home *** CD-ROM | disk | FTP | other *** search
- LOCKS.DOC
-
- locks.doc -- this file, general information and registration information.
- mylock.doc -- description for mylock.exe
- mylock2.doc -- description for mylock2.exe
- mylock3.doc -- description for mylock3.exe
- saver.doc -- description for saver.exe
- tsaver.doc -- description for tsaver.exe
-
- Included in this archive file you will find a variety of password programs.
-
- Video Requirements:
-
- Saver requires that you have a video card capable of
- graphics. The Saver program recognizes and uses active video
- modes of VGA, EGA, CGA and Hercules. This program will work
- with a MDA adapter. However, there will be no graphics output
- in MDA mode. Saver has been tested for VGA, CGA, and Hercules
- modes. The program has also been tuned for 386-16Mhz systems
- with VGA graphics. None of the other programs require graphics.
-
- Processor Requirements:
-
- All executeables have been created to run on a 286 or better machine.
- If you need to have executeables for an 8086 machine please note this
- when registering.
-
- If the password is not entered properly in the given number of
- attempts an alarm will sound and an Access Denied message will
- appear on screen. No further access will be allowed to the computer
- until it is rebooted. The speakers in most PC's is loud enough that
- this will draw the attention of office and or security personnel in
- the area.
-
- The programs in this package are good to run when you have to leave your
- workstation for a brief period of time. For instance, you have
- to speak with your manager in his office for a few minutes. Maybe
- you have a daily conference to attend and do not want to power
- cycle your computer.
-
- The mylock2, tsaver and saver programs display some "statistics" when
- the proper password is entered, unlocking the computer. It displays
- the date and time the program was started, the date and time the password
- was verified and the number of "bad keys" that were entered. This information
- can be used to tell you if someone else tried to access the machine,
- "bad keys" is the number of bad passwords. If the start time does not
- correspond to the time that you started the program, then someone may have
- guessed your password and started the program again.
-
- Another noted feature of the programs in this package is that the person
- attempting access can not "break out" of the program by means of
- a control-break or control-c. This is very important.
-
- The password that you choose is also very important.
- Don't pick something simple like your name or the name of someone
- close to you. People are likely to guess these names right away.
- Choose something that is easy for YOU to remember but may appear
- to be nonsense to other people. For example: Kod9109. This
- password may not make much sense to you but to me it says kodiak,
- Kodiak Enterprises officially became a company in 1991 and my birthday is in
- the ninth month. You will also note that the capital case K is significant.
- The password program sees k and K as two distinctly different characters.
- Therefore the following passwords are all different: ab, aB, Ab, AB.
-
- If you decide to use MyLock in your autoexec.bat it would
- be a good idea not to tell other people your password. In most
- situations it is likely that you alone are responsible for the
- equipment and the data stored thereon. So don't tell other people
- your password. What good is a password if everybody knows what
- it is?
-
- You may also want to setup batch files to run the programs from.
-
- When you register the software, you will receive new executeables
- where the "Please register" message will be replaced with a message
- noting that the software is registered to you. It is also possible
- to have defaults changed when you register the software. For example,
- you may want a different prompt or attempts allowed.
-
- It is possible to have a custom version of the software created for you,
- at a negotiated rate. For example some companies may want a header on
- all of the windows with the name of the company. Other companies or
- individuals may want a warning message prepended to the output of the program.
- For example, "Use of this machine by Unauthorized Personnel is Illegal."
-
- This program is distributed under the shareware concept. If you
- continue to use this software you are required to register it
- with Kodiak Enterprises.
-
- Rates are as follows:
-
- License for: Cost:
- 1 $ 35
- 5 $150
- 10 $250
- 11+ $negotiable
- Custom Version $variable
-
- Send your check or money order, or PO to:
-
- Kodiak Enterprises
- Bryan D. Nehl
- 715 Colorado St.
- Manhattan, KS 66502
-
- Please, only checks or money orders made payable to Kodiak Enterprises.
- PO's NET 30 from date of shipment, senders of PO's will be notified when
- the software has been shipped.
-
- *(913) 776-8181 x10
- (913) 776-0210
-
- *internet: kodiak@Kodiakpc.Manhattan.KS.US
- *internet: kodiak%kodiakpc.uucp@phobos.cis.ksu.edu
-
- All software Copyright Kodiak Enterprises
-
- -------------------------- End of File ---------------------------------------
-