home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Deutsche Edition 2
/
Deutsche Edition 2.iso
/
mac
/
VIRUS
/
Gatekeeper 1.2.8 ƒ
/
Gatekeeper Introduction.txt
< prev
next >
Wrap
Text File
|
1993-08-17
|
37KB
|
974 lines
Introduction to Gatekeeper
Version 1.2.8
August 1993
Installing Gatekeeper
------------------------------------------------------------------
Gatekeeper will only operate on Macintoshes with the 128K ROMs, or
better. This means that it should work fine with the Macintosh
512Ke, Plus, SE series, II series, Classic, LC and better. In
addition it should only be used with System versions 4.1 or later;
ideally 6.0.4 or later.
To install Gatekeeper youÕll need the following files: Gatekeeper,
Gatekeeper Controls, and Gatekeeper Aid. Where these files are
placed, however, varies depending on the version of the System you
happen to be using. Regardless of the System you are using, though,
you can install Gatekeeper quickly and correctly by following the
steps below.
1. Find your System FolderÕs icon.
2. If the System Folder window is open (the System FolderÕs icon
will appear gray if it is), find and close that window.
3. Select the Gatekeeper, Gatekeeper Aid and Gatekeeper Controls
files and drag them onto your System FolderÕs icon.
4. If youÕre running a System earlier than version 7.0, the
files will be copied and thatÕll be that. If youÕre running
System 7.0 or later an alert will appear and youÕll be told that
the items Òneed to be stored in special places inside the System
FolderÓ Ð just click the OK button in this alert and everything
will happen automatically.
5. Double-check the installation by making sure those items are
in the locations shown in the following diagrams.
6. If youÕve used Gatekeeper 1.2.x on your Mac before, look for
the Gatekeeper Prefs file in either the System Folder or the
Preferences folder. If you find it, throw it away. This will
force Gatekeeper 1.2.8 to create a new Prefs file when you
restart your Mac. The new Prefs file will contain the latest set
of default privilege information, so it is normally preferable
to earlier versions of the file.
System 4.1 to System 6.0.x Gatekeeper Component Locations
[Graphic Omitted]
System 7.x Gatekeeper Component Locations
[Graphic Omitted]
NOTE: Once Gatekeeper is installed and operating it will create two
new files named ÒGatekeeper LogÓ and ÒGatekeeper PrefsÓ. System 7
users will find these files in the Preferences folder, while users
of earlier systems will find them in the System Folder.
Because of the way Gatekeeper Controls was written, you are not
required to place it in the Control Panels folder under System 7.
In fact, you can put it anywhere that happens to be convenient, or
you can even remove it altogether if you are certain you wonÕt need
it to configure Gatekeeper at some later date. In general though,
itÕs best to put it in the Control Panels folder and leave it
there, so that there wonÕt be any question of where to find it when
you need it.
System 6 users do not have the option of relocating the Gatekeeper
Controls file; it must be located in the System Folder for the
Control Panel desk accessory to find it. However, it is possible to
omit the Gatekeeper Controls file, if you are certain you wonÕt
need it to configure Gatekeeper at some later date. Omitting
Gatekeeper Controls is useful when youÕre setting up a facility
like a public access lab in which you donÕt want users changing
GatekeeperÕs configuration.
For the sake of flexibility there are three valid locations for the
Gatekeeper Log and Gatekeeper Prefs files under System 7. They can
be in the Preferences folder, the System Folder, or the same folder
that contains Gatekeeper. Under System 6, however, the choice of
location is limited to the System Folder or the same folder that
contains Gatekeeper (there are a few INITs which make this
distinction relevant).
NOTE: If, after you install Gatekeeper, you do not see the new
Gatekeeper icons (particularly the color icons available under
System 7) you will need to delete all previous versions of
Gatekeeper from your disk(s) and rebuild your Desktop file. This is
done by restarting your Macintosh while holding down both the
command and option keys until menus reappear in the menu bar at the
top of the screen. At this time you can release those keys. You
will soon be asked if you want to Òrebuild the desktopÓ on your
disk(s). Click on the OK button, and the Finder will do the rest
for you. Remember, however, that rebuilding your Desktop file will
remove all the comments attached to your files in the ÒGet InfoÉÓ
dialog Ð other than that, though, itÕs a harmless operation.
Gatekeeper in Principle
------------------------------------------------------------------
Gatekeeper is a program designed to continuously monitor the
operation of your Macintosh, watching for operations that are
commonly carried out by viruses as they attempt to spread. When
Gatekeeper detects an infection attempt it will automatically stop
the attempt, almost before itÕs started.
This type of monitoring and protection is possible because viruses
generally depend on a small group of operations which they use in
somewhat unusual ways. Of course, if detecting virus operations was
really as straightforward as all that, everyone would be doing it.
The fact is thereÕs a catch. Not a big one, but a catch just the
same:
Some perfectly normal programs carry out some of the same basic
operations that viruses do. (For very different reasons, of course.)
Gatekeeper deals with these Òfalse-alarmsÓ by allowing you to tell
it what virus-like operations any given program should be allowed
to carry out. You tell Gatekeeper just once, then forget about it Ð
everythingÕs automatic from then on.
Gatekeeper restricts two basic classes of operations:
1. Operations on information about files that contain programs.
These are known as ÒFileÓ operations.
2. Operations on the components of programs stored within files.
These are known as ÒResourceÓ (usually abbreviated as just
ÒResÓ) operations.
Within each class of operation there are three variants:
1. The file being operated on is the file containing the currently
running program, i.e. the program is operating on itself. This
is known as an operation of type ÒSelf.Ó
2. The file being operated on is the System file. This is known
as an operation of type ÒSystemÓ (usually abbreviated as ÒSysÓ).
3. The file being operated on is some other file, i.e. the program
isnÕt operating on itself (case 1) and it isnÕt operating on the
System file (case 2), either. This is known as an operation of
type ÒOther.Ó
With these two basic classes of virus operations, each of which has
three variants, we get a total of six separate operations for which
Gatekeeper has to watch.
If this doesnÕt mean anything to you, donÕt worry. ItÕs helpful to
understand what these different operations do, but itÕs certainly
not required. Just understand that there are two classes of
operations monitored by Gatekeeper, ÒFileÓ and ÒRes,Ó and that
there are just three variations within those two classes, ÒSelf,Ó
ÒSystemÓ and ÒOther.Ó You donÕt have to memorize this, but itÕs
worth being aware of it.
Gatekeeper in Practice
------------------------------------------------------------------
[Graphic Omitted]
When push comes to shove, this is what Gatekeeper does. It
automatically detects and stops suspicious operations and notifies
you of the event.
This alert tells you what program appears to have been responsible
for the suspicious operation (Kermit), what privilege the program
attempted to violate (Res(System)), and who the intended victim was
(the System file). For the technical and the curious, it also
includes in brackets the name of the actual Toolbox or OS operation
that was blocked (AddResource) and what itÕs immediate intent was
(to add a resource of type ÔnVIRÕ with an ID number of 0 to the
System file).
In this case the operation being stopped was an attempt by the nVIR
virus to implant itself in a MacintoshÕs System file. But what if
you didnÕt know about the nVIR virus? How would you determine
whether or not this was an operation that should have been
permitted?
Unfortunately, thereÕs no perfect method. The first thing to do is
to run John NorstadÕs Disinfectant utility, version 3.2 or later,
to check for known viruses. If Disinfectant gives your Mac a clean
bill of health, youÕre probably safe. If youÕre still not sure
whether or not that operation should have been permitted, there are
a few rules of thumb that take care of most situations, so, when in
doubt, ask yourself the following questions:
Does the program modify, create, install, decode, recover or
restore applications, extensions or control panels? If so, itÕll
need some type of File privilege.
¥ All file manipulation, backup and recovery software will
require File(Other) privileges in order to work properly.
Examples: Finder, DiskFit, Symantec Tools, HFS Recover,
MacTools, Scanner, Floppy Recover, HD TuneUp, File Splitter.
¥ Communications programs, compression utilities, and electronic
mail packages require File(Other) privileges when decoding
downloaded applications and system files.
Examples: Compact Pro, StuffIt, PackIt, BinHex, NCSA Telnet,
XferIt, VersaTerm, MacTerminal, White Knight, AppleLink, etc.
NOTE: Gatekeeper does not require that self extracting archives
(SEAs) created by Compact Pro, StuffIt, Zoom or Disk Doubler have
any privileges in order to operate. These types of SEAs are handled
as special cases internally, so they can be used without privileges
and without worry.
Does the program modify, create, install or delete resources that
contain programs? If so, itÕll need some type of Res privilege.
Some of the most common examples of resources that contain programs
are desk accessories, FKEYs, and HyperCardÕs XCMDs and XFCNs.
¥ Installer and Updater applications almost always require
Res(Other) and/or Res(System) privileges and are likely to
require similar File privileges. However, since these applica-
tions are used infrequently, they shouldnÕt be granted any
privileges. Just turn Gatekeeper off (after using Disinfectant
2.9, or later, to verify that the items to be installed are
free of known viruses) while you perform the installation.
Examples: AppleÕs Installer, PageMaker Installer, TOPS Installer.
¥ Resource manipulation utilities generally need Res(Other)
privileges and will need Res(System) privileges if they are used
to modify the System file. The exact privileges they require
will depend on what you use these utilities for.
Examples: Font/DA Mover, ResEdit, FKey Manager, ResCopier stack,
RMaker, Rez.
¥ Development systems (i.e. programming languages) require
File(Other) and Res(Other) privileges in order to build
virtually all projects.
Examples: THINK C, THINK Pascal and AppleÕs MPW.
If none of these cases seem to fit your situation, or youÕre just
not sure, check with others who might have relevant knowledge Ð
users groups can be good places to find such people.
If none of the programs listed in the examples above sound very
familiar to you, donÕt worry: most programs donÕt need any
privileges.
GatekeeperÕs Division of Labor
------------------------------------------------------------------
There are two crucial components of any Gatekeeper installation;
Gatekeeper and Gatekeeper Aid. Although this document will discuss
Gatekeeper at length, it will hardly mention Gatekeeper Aid,
because it doesnÕt require any configuration. In this section,
though, weÕll take some time out to talk a bit about Gatekeeper Aid
and how it relates to Gatekeeper.
Gatekeeper, as has been discussed above, is a general purpose
anti-virus utility which knows little or nothing about specific
viruses. It stops viruses from operating by carefully monitoring
your Mac and stopping any suspicious behavior that occurs. It has
been remarkably successful in stopping both the viruses that
existed when it was first released and those that have appeared in
the years since then, but no anti-virus system can ever be perfect,
and at least one virus appeared that could get around GatekeeperÕs
protections. ThatÕs why Gatekeeper Aid exists.
Gatekeeper Aid is a utility that searches for and removes families
of known viruses which Gatekeeper either canÕt stop at all, or
canÕt stop completely enough to render harmless. Over time, its
role has been expanded to include some general purpose anti-virus
duties as well as the detection and removal of some viruses that
Gatekeeper can stop successfully, but which also happen to be
easily detected and removed.
Together, Gatekeeper and Gatekeeper Aid form a security system
capable of stopping all known viruses, and one with a proven (if
inevitably imperfect) ability to stop new viruses as they appear.
This is why itÕs crucial to use both products; one or the other
isnÕt enough to provide effective protection.
In spite of this, it is possible to use Gatekeeper Aid independent
of Gatekeeper. Some people use Gatekeeper Aid to augment the
abilities of other anti-virus utilities, like the Disinfectant
INIT. Rest assured that ÕAid still works perfectly well in such
setups.
1 Ð General Section
------------------------------------------------------------------
[Graphic Omitted]
GatekeeperÕs General section is always the first thing youÕll see
when you open Gatekeeper. ItÕll tell you what version of Gatekeeper
youÕre using, but other than that itÕs pretty dull.
The most important thing in this section isnÕt really a part of
this section at all; itÕs the scrolling list of sections which
always appears in the same place at the top of the window. This
list shows you all the other parts of Gatekeeper you can access.
Clicking on a section name in the list takes you to that section.
Keyboard Shortcuts Ð Section List
-------------------------------------------------------
tab Advance to next section.
shift + tab Go back to previous section.
-------------------------------------------------------
2 ÐÊHelp Section
------------------------------------------------------------------
[Graphic Omitted]
The Help section provides a simple quick-reference to GatekeeperÕs
features. It doesnÕt do anything fancy; IÕm afraid thereÕs no
searching or indexing features. However, when used on Macs running
System 6.0 or later, the text is displayed in multiple fonts, sizes
and styles to make the text as easy to navigate as possible. In
particular, major section headings in the help text are set in
Helvetica 18 point bold, so theyÕre easily located as you scroll
through the text.
To view the text properly, make sure that the Times, Helvetica and
Monaco fonts are installed in your System.
If youÕd like to print text from the help display, select the text
with the mouse and then select the ÒCopyÓ item from the ÒEditÓ
menu. You can then paste the text into any word processor and print
it out in any way youÕd like.
Keyboard Shortcuts
-------------------------------------------------------
home Move to top of help text.
end Move to bottom of help text.
page up Move up one Òpage.Ó
page down Move down one Òpage.Ó
option If held down when the Help section
is initially opened, help text is
displayed only in Geneva 9.
-------------------------------------------------------
3 Ð ON/OFF Section
------------------------------------------------------------------
[Graphic Omitted]
The ON/OFF section provides you with the means to turn off
Gatekeeper for up to nearly one hundred hours. ItÕs simple enough;
just click on the big, fancy ON/OFF button. When the button says
OFF in big, bold, red letters, all of GatekeeperÕs protections are
disabled. When the button merely says ON, Gatekeeper is operating
normally, providing your system all the protection it can.
Turn Gatekeeper off when youÕre performing relatively brief tasks
that Gatekeeper would otherwise interfere with. The most common
examples of such tasks are running ÒinstallerÓ programs which
install software of some kind on your system, such as PageMaker or
TOPS.
Remember, Gatekeeper will automatically turn itself on again after
the time limit has expired. (If youÕre looking at the ON/OFF
section at the time, youÕll see that the time remaining counter has
counted-down to 0:00:00.) If the time limit value is too small (or
too large) for your needs, you can change it just by clicking on it
and entering the new value the same way you would if you were
setting the time in the General control panel or the Alarm Clock
desk accessory.
NOTE: Turning off Gatekeeper doesnÕt turn off Gatekeeper Aid. Even
with Gatekeeper off, ÕAid will still remove any known viruses that
it detects. The one thing it will not do is remove suspicious
resources (known as ÒImplied LoadersÓ) when it comes across them.
4 Ð Settings Section
------------------------------------------------------------------
[Graphic Omitted]
The Settings section allows you to define some of the basic ways in
which Gatekeeper operates. Each group of options is discussed
below.
When a Privilege Violation Occurs
---------------------------------
Two radio buttons in this area let you tell Gatekeeper what to do
about suspicious operations it encounters. When the ÒStop the
Operation (Notify & Veto)Ó radio button is selected, Gatekeeper
will stop any suspicious activities it observes. On the other hand,
if the ÒPermit the Operation (Notify Only)Ó radio button is
selected, Gatekeeper will not actually interfere with suspicious
operations; it will merely tell you the operations have occurred.
ItÕs then up to you what you do about them.
Gatekeeper Aid will also respect these settings to some extent Ð
when ÒNotify OnlyÓ mode is chosen, it will refrain from removing
any suspicious resources (known as ÒImplied LoadersÓ) that it may
find. However, even in ÒNotify OnlyÓ mode, ÕAid will still remove
any known viruses it comes across.
When an Important Event Occurs
------------------------------
Two check boxes in this area let you tell Gatekeeper and Gatekeeper
Aid what they should do when they need to get your attention.
Typically, they only need to get your attention when they observe
things like privilege violations, viral infections or other
similarly unusual events. The ÒDisplay an AlertÓ check box tells
Gatekeeper and ÕAid, when they are used with System 6.0 or later,
to display an alert describing the event that occurred and their
response to that event. The ÒRecord it in the Log FileÓ check box
tells them to record a short description of the event in the
Gatekeeper Log file for later review. These two options may be in
used in any combination you find convenient; in practice, however,
itÕs best to keep both options checked.
During Startup
--------------
Two check boxes in this area let you tell Gatekeeper and ÕAid how
to behave when your Mac starts-up. If the ÒShow the Gatekeeper
IconÓ check box is checked, Gatekeeper and Gatekeeper AidÕs icons
will be displayed somewhere along the bottom of your MacÕs display
during startup. Showing icons in this fashion is merely a
convenient way of showing that both items are installed on your
Macintosh. In addition, if either one cannot install itself for
some reason, its icon will be drawn with a large red X over it to
warn you that something went wrong.
The other check box in this area, labeled ÒDisplay a Mode Warning
AlertÓ, allows you to tell Gatekeeper whether or not it should
display a ÒwarningÓ alert after startup to remind you of what mode
it is operating in. Gatekeeper can operate in either Notify Only or
Notify & Veto mode. By default, Gatekeeper displays a warning alert
after startup when it is in Notify Only mode (since it doesnÕt
protect against viruses in that mode), but does not display a
warning alert when in Notify & Veto mode (since that is the mode in
which Gatekeeper normally operates). The ÒDisplay a Mode Warning
AlertÓ check box, however, allows you to change this behavior to
suit your own needs.
5 ÐÊLog Section
------------------------------------------------------------------
[Graphic Omitted]
The Log section allows you to view the contents of GatekeeperÕs log
file if the ÒRecord it in the Log FileÓ option is checked in the
Settings section. The log is a file in which Gatekeeper and
Gatekeeper Aid record all the important events they observe so that
you can review them at a later date.
Each entry in the log file occupies one line of the log display.
Entries for different days are separated by a line which indicates
the day and date on which the entries below it occurred. All other
lines in the display begin with the time at which the event
occurred and are completed by a brief indication of the type of
event that occurred. Important events like privilege violations are
drawn in bold, red text so that you can locate them at a glance.
Startup and Shutdown messages are grouped together by dotted lines
in the left margin of the list so that you easily see when your Mac
has been in use, or has crashed.
To see an explanation of an entry in the log file, select that
entry in the log file display and click on the ÒGet InfoÓ button. A
dialog similar to one of the two on the next page will appear. The
dialog will give you all the available details including the name
of the program responsible for the operation and the name of the
disk that program was stored on at the time.
Double-clicking on an entry, not surprisingly, has the same effect
as selecting an entry and clicking on the ÒGet InfoÓ button.
[Graphic Omitted]
Startup & Shutdown Entries
--------------------------
Normally, the log will contain only ÒStartupÓ and ÒShutdownÓ
entries, which tell you when your Macintosh has been started or
shutdown in GatekeeperÕs presence. These entries are totally
routine, and are recorded only to help you determine when your Mac
has been used and whether it may have been used without Gatekeeper,
thereby leaving it unprotected against possible virus attacks.
HINT: To determine whether your Mac may have been used without
Gatekeeper, look at the difference between the volume write counts
for a Shutdown entry and the Startup entry that appears immediately
after it. If the difference is greater than normal Ð and itÕs up to
you to determine whatÕs normal for your Mac Ð then your Mac
probably has been booted with some other disk. So whatÕs a Òvolume
write countÓ? ItÕs just the number of times any information has
been written to the disk since it was last initialized. Every time
you save a document, for instance, a number of writes are made to
the disk and the volume write count increases accordingly.
Res & File Privilege Violation Entries
--------------------------------------
Occasionally, you may find other entries in the log file, though.
These entries begin with the words ÒResÓ or ÒFileÓ and describe
attempts by programs to exceed the privileges they have been
granted. These entries tell you one of two things: (1) some program
needs additional privileges in order to operate correctly, or (2) a
virus is attempting to spread on your Macintosh and is being
stopped by Gatekeeper. If youÕre not sure which is which, run
Disinfectant 3.2, or later, to see if there are any known viruses
on your Macintosh. If Disinfectant detects a virus in the program
that was guilty of the privilege violation, you know that
Gatekeeper was doing its job properly and stopping a virus from
spreading. If Disinfectant gives your Mac a clean bill of health,
though, itÕs up to you to determine whether the guilty program was
operating normally, or was the victim of a new virus which
Disinfectant cannot detect.
Some rules of thumb that may help you determine what privileges
certain types of programs will require are included in the
ÒGatekeeper in PracticeÓ section of this document. Read through
those rules of thumb and see if any obvious explanations present
themselves.
If youÕre still not sure what to do at this point Ð and thatÕs
highly understandable Ð contact your system administrator for help.
If you donÕt have a system administrator to pick on, or you are a
system administrator and you still canÕt decide how to resolve the
matter, make sure youÕre using the latest version of Disinfectant
and remember that you can always pick on me (the author) Ð see the
Bug Reports section of this document for details.
Granting Privileges from the ÒGet InfoÓ Window
----------------------------------------------
If, on the other hand, you are confident that an entry in the log
file merely indicates that a program needs an additional privilege
in order to operate correctly, you can easily grant that privilege
to the program by clicking on the ÒGrant PrivilegeÓ button in the
ÒGet InfoÓ dialog box for that entry.
After using the Grant Privilege button, you can, if you wish,
switch to the Privileges section where youÕll find that the guilty
program has been automatically selected, and its privileges
displayed, in case you want to make any adjustments (like removing
the version number from the end of the programÕs name).
Other Entries
-------------
A number of other types of entries which are not discussed here may
also be found in the Gatekeeper Log. Selecting them and clicking on
the ÒGet InfoÓ button will give you a brief, and hopefully
informative, explanation of their meanings.
Keyboard Shortcuts
-------------------------------------------------------
home Move to top of log file.
end Move to bottom of log file.
page up Move up one Òpage.Ó
page down Move down one Òpage.Ó
up-arrow Select the previous line.
down-arrow Select the next line.
return Display an explanation of the
selected line. Same as clicking on
the ÒGet InfoÓ button.
enter Same as return.
-------------------------------------------------------
6 Ð Privileges Section
------------------------------------------------------------------
[Graphic Omitted]
The Privilege section is the most important part of Gatekeeper. In
this section you tell Gatekeeper what programs are allowed to
perform operations that would otherwise be considered suspiciously
virus-like. (These operations are known as Òprivileged
operationsÓ.) This information allows Gatekeeper to operate
automatically on behalf of you and others; preventing viruses from
operating successfully while permitting normal programs to work
unhindered.
Gatekeeper is distributed with a large list of common programs
known to require privileges, so that most users will not need to
worry about setting-up any privileges in order to use Gatekeeper on
their Macintosh system.
In order to add a program to the privilege list, you can click on
the ÒAddÉÓ button and select the program using the standard ÒOpenÉÓ
dialog box. Alternately, you can click on the ÒNewÉÓ button and
type in the name of the program directly Ð note that this is often
the only way to grant privileges to desk accessories.
In order to grant privileges to a program, click on the programÕs
name in the privilege list and check the appropriate check-boxes
that will appear at the bottom right side of the Privileges
section. For an explanation of what the various privileges mean,
see the ÒGatekeeper in PrincipleÓ section of this document.
To changed the name of an item in the privilege list, select the
item and click on the ÒEditÉÓ button. A dialog box will appear in
which you can edit the itemÕs name.
Removing an item from the privilege list is easiest of all; just
select the item and click on the ÒClearÓ button.
To keep confusion to a minimum certain changes are made to names as
they are added to the privilege list, so donÕt be surprised if the
name you enter isnÕt exactly the name that actually ends-up in the
privilege list. Invisible characters like control characters are
replaced with spaces. So are colons. Non-breaking spaces are
replaced with conventional spaces. Spaces found at the beginning of
names are always removed, and diacritical marks although they are
preserved, are ignored when the list is searched. These
translations make Gatekeeper good at coping with subtle changes to
program names, and eliminates confusion like that which resulted
when Apple quietly replaced the non-breaking space in DA HandlerÕs
name with a conventional space.
Keyboard Shortcuts
-------------------------------------------------------
home Move to top of privilege list.
end Move to bottom of privilege list.
page up Move up one Òpage.Ó
page down Move down one Òpage.Ó
up-arrow Select the previous line.
down-arrow Select the next line.
type-to-select Typing a name will select the item
most closely matching that name.
return Edit the selected item. Same as
clicking on the ÒEditÉÓ button.
enter Same as return.
command + e Same as return.
delete Delete the selected item. Same as
clicking on the ÒClearÓ button.
backspace Same as delete.
clear Same as delete.
command + n Create a new entry. Same as
clicking on the ÒNewÉÓ button.
command + a Add a new entry. Same as clicking
on the ÒAddÉÓ button.
command + o Same as command + a.
-------------------------------------------------------
System 7.0 does not allow control panels like
Gatekeeper Controls to receive most command key
shortcuts. Consequently, marked shortcuts do not work
in System 7.0 Ð this is not a bug in Gatekeeper.
-------------------------------------------------------
Postcards, Bug Reports, Etc.
------------------------------------------------------------------
I can be reached with questions, suggestions, bug reports (be sure
to note the version number of Gatekeeper and/or Gatekeeper Aid that
you were using), etc. atÉ
US Mail:
--------
Chris Johnson
Gatekeeper
4505-B Avenue H
Austin, TX 78751
USA
Internet:
---------
chrisj@emx.cc.utexas.edu
UUCP:
-----
{husc6|uunet}!cs.utexas.edu!ut-emx!chrisj
AppleLink:
----------
chrisj@emx.cc.utexas.edu@internet#
CompuServe:
-----------
>INTERNET:chrisj@emx.cc.utexas.edu
MCI Mail:
---------
Command: Create
To: Chris Johnson (EMS)
EMS: Internet
MBX: chrisj@emx.cc.utexas.edu
Turnaround time on email messages is usually under 48 hours, if IÕm
not drowning in mail at the time. If I am drowning in mail at the
time (an increasingly common situation in the last few years),
itÕll definitely take longer to get back to you. Turnaround time on
US Mail is approaching five years in many cases. So, if you have
the choice, send email. If you must use US Mail, including a self
addressed stamped envelope just might help to speed up the process.
Éand please send a postcard. (See the Copyright Notice below.)
(Of course, if you use this product and happen to work for Apple
Computer, feel free to convince Apple to contribute a fast
Macintosh computer system of some sort as a way of finally showing
some support for this development effort. ...Not that IÕm holding
my breath.)
Finding the Latest Version
------------------------------------------------------------------
There are several good ways to find the latest version of
Gatekeeper:
1. People with FTP access to the Internet can retrieve the latest
version via anonymous FTP to the microlib/mac/virus directory of
microlib.cc.utexas.edu. Of course, there are many other good
archive sites which should also have current versions at any given
time, but I upload new releases directly into microlib as soon as
theyÕre ready, so I can guarantee that itÕs up to date.
2. If you can send me email, I can usually email the latest version
back to you. Be sure to let me know what version you are currently
using. There can be problems, however. Some services like AppleLink
and CompuServe limit the length of messages their users can receive
to something in the neighborhood of 32K. This means that IÕd have
to split Gatekeeper into more than 12 parts in order to send it via
email (and the recipient would subsequently have to reassemble all
those parts). This is very time consuming, so unless your mail
system will accept messages close to 100K in length, itÕs probably
not a good idea to try to get Gatekeeper via email. Remember to
tell me the maximum message length your system will accept.
3. U.S. Mail is also an option. Send a diskette along with a
self-addressed, stamped envelope (SASE) to the address below.
Unlike correspondence, I am able to periodically catch-up on all
the outstanding update requests, so you really will get your disk
back eventually. Unfortunately, disks sent without a SASE (or a
reasonable facsimile), legible return address, correct postage,
etc. canÕt be returned. I will occasionally replace a bad or
damaged diskette out of my own pocket, but donÕt count on it. In
other words, donÕt send me that old diskette that you found under
the refrigerator last spring. I probably wonÕt be able to format it
successfully, and youÕll always wonder why you didnÕt get your disk
back.
Anyway, the address to send those disks to is:
Chris Johnson
Gatekeeper Update from 1.2.8
4505-B Avenue H
Austin, TX 78751
USA
The ÒGatekeeper UpdateÉÓ line is important, so be sure to
include it. Note that the Òfrom 1.2.8Ó part tells me what version
you are currently using so that I wonÕt make the mistake of sending
you a version which you already have.
Credits
------------------------------------------------------------------
Many thanks to all the Gatekeeper testers. Without their help and
patience Gatekeeper couldnÕt have been made even remotely as
reliable and trouble-free as it is.
Scott R. Anderson
Dale M. Arends
Brian Aslakson
Steve Baumgarten
David A. Belsley
Sunil Bhatla
Thomas R. Blake
James Blieden
Jonathan Brecher
Daniel Buchan
Rick Cardona
Ian Chai
Philippe Chatalic
Brian L. Donnell
Jon Duke
Jim Elliott
Bill Engels
Zbigniew Fiedorowicz
Charette Frederick
Brian Gaines
Peter Galko
David A. Grayson
Ben Goren
Marcus Harvey
Jay Hirsh
Steve Holden
Kirk Holub
Dan Hugo
John Im
David Inman
William G. Innanen
Andrew E. Johnson
Vahe Kassardjian
Kendrick Killian
Edgar Knapp
Dick Kriss
Dave Lee
Masato Ogawa
Doc O'Leary
John Owens
John F. Pane
Peter John Roberts
Clay C. Ross
Nick Rothwell
Robert Rubinoff
Howard Shubs
Larry Simmons
Robert Stewart
Michael Stovsky
Jochen Teufel
Werner Uhrig
Johan van Zanten
Mike Weasner
Jerry Wilcox
Thomas Willett
Ed Wright
Marvin Yount
David R. Zinkin
Sam Zschokke
I would also like to thank all the people around the world who have
sent me problem reports at one time or another. Unfortunately,
thereÕs just no testing ground quite like the real world. There are
too many people to list (and, in fact, too many to keep track of),
but they know who they are. Thanks to all.
Thanks to Ken McLeod for his translation of the original ShowINIT
code into THINK C. ThereÕs only a few lines of his code left in
GatekeeperÕs ShowINIT implementation, but IÕm glad I had that code
to work from. Patrick C. BeardÕs code was also helpful, but none of
it survives into this implementation.
Gatekeeper and Gatekeeper Aid were built with version 5.0.4 of
THINK C.
Copyright ©
------------------------------------------------------------------
Gatekeeper ©1988-1993
Gatekeeper Aid ©1990-1993
by Chris Johnson.
All Rights Reserved.
Gatekeeper and Gatekeeper Aid are free for non commercial public
distribution. This software may not be sold or distributed for
profit, or included with other software or hardware which is sold
or distributed for profit, without the permission of the author.
(CD-ROM publishers are not now, nor have they ever been, an
exception to this rule.)
To put it simply, I donÕt make any money from this software, so
nobody else should either.
While there is no charge for Gatekeeper, I do ask that if you use
this product, you send me a picture postcard from your home town
(or from wherever you happen to be at the time). If thatÕs too much
to ask, find a comparable product with more reasonable terms....