home *** CD-ROM | disk | FTP | other *** search
- URGENT.DOC - important information!
-
- It is VERY important that certain files are never found by the users.
-
- For instance, DOSGATE.EXE if executed would attempt to come up in terminal
- emulation mode. This would bypass the operating system and crash the system
- as far as the user was concerned! Keep this file in a place where the user
- WILL NOT STUMBLE across it and DO NOT keep it in a directory specified by
- 'PATH'.
-
- One simple way to protect the system is to use a third party tool call 'CED'.
- It allows one to make "synonyms" to replace any command. Use it to
- map all of the following commands to the supplied program 'SORRY':
-
- DOSGATE = sorry
- DEL = sorry
- ERASE = sorry
- SET = sorry
- FORMAT = sorry
- PROMPT = sorry
-
- The following synonyms may also be created for packet radio operations:
-
- BYE = DISC
- B = DISC
- QUIT = DISC
- D = DISC
-
- Some other synonyms to help the novice DOS user out:
-
- ROOT = CD \
- UP = CD ..
-
- Some synonyms to help with other DOSGATE/DOSMAIL commands:
-
- R = READ
- L = LIST
- S = SEND
- H = HELP
- INFO = HELP
-
- A *SIMPLE* way to keep users from accessing drives that may not be
- available:
-
- A: = SORRY
- B: = SORRY
-
-
- NOTE: CED is a public domain tool that has been included here for your
- convenience. There is NO CHARGE for CED. The documentation for
- CED is in the file CED.DOC.
-
- Also, it would be a good idea to set the hidden attibute on files such as
- AUTOEXEC.BAT
- CONFIG.SYS
-
- and on some directories such as
- MAILSYS
- DOSSYS
-
- This helps to keep users from snooping around in areas that they shouldn't.
- It is not foolproof, and any user who is very familiar with DOS can get
- around these mechanisms. But most users don't know DOS all that well.
-
- You may use other names for the various directories for further protection
- as long as you change all references to those directories in the appropriate
- files.
-