home *** CD-ROM | disk | FTP | other *** search
-
- This is an extract of the PIGAS.DOC file. The text here will explain to you
- how to use the example files of PiGAS SECURITY.
- For your convenience, please print this file, and use the printout while
- running the example.
-
- FIRST TIME RUNNING - A SIMPLE EXAMPLE.
- --------------------------------------
-
-
- Let's try an example which will help you in understanding the main
- features and ideas behind PiGAS SECURITY.
-
- When you installed the PiGAS SECURITY, the installation program built
- the following structures:
-
- c:\pigastst - A new directory
- c:\pigastst\jones.txt - A new file
- c:\pigastst\smith.txt - A new file
- c:\pigastst\smith - A new directory
- c:\pigastst\jones - A new directory
-
- c:\pigastst\demo.doc - The demo documentation.
- c:\pigastst\pigas.doc - The PiGAS SECURITY documentation.
- c:\pigastst\login.exe - The PiGAS SECURITY login program.
- c:\pigastst\logout.exe - The PiGAS SECURITY logout program.
- c:\pigastst\psp.exe - The PiGAS SECURITY configuration program.
- c:\pigastst\register.doc - Our registration file.
- c:\pigastst\vendor.doc - Our distribution policy.
-
-
- You can use the commands DIR and TYPE in order to study this structure.
-
- In our example there are four different users :
-
- 1. You - you are the master user, there is no hidden
- information from you.
-
- 2. Smith - one of the users.
- Smith HAS ACCESS to the following information:
-
- c:\pigastst\demo.doc
- c:\pigastst\pigas.doc
- c:\pigastst\login.exe
- c:\pigastst\logout.exe
- c:\pigastst\psp.exe
- c:\pigastst\smith.txt
- c:\pigastst\smith
- c:\pigastst\register.doc
- c:\pigastst\vendor.doc
-
- Smith HAS NO ACCESS to the following information:
-
- c:\pigastst\jones.txt
- c:\pigastst\jones
-
- 3. Jones - one of the users.
- Jones HAS ACCESS to the following information:
-
- c:\pigastst\demo.doc
- c:\pigastst\pigas.doc
- c:\pigastst\login.exe
- c:\pigastst\logout.exe
- c:\pigastst\psp.exe
- c:\pigastst\jones.txt
- c:\pigastst\jones
- c:\pigastst\register.doc
- c:\pigastst\vendor.doc
-
- Jones HAS NO ACCESS to the following information:
-
- c:\pigastst\smith.txt
- c:\pigastst\smith
-
- 4. Others - Anyone who is trying to use the computer without
- your permission, HAS ACCESS to the following information:
-
- c:\pigastst\demo.doc
- c:\pigastst\pigas.doc
- c:\pigastst\login.exe
- c:\pigastst\logout.exe
- c:\pigastst\psp.exe
- c:\pigastst\register.doc
- c:\pigastst\vendor.doc
-
- and HAS NO ACCESS to the following information:
-
- c:\pigastst\smith.txt
- c:\pigastst\smith
- c:\pigastst\jones.txt
- c:\pigastst\jones
-
-
-
- The install program built the necessary setup for these users and gave
- each user an id and a password as follows:
-
- For you - the user id is master and the password is masterp
- For smith - the user id is smith and the password is 12345678
- For jones - the user id is jones and the password is 87654321
- For others - there is no special setup.
-
- A. First, we will hide all the confidential information.
- Type :
-
- LOGOUT <enter>
-
- Now everybody has access only to:
-
- demo.doc
- pigas.doc
- login.exe
- logout.exe
- psp.exe
- register.doc
- vendor.doc
-
- but no access to:
-
- smith.txt
- smith
- jones.txt
- jones
-
-
- WARNING
- -------
-
- You will not succeed accessing the hidden files and directories,
- even if you try to boot the computer, or use a sophisticated disk
- utility .
-
-
- B. Suppose Smith wants to start a session.
- He will type:
-
- LOGIN <enter>
- >smith 12345678 <enter>
-
- Now Smith has only access to:
-
- demo.doc
- pigas.doc
- login.exe
- logout.exe
- psp.exe
- smith.txt
- smith
- register.doc
- vendor.doc
-
-
- and has no access to the following information:
-
- jones.txt
- jones
-
- Once Smith has finished his work - and before turning off
- the computer - he should type:
-
- LOGOUT <enter>
-
- Again, all the confidential information becomes hidden.
-
- C. Suppose Jones wants to start a session.
- He will type:
-
- LOGIN <enter>
- >jones 87654321 <enter>
-
- Now Jones should have access only to:
-
- demo.doc
- pigas.doc
- login.exe
- logout.exe
- psp.exe
- jones.txt
- jones
- register.doc
- vendor.doc
-
- and not be able to access the following information:
-
- smith.txt
- smith
-
- Once Jones has finished his work - and before turning off
- the computer - he should type:
-
- LOGOUT <enter>
-
- Again, all the confidential information becomes hidden.
-
- C. Suppose that YOU (the master user) want to start a session.
- Type:
-
- LOGIN <enter>
- >master masterp <enter>
-
- You will have access to all the information:
-
- demo.doc
- pigas.doc
- login.exe
- logout.exe
- psp.exe
- jones.txt
- jones
- smith.txt
- smith
- register.doc
- vendor.doc
-
- D. Any other user has no reason for using the Login program.
- If he tries and enters a wrong user id or password, the Login
- program will call the Logout program which will hide all
- confidential information.
-
-
- In this chapter we demonstrated the daily use of the PiGAS SECURITY -
- using the Login and Logout programs in order to start, and end,a session.
- However, the "master user" (you) should also need to know how to create,
- change or delete a user setup. This is done using the PSP program and
- it is explained in the next chapter.
-
- Before continuing, make sure to log in as master by typing:
-
- LOGIN <enter>
- >master masterp <enter>
-
-
- IMPORTANT :
- -----------
-
- All other users cannot use the PSP program.
-