home *** CD-ROM | disk | FTP | other *** search
- xlock1-readme.doc 11/1/90
-
- THIS IS XLOCK 1 VERSION 2.14. WE HAVE MADE THE FOLLOWING UPDATES TO THE
- LAST VERSION WHICH WAS VERSION 1.32:
-
- LARGE HARD DRIVE SUPPORT
- LESS SYSTEM OVERHEAD
- NEW FASTER EASIER INSTALLATION
- USER CHOICE OF MONO/COLOR MONITOR
-
- IF YOU EXPERIENCE ANY DIFFICULITES OR HAVE QUESTIONS PLEASE CALL US AT
- 404 475-8787
-
-
- COMMING SOON!!!!!!
-
- WINDOWS 3.0 SUPPORT
- VGA/EGA/MCGA SUPPORT FOR SUSPEND PROGRAM
-
-
-
-
- LICENSE AGREEMENT
-
-
- The X-Lock 1 Product is NOT "Public Domain" and it is NOT "Freeware".
- X-Lock 1 is a copyrighted software product developed and owned by X-Lock
- Corporation, located in Alpharetta, Georgia, U. S. A. X-Lock Corporation,
- grants you without charge the right to reproduce, distribute and use
- copies of this version of our X-Lock 1 shareware software product, subject to
- the limitations specified below, and on the express condition that you do not
- receive any payment, commercial benefit, or other consideration for such
- reproduction or distribution, or change this license agreement or the
- following copyright notice which appears in the software, documentation, user
- interface, menus and magnetic media: (C) Copyright 1988, 1989, 1990
- X-Lock Corporation All rights reserved worldwide.
-
- Limitations: You may make and keep one (1)back-up copy of the software for
- your personal use, provided that (i) you copy all the copyright, trademark,
- and other information indicated on the initial screen display (or on the
- diskette label, for the registered version disk onto your backup diskette
- label, and (ii) you have registered. Also you may distribute copies to other
- persons, but solely for their evaluation (i.e., to decide whether to continue
- using the product and therefore register) and solely for evaluation by such
- other persons during that thirty (30) day period. X-Lock 1 must NOT be sold or
- otherwise provided as part of a larger system, or as a part of a more
- inclusive product or service, without express written consent and licensing
- from X-Lock Corporation.
-
- The rights to receive any such financial or other benefit, and to modify the
- product or employ its components in any kind of derivative work, are reserved
- exclusively by X-Lock Corporation. Support from users enables us to develop
- additional features and future versions of the X-Lock 1.
-
-
- Registered users benefit from enhanced technical support, notice of new
- products, and bulletin board access. To register, please send $30 to:
-
- XLOCK Corporation
- 2001 Westside Parkway Ste. 190
- Alpharetta Georgia 30201 USA
- (404) 475-8787
-
- Please use the enclosed registration form and include software version #.
-
- Xlock Corporation has a wide range of data security and privacy products,
- please see the following page for additional products.
-
-
-
- ┌─────────────────────────────────────────────────────────────────┐
- │ X-Lock Product Familiy │
- ├─────────────────────────────────────────────────────────────────┤
- │ │
- │ Thank you for choosing X-Lock 1 as a privacy system for │
- │ your computer/s. To have a fully functional security │
- │ system you may want to install optional software/hardware. │
- │ A list of our current product line is provided below. │
- │ │
- ├─────────────────────────────────────────────────────────────────┤
- │ │
- │ X-Lock 1 Access Control SHAREWARE privacy system │
- │ Provides access control for │
- │ 1 user │
- │ │
- │ X-Lock 10 Access Control Provides access control for │
- │ 1 system administrator and │
- │ 9 general users │
- │ │
- │ X-Lock 10 Hardware Provides increased security with│
- │ hardware boot protection for │
- │ IBM PC/AT and 100% compatibles │
- │ │
- │ X-Lock 10 PS/2 Hardware Microchannel version of above │
- │ │
- │ Directory Control System Administrator can │
- │ restrict access to specific │
- │ directories to individual users │
- │ │
- │ Program Authentication Guards against computer viruses │
- │ and un-authorized use of │
- │ software │
- │ │
- │ Audit Trail Provides a permament record │
- │ of who has used the PC and │
- │ their activities │
- │ │
- │ DES Encryption Provides a means to encrypt │
- │ your data on a file by file │
- │ basis │
- │ │
- │ X-Lock 50 An NSA approved security system │
- │ for 130 users providing all of │
- │ the above features with the │
- │ added benifit of full disk DES │
- │ hardware encryption on the fly. │
- │ ... for maximum security │
- │ │
- └─────────────────────────────────────────────────────────────────┘
-
- Also, please feel free to contribute your ideas regarding desired additional
- product features and functionality.
-
-
- THIS PRODUCT IS LICENSED "AS IS" WITHOUT ANY WARRANTY OF MERCHANTABILITY OR
- FITNESS FOR A PARTICULAR PURPOSE, PERFORMANCE, OR OTHERWISE; ALL WARRANTIES
- ARE EXPRESSLY DISCLAIMED. BY USING THE X-LOCK 1 PRODUCT, YOU AGREE THAT
- NEITHER X-LOCK CORPORATION NOR ANY OFFICERS, DIRECTORS, EMPLOYEES,
- SHAREHOLDERS, AFFILIATES, OWNERS, OR OTHER RELATED PARTIES WILL BE LIABLE TO
- YOU OR ANY THIRD PARTY FOR ANY USE OF (OR INABILITY TO USE) OR PERFORMANCE OF
- THIS PRODUCT, OR FOR ANY DAMAGES WHATSOEVER WHETHER BASED ON CONTRACT, TORT OR
- OTHERWISE. EVEN IF WE ARE NOTIFIED OF SUCH POSSIBILITY IN ADVANCE. (SOME
- STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL
- DAMAGES, SO THE FOREGOING LIMITATION MAY NOT APPLY TO YOU.)
-
- You may not reverse-engineer, disassemble, modify, decompile or create
- derivative works of the product. You acknowledge that the product includes
- certain trade secrets and confidential information, all of which is the
- copyrighted intellectual property of X-Lock Corporation. X-Lock 1 is a
- registered trademark of X-Lock Corporation. All rights are reserved
- worldwide. IBM, Microchannel, PS/2 and Personal System/2 are registered
- trademarks of the IBM Corporation.
-
-
- RESTRICTED RIGHTS LEGEND
-
- Use, duplication or disclosure by the Government is subject to restrictions as
- set forth in sub paragraph (c) (1) (ii) of the Rights in Technical Data and
- Computer Software clause of DFARS 252.227-7013. X-Lock Corporation,
- 2001 Westside Pkwy, Suite 190, Alpharetta, Georgia 30201. (404) 475-8787
-
- * * * * * * * * * * * * * * * * Installation * * * * * * * * * * * * * * * * *
-
- On the X-LOCK 1 distribution diskette you should have the following files:
-
- README.DOC - documentation (this file)
- 1INSTALL.EXE - install / uninstall program
- PASSWORD.EXE - password change program
- EMERACC.EXE - emergency access program
- LOGON.SYS - security driver
- SUSPEND.COM - suspend utility
- SHOWME.EXE - module version utility
- WHO.EXE - unauthorized logon audit utility
-
- If you downloaded these files from a network or BBS, copy all of them to
- a blank diskette. We will refer to this disk as your "INSTALL diskette".
- The current version of 1install requires that the installation
- be done from this diskette.
-
- Please be sure to make a backup of this diskette.
-
-
- Installation of X-Lock 1 is SIMPLE. There are three(3) steps:
-
- 1. Format a bootable system diskette for use by installation program
- 2. Execute the A:1INSTALL program to install programs
- 3. Execute the PASSWORD program to activate your password
-
-
-
- UN-Installation of X-Lock 1 is also SIMPLE. There is one(1) step:
-
- 1. Execute the A:1INSTALL program to un-install programs
-
-
-
- >>>> NOTE: The XLOCK-1 must be un-installed prior to changing DOS levels
-
-
- * * * * * * * * * * * * * * * Installation - Step One * * * * * * * * * * *
-
- INSTALLATION - STEP ONE
-
-
- First obtain ANOTHER diskette that will fit in your bootable diskette
- drive, (most of the time this is drive a:). Format this diskette with
- the standard DOS command:
-
- FORMAT X:/S
-
- where X is the bootable drive on your PC
-
- This bootable diskette will be used later as the "EMERGENCY ACCESS"
- diskette.
-
- Please label as EMERGENCY ACCESS and which PC it is for.
-
- Please place it aside and re-insert the "INSTALL" diskette.
-
-
- * * * * * * * * * * * * * * * Installation - Step two * * * * * * * * * * *
-
- INSTALLATION - STEP TWO
-
- Next get to the bootable drive prompt, for instance
-
- A:\
-
- Once you see the prompt above invoke the install program
- like this:
-
- 1install <source>: <target>:
-
- where source is your bootable diskette drive and
- target is your bootable hard disk.
-
- Once you have invoked 1install.exe a screen will appear asking you
- if you want to install or un-install. Select "I" to install. A
- menu will now appear with the current status (installed/un-installed)
- of all available X-Lock options. You may select each option by
- pressing the button that represents it. For example if you chose
- to install Access Control you would press the '1' button on your
- keyboard.
-
- NOTE: Access Control MUST be installed prior to any other module.
-
- You will then be prompted to insert the formatted system diskette
- you made earlier. After 1install.exe is finished with the
- "Emergency Access Diskette" you may install additional options (if
- purchased) or quit the program.
-
- You must now re-boot your computer before you can finish installing
- X-LOCK 1. The install program will assist by re-booting for you.
-
- NOTE: YOU MUST REBOOT !
-
- The "Emergency Access" diskette created above can be used
- to obtain "Emergency Access" should you ever get locked out of
- your PC. Keep this disk in a safe place as it can be used to
- circumvent the security system. Also, each emergency access
- diskette is unique to the PC where it was created. DO NOT
- USE AN EMERGENCY ACCESS DISKETTE CREATED ON ONE PC ON ANOTHER
- PC. Use of the emergency access disk on the wrong PC will
- destroy the PC's data, and it will not be recoverable. Each
- PC must have its own unique Emergency Access Diskette. The
- Emergency Access diskettes are not interchangable between PC's.
-
- The procedures for using the Emergency Access diskette are
- described below.
-
- * * * * * * * * * * * * * * Installation - Step three * * * * * * * * * *
-
- INSTALLATION - STEP THREE
-
- cd xlock <enter>
- password <enter>
-
- The password program will obtain your account name and password that
- you create (up to twenty characters). It is advisable to use at
- least eight characters each.
-
- X-Lock 1 is now completely installed. To make it active, the
- computer must now be RE-BOOTED.
-
- THATS IT!!
-
-
-
- NOTE: The PASSWORD.EXE and other utility programs must be executed
- out of the XLOCK subdirectory, or a "PATH=C:\XLOCK" must
- be included in your AUTOEXEC.BAT file.
-
- NOTE: The XLOCK programs require that the XLOCK subdirectory be
- located off of the root directory. Do not attempt to move
- the installed programs to another directory.
-
-
- * * * * * * * * * * * * * * * * * UN-Install * * * * * * * * * * * * * * *
-
- UNINSTALL - STEP ONE
-
- First insert the "INSTALL" diskette into the bootable drive (A).
-
- Next get to the bootable drive prompt, for instance
-
- A:\
-
- Once you see the prompt above Invoke the uninstall program
- like this:
-
- 1install <source> <target>
-
- where source is your bootable diskette drive and
- target is your bootable hard disk.
-
- Once you have invoked 1install.exe a screen will appear asking you
- if you want to install or un-install. Select "U" to uninstall. A
- menu will now appear with the current status (installed/un-installed)
- of all available X-Lock options. You may select each option by
- pressing the button that represents it. For example if you chose to
- install Access Control you would press the '1' button on your
- keyboard.
-
- The uninstall program will now remove the appropriate programs and
- drivers from your computer.
-
- You must now re-boot your computer in order to completely remove
- X-LOCK 1. The uninstall program will assist by re-booting for you.
-
- NOTE: YOU MUST REBOOT !
-
-
- NOTE: DO NOT attempt manually un-install any of the XLOCK files.
-
-
- * * * * * * * * * * * * * * * * EMERGENCY ACCESS * * * * * * * * * * * * *
-
- The "Emergency Access" diskette created during installation can be
- used to obtain "Emergency Access" should you ever get locked out of
- your PC. Keep this disk in a safe place as it can be used to
- circumvent the security system.
-
-
- EMERGENCY ACCESS PROCEDURES
-
- In the unlikely event you are locked out of your PC the Emergency
- Access disk can generally be used to unlock the system. If you are
- unable to unlock your PC after following the Emergency Access
- procedures then contact your dealer or X-Lock Corporation for
- further assistance.
-
- Each emergency access diskette is unique to the PC where it was
- created. DO NOT USE AN EMERGENCY ACCESS DISKETTE CREATED ON ONE PC
- ON ANOTHER PC. Each PC must have its own unique Emergency Access
- Diskette.
-
-
- Follow these steps CAREFULLY:
-
- 1. Locate the "EMERGENCY ACCESS" diskette and "ACCESS CONTROL"
- diskettes that were created in the installation process.
-
- 2. Boot your PC from the A: drive with your Emergency
- Access Diskette and obtain an A:> prompt. Then type
-
- EMERACC xxxxxxxx
-
- Where xxxxxxxx is the key you wrote down
- during the installation process.
-
- While running the EMERACC program you should have seen the
- message
-
- Emergency Disk Recovery Complete
-
- 3. Press any key to continue. The machine will automatically
- reboot and UN-INSTALL all X-LOCK related device drivers and files.
-
- 4. When the machine is finished press "q" to quit. The machine will
- once again reboot.
-
- 5. You are now ready to re-install X-LOCK 1.
-
-
-
- NOTE: THIS "EMERGENCY ACCESS" DISKETTE IS A "FEATURE". IT DOES NOT
- HAVE TO BE USED!!
-
- IF YOU DO NOT WISH TO KEEP THE EMERGENCY ACCESS DISKETTE JUST
- DESTROY IT. OUR TECHNICAL SUPPORT DEPARTMENT IS AVAILABLE TO
- ASSIST THE USER SHOULD THEY GET "LOCKED OUT" OF THEIR SYSTEM.
-
-
-
- * * * * * * * * * * * * * * * * UTILITY PROGRAMS * * * * * * * * * * * * *
-
- The following utility programs are included to enhance your system:
-
- 1) SUSPEND.COM - suspend utility
- 2) SHOWME.EXE - module version utility
- 3) WHO.EXE - unauthorized logon audit utility
-
- These programs are executed from the DOS command prompt.
-
-
- 1) SUSPEND - This program provides a means of securing a machine that
- has been inactive for a pre-determined period of time.
- It also provides a "hot-key" that will secure the machine
- while the operator is away from the computer.
-
- The screen will go blank, depressing any key will display
- the log-on screen.
-
- When the operator returns, a simple log-on will resume
- the operator to the "suspended" program.
-
- Both the time period and the "hot-key" are set as command
- parameters.
-
- Type SUSPEND ? for more information
-
- Note: This program may not work with certain graphic-based
- programs.
-
-
- 2) SHOWME - This program will display the versions of the XLOCK modules.
-
-
- 3) WHO - This program will display all unsuccesfull log-on attempts.
- This will let you know that someone has TRIED to use your
- machine!!
-
- Note: This program will not log attempts made from the
- SUSPEND log-on banner.
-
- Note: This program uses the PC/AT clock and date information.
- Several older PCs do not have real-time-clocks. The
- date stamps therefore will be inaccurate in these
- machines.
-
- The illegal logon attempt will still be logged.
-
-
- NOTE: These utility programs must be executed out of the XLOCK
- subdirectory, or a "PATH=C:\XLOCK" must be included in your
- AUTOEXEC.BAT file.
-
- ┌─────────────────────────────────────────────────────────┬──────────────────
- │User Registration: │YES! I want to
- │ │help support the
- │ │Free Enterprise
- │Name: ___________________________________________________│system. Please
- │ │register me as a
- │Address: ________________________________________________│user of the X-Lock
- │ │family. This
- │Telephone: _____________________ │registration
- │ │entitles me to
- │Product: _______________________ │warranty, manuals,
- │ │update information
- │Serial Number: ________________ │and support.
- │ │
- │Received From: __________________________________________│$30 REGISTRATION FEE
- │ │ $8 X-LOCK T-SHIRT
- │IMPORTANT ! Resale or Export of this equipment from USA │
- │may be subject to control by the U.S. Department of State│METHOD OF PAYMENT
- │ │ MC VISA │
- │YES! I am enclosing an additional $8.00 for an X-LOCK │
- │T-SHIRT (The latest in Security Fashion) │ __________________
- │ │
- │Make Payment to: │ __________________
- │ MAGEE ENTERPRISES INC. │ SIGNATURE/EXP DATE
- │ POST OFFICE BOX 1587 │
- │ NORCROSS, GEORGIA 30091 USA │ CHECK ENCLOSED
- │ │
- │ │
- └─────────────────────────────────────────────────────────┴───────────────────
- end
-