********************* * C O M P S E C * ********************* UNREGISTERED VERSION 2.2 Release Date February 26, 1995. Latin Connection BBS (318) 535-1863 Fort Polk Louisiana Copyright (C) Marcos A. Gonzalez, 1993-1995 All Rights Reserved TABLE of CONTENTS ----------------- LEGALITIES ................................. 1 INTRODUCTION ............................... 1 PROGRAM FILES .............................. 1 INSTALLATION ............................... 2 DOS 6.X USERS .............................. 3 COMPSEC WITH DOS MENU PROGRAMS ............. 3 COMPSEC WITH MS WINDOWS 3.1X ............... 4 FENCRYPT ................................... 5 ENABLE.COM & DISABLE.COM ................... 6 REGISTRATION ............................... 7 REGISTERED USERS ........................... 8 LEGALITIES ---------- This software and accompanying materials are distributed "AS IS" without warranty, express, implied, or statutory, including but not limited to any implied warranties of merchantability and fitness for a particular purpose. In no event shall the author or anyone involved with the creation and production of this product be liable for any direct, indirect, incidental, or consequential damages resulting from the use of this program. Your use of this program constitutes your agreement to this disclaimer and your release of the author from any form of liability or litigation. This copy of COMPSEC is Shareware. INTRODUCTION ------------ COMPSEC.EXE is a small utility that will add password protection to your system. Use it to have exclusive access to your computer or just for those important programs you don't want anybody else in your job or home to use. COMPSEC installs automatically and makes all necessary changes to your AUTOEXEC.BAT file. COMPSEC keeps an activity log each time it is executed. Ideal for use with menu programs or batch files. Additional utilities included are disk and file encryption, utilities to enable and disable disks drives, and boot logger. Your imagination is the limit on how you can use this utilities. PROGRAM FILES ------------- COMPSEC.EXE = This is the password program. When called from the command line or a Batch file, if configured for one user, it asks for the user's password and compares it to the previously saved password. If configured for more than one user, it asks for the user's key, and then compares the input with the previously saved password. If the password is incorrect it sounds and audible alarm and give the user unlimited chances to repeat his or her input. The only way out is entering the correct password. COMPSEC.DOC = Users Manual. This file. PW*.DAT = File(s) containing user(s) password(s). This file(s) are not included with the program. Your password(s) will be saved to the current directory and drive after you run CONFIG.EXE. This file(s) must be in the same directory you run COMPSEC. ENCRYPT.EXE = Utility to encrypt/decrypt floppies. Once a floppy has been encrypted it is unreadable and cannot be decrypted by any other means. Each registered copy of COMPSEC is unique and will not decrypt a floppy that has been encrypted by another copy of COMPSEC. FENCRYPT.EXE = Utility to encrypt/decrypt files. ENABLE.COM/DISABLE.COM = Utility to enable/disable drives. SURFER.EXE = Utility that writes to a log the date and time each time you run it. Use it with batch files or dos menu programs. COMPSEC.LOG = Ascii file containing COMPSEC's activities. Here is how it works. When COMPSEC.EXE is called from a Batch file or the command line, for the very first time it writes the following lines to COMPSEC.LOG: 1 COMPSEC.LOG Not Found New Log Started On February 6 1994. 15:41:11 If PW*.DAT is not found the following message will be written to the log: ÚÄÄÄÄÄÄ[ WARNING ]ÄÄÄÄÄÄÄ¿ ³ PW.DAT Not Found ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Note: At this point the program exits and allows the user to configure COMPSEC. When the correct password is entered the following message is added: Correct Password Entered! A normal log on will look something like this: System Access By Key # 1 On Tuesday 23 August 1994. 15:42:50 Correct Password Entered! If an illegal attempt is made the following lines are added: System Access By Key # 1 On Tuesday 23 August 1994. 15:42:16 ÚÄÄÄÄÄÄ[ WARNING ]ÄÄÄÄÄÄÄ¿ ³ Illegal Attempt Made ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Tuesday 23 August 1994. 15:42:24 Attempted Password ÍÍÍÍÍ SURFER If the attempt is successfull the following message is added: Correct Password Entered! If the user shuts off the computer, but first entered a key number, the log will look like this: (*** Note the line "Correct Password Entered!" is missing***) System Access By Key # 1 On Tuesday 23 August 1994. 15:43:31 This log will grow in size and eventually you'll want to delete it. Simply delete it and Compsec will take care of the rest. A new log will be started automatically. INSTALLATION ------------ At the Dos prompt type INSTALL and hit enter. COMPSEC will ask you for a drive letter and directory name for COMPSEC. To accept default settings just hit enter. All program files will be copied to the selected directory, and your program will be configured. 2 COMPSEC allows a maximum of 9 users (2 Shareware version). Each user will get an individual key number and password. When you enter your passwords follow these simple rules: If you enter the following password --------> COMPSEC When COMPSEC ask for your password type ----> COMPSEC This will be an illegal attempt ------------> compsec ensure you type the exact password. If not you will not be allowed access. This program is case sensitive. 'A' or 'a' is not the same. DOS 6.x USERS ------------- To disable bypassing AUTOEXEC.BAT at boot time (by hitting F5), add the following line to your CONFIG.SYS: SWITCHES /F /N ************************************** COMPSEC WITH DOS MENU PROGRAMS ************************************** Situation #1: You want to password protect the text editor that comes with MS DOS (EDIT.COM). Choice A: Add the following lines to the menu definition file of your dos program: (Most menu programs allow you to use dos commands to access and execute your programs) CD C:\CMP { Change to the directory where COMPSEC.EXE is located } COMPSEC { Run COMPSEC } CD C:\DOS { Change to the directory where the program is located } EDIT { Run the program } -------------------------------------------------------------------------- Choice B: Make a batch file that you will call from your menu program. From the DOS prompt, from the menu program directory, type the following lines. Press enter at the end of each line. Note: Do not type anything enclosed in { }. COPY CON:PROG1.BAT { Dos Command to write whatever you type to this file } @ECHO OFF { Optional. Commands will not be echoed to the screen } CD C:\CMP { Change to the directory where COMPSEC.EXE is located } COMPSEC { Run COMPSEC } CD C:\DOS { Change to the directory where the program is located } EDIT { Run the program } CD\MENU { Return back to the directory from where you started { "MENU" is used as a sample directory } Then press F6 (You'll see: ^Z ) and press enter. This makes a batch file named PROG1.BAT in the current directory. 3 Now you have a batch file named PROG1.BAT. When you type PROG1.BAT from the Dos prompt and press enter all the commands in this batch files will be executed in sequence from top to bottom. But you don't want to do it this way. You want your menu program to "call" this batch file. Add the following line to your menu definition file: CALL PROG1.BAT Make sure the batch file is in the same directory your menu program is located. ************************************ COMPSEC WITH MS WINDOWS 3.1x ************************************ Situation #2: You want to password protect WordPerfect 5.1. Program files are located in the directory C:\WP51 and the PIF (Program Information File) if located in the directory C:\WIN Choice A: The program item is already loaded. 1. First go to C:\WP51 directory and make the batch file you'll need to run the program. CD C:\WP51 < Enter > COPY CON:PROG1.BAT < Enter > @ECHO OFF < Enter > CD C:\CMP < Enter > COMPSEC < Enter > CD C:\WP51 < Enter > WP < Enter > CD C:\WIN < Enter > 2. Press F6 to save the batch file. 1. Start MS WINDOWS 2. From Program Manager open Main Program Group. 3. Open PIF Editor. 4. Select File, Open, and search for the PIF (WP.PIF) on the file window. 5. Double click on WP.PIF (This will open PIF EDITOR-WP.PIF window). 6. Go to Program File and replace "C:\WP51\WP" with "C:\WP\PROG1.BAT" (This is the batch file you made in step #1) 7. Close window and save changes. 8. That's it. Next time you run WordPerfect COMPSEC will be executed and unless you input the right password, you won't be allowed access. This two methods will keep most users from using the password protected programs. It is not 100% secure, because a knowledgeble user will find his or her way around it. If you want a method that is 100% secure try encrypting the program executable with FENCRYPT.EXE (See the section on FENCRYPT.EXE). 4 ******************** FENCRYPT.EXE ******************** Situation #3 You want to encrypt a file or program making it imposible to anybody to access data or use the program. Solution: Use FENCRYPT.EXE This is the most powerful utility in COMPSEC. Once you encrypt a file or program there is no way it can be decrypted unless you use your own FENCRYPT.EXE. On the registered version of COMPSEC, each FENCRYPT.EXE is unique and it will not allow the file or program encrypted to be decrypted by any other copy of FENCRYPT.EXE. FENCRYPT.EXE is very simple to use. The first time you use it on a file it will encrypt it. If the file is already encrypted it will decrypt it. You can use it on program files (.EXE .COM) or any other type of files. There is a few basic rules that you need to take in consideration before you use FENCRYPT.EXE: 1st you need to know that FENCRYPT.EXE , ÷÷÷÷÷÷÷÷.BAT and ÄÄÄV2ÄÄÄ.COM need to be in the same directory with the file you want to encrypt. 2nd you don't want to have FENCRYPT.EXE accesible once you encrypt your file or program because if you do and if a person knows what to look for he or she will use FENCRYPT.EXE and have access to the file or program. Choice A: 1. One way to take care of this is to copy FENCRYPT.EXE, ÷÷÷÷÷÷÷÷.BAT and ÄÄÄV2ÄÄÄ.COM to the directory where the file or the program you want to encrypt is located. 2. Run FENCRYPT and enter the name of the file. The file will be encrypted. 3. Delete FENCRYPT.EXE, ÷÷÷÷÷÷÷÷.BAT and ÄÄÄV2ÄÄÄ.COM. 4. To decrypt the file copy FENCRYPT.EXE, ÷÷÷÷÷÷÷÷.BAT and ÄÄÄV2ÄÄÄ.COM back to the directory where the file or the program you want decrypt is located. 5. Run FENCRYPT and enter the name of the file. The file will be decrypted and ready to be used again. Choice B: 1. Copy the file you wish to encrypt to the directory where COMPSEC and utilities are located. 2. Run FENCRYPT and enter the name of the file. The file will be encrypted. 3. Copy the encrypted file back to its original directory. 4. Instead of deleting FENCRYPT.EXE rename it to something like .EXE. This will prevent most users from using it back to decrypt your file. Since you can't type the '' character from the keyboard. (To do this hold the ALT Key and on the numeric pad type 21 and then release. Instead of 21 you can also use number 1 thru 254). Example: ren FENCRYPT.EXE .EXE 5 ******************************** ENABLE.COM & DISABLE.COM ******************************** Situation #4: You want to disable your disk drives. This way you keep others from transfering information from your computer to a disk. Solution: Use DISABLE.COM with your AUTOEXEC.BAT. To do this load and edit your AUTOEXEC.BAT the following way: 1. Use your favorite text editor or if you have MS DOS 5.0 and higher use EDIT.COM. From the DOS prompt type the following CD\ < Enter > EDIT AUTOEXEC.BAT < Enter > 2. Add the following line at the top of your AUTOEXEC.BAT: (Do not type anything inside { } CD\CMP { Or directory where COMPSEC is located } DISABLE A: { Disable A: drive } DISABLE B: { If you have a B: drive then Disable B: drive } 3. Save your AUTOEXEC.BAT file. 4. Reboot your computer. A and B drive will be disabled. If a person tries to access A or B drive the following message will be displayed: " Invalid drive specification " If you want to access the drives again change to the directory where COMPSEC and utilities are located and type: ENABLE A: < Enter > or ENABLE B: < Enter > REGISTRATION ------------ COMPSEC is distributed under the shareware concept. It can be utilized on a trial basis for not more than thirty (30) days. In the event this software is used beyond the trial period, then the registration fee is required. You are free to distribute the shareware version of COMPSEC provided it remains in its original, unmodified condition and no fee is charged. When you register, you'll get the latest registered version of COMPSEC and utilities. To register send registration form with check or money order for $15.00 US dollars to: Marcos A. Gonzalez 5820 Bradshaw Ct. Apt A Fort Polk, Louisiana 71459 6 REGISTERED USERS ---------------- If you are a registered user of COMPSEC and wish to upgrade to version 2.2, complete and return this form. REGISTRATION NUMBER: _________________________________________________ Check one of the boxes. [ ] I wish to download my copy of COMPSEC from the Latin Connection BBS I understand this upgrade is FREE. (I need the following information to log you into the BBB) NAME: _________________________________________________________ PASSWORD: ______________________________________________________ PHONE # ________________________________________________________ CITY: __________________________________________________________ STATE: _________________________________________________________ DATE OF BIRTH: _________________________________________________ [ ] Mail me my upgrade to the following Address: (Include check or money order payable to MARCOS A. GONZALEZ for $5.00 to cover postage and handling) Select disk size [ ] 3 1/2 [ ] 5 1/4 NAME: ___________________________________________________________ ADDRESS _________________________________________________________ _________________________________________________________ COMMENTS: ___________________________________________________________ ___________________________________________________________ ___________________________________________________________ ___________________________________________________________ ___________________________________________________________ ___________________________________________________________ ___________________________________________________________ 7