home *** CD-ROM | disk | FTP | other *** search
-
- There are 10 different user profiles that can be used in 3 ways:
-
- When calling systems with the autodialer
- When calling systems with the pointsystem
- Setting up users for the hostmode
-
- ^m╒═══════════╤════════════════════════════════╡^t Users/IEMSI ^m╞╕
- │ │ ^m│
- │^r User 1 ^m│^b■ ^hBo Bendtsen ^m│
- │ ^nUser 2 ^m│ ^hGuest ^m│
- │ ^nUser 3 ^m│ ^hTerminat ^m│
- │ ^nUser 4 ^m│ │
- │ ^nUser 5 ^m│ │
- │ ^nUser 6 ^m│ │
- │ ^nUser 7 ^m│ │
- │ ^nUser 8 ^m│ │
- │ ^nUser 9 ^m│ │
- │ ^nUser 10 ^m│ │
- │ │ │
- │ ^nIEMSI ^m│ ^hOn ^m│
- │ ^nInfo time ^m│ ^h10 ^m│
- │ ^nLocation ^m│ ^hLondon, United Kingdom ^m│
- │ ^nPhone # ^m│ ^h42643827 ^m│
- │ ^nPrg. Pwd ^m│ ^hOff ^m│
- │ ^nBirthday ^m│ ^h02-Apr-1965 29 years old (10818 days) ^m│
- │ ^nSecurity ^m│ │
- │ │ ^n■ Active user ^m│
- ╘═══════════╧═══════════════════════════════════════════════╛^n
-
- ^hEdit user profiles^n
-
- ^m╒═══════════╤═══════════════╤════════════════════════╡^t User profile ^m╞╕
- │ │^r Username ^m│ ^hBo Bendtsen ^m│
- │ ^nUser 1 ^m│ ^nPassword ^m│ ^h...... ^m│
- │ ^nUser 2 ^m│ ^nPrg/host Pwd ^m│ ^m│
- │ ^nUser 3 ^m│ ^nAddress ^m│ ^h2:231/111.9999 ^m│
- │ ^nUser 4 ^m│ ^nComment ^m│ │
- │ ^nUser 5 ^m│ ^nHost settings ^m│ ^m│
- │ ^nUser 6 ^m├───────────────┴────────────────────────────────────────┤
- │ ^nUser 7 ^m│ ^nIEMSI Profile (Interactive Elec. Mail Standard Id.) ^m│
- │ ^nUser 8 ^m├───────────────┬────────────────────────────────────────┤
- │ ^nUser 9 ^m│ ^nHandle ^m│ ^m│
- │ ^nUser 10 ^m│ ^nZmodem 8k ^m│ ^hYes ^m│
- │ ^m│ ^nHot-keys ^m│ ^hYes ^m│
- │ ^nIEMSI ^m│ ^nQuiet ^m│ ^hNo ^m│
- │ ^nInfo time ^m│ ^nPausing ^m│ ^hYes ^m│
- │ ^nLocation ^m│ ^nEditor ^m│ ^hYes ^m│
- │ ^nPhone # ^m│ ^nNews ^m│ ^hYes ^m│
- │ ^nPrg. Pwd ^m│ ^nNew mail ^m│ ^hYes ^m│
- │ │ ^nNew files ^m│ ^hNo ^m│
- │ │ ^nScreen Clr ^m│ ^hYes ^m│
- │ │ ^nAuto chat ^m│ ^hYes ^m│
- ╘═══════════╧═══════════════╧════════════════════════════════════════╛^n
-
- ^hUsername^n
-
- The name of the user to use at logins and to show in the mail session,
- and for a user calling Terminate in hostmode.
-
- ^hPassword^n
-
- Default password to send if no password is defined in the phonebook. Maybe
- you have a lot of places where you use the same password. You may think it
- does not matter, but you will never be sure who uses or abuses your user
- record in other places. If you use random passwords it is almost guaranteed
- that only you, and the persons that have access directly to the hardware
- will know your password, but ONLY ON THAT SYSTEM. If you use the same
- password all over, maybe a person that is angry with you could use it
- to call up and write angry letters to the sysop in your name.
-
- ^hPrg/host Pwd^n
-
- Program password can be asked when starting up Terminate to ensure that
- only you and nobody else uses your machine while you are gone for lunch.
- This password is also used when this person logs into the hostmode.
- Smart people could look inside TERMINAT.CFG so it is advised to also set
- encryption on phonebooks and the configuration file.
-
- ^hAddress^n
-
- The mailer address is explained in point setup - it is used together with
- the mailer system. Remember the address for user 1 is your ^hMAIN ADDRESS^n
-
- ^hComment^n
-
- Any comment you want to remember about this user.
-
- ^hHost settings^n
-
- ^m╒════════════════╤═══════════════╡^t Host settings ^m╞╕
- │ ^nAccess ^m│ ^hSupervisor ^m│
- │ ^nCallback ^m│ ^hNo ^m│
- │ ^nDial prefix ^m│ ^hATDT ^m│
- │ ^nPhone number ^m│ ^m│
- ╘════════════════╧════════════════════════════════╛^n
-
- ^hAccess^n
-
- Either Supervisor or normal. A supervisor has complete access to your
- computer. A normal user only has limited access. More info in hostmode.
- For security reasons a Supervisor must always have a password defined.
- If there is no password defined in ^hPrg/host Pwd^n the Supervisor
- option cannot be turned on.
-
- ^hCallback^n
-
- When a user has callback enabled, Terminate will hangup the line
- and call back the user. If you choose Ask, Terminate will ask online
- which number to call and dial that number.
-
- ^hDial prefix^n
-
- What prefix to use with this callback record
-
- ^hPhone number^n
-
- The number to callback
-
- ^hUser IEMSI settings^n
-
- When you call a system that supports IEMSI logins, you can set these
- parameters before calling the system:
-
- Handle Also known as alias
- Zmodem 8k When logging on with IEMSI and this function is enabled
- then a 'ZAP' flag will also be presented in protocol flags,
- 'ZAP,ZMO,KER' without this enabled only 'ZMO,KER'.
- When receiving the server package Terminate will test for
- the 'ZAP' flag in capabilities and then enable the
- ZedZap (Zmodem 8k) protocol instead of the normal Zmodem.
- At the present time only RemoteAccess 2.00 (release ver.)
- will support this. Then when autodownloading ZedZap will be
- selected. When uploading Terminate will place the menubar
- on ZedZap to inform you that this protocol is needed.
- Hot-keys Use hotkey on the system
- Quiet Turn on/off online messages from other users
- Pausing Turn the MORE Yes/no etc. prompts on/off
- Editor Use fullscreen editor
- News Watch the NEWS bulletins at login
- New mail Search for new mail at login
- New files Search for new files at login
- Screen Clr Allow system to send screen clears
- Auto chat Allow the fullscreen chatter to be used automatically
-
- ^hIEMSI^n
-
- Allow Terminate to try logging on with IEMSI. You can also use a login
- script with the !I parameter if you do not want to globally turn off
- IEMSI logins.
-
- ^hInfo time^n
-
- When a IEMSI connection results, how long you want the information to be
- shown on screen in 1/10 seconds. You can always recall the window by
- pressing Alt-F4.
-
- ^hLocation^n
-
- Your city and country. This will be transferred in the IEMSI and
- EMSI (mail) sessions.
-
- ^hPhone #^n
-
- Your phone number can also be transfered in IEMSI and EMSI sessions.
-
- ^hPrg. Pwd^n (Program password)
-
- Ask for password when starting Terminate. All 10 Prg.Pwd can be used. If
- you forget your password and have set encryption on configuration and
- phonebooks, just delete the configuration file, then the phonebooks will be
- decrypted.
-
- ^hBirthday^n
-
- On many systems that you call for the first time, you will be asked for
- your birth date. This is done for several reasons: to see how old you
- are; to be able of sending you a birthday note or to check if you really
- who you say you are and not someone who has stolen someone else's
- account. Soon, when you log into a new system Terminate will send the
- birthday, so you don't have to type it in yourself everytime you log into
- a new system for the first time.
-
- Please note that this is only supported by a few systems like RemoteAccess.
-
- ^hSecurity^n
-
- Prevent unauthorised users (particularly in corporate and network
- environments) from tampering with approved settings or using
- unauthorised 'phonebooks.
-
- ^m╒═══════════════════╤═══════════╡^t Security ^m╞╕
- │ ^nConfiguration ^m│ │
- │ ^nPhonebook ^m│ │
- │ ^nPoint system ^m│ │
- │ ^nFile manager ^m│ │
- │ ^nScreen blanker ^m│ │
- │ ^nSecurity menu ^m│ │
- │ ^nSystem Searcher ^m│ │
- │ ^nEncrypt logfile ^m│ │
- │ ^nNetwork lock ^m│ │
- ╘═══════════════════╧═══════════════════════╛^n
-
- ^hConfiguration^n
-
- If you enter a password here, then all users will be prompted
- for this password whenever they press Alt-O. Remember that if
- YOU forget this password your entire setup will be lost. You
- must enter a password HERE if you want to protect the following
- menus:
-
- ^hPhonebook^n
-
- Whenever the user wants to use a new phonebook or change anything in
- an existing phonebook this password must be entered.
-
- ^hPoint system^n
-
- When pressing Alt-F7 to enter the point system, this password must be
- known by the user.
-
- ^hFile manager^n
-
- When pressing Alt-F to enter the file manager, this password must be
- known by the user.
-
- ^hScreen blanker^n
-
- If the screen blanker activates, this password must be entered to
- defeat it - for example if you leave your machine for an
- unexpectedly long period.
-
- ^hSystem Searcher^n
-
- Protect the Alt-F8 menu with an extra password
-
- ^hSecurity menu^n
-
- If you want users to have access to the configuration, but not to this
- menu, just enter any password here.
-
- ^hEncrypt logfile^n
-
- ^m╒════════════════════════╤═════════════════════════╡^t Encrypted logfile ^m╞╕
- │ ^nSecondary logfile ^m│ ^hF:\SYSTEM\LOGFILES\T-USER%NET%.LOG ^m│
- │ ^nPassword ^m│ ^hSECRET ^m│
- │ ^nDecrypt/View logfile ^m│ │
- ╘════════════════════════╧══════════════════════════════════════════════╛^n
-
- ^hSecondary logfile^n
-
- If you want to keep an extra logfile of the users activity, you can
- enter the filename in here. If you are on a network like Novell, then
- the user should only have Create/Write access to this directory where
- your extra logfiles are located. When you are using a network with
- several users, you should always have an environment variable for each
- machine with a number like: SET NET=07. This would create a file called
- T-USER07.LOG in F:\SYSTEM\LOGFILES.
-
- ^hPassword^n
-
- If you also want to encrypt this secondary logfile, you can enter
- a password here.
-
- ^hDecrypt/View logfile^n
-
- This extra logfile is written in a database format. If it is encrypted
- the only way to view it is from this menu. Remember to protect at least
- the Security Menu with a password as well.
-
- ^hNetwork lock^n
-
- ^m╒══════╤═════════════════════════════════════════════╡^t Network lock ^m╞╕
- │ ^nLock ^m│ │
- │ ^nEXE ^m│ ^h\\DANBBS\SYS\DANBBS\TERMINAT\TERMINAT.EXE ^m│
- │ ^nKEY ^m│ ^h\\DANBBS\SYS\DANBBS\TERMINAT\TERMINAT.KEY ^m│
- │ ^nCFG ^m│ ^h\\DANBBS\SYS\DANBBS\TERMINAT\TERMINAT.CFG ^m│
- ╘══════╧═════════════════════════════════════════════════════════════╛^n
-
- ^hLock^n
-
- Lock TERMINAT.EXE so it only can be started from a path that you define.
- This is very useful so users cannot move the Terminate files to a local
- drive and change the configuration.
-
- ^hEXE^n
-
- Complete path (or network-path) and filename to TERMINAT.EXE.
-
- ^hKEY^n
-
- Complete path (or network-path) and filename to TERMINAT.KEY.
- With this function you can hide the keyfile anywhere on the network.
- It is suggested that you rename TERMINAT.KEY to a random filename,
- like 'ABCDEFGH.IJK' or simular. Then place this file on a network
- path where the users only have READ access to.
-
- ^hCFG^n
-
- Only allow this configuration file to be used with Terminate.
- If you just want to lock the EXE and KEY, just leave this field
- blank then you still are allowed to use the /C: on the commandline.
- You can also use environment variabels:
-
- SET TERCFG=0001
- \\DANBBS\SYS\DANBBS\TERMINAT\TER-%TERCFG%.CFG
- Would be expanded to
- \\DANBBS\SYS\DANBBS\TERMINAT\TER-0001.CFG
-
- SET TCONFIG=0050
- F:\TERMINAT\TER-%TCONFIG%.CFG
- Would be expanded to
- F:\TERMINAT\TER-0050.CFG
-
-