













                                S e n t r y
                                ===========
                                    V4.3

                             Instruction Manual

                             Copyright (C) 1996

                             Michael A. Bobbitt
                            NightShade Computing
                          Mike.Bobbitt@AcadiaU.CA
               http://dragon.acadiau.ca/~910318b/Sentry.html




                                S e n t r y
                                ===========
                             Table of Contents

        1.0 Introduction
            1.1  Purpose of Sentry
                 1.1.1 In the Home
                 1.1.2 In a Business Environment
                 1.1.3 In an Educational Environment
                 1.1.4 General
            1.2  Features of Sentry
                 1.2.1 General
                 1.2.2 Expiry Dates
                 1.2.3 Windows
                 1.2.4 File Protection
            1.3  Distribution of Sentry

        2.0 Setup
            2.1  Installing Sentry
            2.2  The Initial Login
            2.3  First Priorities
            2.4  Using the Initialization Settings
            2.5  Uninstalling Sentry

        3.0 Securing Your Computer
            3.1  BIOS Password
            3.2  Boot Sequence
            3.3  SWITCHES in CONFIG.SYS
            3.4  BootKeys in MSDOS.SYS
            3.5  BREAK in CONFIG.SYS
            3.6  Passwords
            3.7  Placement in AUTOEXEC.BAT
            3.8  Keep a Backup

        4.0 Logging In
            4.1  The Login Procedure
            4.2  Changing Passwords

        5.0 The SuperUser Menu
            5.1  The User Maintenance Menu
                 5.1.1  Create User
                 5.1.2  Delete User
                 5.1.3  View Users
                 5.1.4  Toggle SuperUser Status
                 5.1.5  Change Account Exipry Date
                 5.1.6  Change Password Expiry Date
                 5.1.7  Change Account Password
                 5.1.8  Assign Max Invalid Logins
                 5.1.9  Return to SuperUser Menu
            5.2  The Log File Maintenance Menu
                 5.2.1  View Log File
                 5.2.2  View Backup Log File
                 5.2.3  Move Log File to Backup
                 5.2.4  Return to SuperUser Menu
            5.3  Edit Initialization Settings
            5.4  Send a Message to a User
            5.5  Protect a File
            5.6  Export Initialization Settings
            5.7  Exit

        6.0 Using Sentry With Windows
            6.1  General
            6.2  Installation Procedure
            6.3  Windows 95

        7.0 Securing Other Programs
            7.1  General
            7.2  Setup
            7.3  Account Information
            7.4  Using Templates
            7.5  Running a Protected File

        8.0 Creating a new Instance of Sentry

        9.0 Registration
            9.1 General
            9.2 Benefits of Registration

        10.0 The Initialization Settings
             10.1  Location of the Log File
             10.2  Location of the Backup Log File
             10.3  Location of the Message File
             10.4  Minimum Password Length
             10.5  Maximum Password Length
             10.6  Maximum Invalid Tries
             10.7  Wait Time After an Invalid Login
             10.8  Max Log File Size
             10.9  Key to Change Password
             10.10 Password Echo Character
             10.11 Days Until Passwords Expire
             10.12 Days Until Accounts Expire
             10.13 Screen Saver Activation Time
             10.14 Screen Saver Message
             10.15 Login Prompt
             10.16 Password Prompt
             10.17 Wrong Password Message
             10.18 Wrong Login Message
             10.19 Bad Password Length Message
             10.20 Bad Login Length Message
             10.21 Wrong Password Log Message
             10.22 Wrong Login Log Message
             10.23 Bad Password Length Log Message
             10.24 Bad Login Length Log Message
             10.25 Environment Variable
             10.26 Enable Sentry with Windows
             10.27 Show Title
             10.28 Date Format
             10.29 Case Sensitivity
             10.30 Windowed Mode
             10.31 Enable Colour
             10.32 Text Colour
             10.33 Text Background
             10.34 Highlighted Text Colour
             10.35 Highlighted Text Background
             10.36 Maximum Invalid Logins
             10.37 Type Ahead
             10.38 Clear Screen

        11.0 Technical Notes
             11.1  Encoding Algorithm
             11.2  SuperUser Access
             11.3  Files
             11.4  File_id.diz
             11.5  Time / Date
             11.6  Environment Variables
             11.7  Virus Scanners
             11.8  File Deletion
             11.9  General

        12.0 Potential Threats To Security
             12.1  Account Information
             12.2  Hardware Loopholes

        13.0 Troubleshooting
             13.1  Error messages
                   13.1.1  Environment overflow - not modified.
                   13.1.2  Cannot locate environment!
                   13.1.3  Error Reading Data Segment! [Open]
                   13.1.4  Error Reading Data Segment! [Scan]
                   13.1.5  Error in Initialization Settings!
                   13.1.6  Error in creating log file!
                   13.1.7  Error in Account Information.
                   13.1.8  Error opening log file!
                   13.1.9  Error opening backup log file!
                   13.1.10 Error opening temp file!
                   13.1.11 Internal Screen Error. [Reading]
                   13.1.12 Internal Screen Error. [Writing]
                   13.1.13 Out of memory!
                   13.1.14 Registration Error - Program Aborted!
                   13.1.15 This account has expired.
                   13.1.16 Cannot allocate memory for environment block
                   13.1.17 Error Opening Message File.
                   13.1.18 Error Opening System Files!
                   13.1.19 Error opening protected file!
                   13.1.20 Error opening Sentry.ins!
             13.2  Other problems

        14.0 Standard Disclaimer

        15.0 Contact Information

        16.0 Credits

                           ========================






                                S e n t r y
                                ===========
                     Security for the Home and Business





        1.0 Introduction
        ================

        Currently, almost all fields of computer security are growing
        and advancing, with a few notable exceptions. Networks, servers
        and public access systems are all tightening their access to
        avoid potential problems. But what of the non-networked PC? Is
        the information contained on these any less valuable? Often
        times not, yet adequate security programs do not exist for PC's.
        In my search for security, I discovered that PC's were virtually
        ignored, and those programs that did exist were weak and faulty.
        Faced with this situation, I decided to write my own security
        program from scratch, incorporating the tightest security
        measures possible, while allowing flexible, easy use.


        1.1 Purpose of Sentry

        Sentry is meant for one basic purpose only: to keep unwanted
        people out of "private" information. It is flexible enough that
        this single purpose can be used in many different ways, for many
        different reasons. Here are just a few.

        1.1.1 In the Home

        Most people have something on their home PC that they consider
        to be "sensitive". Maybe it's a private letter, maybe it's
        copies of e-mail, or maybe it's financial information. Or quite
        possibly, you just want a way to keep track of who is using your
        system. Sentry has the solution for all of these problems, by
        restricting access and logging all attempts to use the system.

        Alternatively, sometimes you just want to keep people out,
        period. It could be your nosy room mate, your little brother, or
        your boss at work. In any case, Sentry will keep them out, while
        letting a select group of people in.

        1.1.2 In a Business Environment

        Businesses will find Sentry valuable to guard against
        unauthorized access to PC's. With Sentry, you can leave your
        terminals unattended, knowing that the information held on them
        is secure. Many businesses have cleaners or other independent
        contractors come in during silent hours. A lot of businesses
        have PC's in open areas where a "passer-by" could use them. Most
        terminals are left unattended for a portion of the day (lunch,
        during errands, during meetings, etc.). There's no guarantee
        that an unauthorized person won't attempt to use your PC's when
        you're not around.

        For businesses that work in groups, Sentry is useful for keeping
        track of who used the PC's and when. Supervisors could have
        SuperUser access on all PC's in their group, allowing them to
        manage and control access as required. Also, the log that Sentry
        keeps could be a valuable tool in determining who was doing
        what, and when.

        1.1.3 In an Educational Environment

        Schools and educational institutes will find Sentry useful for
        limiting access to certain terminals. If, for example, only a
        select group of people (staff, administrators, or a certain
        class) should have access to specific PC's, simply give each
        person an account. Anyone without an account cannot log in.
        Sentry will also help track usage, attempted break-ins, and any
        other suspicious activity.

        Often school terminals are left unattended, with nothing to stop
        a student from "poking around." Sentry can act as protection
        from the prying eyes of the student body.

        1.1.4 General

        You may not need to use Sentry on your system. You might never
        have a security problem to worry about. But the truth is that
        Security isn't something to take a chance on. It is a serious
        problem in today's computing society, and many legitimate users
        find themselves helpless or confused about the real issues. It
        is a shame that the immoral few have ruined it for the rest, but
        we cannot let them get in the way of our daily business. With
        the proper tools and knowledge, we can fight back by closing up
        the common loopholes that attackers use.


        1.2 Features of Sentry

        1.2.1 General

        Sentry will allow you to set up accounts on your computer, one
        account for each person you want to have access. If someone
        doesn't have an account, they don't get in. It's that simple.
        Each person has their own account, with their own password,
        making it easy to track who logs in and when. Since Sentry
        doesn't use a "master access" password, you can wipe a single
        users account without affecting any other users.

        Sentry records each login attempt in a log file which can be
        viewed by the SuperUser at any time.

        1.2.2 Expiry Dates

        You can set accounts to expire on a certain date, effectively
        barring access to the specified user after that. For example, if
        you know that Joe will be leaving on April 14th, you can set his
        account to expire on April 15th. That means you don't have to
        remember to delete his account on the 15th... It will expire on
        it's own, and you can delete it whenever you remember.

        You can also set expiry dates for passwords, meaning that a user
        will have to enter a new password once his old one has expired.
        In addition, you can set the period of time that new passwords
        are good for.

        1.2.3 Windows

        Sentry can be used in conjunction with Windows to make it a
        more secure environment. You can protect your MS-DOS icon so
        that only users with an account can drop to DOS. In addition,
        you can tailor the way Windows operates to allow more protection
        from accidental deletion or modification of important items.

        1.2.4 File Protection

        In addition to securing your PC, Sentry can secure individual
        files. If you have a program that you need to keep on your hard
        drive, but you want to restrict who uses it, you can simply
        protect that file with Sentry. A good example of this is the
        FORMAT program. This is a useful command, however you probably
        don't want it available to the masses. The solution? Protect it
        with Sentry. Once protected, only those people you designate
        will be able to execute the program.


        1.3 Distribution of Sentry

        Sentry is a copywritten piece of work, however distribution of
        the ShareWare version is allowed and encouraged. The only
        stipulation is that it must be unmodified, and must contain all
        of the original files (and no others). Essentially, the
        SentryXX.zip file you initially received is the only format that
        Sentry is distributable in.

        DO NOT distribute any registered versions whatsoever. (By
        distributing a registered version, you are giving out copies of
        a specific encoding scheme, which can be used against the
        registered user - and only the registered user!)


        2.0 Setup
        =========

        Since you are reading this, I can safely assume you have
        unzipped Sentry. Along with that, I will also assume that you
        have created a directory for Sentry, and that all Sentry files
        are currently in it. (If this is not true, do it now). You may
        want to read the section entitled "Creating a new Instance of
        Sentry" below.


        2.1 Installing Sentry

        The very first thing you should do is make sure you keep a copy
        of all the Sentry files somewhere safe. Copying them to a floppy
        disk and storing it is a good idea.

        From here, installation is relatively simple. Just run the
        program called INSTALL.EXE. You will now be asked for the
        directory you wish to install to. If it the current directory,
        you can simply enter a period (.) at this prompt. If you enter
        another directory, the files will be copied to that new
        directory, but not deleted from the current one. (You must do
        that yourself).

        If you have previously exported your initialization settings,
        they will be detected now, and you will be asked if you wish to
        use them.

        If there are no exported settings, the install program will
        automatically search to see if your copy of Sentry already has
        initialization settings. If it does, you will be asked if you
        wish to over-write them. Enter 'y' if you wish to overwrite
        them. If you do not already have initialization settings, the
        install program will automatically use the default settings.

        Next you will be asked if you wish to update your system files.
        If you answer 'y' then your AUTOEXEC.BAT, CONFIG.SYS and
        MSDOS.SYS (for Windows 95 only) will be backed up and modified.
        This action will cause Sentry to run automatically the next time
        your computer reboots.

        Finally, you will be asked if you wish to use Sentry with
        Windows. If you answer 'y' then you will be asked for the path
        to your windows directory. You will also be asked a series of
        questions about general Windows security. The options you select
        will automatically be set within windows. If you wish to re-set
        any options, simply run the install program again.

        Please note that the install program deletes itself after
        running. This is so it cannot be run by a regular user to gain
        access or over-write settings. Make sure you keep a backup of
        the install program in case you need it.


        2.2 The Initial Login

        Now the next thing you must do is to change the password and
        login provided with the initial copy of Sentry. To do this, you
        must run the Sentry.exe program. If it displays an error
        message, check the troubleshooting section at the end of this
        file.

        When it asks for a login, use "Sentry", with the password
        "Sentry". You can turn case sensitivity off via the
        initialization settings, but only for logins. The password must
        be entered exactly as shown (sentry or SENTRY will not work).
        The Sentry account has SuperUser access, meaning you can create
        and delete accounts while logged in as Sentry. To log in as a
        SuperUser, enter Sentry for a login, and instead of pressing
        enter, hold down the CTRL key and press enter. This tells the
        Sentry program that you want to log in as a SuperUser. Then
        enter your password normally, and instead of dropping to DOS,
        you will go to the SuperUser menu. (See the section below on
        "The SuperUser Menu" for more information).

        From here, you should create a new user (you) and grant yourself
        SuperUser access. You can do this during creation by holding the
        CTRL key while pressing enter after typing your login name. You
        can also do this by using the "Create User" option normally and
        then using the "Toggle SuperUser Access" menu option to give
        yourself SuperUser privileges.


        2.3 First Priorities

        Once you have your account set up, you should delete the Sentry
        account, so nobody else can use it. This is very important as a
        potential intruder will probably try to enter through the
        default Sentry account first. (If you delete it, that closes the
        loophole).

        Sentry will not let you delete the last SuperUser, so you must
        create a new user with SuperUser access before deleting the
        Sentry account.

        From here, you can create the other users of your system, and
        define their starting passwords, expiry dates and access rights.
        See the section below on "The SuperUser Menu" for more
        information.


        2.4 Using the Initialization Settings

        Sentry can be configured to your needs by way of the
        initialization settings. These settings contain information that
        you may wish to change, allowing Sentry to adapt to many
        different situations.

        You can edit the initialization settings from the SuperUser
        menu. You can do this by selecting the "Edit Initialization
        Settings" option (see section 5.10 and section 10 for details).
        Each setting includes helpful hints and information to simplify
        customization. Any changes you make will not take effect until
        the next time you use Sentry.


        2.5 Uninstalling Sentry

        Sentry is simple to uninstall. Simply re-run the INSTALL.EXE
        program (you may have to get it from backup as it deletes itself
        after installing). At the "Install Path" prompt, simply enter an
        asterisk (*) to uninstall.

        From here you will be asked if you wish to remove Sentry from
        your hard drive. Responding with a 'y' will delete the files and
        remove the directory that Sentry is in. Next you will be
        prompted for your windows directory. If you did not install
        Sentry with Windows, you can simply enter an asterisk (*) to
        skip this.

        When the program finishes, Sentry will no longer be on your
        system. If you change your mind, you can re-install it at any
        time.


        3.0 Securing Your Computer
        ==========================

        Sentry is essentially useless unless you take the appropriate
        additional security measures for your machine. Below I have
        outlined some of the things you can do to increase the security
        of your system.


        3.1 BIOS Password

        Protect your BIOS! It has a built in password, so set it!
        Without the password, any user can get into your BIOS and change
        your critical system settings. I have seen several different
        types of BIOS setups, but generally, you use the CHANGE PASSWORD
        command (Sometimes also listed as SUPERVISOR PASSWORD) from the
        main menu and set the SECURITY OPTION to "Setup" (as opposed to
        "System") in the BIOS FEATURES SETUP screen. Depending on the
        layout of your BIOS, you may have a CHANGE SETUP PASSWORD option
        right on the main menu.


        3.2 Boot Sequence

        Change your boot sequence. Again, in your BIOS, under the BIOS
        FEATURES SETUP screen, set your BOOT SEQUENCE to boot from your
        hard drive first. (This usually means set it to C,A as opposed
        to A,C). This will ensure that no-one can bypass Sentry by means
        of a boot disk.


        3.3 SWITCHES in CONFIG.SYS

        This step is not required for Windows 95 users.

        Add "switches /n/f" as the first line of your CONFIG.SYS file.
        The /n will disallow pressing F8 or F5. F8 allows users to step
        through each command of the CONFIG.SYS and AUTOEXEC.BAT files,
        and F5 gives them the option of skipping them all together. This
        means that users cannot bypass Sentry by this method. The /f
        switch is optional, it simply speeds up your boot-up time (by
        about 2 seconds).

        This is automatically done if you update your system files
        through the install program.


        3.4 BootKeys in MSDOS.SYS

        This step is for Windows 95 users ONLY.

        Add the line "BootKeys=0" to your MSDOS.SYS file. This will
        disable the use of F8, F4 or SHIFT to bypass the CONFIG.SYS and
        AUTOEXEC.BAT files. Adding this line is therefore a must,
        otherwise people will be able to defeat Sentry with the press of
        a key. To edit your MSDOS.SYS file, you may need to issue the
        command "attrib -h -s c:\msdos.sys" which will make it readable.
        When you are finished, you should issue the command "attrib +h
        +s c:\msdos.sys" which will restore it to it's previous
        condition.

        This is automatically done if you update your system files
        through the install program.


        3.5 BREAK in CONFIG.SYS

        You must also check your CONFIG.SYS file for any BREAK commands.
        If the command BREAK=ON is present, delete it! This command may
        allow users to break out of the CONFIG.SYS file, which is wrong!
        If BREAK=OFF exists, that is ok (since that is the DOS default,
        and it is secure), however you must get rid of any BREAK=ON
        commands.

        This is automatically done if you update your system files
        through the install program.


        3.6 Passwords

        Pick a good password. Short passwords are a bad idea, as well as
        birthdays, girlfriends names, etc. Anything that is easy to
        guess should be avoided. Good passwords are not words at all,
        but made up from a "mnemonic" sentence. For example, the
        sentence "I'll wait for you" turns into "Illw84u" (trust me).
        Mixing lower case letters, upper case letters, and numbers
        increases the security of a password, and passwords of this type
        are near impossible to guess or crack. Do not write your
        password down, especially near your computer. Try to memorize it
        if possible. Change your password, but not too often. People who
        change their passwords too often (less than 6 months or so) tend
        to write them down, which is a bigger risk. Don't enter your
        password with someone looking over your shoulder. If someone is
        in the room, block their view, or wait until they leave.


        3.7 Placement in AUTOEXEC.BAT

        When you are installing Sentry, make sure it is the FIRST file
        in your AUTOEXEC.BAT! Otherwise, the user may be able to exit
        when another program is running and avoid Sentry all together!

        This is automatically done if you update your system files
        through the install program.


        3.8 Keep a Backup

        Keep a backup copy of all your Sentry files! If something
        happens to these files, you may be locked out your computer if
        you don't have a backup. It is best to copy your entire Sentry
        directory to a floppy disk about once a week, so you won't be
        caught short.


        4.0 Logging In
        ==============

        4.1 The Login Procedure

        When you first run Sentry, you should see the standard startup
        screen. Your registration information is contained here. (The
        shareware release simply says it is registered to Shareware).
        You should also see a prompt asking you to enter your login (or
        user name). If instead you see an error message, check at the
        end of this file for help.

        While entering your user name, if you have SuperUser access, you
        can log in as such. You can do this by holding down the CTRL key
        while pressing enter (CTRL-ENTER). If you do not have SuperUser
        access, or do not wish to log in as such, simply press enter. In
        either case, this will send you to the password prompt.

        Once you have reached the password prompt, you simply enter your
        password, and hit enter when you are finished. Your password is
        not echoed to the screen.

        The minimum and maximum length of both the login and password
        are set by initialization settings. If you wish to change these,
        you must do so from the SuperUser menu.

        After correctly entering your password, Sentry will search for
        any messages addressed to you. If you have a message waiting, it
        will be displayed. Pressing 'd' will delete that message, any
        other key will keep it for the next time you log in. Each
        message is displayed individually.

        Next, the date and time of your last login will be displayed. If
        there have been any invalid login attempts made against your
        account since the last valid login, you will be told so, and how
        many. If the number of invalid login attempts against your
        account has exceeded the maximum allowed, your account will be
        locked out until the SuperUser resets it.

        If your account has expired, it will say so, and subsequently
        lock you out. If your password has expired, it will also say so,
        but will then prompt you to enter a new password. You may not
        re-use your old password, and you must pick a password that
        corresponds to the length limits set out by the initialization
        settings. Once you have entered and verified your new password,
        it is given a new expiry date according to the default (again
        determined by the initialization settings).

        If you have logged in as a SuperUser, and have SuperUser access,
        you will now be in the SuperUser menu (see the section below).
        If not, you will simply be dropped to DOS, and the login
        procedure is complete.


        4.2 Changing Passwords

        If you wish to change your password at any time, you can do so
        by entering the pass key. The pass key is defined in the
        initialization settings, and is displayed when Sentry starts up.
        The default pass key is "passwd". To change your password,
        simply enter your user name as usual, and when prompted for your
        password, enter the pass key. You will then be prompted for your
        old  password (to make sure it is really you), and then you will
        be asked for your new password, which will be verified and saved
        to disk. Your new password will expire in the number of days
        designated by the initialization settings.

        Changing your password has no effect on SuperUser access.


        5.0 The SuperUser Menu
        ======================

        The SuperUser menu is where most of the important actions take
        place. From here it is easy to perform system administrator
        tasks, and maintain user accounts. The following options are
        shown on the SuperUser menu:

            1.  The User Maintenance Menu
            2.  View Log File
            3.  Edit Initialization Settings
            4.  Send a Message to a User
            5.  Protect a File
            6.  Export Initialization Settings
            7.  Exit

        Each option is described below.


        5.1  The User Maintenance Menu

        The User Maintenance Menu contains all actions that affect
        users. The following options can be accessed through the User
        Maintenance Menu:

            1.  Create User
            2.  Delete User
            3.  View Users
            4.  Toggle SuperUser Status
            5.  Change Account Exipry Date
            6.  Change Password Expiry Date
            7.  Change Account Password
            8.  Assign Max Invalid Logins
            9.  Return to SuperUser Menu

        Each option is described below.

        5.1.1  Create User

        This option allows you to create users on your system. First of
        all, you must enter the username (or login) you wish to assign
        to that user. If you wish to create a user with SuperUser
        status, type in the username and hold down the CTRL key when
        pressing enter. Otherwise, just press enter. Once that is
        complete, Sentry asks for the password. The password is not
        echoed to the screen. The user should choose and enter their own
        password. SuperUsers need not know what the passwords are since
        they can still manage the accounts without knowing them. The
        password is entered twice to ensure no typos were made, and then
        saved in encoded form. The ESC key will abort this operation at
        any time.

        Note: There is currently a maximum of 100 users allowed. This
        limit can be bypassed if required (contact me for a larger
        capacity version).


        5.1.2  Delete User

        The delete option is very simple. It brings up a list of all
        users, and you simply use the cursor keys to highlight the user
        you wish to delete. SuperUsers are denoted by a * to the right
        of their username. Press enter to select the appropriate user.
        If the selected user is a SuperUser, Sentry will give a warning.
        SuperUser or not, Sentry will then ask if you are sure you want
        to delete them. Any input other than a 'y' will not perform the
        delete. The ESC key will abort this option at any time.


        5.1.3  View Users

        This option allows you to view all users who currently have
        accounts on your system. SuperUsers are again denoted by a * to
        the right of their login name. The last login date/time, account
        expiry date and password expiry date are also shown to the right
        of the user's login name. In addition, the number of invalid
        logins since the users last valid login are shown with the
        number of invalid logins allowed before an account is locked up.
        An "X" in the "Max Inv Log" (Maximum Number of Invalid Logins
        Allowed) column means there is no limit. You can use the PAGE UP
        and PAGE DOWN keys to scroll forward and back if there are
        multiple pages of users. Arrows will be present if there are
        additional pages above/below. The ESC key will exit back to the
        main menu.


        5.1.4  Toggle SuperUser Status

        When this option is selected, it first brings up a list of all
        users on the system. Again, SuperUsers are denoted by a *. Once
        you have selected a user, Sentry will ask you if you want to
        grant/revoke SuperUser access to/from the appropriate user. Any
        input other than a 'y' will not change that users status. Now
        the user must enter a password. (Since the SuperUser status is
        encoded in the password, and the password can never be decoded,
        I can't change SuperUser access without resetting the password).
        The user can re-enter their old password, or enter a new one
        (the old one will be over-written). In a worst case scenario,
        the SuperUser can re-assign a new password to the user if he is
        unavailable to enter a new password himself. (A hostile user can
        have SuperUser access revoked without having to enter a new
        password; you can do it for him).


        5.1.5  Change Account Exipry Date

        This option lets you define when an account will expire on your
        system. Expired accounts no longer have access. This option is
        useful if a user will be leaving. Then you don't have to
        remember to delete their account on the day they leave. You can
        set it to expire, and delete it when you remember.

        This option also works in conjunction with the "Assign Max
        Invalid Logins" option. Once an account reaches it's maximum
        number of sequential invalid logins, it expires. The only way to
        re-activate the account is to change the expiry date with this
        option.

        Once you select this option, some information about the account
        will be displayed. If it is a SuperUser account, Sentry will
        tell you so. It will then display the account's current expiry
        date. You will be asked if you are sure you want to change that
        user's expiry date. Any input other than a 'y' will abort the
        process, otherwise you will be prompted for the year the account
        will expire. The year must be entered as 4 digits (IE: 1997). If
        you enter 'N' at the year prompt, no expiry date is assigned to
        that account (it is valid forever). If you enter a valid year,
        you will then be prompted for the expiry month, which is entered
        as 2 digits (IE: 06 for June) followed by the expiry day, which
        is also entered as 2 digits. Accounts expire at one second past
        midnight on the date of expiry.


        5.1.6  Change Password Expiry Date

        This option lets you define when a users password will expire.
        Once the password has expired, the user must enter a new one.
        This forces the user to change their password. Once a password
        has expired, the next time the user logs in he will be forced to
        enter a new password. The new password is valid for the number
        of days set by the initialization settings. Once a password has
        expired, the user cannot re-enter it. He must select a new
        password. (NOTE: Sentry does not keep historical records on
        passwords, so a user may alternate back and forth between 2
        passwords. This is not a secure practice and should be avoided).

        Once you select this option, some information about the account
        will be displayed. If it is a SuperUser account, Sentry will
        tell you so. It will then display the current expiry date for
        the password. You will be asked if you are sure you want to
        change that user's expiry date. Any input other than a 'y' will
        abort the process, otherwise you will be prompted for the year
        the password will expire. The year must be entered as 4 digits
        (IE: 1997). If you enter 'N' at the year prompt, no expiry date
        is assigned to that password (it is valid forever). If you enter
        a valid year, you will then be prompted for the expiry month,
        which is entered as 2 digits (IE: 06 for June) followed by the
        expiry day, which is also entered as 2 digits. Passwords expire
        at one second past midnight on the date of expiry.


        5.1.7  Change Account Password

        This option allows the SuperUser to change an account's
        password, in case the user forgot it, or some other strange
        disaster has occurred. When assigning a new password to an
        account, you should set the expiry date to be immediately, so
        the user is forced to choose a new one. If the previous password
        had no expiry date, none is assigned to the new password.
        Otherwise the password expires in the number of days assigned in
        the initialization settings. You can abort at any time by
        pressing the ESC key.


        5.1.8  Assign Max Invalid Logins

        This allows you to set the maximum number of invalid logins
        allowed before an account is disabled. The default number is
        defined in the initialization settings, and is assigned to all
        accounts when they are first used.

        To assign a new maximum, simply select the "Assign Max Invalid
        Logins" option from the SuperUser menu. From here you will be
        shown the complete user list, and asked to select the user you
        wish to change. Pressing the ESC key will abort the operation
        here.

        Once you have selected the user, you will be informed if that
        user is a SuperUser. NOTE: You should not assign a maximum
        number of invalid logins to your last SuperUser account. If you
        do, and someone attempts to break in to that account, you could
        be locked out of the SuperUser menu!

        Next you will be told what the user's current max invalid login
        setting is, and asked if you want to change it. Any input other
        than a 'Y' will abort the operation. Now you will be asked to
        enter the number of invalid login attempts before an account is
        disabled. Entering 'N' or a 0 will mean that there can be
        unlimited invalid login attempts made.

        Please note that a value of less than 10 may cause you more
        trouble than good. You may be spending a lot of time re-setting
        accounts if you pick too low a value, so consider this
        carefully. Also note that when an account is locked up, it is
        actually set to expire immediately. As a result, if you wish to
        re-activate an account, you must change the account's expiry
        date (see above). This is also handy for determining when the
        account was actually de-activated. The expiry date for that
        account it set the day it was locked out.

        Every time a successful login is made to an account, the invalid
        login counter is reset. This means that an account will not be
        locked out if it has a valid login before the maximum is
        reached. (For example, say an account has a maximum of 10
        invalid logins. If there are 7 invalid logins before a
        successful login, and then 5 more invalid logins, the account
        will not be locked up. There must be 10 sequential invalid
        logins for the account to be disabled.)

        Once you have finished making the change, you can view the user
        list to make sure it is acceptable.


        5.1.9  Return to SuperUser Menu

        This option simply returns you to the SuperUser menu. It is the
        same as hitting the ESC key.


        5.2  The Log File Maintenance Menu

        The Log File Maintenance Menu contains all actions required to
        manage the log file. The following options can be accessed
        through the Log File Maintenance Menu:

            1. View Log File
            2. View Backup Log File
            3. Move Log File to Backup
            4. Return to SuperUser Menu

        Each option is described below.


        5.2.1  View Log File

        Every time a user logs in, a record is kept on disk. If you want
        to view that online record, select this option. You will be
        asked if you want view to the log file for one or all users.
        Entering 'o' (for one user) will bring you to the userlist,
        where you can select the user you wish to view. Any other input
        will show the log for all users.

        The log file will be displayed one screen at a time. You can
        press ESC at any time to skip to the end of the file. Once the
        entire log file has been displayed, Sentry will ask you if you
        want to clear the log file. If you were viewing a single user's
        log, Sentry will ask if you want to clear their file.

        Any input other than 'y' will exit, leaving the log file in
        tact. If you answer with a 'y', Sentry will clear out the old
        entries. When viewing the log for all users, that means that all
        entries will be removed. When viewing the log for a single user,
        only that user's entries will be removed.

        The log file itself will not consume much disk space, and so it
        should be left in tact for historical reasons. You may find it
        necessary to refer back to the log file to verify certain
        events. If disk space is a constraint, you can use the "Move Log
        File to Backup" option described later.

        You should always keep a close eye on the log file as this will
        often tell you when something is wrong on your system. All error
        messages are saved to the log file, so you can see if Sentry has
        run into any problems. Also, it records the current time, and
        the username of the user attempting to log in. This will help
        you to identify any potential attacks on your system. The log
        file is hidden by Sentry, but you should also place it somewhere
        safe so that users cannot tamper with it. You can set the
        location of the log file via the initialization settings.


        5.2.2  View Backup Log File

        This option is the same as "View Log File" except it allows you
        to view the information you have backed up. This is strictly for
        historical purposes, so log file information is not lost.


        5.2.3  Move Log File to Backup

        This moves all of the information in the current log file to the
        backup file. The backup file is not overwritten, the new
        information is appended to it. This makes it easier to manage
        when the log file gets large, but you don't want to clear it.


        5.2.4  Return to SuperUser Menu

        This option simply returns you to the SuperUser menu. It is the
        same as hitting the ESC key.


        5.3  Edit Initialization Settings

        This option allows you to edit the initialization settings.
        After installation, it is critical that you go through each and
        every attribute, and make sure it is set to your liking. Many of
        the initialization settings have serious implications on
        security. Once this option is selected, all of the attributes
        are displayed. Simply select the attribute you wish to modify,
        and you will be given the following information:

                - A one line description of the attribute.

                - A brief description of the attribute and it's uses.

                - Valid settings for the attribute, if applicable.

                - Any security notes, if applicable.

                - The default value for the attribute.

                - The current value for the attribute.

        At this time, you will be prompted to enter a new value for the
        attribute. Pressing ENTER on a blank line, or pressing the ESC
        key abort any changes the current value.

        Sentry performs strict checking on the values you enter, and
        will not save an invalid value.

        See section 10 for details on individual settings.


        5.4  Send a Message to a User

        This option allows the SuperUser to send a one-line message to
        any user on the system (including themselves). Once this option is
        selected, you must pick the user you wish to send a message to
        from the list of all users. Once this is done, you will be
        prompted for your one-line message. If you wish to send more
        than one line, simply send two messages to the same user. After
        you have entered your message, you will be returned to the
        SuperUser menu. The next time that person logs in, your message
        will be displayed, including:

          - Who the message is from
          - The time and date the message was sent
          - The message itself

        The user then has the option to delete the message. If they do
        not delete the message, they will also see it on their next
        login.

        NOTE: Messages are displayed before any login information, so
        you can send messages to users that are locked out. That way, if
        you wish to send an explanation, you can.


        5.5  Protect a File

        This option allows you to protect executable files (.EXE, .COM
        and .BAT). When this option is selected, it prompts for the file
        name. You must enter a path to a file that exists, and the file
        must be executable. If the file name is correct, Sentry then
        processes that file, and "protects" it. Protection means that
        the next time that file is run, Sentry will execute. If the user
        enters a valid login and password, then the original file
        executes. If not, then the file is not executed.

        This is useful for protecting individual files. After all, if a
        person successfully logs into your computer, they have free
        access to anything there. This will allow you to tighten up
        access to individual files.

        The current method of protection does not work with all files.
        That is to say, I have tested it on some files that do not run
        correctly once protected. (It seems to be memory or video
        conflicts). Currently, a protected file has about 100k less
        memory available to it than if it was run normally. Also,
        protecting programs that run within Windows does not work. These
        issues are "on the list" for research.

        See section 7 for specific details on protecting files.


        5.6  Export Initialization Settings

        Selecting this option will export the Initialization Settings.
        This will allow you to use the same settings and account
        structure when you upgrade. The process for this is simple.
        Select this option, and it will export the settings. Now simply
        unzip the new SentryXX.zip into your directory (overwriting all
        files), and run the Install.exe program. Install will
        automatically sense the exported information, and ask if you
        want to use it. If you say yes, the settings are automatically
        updated to the new version, and loaded in.

        Please note that you should not export the settings unless you
        plan to import them right away into a new version (it can cause
        a slight security risk).


        5.7  Exit

        This simply returns you to the DOS prompt. It is the same as
        pressing the ESC key.


        6.0 Using Sentry With Windows
        =============================

        6.1 General

        Sentry is also adaptable to Windows, allowing you to keep users
        away from DOS. This may be desirable if you enter Windows
        immediately upon startup (I.E.: your AUTOEXEC.BAT contains "win"
        as a command). If you want to limit access to your system as a
        whole, you could install Sentry in the usual way. This would
        keep out unwanted users all together. If you want to also limit
        access to the DOS prompt from Windows, you can do that too. All
        you must do is create a new instance of Sentry (see below), and
        then simply set up your windows to run Sentry when you drop to
        DOS. The example setup below assumes you have installed an
        instance of Sentry in c:\Sentry\Inst1, but you can substitute
        your actual directory names in where applicable.


        6.2 Installation Procedure

        Installing Sentry in the Windows environment is simple. Included
        in the Sentry zip file are 2 files:

        Sentry.grp
        Sentry.pif

        Both of these will be copied to your windows directory during
        the install. Enter Windows and from the Program Manager, select
        [F]ile, then [N]ew. Next select Program Group. When prompted,
        enter "Sentry" for both description and file name. Now you
        should see a new program group called Sentry. The Sentry program
        group should contain a single icon, labeled MS-DOS. This icon
        actually points to sentry.pif, which contains specific
        information about running Sentry.

        You can edit the new icon (highlight it and press ALT-ENTER) and
        change the working directory to point to your Sentry files.

        IE: c:\Sentry, or c:\Sentry\Inst1, etc.

        From here, run the Pif Editor program (the icon is a little
        tag), and open Sentry.pif. Now change the "Program Filename" to
        point to your Sentry.exe file.

        IE: c:\Sentry\Sentry.exe, or c:\Sentry\Inst1\Sentry.exe, etc.

        In Addition, change the "Working Directory" to be the same as
        the working directory for the icon (see above). Once you save
        the .pif file, you are all set.

        At this point you should test out the new Sentry icon to make
        sure it works ok. When you double click on the new icon, it
        should take you directly to Sentry. Once you have entered a
        correct username and password, it will then drop you to a
        regular DOS shell. You can type "EXIT" to return to Windows at
        any time.

        Once you are sure it works, remove your old MS-DOS icon, so that
        users cannot use it to drop straight to DOS. You can drag your
        new icon into the same location as your old MS-DOS icon, so
        everything will look the same.

        Now there is one last step. If a user were to exit Windows, they
        would be at the DOS level, which is not what we want. Since your
        AUTOEXEC.BAT file is running windows on startup, you can block
        people from exiting by forcing them to go through Sentry. You
        can do this by adding a call to Sentry after the win command in
        your AUTOEXEC.BAT.

        For example, the last lines of your AUTOEXEC.BAT might look like
        this:

        ----------------- CUT ----------------
        win
        \Sentry\Inst1\Sentry
        ----------------- CUT ----------------

        Alternatively, you can add the security measures offered by the
        install program.

        If it seems like a complicated process, just try the steps one
        at a time, and make sure everything works ok. The end result is
        that when you click on the MS-DOS icon, it will run Sentry
        before dropping you to the DOS shell. That means that you can
        limit access to the operating system, without pulling any fancy
        tricks in Windows. Since you have made a new instance of Sentry,
        you could have one instance run when you boot up (giving access
        to windows), and have another instance run when you click on the
        DOS icon (giving access to the operating system). That way, a
        user that has access to your PC may not be able to drop to DOS.

        Be warned that Sentry will still lock up your terminal if a user
        fails to log in. If this happens in Windows, you may be able to
        recover back to Windows by pressing CTRL-ALT-DELETE and closing
        the DOS prompt. This will still not allow access to DOS, but you
        will not lose anything you were working on.


        6.3 Windows 95

        Sentry is easily adaptable to use in a Windows 95 environment.
        In most respects, the setup is the same as in a DOS/Windows
        environment.

        The primary difference with Windows 95 is instead of adding the
        line "switches /n/f" to your CONFIG.SYS file, you must add the
        following line to your MSDOS.SYS file:

        BootKeys=0

        This will disable the use of F8, F4 or SHIFT to bypass the
        CONFIG.SYS and AUTOEXEC.BAT files. Adding this line is therefore
        a must, otherwise people will be able to defeat Sentry with the
        press of a key. To edit your MSDOS.SYS file, you may need to
        issue the command "attrib -h -s c:\msdos.sys" which will make it
        readable. When you are finished, you should issue the command
        "attrib +h +s c:\msdos.sys" which will restore it to it's
        previous condition.

        As before, ensure that the call to Sentry is at the beginning of
        your AUTOEXEC.BAT file. The Sentry.pif file and Sentry.grp file
        will still work with Windows 95, although at this time I have
        not drawn up specific instructions for installation.

        I have not yet conducted thorough tests in a Windows 95
        environment, however documentation for this should be
        forthcoming in a future revision.


        7.0 Securing Other Programs
        ===========================

        7.1 General

        In some cases, it might be beneficial to secure a single
        program. It might be a word-processor, Windows, or a potentially
        dangerous file like FORMAT.COM. In any case, you can secure it
        with Sentry, even if you don't use Sentry during boot-up.


        7.2 Setup

        To successfully protect your file, you must keep a backup.
        (Sentry cannot reverse the process of protecting a file!) This
        backup should not be kept anywhere accessible (IE: make a backup
        on floppy, and store it somewhere safe). After all, if a user
        can run an unprotected version of the file, why bother
        protecting it in the first place? It is wise to test the file
        once it has been protected to ensure it works as expected.

        To protect a file, simply chose "Protect a File" from the
        SuperUser menu. Sentry will ask for the file name of the file to
        protect. The file must be an executable (IE: it ends with .EXE,
        .COM or .BAT). Batch files are automatically converted into .EXE
        files. Once you have entered a correct file name, Sentry will
        then proceed to protect the file. When it is finished, you will
        be returned to the SuperUser menu. Your file is now protected!

        The applications for this type of protection are almost
        limitless. Use your imagination. If you come up with an
        innovative idea, I would be interested in hearing about it.


        7.3 Account Information

        The account structure for a given protected file is copied from
        the version of Sentry that protected the file, but is unique.
        That is, once a file is protected, a SuperUser can
        add/delete/modify any accounts for that protected file without
        affecting any other copies of Sentry. The initialization
        settings are treated in the same manner. Each protected file has
        their own unique copy.

        To change account information on a protected file, simply run
        the file, and when Sentry executes, log in as a SuperUser. You
        can now perform all SuperUser options as usual.


        7.4 Using Templates

        It is possible to set up "template" instances of Sentry for use
        when protecting files. This can be extremely useful as it saves
        the administrator a considerable amount of time, as well as
        decreasing the possibility of making a mistake.

        To use templates, you must set up several instances of Sentry
        (one for each template you wish to use). See section 8 for
        instructions on how to create an instance of Sentry.

        A sample setup could be as follows:

        c:\Sentry
             |
             +----+------- Private
                  |
                  +------- Public
                  |
                  +------- SemiPub

        With each instance having a complete copy of Sentry. Next simply
        modify the account structure of each instance to match the
        template. That is, the Private instance would contain only the
        SuperUser(s), the Public may contain all users, and the
        Semi-Public would contain the SuperUser(s) plus some users.

        Now you would use the Private instance as a template to protect
        exclusive executables, such as format.com. When you use the
        Private template, the protected file is automatically set to
        allow only SuperUsers to run it.

        Similarly, the Semi-Public template can be used for programs
        that only the SuperUser and a select number of users have access
        to.

        The advantage to using templates is that the administrator need
        only set up the account structure and initialization settings
        once. From that point forward it becomes the default for all
        files protected using that template.


        7.5 Running a Protected File

        To use a protected file, simply run it as usual. Now, instead of
        the program executing, Sentry will run. The user will be
        confronted with a login prompt, and they must enter a correct
        login and password to continue.

        An unsuccessful login will result in the user being locked out
        (as with Sentry in normal use). A successful login will simply
        run the protected file. Once the file is run, the user will be
        returned to whatever they were doing (IE: the DOS prompt, etc).

        Command line arguments are passed to protected files in the same
        manner as usual. To run the file FORMAT with the argument A:, it
        would look like this:

        format a:

        which is identical to the usual way of passing command line
        arguments.


        8.0 Creating a new Instance of Sentry
        =====================================

        In some of the scenarios listed above, you may be required to
        create a new "instance" of Sentry. That is to say, a completely
        new copy of Sentry, that works independently of all other
        copies. This is a fairly simple process, that you can perform as
        many times as required.

        The first thing you must do when creating a new instance is to
        create the directory you wish to place it under. If you plan to
        have several instances, you may want to create a Sentry main
        directory, with your instances branching off of that. For
        example:

        c:\Sentry
             |
             +----+------- Inst1
                  |
                  +------- Inst2

        This will allow you to keep all your Sentry files well
        organized, and separate from your other programs. Create a
        directory for each instance you anticipate you will need. From
        there, simply copy ALL of the Sentry files into each directory.

        The final step is to set up the accounts of each instance
        according to your needs. To do this, you must go into each
        directory individually and run Sentry. Now log in as a SuperUser
        and set up all the required accounts. Remember that each
        instance is independent of the others. Your account information
        will not be the same for any 2 instances (otherwise there is no
        advantage to having 2 instances).

        You should always test out each instance and make sure it works
        before using it.


        9.0 Registration
        ================

        9.1 General

        If you use Sentry on your machine(s), I urge you to register. A
        lot of time and effort has been put into Sentry to make it a
        viable security program. With your help, Sentry can continue to
        adapt to new situations and keep abreast with any new
        developments in the field of computer security.

        On the other hand, I realize that not everyone can afford to
        register. In that case, please feel free to continue to use the
        ShareWare version. There are no limitations on how long or how
        many times it can be used. My intention with Sentry was to make
        a contribution to PC security, and to make it available to
        everyone. All I ask is that if you use Sentry, and are able,
        please register.

        The shareware version of Sentry has all the functionality of the
        registered version, with one exception: it does not encode
        passwords. This will allow you to test out all the functions of
        Sentry before you commit to purchasing it. The ShareWare version
        in itself is a very secure program as is, however if you are
        serious about security, plaintext passwords are not a viable
        option.

        To order, simply fill out the order form provided (Order.frm)
        and e-mail or snail-mail a copy to me.


        9.2 Benefits of Registration

        As a registered user, you will receive:

              - The full Sentry program (with password encryption) and
                related files on 3.5" disk.

              - A laser printed user's manual (essentially this file,
                with a few changes in format and content).

              - Online internet support via e-mail.

              - Free upgrades as soon as they are available via the
                internet.

              - Notices about any potential security risks, and
                instructions on how to protect yourself.

              - The ability to request specific features in future
                versions of Sentry.

              - A clear conscience knowing that you paid for your
                software.

        NOTE: Registered versions are not inter-compatible. That is,
        user X's account information is encrypted differently than user
        Y's. The version of Sentry that you receive is good only for you
        and your files. (Likewise, nobody else can use their copy of
        Sentry with your account information). See the order form for
        information on obtaining compatible versions of Sentry.


        10.0 The Initialization Settings
        ================================

        Shown below are all of the initialization settings that may be
        changed within Sentry. A short description of each setting is
        included, as well as any security notes, and the default
        setting.

        10.1 Location of the Log File

        This contains the location of the log file. The log file should
        be kept somewhere safe, tucked away from prying eyes.

        NOTE: You should change the name of the file from Sentry.log to
        some other, inconspicuous name. Potential intruders will search
        for the Sentry.log file. You can hide it under misleading names
        such as file_id.diz, chklist.ms, warm.com etc etc.

        Default: c:\Sentry.log


        10.2 Location of the Backup Log File

        This contains the location of the backup log file. When the max
        log file size has been reached, half of the log file is
        automatically moved to the backup log file. This prevents the
        primary log file from getting too large.

        Default: c:\backup.log


        10.3 Location of the Message File

        This contains the location of the message file. The message file
        should be kept somewhere safe, tucked away from prying eyes.

        NOTE: You should change the name of the file from Sentry.msg to
        some other, inconspicuous name. Potential intruders will search
        for the Sentry.msg file. You can hide it under misleading names
        such as file_id.diz, chklist.ms, warm.com etc.

        Default: c:\Sentry.msg


        10.4 Minimum Password Length

        Sets the minimum length for passwords and logins.

        NOTE: A value of 4 should be the absolute minimum for
        MinPasswordLen. A value of 5 or 6 would be even better. Short
        passwords are much easier to stumble across since less attempts
        have to be made before it is guessed.

        Default: 4


        10.5 Maximum Password Length

        Sets the maximum length for passwords and logins.

        Default: 20


        10.6 Maximum Invalid Tries

        Sets the maximum times a user can attempt to log in before being
        locked out.

        NOTE: This should not be set too high. It is very rare for a
        legitimate user to botch a login attempt 3 times in a row. A
        potential intruder will usually have to make many attempts
        before getting anywhere. Setting MaxTries to around 3 will slow
        him down greatly, as he will have to reset after 3 failed
        attempts.

        Default: 3


        10.7 Wait Time After an Invalid Login

        Sets the delay in seconds to wait after the user fails to log
        in.

        NOTE: Setting the WaitTime to 3 or above greatly slows any
        methodical attempt to guess or discover passwords. It offers
        little inconvenience to the end users while providing added
        security.

        Default: 3


        10.8 Max Log File Size

        This sets the maximum size the log file can reach before the
        oldest half of it is automatically moved to the backup log file.
        The size is given in number of kilobytes (1024 bytes). A value
        of 0 means never backup the log file.

        Default: 20


        10.9 Key to Change Password

        Sets the "key" to enter as a password to change passwords.

        Default: passwd


        10.10 Password Echo Character

        Sets the character to be echoed to the screen when the password
        is being entered.

        Enter '?' to display no character.
        Enter '!' to display the actual character (not recommended).

        Default: *


        10.11 Days Until Passwords Expire

        Sets the number of days a password is good before it expires.
        This is the Default value used whenever a password is changed.
        Individual passwords can be set to expire on the SuperUser menu.

        NOTE: It is a good idea to have this set to between 180 and 365.
        Anything over a year is a security risk due to age. Anything
        under half a year is a risk because people will tend to forget
        their passwords and start writing them down. This setting should
        depend on how busy your system generally is.

        0 = Never expire passwords.

        Default: 365


        10.12 Days Until Accounts Expire

        Sets the number of days an unused account is good before it
        expires. This is the Default value used whenever an account is
        created. Individual accounts can be set to expire on the
        SuperUser menu.

        NOTE: This setting should depend on the level of activity on
        your system. Active systems can afford to have a lower setting
        than generally inactive settings. You should also take into
        consideration the probability of an intruder using an old
        account.

        0 = Never expire unused accounts.

        Default: 365


        10.13 Screen Saver Activation Time

        This sets the amount of idle time (in seconds) that may pass
        before the screen saver is activated.

        Default: 300


        10.14 Screen Saver Message

        This is the message that is displayed randomly on the screen
        when the screen saver is active.

        Default: This is a Secure Terminal.


        10.15 Login Prompt

        This sets the value of the prompt that is displayed when the
        user is expected to enter their login name. Modifying this
        allows you to customize your environment as you see fit.

        Default: Login:


        10.16 Password Prompt

        This sets the value of the prompt that is displayed when the
        user is expected to enter their password. Modifying this allows
        you to customize your environment as you see fit.

        Default: Password:


        10.17 Wrong Password Message

        This sets the message to be displayed when a user enters the
        wrong password.

        NOTE: It is a good idea to keep the wrong password and wrong
        login messages the same. Otherwise, a potential intruder will
        know when he has found an account (IE: If Sentry responds with
        "Invalid Password", he knows the login was correct). Keeping the
        two the same prevents an attacker from knowing if he even has
        the correct login.

        Default: Invalid Login.


        10.18 Wrong Login Message

        This sets the message to be displayed when a user enters the
        wrong login.

        NOTE: It is a good idea to keep the wrong password and wrong
        login messages the same. Otherwise, a potential intruder will
        know when he has found an account (IE: If Sentry responds with
        "Invalid Password", he knows the login was correct). Keeping the
        two the same prevents an attacker from knowing if he even has
        the correct login.

        Default: Invalid Login.


        10.19 Bad Password Length Message

        This sets the message to be displayed when a user enters a
        password of invalid length.

        NOTE: It is wise to keep the wrong password length, wrong login
        length, wrong password and wrong login messages the same. This
        will prevent a potential attacker from knowing the max and min
        settings for passwords or logins on your system. (Knowing the
        length of a password can greatly decrease the amount of time
        required to crack it).

        Default: Invalid Login.


        10.20 Bad Login Length Message

        This sets the message to be displayed when a user enters a login
        of invalid length.

        NOTE: It is wise to keep the wrong password length, wrong login
        length, wrong password and wrong login messages the same. This
        will prevent a potential attacker from knowing the max and min
        settings for passwords or logins on your system. (Knowing the
        length of a password can greatly decrease the amount of time
        required to crack it).

        Default: Invalid Login.


        10.21 Wrong Password Log Message

        This sets the message to be saved to the log file when a user
        enters the wrong password.

        Default: User entered the wrong password.


        10.22 Wrong Login Log Message

        This sets the message to be saved to the log file when a user
        enters the wrong login.

        NOTE: This message should be descriptive, since the SuperUser
        will use it to determine what sort of activities have been
        happening.

        Default: User entered the wrong login.


        10.23 Bad Password Length Log Message

        This sets the message to be saved to the log file when a user
        enters a password of invalid length.

        Default: Invalid Password Length.


        10.24 Bad Login Length Log Message

        This sets the message to be saved to the log file when a user
        enters a login of invalid length.

        Default: Invalid Login Length.


        10.25 Environment Variable

        This sets the environment variable used to store the user's
        login name after a successful login.

        NOTE: The environment variable USER is used by many networks,
        such Novell. By using this setting, Sentry can be used in
        conjunction with these networks.

        Default: USER


        10.26 Enable Sentry with Windows

        The Windows flag is set if you wish to run Sentry from Windows.
        Technically, this allows Sentry to open up a DOS shell after a
        successful login. Setting this option to 1 has no effect on
        normal use, and is not a security risk.

        (0=Do Not Run In Windows, 1=Run In Windows)

        Default: 1


        10.27 Show Title

        This determines if the intro screen is displayed or not. You may
        choose not to display the title information if you don't want
        users to know what program you are using. On the other hand, the
        registration information should be displayed for authenticity's
        sake. I have added this option because security comes before all
        else.

        (0=Not Displayed, 1=Displayed)

        Default: 1


        10.28 Date Format

        This will allow you to have dates displayed in different
        formats. Some people prefer different formats than others, so
        this will allow you to define the way dates are displayed.

        (0=MM/DD/YYYY, 1=DD/MM/YYYY)

        Default: 1


        10.29 Case Sensitivity

        This sets the case sensitivity. If "Case Insensitive" is
        selected, "SENTRY" "sentry" and "Sentry" are all treated as the
        same at the login prompt. If case sensitivity is enabled, the
        three are all treated as different logins.

        (0=Case Sensitive, 1=Case Insensitive)

        NOTE: Using "Case Insensitive" reduces the number of allowable
        logins, and increases the probability of an attacker getting a
        correct login. Still, some people find it easier to work with
        Case Sensitivity off.

        Default: 0


        10.30 Windowed Mode

        This allows you to use Sentry in a "windowed" mode (not to be
        confused with Microsoft Windows). If the windowed mode is
        undesirable, you can choose not to use it.

        (0=Regular Mode, 1=Normal Windowed Mode, 2=Exploding Windowed Mode)

        Default: 2


        10.31 Enable Colour

        This determines if colour will be displayed by Sentry or not.
        Some laptop users may wish to use the black and white setting
        for better readability.

        (0=Black and White, 1=Colour)

        Default: 1


        10.32 Text Colour

        You can set TextColour to the value of the colour you wish
        normal text to appear in. Colour values are shown in the chart
        below.

        COLOURS:
        0 Black 4 Red        8 Dark Gray    12 Light Red
        1 Blue  5 Magenta    9 Light Blue   13 Light Magenta
        2 Green 6 Brown      10 Light Green 14 Yellow
        3 Cyan  7 Light Gray 11 Light Cyan  15 White

        Default: 15


        10.33 Text Background

        You can set TextBackground to the value of the colour you wish
        normal text to have as a background. Colour values are shown in
        the chart below.

        COLOURS:
        0 Black 4 Red
        1 Blue  5 Magenta
        2 Green 6 Brown
        3 Cyan  7 Light Gray

        Default: 1


        10.34 Highlighted Text Colour

        You can set HighColour to the value of the colour you wish
        highlighted text to appear in. Colour values are shown in the
        chart below.

        COLOURS:
        0 Black 4 Red        8 Dark Gray    12 Light Red
        1 Blue  5 Magenta    9 Light Blue   13 Light Magenta
        2 Green 6 Brown      10 Light Green 14 Yellow
        3 Cyan  7 Light Gray 11 Light Cyan  15 White

        Default: 1


        10.35 Highlighted Text Background

        You can set HighBackground to the value of the colour you wish
        highlighted text to have as a background. Colour values are
        shown in the chart below.

        COLOURS:
        0 Black 4 Red
        1 Blue  5 Magenta
        2 Green 6 Brown
        3 Cyan  7 Light Gray

        Default: 7


        10.36 Maximum Invalid Logins

        This sets the Default number of consecutive invalid logins
        possible before an account is locked out. Only a SuperUser can
        subsequently unlock an account.

        Default: 10


        10.37 Type Ahead

        This allows you to determine if Sentry acknowledges characters
        typed before execution began. With this option enabled, the user
        can type their login and password before Sentry runs, and it
        will automatically be used. This is useful for saving time while
        logging in.

        (0=Ignore input, 1=Accept input)

        NOTE: Some System Administrators turn this option off because it
        can cause some users to get confused and log in incorrectly.

        Default: 1


        10.38 Clear Screen

        This setting determines if the screen is cleared before running
        Sentry. Some users prefer to turn this option on as the screen can
        look cluttered otherwise.

        (0=Don't clear screen, 1=Clear screen)

        Default: 0


        11.0 Technical Notes
        ====================

        11.1  Encoding Algorithm

        The encoding algorithm used is the standard UNIX Crypt()
        algorithm. It is a one-way encoding algorithm that incorporates
        the Data Encryption Standard (DES) and RSA technology. It is
        used on UNIX systems to secure passwords. (As a note, the
        encryption code is not included with the ShareWare version, so
        no amount of examining the code will reveal the algorithm).

        The users' passwords are never decoded. They are stored on disk
        and in memory in an encoded format. The entered passwords are
        encoded using the same algorithm and matched in an encoded form.
        This prevents disk or memory scans from revealing the password
        to prying eyes.

        I have begun running some tests on cracking the passwords, and I
        will include my results. So far, this is what I have found:

        Password Length          Maximum Time to Break
        ------------------------------------------------
        4                        22 days
        5                        1368 days or 3.75 years
        6                        232.4 years
        7                        14409 years
        8                        893357 years

        All times listed are approximated as using a Pentium 90MHz CPU
        and an alpha-numeric password.

        These figures may be adjusted as my testing becomes more
        accurate. The above figures also assume you know the length of
        the password, which cannot be determined by looking at the
        encrypted version. As a result, the search time may be much
        greater.


        11.2  SuperUser Access

        SuperUser access is also encoded in the password. I tried many
        different ways before finally settling on this. It is the most
        secure method. Actually, SuperUser access is stored on the
        password (which is then encoded), and then stored again on the
        encoded password. That looks like:

        password                      <-- Password as entered.

        super(password)               <-- Password with SuperUser stamp.
                                          * This is the stamp that is
                                          used to determine access.

        crypt(super(password))        <-- Encoded password with
                                          SuperUser stamp.

        super(crypt(super(password))) <-- SuperUser stamped encoded
                                          password with SuperUser stamp.
                                          * This is the stamp that is
                                          used to "see" who has
                                          SuperUser access.

        That way when you use the "View Users" command, you can see
        which ones are SuperUsers. However, since the non-encoded
        SuperUser stamp can be edited, it is only used for viewing. The
        encoded SuperUser stamp is used for access. If anyone attempts
        to alter the SuperUser stamp, a warning will be displayed in
        the log file each time that user logs in.


        11.3  Files

        The following files are included with this release of Sentry:

        Sentry.exe      This is the executable program.
        Install.exe     The installation program.
        File_id.diz     Short description file.
        History.txt     The complete revision history of Sentry.
        License.txt     The license agreement.
        Order.frm       The order form.
        Qstart.txt      Quickstart instructions.
        Readme.com      Displays this file.
        Readme.txt      This file.
        Sentry.ins      Descriptions of Initialization Settings.
        Sentry.hlp      Sentry's Help file.
        Sentry.grp      The Sentry Group file for Windows.
        Sentry.pif      The Sentry .pif file for Windows.
        Whatsnew.txt    A short description of modifications to the
                        latest version.

        If you do not have all of these files, Sentry may not work for
        you. You can pick up a complete copy of Sentry (and updates as
        they become available) at:

              http://dragon.acadiau.ca/~910318b/Sentry.html


        11.4  File_id.diz

        The actual contents of the file_id.diz file are shown below. If
        any modification has been made to the original file, please
        re-create it from the following section.

        NOTE: this is primarily for SysOps of BBS's. Single users can
        delete the file_id.diz if they wish. (However, please make sure
        that all files are present if you distribute the program.)

        -------------------CUT-----------------------
        (V4.3) Sentry - Security for DOS/Windows/95.
        Sentry is an extremely flexible program that
        allows you to secure your system, individual
        files,  Windows, Win 95 or any combination.
        It supports up to 100 users with normal and
        "SuperUser" access. Detailed log files help
        keep track of activity. Expiry dates and a
        mini message system help with user admin.
        http://dragon.acadiau.ca/~910318b/Sentry.html
        Mike Bobbitt [Mike.Bobbitt@AcadiaU.Ca]
        -------------------CUT-----------------------


        11.5  Time / Date

        NOTE: I have found one date which always seems to cause an
        error. 01/01/1997 translates to 01/15/1995 (1st day of the 15th
        month of 1995). This is obviously incorrect. I have determined
        it is a bug in Borland's date conversion routines. It is the
        ONLY date that causes problems, to my knowledge, all others
        translate fine. I advise against using 01/01/1997 for any expiry
        dates.

        This problem is still under investigation.


        11.6  Environment Variables

        When a user successfully logs in, a DOS environment variable is
        set to that user's login name. This can be a very useful feature
        as it allows custom programs to link with Sentry in a meaningful
        way.

        For example, if you are running Sentry from a batch file, you
        can check to see who logged in, and take appropriate action.

        Shown below is a short batch file which can be used for this
        type of function:

        -----------CUT-----------
        @echo off
        rem *** Run Sentry.
        \sentry\sentry
        cls
        rem *** Test to see who logged in.
        if %user==ROBERT goto robert
        if %user==DANNY goto dan
        rem *** Use a line like the one above for each user.
        goto end
        :robert
        rem *** Note that individual users have their own commands.
        echo SuperUser (Robert) logged in.
        defrag c:
        goto end
        :dan
        echo Dan logged in.
        goto end
        rem *** add more users as you see fit
        :end
        -----------CUT-----------

        NOTE: Batch files are not secure! No critical functions should
        be placed here unless it's absolutely necessary!

        An alternative (and more secure) method is to write a program in
        another language (like C) and compile it. Most programming
        languages allow you to read environment variables. This means
        that you can write your own custom extensions to Sentry, which
        will execute after a person logs in.

        Please also note that the usernames in the environment variables
        are all capital letters. (Sentry becomes SENTRY when it is set).

        ** NOTE: Although the environment variables are secure
        immediately after Sentry runs, they may not be secure after
        other programs have run. By this I mean that another program
        could alter the environment variables to make it LOOK like a
        different user logged in. As a result, try to do all your
        checking immediately after Sentry runs.


        11.7  Virus Scanners

        If you scan your system with a virus scanner such as Microsoft
        Anti-Virus, you may find that Sentry will show up quite often.
        The reason for this is that some virus scanners record
        statistics on executable files. When the next scan is performed,
        if the executable files do not match the statistics, the scanner
        panics. This can SOMETIMES be evidence of a virus on your
        system. Sentry modifies itself (in a manner similar to
        a virus) and so may be picked up on occasion, however please be
        aware that there is no threat from Sentry.

        SENTRY IS NOT A VIRUS!

        Every time you use Sentry, the executable is modified, and will
        cause your virus scanner to panic! Do not be alarmed, since this
        is normal operation for Sentry.


        11.8  File Deletion

        Many times, sensitive information can be obtained by recovering
        deleted files and examining their contents. This is a common
        practice, and takes little technical skill to achieve. An
        unauthorized user "undeleting" files can cause the System
        Administrator a lot of hassle if the information recovered is
        sensitive. Also, the user may be able to study the information
        and devise a plan of attack based on how the system operates.

        As such, when Sentry deletes a file, that file cannot be
        "undeleted" to recover any sensitive information. Sentry
        achieves this by routing all delete requests through a special
        function. This function essentially fills the target file with
        garbage (random characters) before deleting it. Once deleted,
        the target file may be "undeleted" however the only information
        available from the recovered file is the garbage, not actual
        data. As a result, an unauthorized user will not be able to
        recover anything more than random characters from Sentry's
        execution.

        Sentry uses this method of deletion on all files, regardless of
        their level of sensitivity. Please note however that deleting a
        file at the DOS prompt, or through any other program does not
        use this secure method.


        11.9  General

        Sentry is written in Borland C, with sections of C++. As of
        version 4.3, Sentry contains over 5500 lines of code.
        Portability between machines is not an issue, since Sentry has
        been designed and tested on standard MS-DOS machines.

        Sentry is verified compatible with Windows 3.x and Windows 95.


        12.0 Potential Threats To Security
        ==================================

        Never underestimate your users. And never be satisfied that your
        system is completely "air-tight". Users are incredibly apt at
        finding loopholes in security, and once found, these holes can
        be exploited. Because of this, I am listing below all of the
        security loopholes that I am aware of at this time.


        12.1 Account Information

        With the release of Sentry V3.0, account information has become
        much more secure. It is still POSSIBLE however that a user can
        find and dissect the account information. The probability of
        this is remote though, since the information is not easily
        edited or understood. Also, all of these methods require a
        working knowledge of how Sentry operates, and that is not
        commonly available. The best source for that information would
        be from this file, which is deliberately missing some key pieces
        of "technical" information.

        If a user did manage to decipher the account information, he may
        be able to do any of the following:

        - Add/Remove an expiry date (account or password)
              This is not a serious issue for passwords, as the user
              would still have to enter their old one before being
              notified that their password has expired. An attacker can
              NOT expire a password and then log in to that account.

        - Edit a username
              This would effectively lock out that user, unless they
              could guess their new user name.

        - Delete a user
              Users can be deleted, but not created.

        - Destroy a password
              Since passwords are encoded, there is no way to change a
              password to something usable. An edited password will lock
              that user out of their account, until the password is
              reset.

        - Change "last login" information
              Not critical, but could be used to cover an attackers
              tracks.

        - Change "number of invalid logins since last login" information
              Same as above.

        - Add/Remove restrictions on the max # of invalid login attempts
              Could allow a "brute force" technique to work on an
              account password if the restriction was lifted. Also, if
              an attacker set this restriction to 1 invalid login, that
              account would be disabled if a single failed login attempt
              was made. This would be very annoying to the SuperUser who
              would end up having to reset accounts fairly often.

        It is important to know however, that a renegade user can never
        grant himself SuperUser privileges, nor can he ever attempt to
        effectively modify a password. To perform any of these
        functions, he MUST be logged in as a SuperUser. In addition,
        NOBODY (not even SuperUsers) can view passwords.
        (They can never be decrypted, remember?)

        In essence:
        Sentry does it's part for security, but you must do yours as
        well...
                       GUARD YOUR SUPERUSER PASSWORDS!


        12.2 Hardware Loopholes

        Although it is unlikely that a user will do this, there is a
        potential security risk to Sentry. Fortunately, this method can
        only be implemented by highly technical users. If a user really
        wants to get into your system, he can disassemble it, and take
        the battery out of your BIOS. This will reset your BIOS to the
        standard setup, which does not include password protection. From
        there, the user can enter your BIOS, and change the boot
        sequence from C,A to A,C. This means that your computer will
        search for a boot disk before booting from your hard drive.
        Therefore, the user can get in if he has a pre-made boot disk.

        Like I said, it's unlikely, but possible. If you want to fix up
        this back door, you can re-wire your floppy disk drive so that
        it is never used on boot up. I do not have instructions for that
        at this time, however I am looking, and will include them in
        future.

        Along the same lines, a user could replace your hard drive (the
        one containing Sentry)  with another hard-drive. This way he
        could then boot up using the new hard drive, and never have to
        worry about Sentry. Also, if he kept your hard drive on the
        system (as drive D for example), he could still access your
        data. This kind of trickery is highly improbable, but not
        impossible.

        The above two methods take more technical skill than the average
        user possesses, and should not be considered a serious threat. I
        include them simply so you can be aware such things exist. If
        you are concerned about attacks of this nature, you should
        secure your system's case to the frame (IE: make it impossible
        to open the case with a screwdriver - install a locking
        mechanism or fuse the screws to the frame).

        It is critical to realize that it is EXTREMELY difficult to
        repel a determined and well-organized attack. Using Sentry does
        not guarantee your computer's safety. It does however greatly
        reduce the threat of a successful attack, and more importantly,
        it can alert you to potential threats before they become a
        serious problem. Your ability to defend is much greater once you
        know you are under attack. Sentry can keep you informed of
        suspicious actions on your PC, as well as being is a powerful
        tool in defeating most threats.


        13.0 Troubleshooting
        ====================

        13.1 Error messages

        Below are listed all possible error messages you can get while
        running Sentry. With each is a brief description of what it
        means, probable causes, and how to fix it.

        Please be aware that ALL of these errors cause Sentry to
        lock-up. This may be an inconvenience at times, but it is done
        for security reasons (that way an attacker can't "induce" an
        error and get into the system).

        13.1.1  Environment overflow - not modified.

        There was an error trying to set modify the DOS environment. It
        may occur if you try to run Sentry from within the Sentry DOS
        shell (IE: running Sentry from Windows, then when you're in the
        shell, running it again). If this error occurs, you are
        generally using too many environment variables for the amount of
        space you have allotted. See your DOS manual for ways of
        increasing environment space.


        13.1.2  Cannot locate environment!

        This indicates an error with your DOS environment. Make sure
        that you are using the regular environment, or that it is set up
        correctly.


        13.1.3  Error Reading Data Segment! [Open]

        This occurs when the initialization settings or account
        information is not acting as expected. Make sure that you have
        about 80k of disk space free, and that your Sentry.exe file is
        not read-only.

        13.1.4  Error Reading Data Segment! [Scan]

        This usually indicates that there are no initialization
        settings. The easiest way to remedy this is to re-install Sentry
        (see section 2 for details). That will create initialization
        settings, or over-write the old settings if they are invalid.


        13.1.5  Error in Initialization Settings!

        Your initialization settings are corrupt or could not be read.
        The best bet here is to re-install Sentry from scratch, and
        over-write the current settings. If you find this occurring
        frequently, it is probably a bug of some sort, and I should be
        contacted.


        13.1.6  Error in creating log file!

        The file that logs all transactions to your computer cannot be
        created. Make sure you have specified a valid pathname for this
        setting, and make sure you have about 80k of free space on your
        drive. If a log file already exists, it will be appended to.
        Otherwise it will be created.


        13.1.7  Error in Account Information.

        This means there is a problem with the account information for a
        certain user. You can either try restoring your sentry.exe file
        from backup, or you can re-install it (see section 2 for
        details). If you continue to use corrupt account information,
        you will find you are locked out quite frequently. It should be
        a top priority to fix the account info.


        13.1.8  Error opening log file!

        There is a problem with the log file. Make sure that the log
        file pointed to by the initialization settings is not
        write-protected.


        13.1.9  Error opening backup log file!

        There is a problem with the backup log file. Make sure that the
        file pointed to by the initialization settings is not
        write-protected.


        13.1.10  Error opening temp file!

        A temporary storage file cannot be opened. Make sure you have at
        around 80k of disk space left when you run Sentry.


        13.1.11 Internal Screen Error. [Reading]

        This error should never occur. Having said that, if it does,
        your best bet is to check your video mode. Sentry has only been
        tested in 80x25 text mode, so make sure that is what you are
        using. If this error crops up, please contact me with the
        details.


        13.1.12 Internal Screen Error. [Writing]

        See above.


        13.1.13 Out of memory!

        When this error appears, it means that for some reason, Sentry
        didn't have enough memory to run. This is extremely rare, since
        Sentry requires very little memory. If this error occurs, try
        freeing up some memory by unloading some un-needed programs, or
        rebooting.


        13.1.14 Registration Error - Program Aborted!

        Someone (probably you) has tried unsuccessfully to change the
        registration information. Very naughty, but if you want to fix
        it, simply restore Sentry.exe from your backup copy. (Again, a
        good reason to keep a backup somewhere!)


        13.1.15 This account has expired.

        Sorry, you're out of luck. The SuperUser(s) have set your
        account to expire, and so it has. If you ARE the SuperUser,
        silly you (you shouldn't let your own account expire!). In that
        case, you will have to restore the Sentry.exe from a backup,
        and make the necessary changes to get your system running.


        13.1.16 Cannot allocate memory for environment block

        This is another DOS environment error. Make sure your
        environment is set up correctly and has sufficient free memory
        allocated to it.


        13.1.17 Error Opening Message File.

        This error indicates that the message file cannot be opened.
        Ensure that your initialization setting for the message file is
        correct, and that the file is not read-only.


        13.1.18 Error Opening System Files!

        This is an error during installation. If this error occurs, make
        sure that your AUTOEXEC.BAT and CONFIG.SYS files are readable,
        if they exist.


        13.1.19 Error opening protected file!

        This error may occur when protecting a file from the SuperUser
        menu. Make sure the file you indicate to protect is readable.


        13.1.20 Error opening Sentry.ins!

        This error occurs when Sentry cannot find the file containing
        the descriptions for the initialization settings. Make sure that
        the file Sentry.ins is in the same directory as the Sentry.exe
        file.


        13.2 Other problems

        When I run Sentry, is displays a warning saying I have
        newer/older initialization settings.

        A: You should probably get the latest version of Sentry (see
        section 11.3 for info on obtaining the latest version). Replace
        all your current files with the files you retrieve. This warning
        may not be a problem in itself, however it is not a good idea to
        use initialization settings from a different version.


        I get a warning about users being tampered with in the log file.

        A: Someone has been tampering with your users (obviously). They
        thought they could change the SuperUser access on your system,
        but really couldn't. The only side effect of this is that some
        users may appear to have SuperUser access when they don't (and
        vice-versa) when you view them from the SuperUser menu. The
        users' actual access has not changed. To remedy this situation,
        you can get the user to enter another password (this can easily
        be done by expiring their current password). As soon as the new
        password is entered, the problem will disappear.


        I can't log in at all.

        A: Are you a user on the system? Are your initialization
        settings set up correctly? Have you run the install program?


        I can't log in as a SuperUser.

        A: Did you give yourself SuperUser access? Are you remembering
        to hold down CTRL when you hit enter?


        My account information is corrupt or deleted.

        A: Pray you kept a backup somewhere. At the very least, you
        should have the install program sent with Sentry. In that case,
        re-install, and log in as Sentry. Since Sentry is initially a
        SuperUser, you can re-create your users (don't forget to delete
        the Sentry user when you are finished!).


        I can't create a c:\Sentry directory on my drive.

        A: If you are using MS-DOS's UNDELETE program, it may create a
        directory called "Sentry" off of your root directory. This
        directory is hidden, and can only be seen with the "dir /a"
        command. (This only occurs if you are using the "delete sentry"
        mode). Possible fixes are to stop using "delete sentry" mode, or
        to create your Sentry directory as something else (eg:
        c:\Sentry2, c:\Secur\Sentry, etc etc).


        14.0 Standard Disclaimer
        ========================

        Inexperienced users should take care with this program, as you
        may lock yourself out of your computer!

        If you feel you want to use it, but don't feel completely
        confident, leave a "back door" for you to use. (IE: don't
        implement all of the security measures listed in "Securing Your
        Computer"), so that if you DO get locked out, you can still get
        in somehow. Once you are satisfied that all is well, lock up the
        back door too.

        Please read the document "LICENSE.TXT" included with this
        software for the entire licensing agreement.


        15.0 Contact Information
        ========================

        I would greatly appreciate any comments you might have about
        this program (either positive or negative). If you encounter any
        problems, or have a suggestion for making Sentry better, please
        let me know, and I'll try to put it in a future release. I look
        forward to hearing from you.

        You can contact me via e-mail at Mike.Bobbitt@AcadiaU.Ca and I
        will reply as quickly as I can. If you do not have internet
        access, you can contact me via surface mail at:

        NightShade Computing
        P.O. Box 1336
        Wolfville, Nova Scotia
        B0P 1X0
        CANADA


        16.0 Credits
        ============

        My thanks go out to these people:

        Mark Saarinen for the encryption algorithm.

        Richard Brittain for use of his DOS environment variable code.

        D.J. Houghton and Rob Coombs for testing and advising during the
        design phase.

        Dexter J. Caldwell for suggestions on various options, as well
        as the "template" methodology  for protected files.

        L.D. Best for suggestions, comments and bug reports, as well as
        detailed explanations of test situations. L.D. has provided
        many good ideas and useful comments with respect to Sentry, and
        has assisted greatly in "fine tuning" many features such as file
        protection.

        Bret Jacobsen for finding some serious errors in the first
        release, as well as continually making suggestions for
        improvement. Bret has given invaluable assistance in the
        development of Sentry.


        ...And my wife for listening to me talk incessantly about it.
