home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Troubleshooting Netware Systems
/
CSTRIAL0196.BIN
/
attach
/
pcc
/
v08n03
/
lockup.exe
/
FAKEDOS1.ZIP
/
FAKEDOS.DOC
< prev
next >
Wrap
Text File
|
1991-12-01
|
7KB
|
143 lines
FakeDoS(c) V1.01
1991
Programmed by M.Ford
an075@freenet-in-a.cwru.edu
PC Security Program
Disclaimer
This program is distributed AS-IS. This program is provided
without warranty of any kind, either expressed or implied, including,
but not limited to, the implied warranties of merchantability and
fitness for any purpose whatsoever. Any damage resulting from use of
this program is the sole responsibility of the user.
The programmer/distributor is not be liable to you for damages,
including any general, special, incidental or consequential damages arising
out of the use or inability to use this program (including but not limited
to loss of data or data being rendered inaccurate or losses sustained by
you or third parties or a failure of the program to operate with any other
programs), even if the holder or any other party has been advised of the
possibility of such damages.
This program may be freely distributed by any means as long as no
fee is charged and all unaltered documentation is included.
The program is placed in the public domain as a service to all users
and to promote the computer sciences and data security.
End of Disclaimer
Basic Description
This password program is different from others!
When this program is used in the autoexec.bat file the user is given an
apparently normal dos prompt on bootup but, the prompt is actually waiting
for the correct password to be typed in. Wait, that is not all.
If the user has not been told that it is a password program then they will
most likely try something like "dir" in which
case the system will give them a directory listing(if you set-up the
configuration to allow it) and if they try "del *.*" the computer will
ask if they want to delete all files(only for *.*) and then access the hard
drive, pause, then put the prompt back up as if the files were deleted.
Of course they are not really gone that is the beauty of this program.
Super-user defined function
The system also has a user-definable function that will allow someone
to use a pc to only run one file. Then they can not delete or change
anything else. This is handy if someone wants to use your word-processor
or play a game but you do not want them looking around too much.
It is also nice protection against children that want to try 'format c:'.
Of course it would not be a good idea to let them use something that
will shell out to command.com because that would be outside the
protection program. A menu program would be a good way
to let someone play several games, if the user selected escape to
dos then program control would return to FakeDos(c).
User Log
Login.lst - ascii log file
The system also keeps a log of users and of what they do.
That is, if you give someone a access to use a single file and
then they try to re-format your hard drive you can look at the
user login file and see what they typed and there will be "format c:"
Of course the program will give them some error like a
"bad track 0" warning to make them think something is wrong.
Level of Security
This program will not deter a determined assault but it will provide
protection against some stupidity, and against an attack by someone
that is not too knowledgeable about computers. At the least it will
confuse someone and the longer it takes them to figure it out the
more likely they are of getting caught.
The passwords are not encrypted but are in an ascii password file
called psswrds.lst . More than one password can be assigned, this
way, if something goes wrong, you can tell who logged in last and when it
was. Higher security did not seem needed because if someone gets in
then it is too late anyway and if you trust someone enough to tell
them the real password then it is probabally not important that they
can see all of the passwords. it would be a good idea to hide the
directory containing the fakedos programs (see your dos manual about ATTRIB).
More than one password can be assigned to identify multiple
users(i.e. just change the prompt in the configuration file to Password:
and user will type in their password) that way no-one has to
know what type of security system you have.
When login file gets too big, use wipelog.com to do automatic system
maintaince. It will clean out the old file and start over with a clean one.
If someone accidentaly (or purposely) deletes login.lst then just run
FakeDoS(c) again and it will recreate the login.lst file.
Fakedos.cfg
The configuration of the system should be changed to suit your
computer and Dos version number, just use an ascii editor on fakedos.cfg
To set the values in configuration file use the following format:
file format is:
line 1 prompt
2 version of OS
3 result of changing to drive a:
4 path displayed to user
5 default user "dir" argument( must include "dir" or be " " or "")
7 Access approval message
8 Number of password attempts user can make before endless looping
9 user definable function, if typed in in same format then will
execute this command from phony prompt, no arguments are allowed
so you may need to use it to call a batch file, but a batch file
can be broken out of so be careful.
A note about passwords:
If you have read this far then you should be interested enough to choose
good passwords. Never use names or dictionary words for passwords(ie words
that can be found in a dictionary). Anyone that knows you and figures out
that you use a password program will try passwords like your name,
your girl/boy friends name, words that describe things that interest you
etcetera. Pick a secure password of at least 6 characters that includes
some numbers and shifted characters. Maximum password length is 80 characters.
Examples of good passwords:
tAll#cool
99MoMs
LatEx@Gloves
Thereoncewasagirlfromfrance,Iforgettherest
They need to be easy to remember but hard to guess, of course if someone
looks over your shoulder with this program they can see it anyway, so you
have to look around before typing in your password.
Birthdays and Social Security numbers are out of the question but this program
doesn't check to see how good your password is, that is left up to you.
If your data is important enough to protect with a password then
the password should be well chosen.
Send comments and bug reports to:
Michael Ford
an075@freenet-in-a.cwru.edu