . 14
-
- Tutorial. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
- Lesson 1: Locating Alien Files and Directories . . . . . . . . . . 15
- Lesson 2: Deleting Alien Files and Directories . . . . . . . . . . 16
- Lesson 3: Scanning Only For Missing Files and Directories. . . . . 17
- Lesson 4: Scanning Only For Alien Files and Directories. . . . . . 18
- Lesson 5: Excluding a Directory From Being Scanned . . . . . . . . 18
- Lesson 6: Creating a Log File, and Running in Silent Mode. . . . . 19
- Lesson 7: Naming an Alternate Snapshot File. . . . . . . . . . . . 19
- Lesson 8: Using Disk Sweeper From a Floppy Diskette. . . . . . . . 20
- Lesson 9: A Visit To Your Computer Lab . . . . . . . . . . . . . . 21
-
- Using Disk Sweeper in a Computer Lab. . . . . . . . . . . . . . . . . . 23
- Installing Individual Copies of Disk Sweeper . . . . . . . . . . . 23
- Preparations For Installing Individual Copies on Each Computer . . 23
- Running Disk Sweeper From a Floppy Diskette. . . . . . . . . . . . 24
- Preparations For Running Disk Sweeper From a Floppy Diskette . . . 24
- Running Disk Sweeper Across a Network. . . . . . . . . . . . . . . 24
- Preparations For Running Disk Sweeper Across a Network . . . . . . 25
- Using the Same Snapshot File on Multiple Computers . . . . . . . . 25
- i
- Other Uses For Disk Sweeper . . . . . . . . . . . . . . . . . . . . . . 26
-
- Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
- Messages Displayed by the CAPTURE Program. . . . . . . . . . . . . 27
- Messages Displayed by the SWEEP Program. . . . . . . . . . . . . . 27
-
- Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
-
- Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- ii
- Introduction
-
- System Requirements
-
- o PC with 256K memory or higher
-
- o DOS version 2.1 or higher
-
- Installation
-
- Before you proceed with the installation, you should make a working copy of
- the original diskette, and then store the original diskette in a safe place.
- If you are planning to use Disk Sweeper from a floppy diskette, this is all
- you need to do.
-
- Installing Disk Sweeper on your hard drive is a simple matter of creating a
- directory and copying the contents of the program diskette into the
- directory. The following instructions assume you are installing Disk Sweeper
- onto drive C:. If you are installing it onto a drive other than C:, use the
- appropriate drive name.
-
- First you must create a directory to hold the Disk Sweeper software. It is
- recommended that you use the name SWEEPER for this directory. Type the
- following command, and press the ENTER key:
-
- MD C:\SWEEPER
-
- Next you must copy the files from the program diskette into the SWEEPER
- directory. Assuming you are copying the files from drive A:, type the
- following command and press the ENTER key:
-
- COPY A:*.* C:\SWEEPER
-
- If you are copying the files from a drive other than A:, use the appropriate
- drive name in the command above.
-
- If you completed the steps listed above without encountering any errors, Disk
- Sweeper should be installed and ready to run. If you encountered errors,
- perform the installation again, making sure to type the commands just as they
- appear.
-
- Printing This Manual
-
- It is recommended that you print this manual on your printer by typing
- the following command at the DOS prompt:
-
- COPY MANUAL.DOC PRN
-
-
-
-
- Page 1
- What is Disk Sweeper?
-
- Disk Sweeper is a software package for people who are constantly having to
- remove unwanted files and directories from computer disks. It is primarily
- intended for persons responsible for managing large numbers of computers,
- such as those who oversee the computer labs at schools, colleges,
- universities, or training organizations.
-
- No matter what safeguards are taken, students will find ways to store files
- in places they're not supposed to. Although this is usually an honest
- mistake, the accumulation of unwanted files and directories over an extended
- period of time can lead to the following problems:
-
- o Precious hard disk space starts disappearing.
-
- o All sorts of student-generated files get mixed in with system and
- application files.
-
- o Lab assignments, reports and projects that were accidentally saved on
- the hard drives can easily be copied by dishonest students.
-
- o Commercial software can be illegally copied to hard drives. A good
- example is computer games. When a student illegally installs a
- software package on a school computer, it creates a risk of legal
- prosecution.
-
- o Courses in subjects such as MS-DOS become difficult to teach. The
- students may have trouble finding the system files when they have to
- sift through screen after screen of garbage.
-
- o Some computers falsely report that there is no more disk space. This
- can happen when the maximum number of files in the root directory has
- been reached.
-
- The only way to combat these problems is to keep a vigilant watch over all
- the computers, in however many labs you are responsible for. Even if you use
- programs such as DOS Shell, Windows File Manager, or other directory
- utilities, it can still be very time consuming.
-
- That's exactly why Disk Sweeper was created. It automatically locates, and
- can even erase any file or directory on a computer disk that does not belong
- there. It doesn't matter if the file is hidden or read-only, Disk Sweeper can
- find it. Kiss those long hours of scanning directory listings good-bye!
-
- Reporting Missing Files
-
- Finding and dealing with unwanted files and directories isn't the only thing
- Disk Sweeper can do. It can also tell you if a file or directory that is
- supposed to be on a disk has been erased. That can be especially helpful in
- a school computer lab where students have the power to remove things from the
- hard drives.
-
-
- Page 2
- You might think the files in your lab are protected from malicious or
- accidental erasure, but are they? Locking your students into a DOS menu
- package wont keep them from accessing the command line because many
- applications have drop to DOS features. Making critical files read-only
- doesn't completely solve the problem either because programs like DOS Shell
- let anyone erase read-only files. Besides, most technically adept students
- learn how to remove the read-only attribute by using the ATTRIB command.
-
- Although it is very difficult to make your files 100% secure, Disk Sweeper
- will let you know if any are missing.
-
- How Does Disk Sweeper Work?
-
- The Disk Sweeper package comes with two programs, CAPTURE and SWEEP. CAPTURE
- is a program that very quickly takes a snapshot of a disk. Once the snapshot
- is taken, it is stored in a file. When SWEEP is run, it scans the contents of
- the disk. Anything it finds that is not in the snapshot is reported as an
- alien file or directory. You can optionally have SWEEP delete alien files
- and directories when they are found. Also, any file or directory that is
- listed in the snapshot, but is not found on the disk is reported as missing.
-
- You might be thinking that these programs will be slow, but in actuality they
- are quite fast. (Besides, the alternative is to scan the disk manually. You
- cant get any slower than that!)
-
- How Do I Use Disk Sweeper?
-
- It's a safe assumption that you presently scan your computers hard drives
- manually, either with a directory utility or the DOS command line. Before you
- first use Disk Sweeper, you'll have to do this one more time. Get the
- contents of the disk drive just the way you want them, with no alien files
- present, and no needed files missing. (Take heart, this is the last time
- you'll have to do it manually.)
-
- You are now ready to use CAPTURE to take a snapshot of the disk. After the
- snapshot has been taken, you can scan the disk for alien or missing files and
- directories by running SWEEP. It will compare the contents of the disk with
- the items in the snapshot file, and report any discrepancies. SWEEPs actions
- will vary, depending upon how you have configured it. Here is an overview of
- some of the different configurations possible:
-
- o SWEEP can be configured to simply list any alien files and
- directories, or delete them as soon as they are found.
-
- o SWEEP can be configured to ask for permission before deleting any
- alien file or directory.
-
- o SWEEP can optionally delete alien files that have been marked as
- read-only.
-
- o SWEEP can be given a list of directories to exclude from the scanning
- process. These directories will simply be skipped, and their contents
- will not be checked for alien or missing items.
- Page 3 o By default, SWEEP checks for both alien and missing files and
- directories. It can be configured to only check for alien items, or
- to only check for missing items.
-
- o You can instruct SWEEP to create a log file listing its activities.
- You specify the name and location of the log file.
-
- o SWEEP can be configured to run in silent mode, which means it displays
- no screen output. This might be appropriate if you want to run SWEEP
- from a batch file.
-
- o SWEEP can be run from the hard drive, a floppy diskette, or across a
- network. You can tell SWEEP the name and location of the snapshot file
- to use.
-
- The next section details how to run Disk Sweeper in any of these
- configurations.
-
- *******************************************
- * A Warning About Copy-Protected Software *
- *******************************************
-
- Although copy-protection mechanisms are extremely unpopular these days, there
- is still a chance that you may be using some copy-protected software. If so,
- you must take every precaution that Disk Sweeper will not erase any files
- that are part of a copy-protection scheme. If this happens, the
- copy-protected software may become permanently disabled. DO NOT run the SWEEP
- program with the /DELETE, /VERIFY, or /ZAP switches until you are ABSOLUTELY
- SURE that the files related to the copy-protection mechanism will not be
- erased.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 4
- Limited Warranty
-
- THIS SOFTWARE, INSTRUCTION MANUAL, AND REFERENCE MATERIALS ARE SOLD "AS IS,"
- WITHOUT WARRANTY AS TO THEIR PERFORMANCE, MERCHANTABILITY, OR FITNESS FOR A
- PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE RESULTS AND PERFORMANCE OF THIS
- SOFTWARE IS ASSUMED BY YOU. GOOD DATA PROCESSING PROCEDURE DICTATES THAT ANY
- PROGRAM BE THOROUGHLY TESTED WITH NON-CRITICAL DATA BEFORE RELYING ON IT. ANY
- LIABILITY OF THE SELLER WILL BE LIMITED EXCLUSIVELY TO PRODUCT REPLACEMENT OR
- REFUND OF PURCHASE PRICE.
-
- TO THE ORIGINAL PURCHASER ONLY, INFORMATION AGE WARRANTS THE MAGNETIC
- DISKETTE ON WHICH THE SOFTWARE IS RECORDED TO BE FREE FROM DEFECTS IN
- MATERIALS AND FAULTY WORKMANSHIP UNDER NORMAL USE FOR A PERIOD OF NINETY DAYS
- FROM THE DATE OF PURCHASE. IF DURING THIS NINETY-DAY PERIOD THE DISKETTE
- SHOULD BECOME DEFECTIVE, IT MAY BE RETURNED TO INFORMATION AGE FOR A
- REPLACEMENT WITHOUT CHARGE, PROVIDED YOU HAVE PREVIOUSLY SENT THE
- REGISTRATION CARD TO INFORMATION AGE OR SEND PROOF OF PURCHASE OF THE
- SOFTWARE PACKAGE.
-
- YOUR SOLE AND EXCLUSIVE REMEDY IN THE EVENT OF A DEFECT IS EXPRESSLY LIMITED
- TO REPLACEMENT OF THE DISKETTE AS PROVIDED ABOVE. IF FAILURE OF A DISKETTE
- HAS RESULTED FROM ACCIDENT OR ABUSE, INFORMATION AGE SHALL HAVE NO
- RESPONSIBILITY TO REPLACE THE DISKETTE UNDER THE TERMS OF THIS LIMITED
- WARRANTY.
-
- ANY IMPLIED WARRANTIES RELATING TO THE DISKETTE, INCLUDING ANY IMPLIED
- WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE
- LIMITED TO A PERIOD OF NINETY DAYS FROM DATE OF PURCHASE. INFORMATION AGE
- SHALL NOT BE LIABLE FOR INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES RESULTING
- FROM THE USE OF THIS PRODUCT. SOME STATES DO NOT ALLOW THE EXCLUSION OR
- LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION
- MIGHT NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND
- YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE.
-
- Copyright
-
- Disk Sweeper software and this document is (C) Copyright 1993 Information
- Age. All rights reserved. Disk Sweeper is a Trademark of Information Age.
-
- Any specific hardware/software names used in this document are trademarks of
- specific manufacturers.
-
- Although Disk Sweeper is partially marketed through Shareware channels, it is
- not in the public domain. It is copyrighted by Information Age. All rights
- are reserved. Copying, duplicating, selling or otherwise distributing this
- product is a violation of the Law. However, we would like to encourage you to
- make and distribute as many copies of this UNREGISTERED Shareware version as
- you wish, with the following provisions:
-
-
-
-
-
- Page 5
- Distribution Policy
-
- 1. Please feel free to distribute this UNREGISTERED Shareware version as
- often as you like, to any interested parties.
-
- 2. Please do not distribute the program without all of its original files,
- documentation and this notice.
-
- 3. Please do not alter the program or documentation in any manner.
-
- 4. This UNREGISTERED Shareware version of Disk Sweeper is licensed for use
- and evaluation for 60 days. After the 60 day evaluation period, the
- REGISTERED version of Disk Sweeper must be purchased or the use of this
- UNREGISTERED version must be discontinued.
-
- Any DISTRIBUTION of the REGISTERED version of the Disk Sweeper software
- is in violation of the license agreement and copyright Law!
-
- How To Register
-
- You may register this copy of Disk Sweeper by printing the file ORDER.FRM,
- and filling it out. To print the file, type the following command at the DOS
- prompt:
-
- COPY ORDER.FRM PRN
-
- Send the completed order form, along with a check or money order (in US
- funds) for $35.00 + 2.50 shipping/handling to:
-
- Information Age
- Post Office Box 651
- Canton, NC 28716
-
- If you are in North Carolina, don't forget to add 6% sales tax. If you have
- any questions, please call us at (704) 648-8585.
-
- The Lab/Network Version
-
- If you wish to run multiple copies of Disk Sweeper simultaneously in your
- computer lab, you should send in the registration for a Lab/Network License.
- This license will allow you to install up to 10 copies of Disk Sweeper, or
- run Disk Sweeper over a network on up to 10 stations simultaneously. The cost
- in US funds is only $90.00 + 2.50 shipping and handling. You will receive 1
- physical copy of the software and 1 manual. (Additional manuals may be
- purchased for only $7.00 each.)
-
-
-
-
-
-
-
-
- Page 6
- What You Get When You Register
-
- o The latest version of Disk Sweeper.
-
- o An attractive, professionally printed manual.
-
- o Technical Support.
-
- o Announcements of other Information Age products.
-
- o Upgrade pricing on future releases of Disk Sweeper.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 7
- Using CAPTURE and SWEEP
-
- The Disk Sweeper software consists of two programs: CAPTURE.EXE and
- SWEEP.EXE. This section shows you how to run them and use their options.
-
- Command-Line Parameters
-
- When you run either the CAPTURE or SWEEP program, you must specify certain
- parameters. A parameter is a piece of information that must be typed on the
- DOS command line after the program name. For example, if you want to take a
- snapshot of drive C:, you must specify C: as a parameter to the CAPTURE
- program. Heres how you would type it:
-
- CAPTURE C:
-
- Some parameters are optional, and some are required. Optional parameters are
- shown in this section with brackets around them.
-
- Switches
-
- A switch is a special kind of parameter that changes the way a program
- operates. All switches begin with the / character. For example, if you want
- the SWEEP program to scan drive C: only for missing files and directories,
- you would use the following command:
-
- SWEEP C: /MISSING
-
- The /MISSING switch causes the SWEEP program to only look for items that are
- missing from the disk.
-
- Spaces
-
- You must separate all parameters and switches with spaces. If you do not put
- a space in front of each parameter and switch, you will get an error message.
-
- Canceling The Programs
-
- You may cancel either the CAPTURE or SWEEP programs by pressing the Escape
- key.
-
-
- The CAPTURE Program
-
- The CAPTURE program is run from the command line, using the following syntax:
-
- CAPTURE drive: [filename] [/?]
-
- The first parameter, drive:, is the name of the disk drive you want to take
- a snapshot of. The second parameter is optional. It is the name and location
- of the snapshot file that is to be created if the default is not desired.
-
- By default, the snapshot is stored in a file named SNAPSHOT.LST, in the same
-
- Page 8
- location as the CAPTURE program itself. If the capture program is located in
- the root directory of drive A:, the default snapshot file will be
- A:\SNAPSHOT.LST.
-
- There is only one switch available with the CAPTURE program: /? It causes a
- brief help screen to be displayed. (You also get the same help screen by
- running CAPTURE with no parameters and no switches.)
-
- Examples of Using the CAPTURE Program
-
- Here are some examples of different methods of using the CAPTURE program.
- Each example is followed by a brief description of what the command will do.
-
- CAPTURE C:
-
- The snapshot will be taken of drive C:, and stored in the file SNAPSHOT.LST.
- It will be located on the same drive and in the same directory as the CAPTURE
- program itself.
-
- CAPTURE C: A:\MACHINE1.LST
-
- The snapshot will be taken of drive C:, and stored in the file MACHINE1.LST.
- It will be located in the root directory of drive A:.
-
- CAPTURE C: D:\ADMIN\LAB4.LST
-
- The snapshot will be taken of drive C:, and stored in the file LAB4.LST. It
- will be located in the \ADMIN directory of drive D:.
-
- CAPTURE C: A:\
-
- The snapshot will be taken of drive C:, and stored in the file SNAPSHOT.LST.
- It will be located in the root directory of drive A:. Since only the name of
- a directory is given in the second parameter, the filename will be
- SNAPSHOT.LST.
-
- CAPTURE /?
-
- A help screen will be displayed. No snapshot will be taken.
-
-
- The SWEEP Program
-
- The SWEEP program is run from the command line, using the following syntax:
-
- SWEEP drive: [filename] [/DELETE] [/VERIFY] [/ZAP]
- [/EXCLUDE=path] [/MISSING] [/NOMISSING] [/SILENT]
- [/LOGFILE=path] [/P] [/?]
-
- The first parameter, drive:, is the name of the disk drive you want to scan.
- The second parameter is the optional name and location of the snapshot file
- that is to be used. By default, the file SNAPSHOT.LST in the same location as
- the SWEEP program will be used.
- Page 9
- As you can see, there are numerous optional switches that can be used. By
- default, SWEEP simply scans the designated drive and reports to the screen
- any alien files or directories AND any missing files or directories. You may
- alter this by using any of the following switches:
-
- /DELETE
-
- Causes SWEEP to AUTOMATICALLY delete any alien files or directories it finds.
- If the /VERIFY switch is not used, SWEEP will NOT ask for permission before
- it deletes. When SWEEP deletes an alien directory, it also deletes all files
- and subdirectories stored under it.
-
- /VERIFY
-
- Causes SWEEP to automatically ask for permission to delete any alien files or
- directories it finds. (You do not have to specify both /DELETE and /VERIFY.)
- Also, with this switch specified, when SWEEP encounters an alien directory it
- will ask for permission to delete every item stored under it.
-
- /ZAP
-
- Instructs SWEEP to automatically delete all alien files and directories, even
- if they are marked read-only. Without the /ZAP switch specified, SWEEP will
- not delete a read-only file. When used with the /VERIFY switch, SWEEP will
- ask for permission before it deletes anything.
-
- /EXCLUDE=path
-
- The path specifies a directory that is to be excluded when scanning for alien
- items. (The directory will still be scanned for missing items, unless the
- /NOMISSING switch is also specified.) This switch may be used multiple times
- on a single command line, to specify several directories to exclude. There
- cannot be any spaces before or after the equal sign.
-
- If the first character of the path is the @ symbol, the name that follows is
- the path of an indirection file. An indirection file is a text file that
- contains a list of directories to be excluded. See the section on Excluding
- Directories With Indirection Files for more details.
-
- /MISSING
-
- Causes SWEEP to only report missing files and directories. Alien items will
- not be reported.
-
- /NOMISSING
-
- Causes SWEEP to only scan for alien files and directories. Missing items will
- not be reported.
-
- /SILENT
-
- Causes SWEEP to run in silent mode. All screen output is suppressed.
- SHAREWARE NOTIFICATION WILL NOT BE SUPPRESSED IN THE UNREGISTERED VERSION.
- Page 10
- /LOGFILE=path
-
- Path specifies the name and location of a log file. This will cause SWEEP to
- log its activities to the log file, which later can be displayed on the
- screen or printed out. The /SILENT switch has no affect on the log file.
- There cannot be any spaces before or after the equal sign.
-
- /P
-
- Cause SWEEP to pause after it has filled the screen with any scrolling
- output. If a large number of alien or missing items were found, this switch
- will cause the output to pause so you will have time to read it.
-
- /?
-
- Displays a brief help screen. No scanning will take place. (The same help
- screen will be displayed if you run SWEEP with no parameters and no
- switches.)
-
- **********
- NOTE -- ALWAYS BE SURE TO USE THE RIGHT SNAPSHOT FILE WHEN YOU RUN THE SWEEP
- PROGRAM. IF YOU SWEEP A COMPUTERS DISK USING THE WRONG SNAPSHOT FILE, MANY
- FILES AND DIRECTORIES WILL BE INCORRECTLY REPORTED AS BEING ALIEN OR MISSING.
- THIS COULD RESULT IN THE UNINTENTIONAL ERASURE OF FILES AND DIRECTORIES!
- **********
-
- Examples of Using the SWEEP Program
-
- Here are some examples of different methods of using the SWEEP program. Each
- example is followed by a brief description of what the command will do.
-
- SWEEP C:
-
- Drive C: will be scanned. The file SNAPSHOT.LST in the same location as the
- SWEEP program will be used as the snapshot file. If there are any alien files
- or directories, their names will displayed on the screen, but they will not
- be erased. If there are any files or directories missing, their names will be
- displayed on the screen.
-
- SWEEP C: /MISSING
-
- Drive C: will be scanned. The file SNAPSHOT.LST in the same location as the
- SWEEP program will be used as the snapshot file. Alien files and directories
- will NOT be reported. If there are any files or directories missing, their
- names will be displayed on the screen.
-
- SWEEP C: /NOMISSING
-
- Drive C: will be scanned. The file SNAPSHOT.LST in the same location as the
- SWEEP program will be used as the snapshot file. If there are any alien files
- or directories, their names will be displayed on the screen, but they will
- not be erased. Missing files and directories will NOT be reported.
-
- Page 11
- SWEEP C: A:\MACHINE1.LST
-
- Drive C: will be scanned. The file MACHINE1.LST in root directory of drive A:
- will be used as the snapshot file. If there are any alien files or
- directories, their names will be displayed on the screen, but they will not
- be erased. If there are any files or directories missing, their names will be
- displayed on the screen.
-
- SWEEP C: A:\MACHINE1.LST /DELETE
-
- Drive C: will be scanned. The file MACHINE1.LST in root directory of drive A:
- will be used as the snapshot file. If there are any alien files or
- directories, their names will be displayed on the screen AND they will
- automatically be erased, without asking for permission first. (Read-only
- alien files will not be deleted.) If there are any files or directories
- missing, their names will be displayed on the screen.
-
- SWEEP C: A:\MACHINE1.LST /VERIFY
-
- Drive C: will be scanned. The file MACHINE1.LST in root directory of drive A:
- will be used as the snapshot file. If there are any alien files or
- directories, you will be prompted for permission to delete them. (Read-only
- alien files will not be deleted.) If there are any files or directories
- missing, their names will be displayed on the screen.
-
- SWEEP C: A:\LAB4.LST /ZAP
-
- Drive C: will be scanned. The file LAB4.LST in root directory of drive A:
- will be used as the snapshot file. If there are any alien files or
- directories, their names will be displayed on the screen AND they will
- automatically be erased, without asking for permission first. Read-only alien
- files WILL BE DELETED.) If there are any files or directories missing, their
- names will be displayed on the screen.
-
- SWEEP C: D:\PC401.LST /ZAP /VERIFY
-
- Drive C: will be scanned. The file PC401.LST in root directory of drive D:
- will be used as the snapshot file. If there are any alien files or
- directories, you will be prompted for permission to delete them. Read-only
- alien files WILL BE DELETED if you give permission. If there are any files
- or directories missing, their names will be displayed on the screen.
-
- SWEEP C: /DELETE /EXCLUDE=C:\TEMP
-
- All of drive C: except the directory C:\TEMP will be scanned for alien items.
- The file SNAPSHOT.LST located in the same directory as the SWEEP program will
- be used as the snapshot file. If there are any alien files or directories (in
- places other than C:\TEMP), their names will be displayed on the screen AND
- they will automatically be erased. The program will not ask for permission
- first. (Read-only alien files will not be deleted, however.) If there are any
- files or directories missing, their names will be displayed on the screen.
-
-
- Page 12
- SWEEP C: A:\MACHINE1.LST /DELETE /SILENT
-
- Drive C: will be scanned. The file MACHINE1.LST in root directory of drive A:
- will be used as the snapshot file. There will be no screen output while the
- program is running (except in the UNREGISTERED version). If there are any
- alien files or directories found, they will automatically be erased without
- asking for permission first. (Read-only alien files will not be deleted.)
-
- SWEEP C: /DELETE /SILENT /LOGFILE=A:\LOG.TXT
-
- Drive C: will be scanned. The file SNAPSHOT.LST in the same directory as the
- SWEEP program will be used as the snapshot file. There will be no screen
- output while the program is running (except in the UNREGISTERED version). All
- activity of the program will be recorded in the file A:\LOG.TXT. If there are
- any alien files or directories found, they will automatically be erased
- without asking for permission first. (Read-only alien files will not be deleted.)
-
- Excluding Directories
-
- With the /EXCLUDE switch, you can specify the name of a directory that is not
- to be scanned for alien items. Here is an example of its usage:
-
- SWEEP C: /EXCLUDE=C:\WINDOWS
-
- The command above specifies that all of drive C: is to be scanned for alien
- items except the directory C:\WINDOWS. The SWEEP program will not look for
- alien items under this directory. (Missing items will still be
- reported, however.) You may specify multiple /EXCLUDE switches. Here is
- another example:
-
- SWEEP C: /EXCLUDE=C:\WINDOWS /EXCLUDE=C:\TEMP
-
- This command specifies that both the C:\WINDOWS and C:\TEMP directories are
- to be excluded from the scan for alien items.
-
- Excluding Directories With Indirection Files
-
- If you need to exclude several directories, using multiple /EXCLUDE switches
- can be cumbersome. Another approach is to store the names of the directories
- in a text file for the SWEEP program to read. This type of file is called an
- indirection file. An indirection file has the name of a directory on each
- line. You can create the file with any text editor such as DOS's EDIT
- program, or the older EDLIN editor.
-
- Suppose you create an indirection file called SKIP.TXT, which contains the
- following lines:
-
- C:\TEMP
- C:\WORK
- C:\WP\LETTERS
- C:\WINDOWS
-
-
- Page 13
- You can instruct SWEEP to read the file with the following command:
-
- SWEEP C: /EXCLUDE=@SKIP.TXT
-
- The @ symbol indicates that SKIP.TXT is the name of an indirection file.
- SWEEP will skip each of the directories listed in the file when scanning for
- alien items.
-
- Embedding Comments In an Indirection File
-
- You can embed a comment in an indirection file by putting a semi-colon in the
- very first character position of a line. SWEEP will ignore any line
- that begins with the ; symbol. Here is an example of the contents of an
- indirection file with embedded comments:
-
-
- ; This is the indirection file for computer
- ; number 4 in lab number 2.
- C:\STUDENTS
- C:\PROJECTS
-
- Comments mean nothing to the SWEEP program, but they give you the ability to
- put reminders and general information in the file as a means of
- documentation.
-
- Using /EXCLUDE and /MISSING Together
-
- The /EXCLUDE switch will be ignored when used with the /MISSING switch. This
- is because the /MISSING switch causes SWEEP to scan for missing items alone.
- The /EXCLUDE switch only works when SWEEP is scanning for alien items.
-
- Using /SILENT and /VERIFY Together
-
- There is a slight conflict between the /SILENT and /VERIFY switches. The
- /SILENT switch specifies that SWEEP should suppress all screen output, and
- the /VERIFY switch requires that a message be printed on the screen, asking
- for permission to delete a file. If you use these two switches together,
- SWEEP will run silently until it finds an alien file or directory. It will
- then ask for permission to delete the alien item. (Remember, /SILENT does not
- suppress all output in the UNREGISTERED version.)
-
- Other Conflicting Switches
-
- Here are some other conflicting combinations of switches:
-
- /MISSING and /NOMISSING
- /MISSING and /DELETE
- /MISSING and /VERIFY
- /MISSING and /ZAP
-
- If you use any of these switch combinations, SWEEP will print an error
- message.
-
-
- Page 14
- Tutorial
-
- This section provides you with several lessons that will help you get started
- with Disk Sweeper. If you have not installed the software, proceed with the
- installation instructions at this time. Since you are just learning how to
- use this software, it is highly recommended that you have current backups of
- the computers disk.
-
- Lesson 1: Locating Alien Files and Directories
-
- The next few lessons assume that you have installed Disk Sweeper in the
- directory C:\SWEEPER. If this is not the case, substitute the appropriate
- drive letter and path when needed in the following instructions.
-
- Lets begin by taking a snapshot of the disk. If you are not in the \SWEEPER
- directory, enter the following command at the DOS prompt:
-
- CD \SWEEPER
-
- You may now use the CAPTURE program to take a snapshot of the disk by
- entering the following command:
-
- CAPTURE C:
-
- After you have entered the command above, the file SNAPSHOT.LST will be
- created in the C:\SWEEPER directory. You may verify this by entering the
- following command:
-
- DIR
-
- The DIR command will show you a list of the files in the current directory.
- Among them, you should see a listing for the file SNAPSHOT.LST.
-
- If you run the SWEEP program now, you wouldn't expect to find any alien or
- missing files or directories. Go ahead and run SWEEP, just to start getting
- a feel for it. Enter the following command:
-
- SWEEP C:
-
- After the initial copyright message, SWEEP will begin scanning for alien
- files and directories. It should report that it found 0 alien files and 0
- alien directories. It will also scan for missing files and directories, which
- should also be reported as 0.
-
- Lets test the SWEEP program to see how it handles alien files when it finds
- them. You will need to create an alien file for this exercise. You can do so
- by making a copy of any file on the disk. Enter the following command to make
- a copy of the snapshot file:
-
- COPY SNAPSHOT.LST BADFILE.DAT
-
- This command will create a file, BADFILE.DAT, which is a copy of
-
- Page 15
- SNAPSHOT.LST. Since BADFILE.DAT is not in the snapshot, SWEEP should report
- it as an alien file. Run the SWEEP program again:
-
- SWEEP C:
-
- This time C:\SWEEPER\BADFILE.DAT should be reported as an alien file. The
- file was not deleted since you did not specify any of the delete-mode
- switches.
-
- Now lets make an alien directory. Enter the following command:
-
- MD SURPRISE
-
- This will create the new directory C:\SWEEPER\SURPRISE. Now run SWEEP again
- with the following command:
-
- SWEEP C:
-
- This time C:\SWEEPER\BADFILE.DAT should be reported as an alien file and
- C:\SWEEPER\SURPRISE should be reported as an alien directory. Once again,
- neither was deleted because you did not instruct SWEEP to do so. In the next
- lesson we will run SWEEP in one of its delete-modes, which will erase these
- alien items.
-
- Lesson 2: Deleting Alien Files and Directories
-
- Make sure you are in the directory that contains the Disk Sweeper software.
- If you are not, type the following command, and press Enter:
-
- CD \SWEEPER
-
- In this lesson you will see how the SWEEP program can delete the alien file
- and directory that was created in the previous lesson. By default, SWEEP only
- shows you the names of files and directories that are either alien or
- missing. It does not automatically delete alien items. To delete alien items,
- you must run SWEEP in one of its 4 delete-modes. You specify one of the 4
- sets of switches below to run SWEEP in delete-mode:
-
- /DELETE
-
- Automatically delete all alien files and directories that are not read-only.
- The program will NOT ask for permission before deleting.
-
- /VERIFY
-
- Ask for permission before deleting any alien file or directory that is not
- read-only.
-
- /ZAP
-
- Automatically delete all alien files and directories, including alien files
- that are read-only. The program will NOT ask for permission before deleting.
-
- Page 16
- /ZAP and /VERIFY
-
- Ask for permission before deleting any alien file or directory, including any
- alien file that is read-only.
-
- In this lesson you will run SWEEP in verify mode, which means it will ask for
- permission before it deletes any alien file or directory.
-
- Enter the following command:
-
- SWEEP C: /VERIFY
-
- Unless you have made other changes to the contents of your hard drive, SWEEP
- should only find the 1 alien file and 1 alien directory you created in lesson
- 1. The program will prompt you for permission to delete the alien items as it
- finds them. When asked, press the Y key to delete the file and remove the
- directory.
-
- If you had used the /DELETE switch instead of /VERIFY, the SWEEP program
- would have deleted the alien items without asking you for permission first.
-
- Lesson 3: Scanning Only For Missing Files and Directories
-
- Make sure you are in the directory that contains the Disk Sweeper software.
- If you are not, type the following command, and press Enter:
-
- CD \SWEEPER
-
- You may want to run the SWEEP program only to see if any files or directories
- have been deleted. When you run SWEEP with the /MISSING switch, it will not
- look for alien items. Only files and directories that are missing will be
- reported.
-
- To see how SWEEP reports missing items, you will need to create a new file
- and a new directory, and then run the CAPTURE program again to make sure they
- get included in the snapshot file.
-
- First, make a copy of the SNAPSHOT.LST file by entering the following
- command:
-
- COPY SNAPSHOT.LST LESSON3.DAT
-
- The command above created a new file named LESSON3.DAT. It is a copy of
- SNAPSHOT.LST. Next, create a new directory by entering the following command:
-
- MD LEARNING
-
- The command above creates a new directory named LEARNING. You must now make
- a new snapshot file to include the file and directory you just created. Enter
- the following command:
-
-
-
- Page 17 CAPTURE C:
-
- The command above will cause a new snapshot file to be created. The file will
- be called SNAPSHOT.LST, and it will be located in the same directory as the
- SWEEP program.
-
- The object of this lesson is to see how SWEEP behaves when it discovers
- missing files or directories. Delete the file you created by entering the
- following command:
-
- DEL LESSON3.DAT
-
- Now remove the directory you created by entering the following command:
-
- RD LEARNING
-
- You are now ready to scan the disk for missing items. Enter the following
- command:
-
- SWEEP C: /MISSING
-
- The SWEEP program will show you that \SWEEPER\LESSON3.DAT is a missing file
- and \SWEEPER\LEARNING is a missing directory.
-
- Lesson 4: Scanning Only For Alien Files and Directories
-
- Make sure you are in the directory that contains the Disk Sweeper software.
- If you are not, enter the following command:
-
- CD \SWEEPER
-
- If you are not concerned with items that may be missing from your disk, you
- can cause SWEEP to only scan for alien items by using the
- /NOMISSING switch. Enter the following command:
-
- SWEEP C: /NOMISSING
-
- The SWEEP program will scan for alien items, but it will not show the names
- of missing items.
-
- Lesson 5: Excluding a Directory From Being Scanned
-
- Make sure you are in the directory that contains the Disk Sweeper software.
- If you are not, enter the following command:
-
- CD \SWEEPER
-
- You may want one or more directories to be skipped by the SWEEP program, when
- looking for alien items. The /EXCLUDE=path switch causes SWEEP to skip a
- specified directory.
-
- As you did in lesson 1, you will create an alien directory. Enter the
- following command:
- Page 18 MD BADSTUFF
-
- Now run the SWEEP program, but instruct it to skip the BADSTUFF directory.
- Enter the following command:
-
- SWEEP C: /EXCLUDE=BADSTUFF
-
- When SWEEP encounters the BADSTUFF directory, it will only display a message
- on the screen indicating that it is excluding it. If there had been any files
- or any other directories in the BADSTUFF directory, they would have been
- skipped too. (Excluded directories will still be scanned for missing items,
- however, unless the /NOMISSING switch is used.)
-
- Be sure to remove the BADSTUFF directory before you continue. Enter the
- following command:
-
- RD BADSTUFF
-
- Lesson 6: Creating a Log File, and Running in Silent Mode
-
- Make sure you are in the directory that contains the Disk Sweeper software.
- If you are not, enter the following command:
-
- CD \SWEEPER
-
- You will probably want to create a log file when you run SWEEP in silent
- mode. Silent mode causes SWEEP to suppress all screen output. You might want
- SWEEP to run in silent mode if you are calling it from a batch file. The
- following command will invoke SWEEP in silent mode, and cause it to create a
- log file. Enter the following command:
-
- SWEEP C: /SILENT /LOGFILE=LESSON6.LOG
-
- SWEEP will not display any output to the screen (except in the UNREGISTERED
- version). The log file will still be created, however, and it will contain
- all of the results. Look at the contents of the log file by entering the
- following command:
-
- TYPE LESSON6.LOG
-
- Lesson 7: Naming an Alternate Snapshot File
-
- Make sure you are in the directory that contains the Disk Sweeper software.
- If you are not, enter the following command:
-
- CD \SWEEPER
-
- By default, CAPTURE creates a snapshot file in the same directory that
- CAPTURE.EXE resides in, with the name SNAPSHOT.LST. You can specify an
- alternate file or path name, if you desire. Enter the following command:
-
- CAPTURE C: DRIVEC.LST
-
-
- Page 19
- The command you entered specifies that the snapshot file should be named
- DRIVEC.LST. Since you did not specify a full path, the file will be located
- in the current directory (the directory you are currently in). Enter the
- following command to get a directory listing:
-
- DIR
-
- You should see a directory listing for DRIVEC.LST. Invoke the SWEEP program,
- and instruct it to use the snapshot file you just created. Enter the
- following command:
-
- SWEEP C: DRIVEC.LST
-
- This feature of Disk Sweeper would be helpful if you have more than one hard
- drive on your computer, and you want to create a separate snapshot file for
- each one. It could also be used if you are maintaining multiple computers.
- Separate snapshot files with unique names could be created, and stored
- together.
-
- **********
- ALWAYS BE SURE TO USE THE RIGHT SNAPSHOT FILE WHEN YOU RUN THE SWEEP PROGRAM.
- IF YOU SWEEP A COMPUTERS DISK USING THE WRONG SNAPSHOT FILE, MANY FILES AND
- DIRECTORIES WILL BE INCORRECTLY REPORTED AS BEING ALIEN OR MISSING. THIS
- COULD RESULT IN THE UNINTENTIONAL ERASURE OF FILES AND DIRECTORIES!
- **********
-
- Lesson 8: Using Disk Sweeper From a Floppy Diskette
-
- For this lesson you will need a formatted floppy diskette for drive A: of
- your computer.
-
- If you are using Disk Sweeper to help maintain a computer lab, you could
- store all of your snapshot files on a floppy diskette, along with the Disk
- Sweeper software. You could take the diskette to each computer, and run the
- SWEEP program with the appropriate snapshot file.
-
- Make sure you are in the directory that contains the Disk Sweeper software.
- If you are not, enter the following command:
-
- CD \SWEEPER
-
- Insert the formatted floppy diskette into drive A:. Enter the following
- command:
-
- COPY *.* A:
-
- The command above copies all of the Disk Sweeper files to the floppy
- diskette. When the operation is finished, log onto drive A: by entering the
- following command:
-
- A:
-
-
- Page 20
- You can run the CAPTURE program from the floppy diskette. Enter the following
- command:
-
- CAPTURE C:
-
- Since you did not specify a file or path name for the snapshot file, CAPTURE
- will store the snapshot in SNAPSHOT.LST. Since CAPTURE.EXE is on the floppy
- diskette in drive A:, the snapshot file will be stored there as well.
-
- Invoke the SWEEP program by entering the following command:
-
- SWEEP C:
-
- Since you did not specify a snapshot file name, SWEEP will look in the
- directory where SWEEP.EXE resides for SNAPSHOT.LST.
-
- Lesson 9: A Visit To Your Computer Lab
-
- This lesson is intended for persons who are using Disk Sweeper in a computer
- lab. You will need to create a working copy of Disk Sweeper on a floppy
- diskette (as you did in lesson 8). Once you have the software on a diskette,
- take it to your computer lab. You will need to boot up two computers. Insert
- the diskette into drive A: of the first computer. Log onto drive A: by
- entering the following command:
-
- A:
-
- Use the CAPTURE program to make a snapshot of drive C:. You will need to
- store the snapshot in a file other than SNAPSHOT.LST, so enter the following
- command:
-
- CAPTURE C: MACHINE1.LST
-
- The snapshot will be stored in A:\MACHINE1.LST. Now remove the diskette, and
- insert it into drive A: of the second computer. Log onto drive A: by entering
- the following command:
-
- A:
-
- Use the CAPTURE program to make a snapshot of drive C: of this computer.
- Store the snapshot in MACHINE2.LST by entering the following command:
-
- CAPTURE C: MACHINE2.LST
-
- You now have two snapshot files on the diskette: MACHINE1.LST and
- MACHINE2.LST. When you want to san the hard drive of either machine, just
- insert the diskette in drive A:, and run the SWEEP program with the
- appropriate snapshot file.
-
- Remove the diskette from the drive and insert it into drive A: of the first
- computer. Make sure you are logged onto drive A: by entering the following
- command:
-
- Page 21 A:
-
- Now run the SWEEP program with the MACHINE1.LST snapshot file. Enter the
- following command:
-
- SWEEP C: MACHINE1.LST
-
- If there had been any files stored on drive C: since you made the snapshot
- file, they would be listed, as would the names of any missing files or
- directories. You can scan the disk of the second computer by inserting the
- diskette into its drive, and running SWEEP with the MACHINE2.LST snapshot
- file.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 22
- Using Disk Sweeper in a Computer Lab
-
- Basically, there are three different strategies to using Disk Sweeper in a
- computer lab:
-
- A) You can install a copy of Disk Sweeper on each computer in the lab.
-
- B) You can have a single working copy of Disk Sweeper on a floppy
- diskette. You also store the snapshot files for all the computers
- in the lab on this same diskette.
-
- C) You can run Disk Sweeper across a network.
-
- This section will discuss each of these strategies so you can decide which
- you want to adopt.
-
- Installing Individual Copies of Disk Sweeper
-
- The simplest strategy is to install a copy of Disk Sweeper on each computer
- in your lab. Each computer would have its own snapshot file. If you decide to
- do this, you must either register an individual copy of the software for each
- computer, or have a Lab/Network License. The Lab/Network License is very
- inexpensive, and will legally entitle you to run up to 10 copies of the
- software.
-
- You might want to think twice, however, before using this strategy. It might
- be possible for a student to locate the software and tamper with it. The
- snapshot file could become corrupt, or the CAPTURE program could be run while
- alien items are on the disk. Either way, the software would become
- ineffective.
-
- Preparations For Installing Individual Copies on Each Computer
-
- Here are the steps you will need to take if you decide to install a copy of
- Disk Sweeper on each computer in your lab:
-
- 1. Send in your registration for a Lab/Network License, or the
- desired number of individual licenses.
-
- 2. Perform manual housekeeping on each of the computers in your lab. Make
- sure there are no unwanted files or directories on the disk. Also,
- make sure all of the files and directories that are supposed to be on
- the drive are. (This should be the last time you'll have to do manual
- housekeeping.)
-
- 3. Use the installation instructions to install a copy of Disk Sweeper to
- each computer.
-
- 4. Invoke the CAPTURE program to take a snapshot of each computers disk.
-
- Anytime you want to do housekeeping, just run the SWEEP program on each
- computer. Your own experience will help you decide which delete-mode (if any)
- you want to use.
- Page 23
- Running Disk Sweeper From a Floppy Diskette
-
- The least expensive strategy is to have a single working copy of Disk Sweeper
- on a floppy diskette. You also store the snapshot files for each computer on
- the diskette (the files are relatively small, and several should easily fit
- on a diskette). Housekeeping is a simple matter of taking the diskette to
- each computer, and running the SWEEP program with the appropriate snapshot
- file.
-
- Preparations For Running Disk Sweeper From a Floppy Diskette
-
- Here are the steps you will need to take if you decide to run Disk Sweeper
- from a floppy diskette:
-
- 1. Send in your registration.
-
- 2. Perform manual housekeeping on each of the computers in your lab. Make
- sure there are no unwanted files or directories on the disk. Also,
- make sure all of the files and directories that are supposed to be on
- the drive are. (This should be the last time you'll have to do manual
- housekeeping.)
-
- 3. Copy the Disk Sweeper software to a floppy diskette.
-
- 4. Take the diskette to each computer and run the CAPTURE program. You
- will have to save each snap shot with a different file name. Use some
- naming strategy that is easy to remember. For instance, you could name
- the files PC1.LST, PC2.LST, PC3.LST, and so on.
-
- Anytime you want to do housekeeping, just take the diskette to each computer
- and run the SWEEP program (with the appropriate snapshot file). Your own
- experience will help you decide which delete-mode (if any) you want to use.
-
- **********
- ALWAYS BE SURE TO USE THE RIGHT SNAPSHOT FILE WHEN YOU RUN THE SWEEP PROGRAM.
- IF YOU SWEEP A COMPUTERS DISK USING THE WRONG SNAPSHOT FILE, MANY FILES AND
- DIRECTORIES WILL BE INCORRECTLY REPORTED AS BEING ALIEN OR MISSING. THIS
- COULD RESULT IN THE UNINTENTIONAL ERASURE OF FILES AND DIRECTORIES!
- **********
-
- Running Disk Sweeper Across a Network
-
- If you are fortunate enough to have a network in your computer lab, running
- Disk Sweeper will be simple. First, make sure you obtain a Lab/Network
- License. The Lab/Network License is very inexpensive, and will legally
- entitle you to run the software on up to 10 network stations simultaneously.
-
- To implement Disk Sweeper on a network, you install it in a location on the
- file server that each station has access to. You run the CAPTURE and SWEEP
- programs from each station, while the files reside on the server. Make sure
- you limit the access rights to the Disk Sweeper files, however, so only
- responsible parties can use them.
-
- Page 24
- Preparations For Running Disk Sweeper Across a Network
-
- Here are the steps you will need to take if you decide to run Disk Sweeper
- across a network:
-
- 1. Send in your registration for a Lab/Network License.
-
- 2. Install the Disk Sweeper software in a location on the file server
- that each station can access.
-
- 3. Perform manual housekeeping on each of the computers in your lab. Make
- sure there are no unwanted files or directories on the disk. Also,
- make sure all of the files and directories that are supposed to be on
- the drive are. (This should be the last time you'll have to do manual
- housekeeping.)
-
- 4. Log into the network on each computer and run the CAPTURE program. You
- will have to save each snapshot to the server, with a different file
- name. Use some naming strategy that is easy to remember. For instance,
- you could name the files PC1.LST, PC2.LST, PC3.LST, and so on.
-
- Anytime you want to do housekeeping, just log into the network on each
- computer and run the SWEEP program (with the appropriate snapshot file). Your
- own experience will help you decide which delete-mode (if any) you want to
- use.
-
- **********
- ALWAYS BE SURE TO USE THE RIGHT SNAPSHOT FILE WHEN YOU RUN THE SWEEP PROGRAM.
- IF YOU SWEEP A COMPUTERS DISK USING THE WRONG SNAPSHOT FILE, MANY FILES AND
- DIRECTORIES WILL BE INCORRECTLY REPORTED AS BEING ALIEN OR MISSING. THIS
- COULD RESULT IN THE UNINTENTIONAL ERASURE OF FILES AND DIRECTORIES!
- **********
-
- Using the Same Snapshot File on Multiple Computers
-
- If each computer in your lab is set up identically, with the same software,
- same directories, and same files, you can use the same snapshot file for
- each. If there are any differences in the content of any of the hard drives,
- however, you will need to create a separate snapshot file for each computer.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 25
- Other Uses For Disk Sweeper
-
- Disk Sweeper is not only a tool for managing hard drives in a computer lab,
- but it can also be used for software installation management.
-
- Some software packages, like Windows applications, create files on your hard
- drive in various places. If you decide to remove such an application, you
- might not know where all of the files are located. Disk Sweeper can be used
- to create a log of all the files that belong to a particular application.
- Heres how you do it:
-
- 1. Before you install the application, take a snapshot of your disk.
-
- 2. Install the application.
-
- 3. Run the SWEEP program, and use the /LOGFILE=path switch to create a
- log file.
-
- If you decide to remove the application, the log file will show you where all
- of the files are located.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 26
- Messages
-
- This section shows you an alphabetized list of error and informative messages
- that are displayed by the CAPTURE and SWEEP programs.
-
- Messages Displayed by the CAPTURE Program
-
- Cannot open snapshot file
-
- The snapshot file specified cannot be opened. Make sure the path
- specified is correct, and the name is a valid DOS filename.
-
- /EXCLUDE has no effect when used with /MISSING
-
- The /EXCLUDE switch is ignored when used with the /MISSING switch. The
- /EXCLUDE switch only works when scanning for alien items.
-
- Invalid drive designation
-
- You have specified an invalid drive for the CAPTURE program to take a
- snapshot of.
-
- Invalid filename
-
- The snapshot filename you have specified is invalid. Make sure you
- specify a valid DOS filename.
-
- Invalid number of arguments
-
- You have specified an invalid number of parameters and/or switches on
- the command line.
-
- Please specify the name of the drive you wish to take a snapshot of.
-
- You must specify the name of a drive on the command line.
-
-
- Messages Displayed by the SWEEP Program
-
- Cannot open exclude indirection file
-
- The indirection file specified in the /EXCLUDE=path switch cannot be
- opened. Make sure the file exists, and the path specified is correct.
-
-
- Cannot open filename
-
- The snapshot file specified cannot be opened. Make sure the file exists,
- and the path specified is correct.
-
-
-
-
- Page 27
- ** Deleted **
-
- This message appears next to the name of an alien file when it is
- successfully deleted. (Some switches cause the message "Deleting Alien
- File" to be displayed in front of the name of the file.)
-
- ERROR DELETING!
-
- This message will be displayed next to the name of an alien file when an
- attempt to delete the file has failed. This can happen when an alien
- file is READ-ONLY, and the /ZAP switch has not been specified.
-
- ERROR REMOVING!
-
- This message will be displayed next to the name of an alien directory
- when an attempt to remove the directory has failed. This can happen when
- the directory is not empty. This situation most frequently occurs when
- there are READ-ONLY alien files in an alien directory, and the /ZAP
- switch has not been used.
-
- FATAL ERROR: Insufficient Memory
-
- There is not enough memory to run. If you are using the /MISSING switch,
- try running sweep without it.
-
- File is READ-ONLY
-
- This message will be displayed next to the name of an alien file if the
- file has been marked READ-ONLY.
-
- Invalid exclude indirection filename
-
- The indirection filename specified is invalid. Make sure you specify a
- valid DOS filename.
-
- Invalid snapshot filename
-
- The snapshot filename specified is invalid. Make sure you specify a
- valid DOS filename.
-
- Invalid switch
-
- You have specified an invalid switch. Make sure you specify valid
- switches, and place a space in front of each switch.
-
- /MISSING and /DELETE are conflicting switches
- The /MISSING switch specifies that SWEEP should not scan for alien
- items. The /DELETE switch specifies that SWEEP should delete alien
- items. These two switches conflict.
-
-
-
-
- Page 28
- /MISSING and /NOMISSING are conflicting switches
-
- The /MISSING switch specifies that SWEEP should not scan for alien
- items. The /NOMISSING switch specifies that SWEEP should not scan for
- missing items. These two switches conflict.
-
- /MISSING and /VERIFY are conflicting switches
-
- The /MISSING switch specifies that SWEEP should not scan for alien
- items. The /VERIFY switch specifies that SWEEP should delete alien
- items. These two switches conflict.
-
- /MISSING and /ZAP are conflicting switches
-
- The /MISSING switch specifies that SWEEP should not scan for alien
- items. The /VERIFY switch specifies that SWEEP should delete alien
- items. These two switches conflict.
-
- (NOT DELETED)
-
- If you respond with N when asked for permission to delete an alien file,
- this message appears next to the name of the file.
-
- (NOT REMOVED)
-
- If you respond with N when asked for permission to remove an alien
- directory, this message appears next to the name of the directory.
-
- Please specify the name of the drive you want to sweep
-
- You must specify the name of a drive on the command line.
-
- ** Removed **
-
- This message appears next to the name of an alien directory when it is
- successfully removed. (Some switches cause the message "Removing Alien
- Directory" to be displayed in front of the name of the directory.)
-
- Unable to open log file
-
- SWEEP cannot create the log file specified. Make sure you have specified
- a valid DOS filename, and that there is free space on the disk.
-
-
-
-
-
-
-
-
-
-
-
- Page 29
- Technical Support
-
- All registered users of Disk Sweeper may obtain technical support. Please
- have the following information when you contact Information Age:
-
- o The version number of Disk Sweeper you are using.
-
- o The version number of DOS you are using.
-
- o Detailed information about the problem you are having.
-
- If Disk Sweeper is reporting errors, please have the exact error message.
-
- You are encouraged to send questions, suggestions, and comments directly to
- Tony Gaddis, the author of Disk Sweeper. If you have access to FidoNet or the
- Internet, send all messages to him at the following addresses:
-
- FidoNet 1:379/607
- Internet tony.gaddis@f607.n379.z1.fidonet.org
-
- You may contact Information Age directly at the following telephone number:
-
- (704) 648-8585
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 30
- Index
-
- /?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9, 11
- /DELETE . . . . . . . . . . . . . . . . . . . . . .4, 10, 12-14, 16, 17, 28
- /EXCLUDE=path . . . . . . . . . . . . . . . . . . . . . . . . . .10, 18, 27
- /LOGFILE=path . . . . . . . . . . . . . . . . . . . . . . . . . . . .11, 26
- /MISSING. . . . . . . . . . . . . . . . . . . .8, 10, 11, 14, 17, 18, 27-29
- /NOMISSING. . . . . . . . . . . . . . . . . . . . . .10, 11, 14, 18, 19, 29
- /P. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
- /SILENT . . . . . . . . . . . . . . . . . . . . . . . . .10, 11, 13, 14, 19
- /VERIFY . . . . . . . . . . . . . . . . . . . . . 4, 10, 12, 14, 16, 17, 29
- /ZAP. . . . . . . . . . . . . . . . . . . . . 4, 10, 12, 14, 16, 17, 28, 29
- Alien Directories . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
- Alien Files . . . . . . . . . . . . . . . . . . . .3, 10-13, 15, 16, 18, 28
- ATTRIB Command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
- CAPTURE . . . . . . . . . . . . . . . . . 3, 8, 9, 15, 17-19, 21, 23-25, 27
- Comments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14, 30
- Computer Lab. . . . . . . . . . . . . . . . . . . .2, 6, 20, 21, 23, 24, 26
- Conflicting Switches. . . . . . . . . . . . . . . . . . . . . . .14, 28, 29
- Copy-Protected Software . . . . . . . . . . . . . . . . . . . . . . . . . 4
- Copyright . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5, 6, 15
- DOS Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2, 3
- Error . . . . . . . . . . . . . . . . . . . . . . . . . . 8, 14, 27, 28, 30
- Excluding Directories . . . . . . . . . . . . . . . . . . . . . . . .10, 13
- FidoNet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
- Floppy Diskette . . . . . . . . . . . . . . . . . . . . . .1, 4, 20, 21, 24
- Help Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9, 11
- Indirection File. . . . . . . . . . . . . . . . . . . . . . .10, 13, 14, 27
- Installation. . . . . . . . . . . . . . . . . . . . . . . . . 1, 15, 23, 26
- Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
- Log File. . . . . . . . . . . . . . . . . . . . . . . . . 4, 11, 19, 26, 29
- Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27, 30
- Missing Files . . . . . . . . . . . . . . . .2-4, 8, 10, 11, 15, 17, 18, 22
- Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4, 6, 23-25
- Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . .8, 9, 11, 27
- Read-Only . . . . . . . . . . . . . . . . . . .2, 3, 10, 12, 13, 16, 17, 28
- Register. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6, 7, 23
- Silent Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 4, 10, 19
- Snapshot. . . . . . . . . . . . . . . . . . . . . .3, 4, 8, 9, 11-13, 15-28
- SNAPSHOT.LST. . . . . . . . . . . . . . . . . . . . .8, 9, 11-13, 15-19, 21
- Software Installation Management. . . . . . . . . . . . . . . . . . . . .26
- SWEEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3, 4, 8-29
- Switches. . . . . . . . . . . . . . . . . . . . .4, 8-11, 13, 14, 16, 27-29
- System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
- Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . 7, 30
- Trademark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
- Tutorial. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
- Warranty. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
- Windows File Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . 2
-
-
-
-
- Page 31
-