home *** CD-ROM | disk | FTP | other *** search
- SECURE
- Writen by: Juan L. Romero, 1987.
-
- SECURE is a very good security program specially designed for dBASE III,
- dBASE III PLUS or FOXPLUS Data Base Manager.
-
- Being a dBASE III user, programer and consultant I soon had the need to keep
- track of authorized users that had previously being active in the application.
-
- I achieved my idea in designing SECURE from a Mainframe application called
- ROSCOE which if any of you are familiar with, you now how helpful it could
- become at times.
-
- SECURE starts off by using the following files.
-
- USERS.DBF - Contains all authorized user ids' and their password.
- USED.DBF - Keeps track of dBASE III system use by tracking logon attempts
- by issuing a status for that attempt:
- (IN = successfully logged-on)
- (OUT = successfully logged-off)
- (TRY # = logon attempt which after 3 attempts quits dBASE III)
- - Keeps track of the entered ID name or number
- - Keeps track of successfully logged-on system time.
- - Keeps track of successfully logged-off system time and the amount
- of logon time in dBASE III.
-
- SECURE.PRG - Security program.
-
- SECTIMER.PRG - This program is to be merged into which ever menu program you
- currently have installed in your system, just before the step
- where you issue dBASE III to exit to DOS.
- Example:
-
- CASE(option)='X'
- ==> merge sectimer.prg HERE! <==
- QUIT
-
- * This step allows you to keep track of whatever time you user
- logged-off from dBASE III.
-
- SECFILES.MEM - Is a memory file that issues variables the value of your
- USERS.DBF & USED.DBF.
-
-
- ============================= INSTALLATION =================================
-
- 1. Copy SECURE.PRG,USERS.DBF,USED.DBF and SECFILES.MEM to your dBASE III
- current directory.
-
- 2. Enter dBASE III Mode, USE users.dbf
- APPEND
- [Enter your authorized ids & passwords]
- Ctrl-W to Save.
- QUIT
-
- 3. (OPTIONAL, BUT SMART) If you have a file HIDE or UNHIDE utility, I suggest
- that you hide the following files: SECFILES.MEM, USERS.DBF, USED.DBF.
-
- 4. Modify you CONFIG.DB file to contain the following command.
-
- COMMAND = DO SECURE.PRG
-
- 5. Now you must tell SECURE what program you wish to chain or call in
- after a user has successfully signed-on.
-
- Use a true ASCII file editor and modify SECURE.PRG at the following
- line where you see these comments.
-
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- * IMPORTANT Access is allowed,enter file to chain below.*
- * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
- * DO [filename]
- ^ ^
- | |_______ Specify path and file name to chain.
- |____ Remember to Example: DO \db3/main.prg
- remove this *
-
-
-
- BINGO!! SIMPLE AS THAT!!!
-
- From now on your USED.DBF file keeps track of all your users.
-
- ** IF YOU HAVE ANY QUESTIONS OR ANY SUGGESTIONS TOWARDS THIS UTILITY PLEASE
- FEEL FREE TO CONTACT ME, JUAN L. ROMERO AT (201) 863-4959 OR LEAVE ME A
- MESSAGE ON THIS BBS. **
-
- ==============================================================================