The X-Lock 1 Product is NOT "Public Domain" and it is NOT "Freeware". X-Lock 1 is a copyrighted software product developed and owned by X-Lock Corporation, located in Alpharetta, Georgia, U. S. A. X-Lock Corporation, grants you without charge the right to reproduce, distribute and use copies of this version of our X-Lock 1 shareware software product, subject to the limitations specified below, and on the express condition that you do not receive any payment, commercial benefit, or other consideration for such reproduction or distribution, or change this license agreement or the following copyright notice which appears in the software, documentation, user interface, menus and magnetic media: (C) Copyright 1988, 1989, 1990 X-Lock Corporation All rights reserved worldwide.
Limitations: You may make and keep one (1)back-up copy of the software for your personal use, provided that (i) you copy all the copyright, trademark, and other information indicated on the initial screen display (or on the diskette label, for the registered version disk) onto your backup diskette label, and (ii) you have registered. Also you may distribute copies to other persons, but solely for their evaluation (i.e., to decide whether to continue using the product and therefore register) and solely for evaluation by such other persons during that thirty (30) day period. X-Lock 1 must NOT be sold or otherwise provided as part of a larger system, or as a part of a more inclusive product or service, without express written consent and licensing from X-Lock Corporation.
The rights to receive any such financial or other benefit, and to modify the product or employ its components in any kind of derivative work, are reserved exclusively by X-Lock Corporation. Support from users enables us to develop additional features and future versions of the X-Lock 1.
Registered users benefit from enhanced technical support, notice of new products, and bulletin board access. To register, please send $25 to:
MAGEE ENTERPRISES INC. POST OFFICE BOX 1587 NORCROSS, GEORGIA 30091 USA (404) 446-0271
Please use the enclosed registration form and include software version #.
Xlock Corporation has a wide range of data security and privacy products, please see the following page for additional products.
X-Lock Product Familiy
Thank you for choosing X-Lock 1 as a privacy system for your computer/s. To have a fully functional security system you may want to install optional software/hardware. A list of our current product line is provided below.
X-Lock 1 Access Control SHAREWARE privacy system Provides access control for 1 user
X-Lock 10 Access Control Provides access control for 1 system administrator and 9 general users
X-Lock 10 Hardware Provides increased security with hardware boot protection for IBM PC/AT and 100% compatibles
X-Lock 10 PS/2 Hardware Microchannel version of above
Directory Control System Administrator can restrict access to specific directories to individual users
Program Authentication Guards against computer viruses and un-authorized use of software
Audit Trail Provides a permament record of who has used the PC and their activities
DES Encryption Provides a means to encrypt your data on a file by file basis
X-Lock 50 An NSA approved security system for 130 users providing all of the above features with the added benifit of full disk DES hardware encryption on the fly. ... for maximum security
Also, please feel free to contribute your ideas regarding desired additional product features and functionality.
THIS PRODUCT IS LICENSED "AS IS" WITHOUT ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, PERFORMANCE, OR OTHERWISE; ALL WARRANTIES ARE EXPRESSLY DISCLAIMED. BY USING THE X-LOCK 1 PRODUCT, YOU AGREE THAT NEITHER X-LOCK CORPORATION NOR ANY OFFICERS, DIRECTORS, EMPLOYEES, SHAREHOLDERS, AFFILIATES, OWNERS, OR OTHER RELATED PARTIES WILL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY USE OF (OR INABILITY TO USE) OR PERFORMANCE OF THIS PRODUCT, OR FOR ANY DAMAGES WHATSOEVER WHETHER BASED ON CONTRACT, TORT OR OTHERWISE. EVEN IF WE ARE NOTIFIED OF SUCH POSSIBILITY IN ADVANCE. (SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE FOREGOING LIMITATION MAY NOT APPLY TO YOU.)
You may not reverse-engineer, disassemble, modify, decompile or create derivative works of the product. You acknowledge that the product includes certain trade secrets and confidential information, all of which is the copyrighted intellectual property of X-Lock Corporation. X-Lock 1 is a registered trademark of X-Lock Corporation. All rights are reserved worldwide. IBM, Microchannel, PS/2 and Personal System/2 are registered trademarks of the IBM Corporation.
RESTRICTED RIGHTS LEGEND
Use, duplication or disclosure by the Government is subject to restrictions as set forth in sub paragraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause of DFARS 252.227-7013. X-Lock Corporation, 2001 Westside Pkwy, Suite 190, Alpharetta, Georgia 30201. (404) 475-8787
On the X-LOCK 1 distribution diskette you should have the following files:
README.DOC - documentation (this file) 1INSTALL.EXE - install / uninstall program PASSWORD.EXE - password change program EMERACC.EXE - emergency access program LOGON.SYS - security driver SUSPEND.COM - suspend utility SHOWME.EXE - module version utility WHO.EXE - unauthorized logon audit utility
If you downloaded these files from a network or BBS, copy all of them to a blank diskette. We will refer to this disk as your "INSTALL diskette". The current version of 1install requires that the installation be done from this diskette.
Please be sure to make a backup of this diskette.
Installation of X-Lock 1 is SIMPLE. There are three(3) steps:
1. Format a bootable system diskette for use by installation program 2. Execute the A:1INSTALL program to install programs 3. Execute the PASSWORD program to activate your password
UN-Installation of X-Lock 1 is also SIMPLE. There is one(1) step:
1. Execute the A:1INSTALL program to un-install programs
>>>> NOTE: The XLOCK-1 must be un-installed prior to changing DOS levels
First obtain ANOTHER diskette that will fit in your bootable diskette drive, (most of the time this is drive a:). Format this diskette with the standard DOS command:
FORMAT X:/S
where X is the bootable drive on your PC
This bootable diskette will be used later as the "EMERGENCY ACCESS" diskette.
Please label as EMERGENCY ACCESS and which PC it is for.
Please place it aside and re-insert the "INSTALL" diskette.
Next get to the bootable drive prompt, for instance
A:\
Once you see the prompt above invoke the install program like this:
1install : :
where source is your bootable diskette drive and target is your bootable hard disk.
Once you have invoked 1install.exe a screen will appear asking you if you want to install or un-install. Select "I" to install. A menu will now appear with the current status (installed/un-installed) of all available X-Lock options. You may select each option by pressing the button that represents it. For example if you chose to install Access Control you would press the '1' button on your keyboard.
NOTE: Access Control MUST be installed prior to any other module.
You will then be prompted to insert the formatted system diskette you made earlier. After 1install.exe is finished with the "Emergency Access Diskette" you may install additional options (if purchased) or quit the program.
You must now re-boot your computer before you can finish installing X-LOCK 1. The install program will assist by re-booting for you.
NOTE: YOU MUST REBOOT !
The "Emergency Access" diskette created above can be used to obtain "Emergency Access" should you ever get locked out of your PC. Keep this disk in a safe place as it can be used to circumvent the security system. Also, each emergency access diskette is unique to the PC where it was created. DO NOT USE AN EMERGENCY ACCESS DISKETTE CREATED ON ONE PC ON ANOTHER PC. Use of the emergency access disk on the wrong PC will destroy the PC's data, and it will not be recoverable. Each PC must have its own unique Emergency Access Diskette. The Emergency Access diskettes are not interchangable between PC's.
The procedures for using the Emergency Access diskette are described below.
The password program will obtain your account name and password that you create (up to twenty characters). It is advisable to use at least eight characters each.
X-Lock 1 is now completely installed. To make it active, the computer must now be RE-BOOTED.
THATS IT!!
NOTE: The PASSWORD.EXE and other utility programs must be executed out of the XLOCK subdirectory, or a "PATH=C:\XLOCK" must be included in your AUTOEXEC.BAT file.
NOTE: The XLOCK programs require that the XLOCK subdirectory be located off of the root directory. Do not attempt to move the installed programs to another directory.
First insert the "INSTALL" diskette into the bootable drive (A).
Next get to the bootable drive prompt, for instance
A:\
Once you see the prompt above Invoke the uninstall program like this:
1install
where source is your bootable diskette drive and target is your bootable hard disk.
Once you have invoked 1install.exe a screen will appear asking you if you want to install or un-install. Select "U" to uninstall. A menu will now appear with the current status (installed/un-installed) of all available X-Lock options. You may select each option by pressing the button that represents it. For example if you chose to install Access Control you would press the '1' button on your keyboard.
The uninstall program will now remove the appropriate programs and drivers from your computer.
You must now re-boot your computer in order to completely remove X-LOCK 1. The uninstall program will assist by re-booting for you.
NOTE: YOU MUST REBOOT !
NOTE: DO NOT attempt manually un-install any of the XLOCK files.
The "Emergency Access" diskette created during installation can be used to obtain "Emergency Access" should you ever get locked out of your PC. Keep this disk in a safe place as it can be used to circumvent the security system.
EMERGENCY ACCESS PROCEDURES
In the unlikely event you are locked out of your PC the Emergency Access disk can generally be used to unlock the system. If you are unable to unlock your PC after following the Emergency Access procedures then contact your dealer or X-Lock Corporation for further assistance.
Each emergency access diskette is unique to the PC where it was created. DO NOT USE AN EMERGENCY ACCESS DISKETTE CREATED ON ONE PC ON ANOTHER PC. Each PC must have its own unique Emergency Access Diskette.
Follow these steps CAREFULLY:
1. Locate the "EMERGENCY ACCESS" diskette and "ACCESS CONTROL" diskettes that were created in the installation process.
2. Boot your PC from the A: drive with your Emergency Access Diskette and obtain an A:> prompt. Then type
EMERACC xxxxxxxx
Where xxxxxxxx is the key you wrote down during the installation process.
While running the EMERACC program you should have seen the message
Emergency Disk Recovery Complete
3. Press any key to continue. The machine will automatically reboot and UN-INSTALL all X-LOCK related device drivers and files.
4. When the machine is finished press "q" to quit. The machine will once again reboot.
5. You are now ready to re-install X-LOCK 1.
NOTE: THIS "EMERGENCY ACCESS" DISKETTE IS A "FEATURE". IT DOES NOT HAVE TO BE USED!!
IF YOU DO NOT WISH TO KEEP THE EMERGENCY ACCESS DISKETTE JUST DESTROY IT. OUR TECHNICAL SUPPORT DEPARTMENT IS AVAILABLE TO ASSIST THE USER SHOULD THEY GET "LOCKED OUT" OF THEIR SYSTEM.
These programs are executed from the DOS command prompt.
1) SUSPEND - This program provides a means of securing a machine that has been inactive for a pre-determined period of time. It also provides a "hot-key" that will secure the machine while the operator is away from the computer.
The screen will go blank, depressing any key will display the log-on screen.
When the operator returns, a simple log-on will resume the operator to the "suspended" program.
Both the time period and the "hot-key" are set as command parameters.
Type SUSPEND ? for more information
Note: This program may not work with certain graphic-based programs.
2) SHOWME - This program will display the versions of the XLOCK modules.
3) WHO - This program will display all unsuccesfull log-on attempts. This will let you know that someone has TRIED to use your machine!!
Note: This program will not log attempts made from the SUSPEND log-on banner.
Note: This program uses the PC/AT clock and date information. Several older PCs do not have real-time-clocks. The date stamps therefore will be inaccurate in these machines.
The illegal logon attempt will still be logged.
NOTE: These utility programs must be executed out of the XLOCK subdirectory, or a "PATH=C:\XLOCK" must be included in your AUTOEXEC.BAT file.
User Registration: YES! I want to help support the Free Enterprise Name: ___________________________________________________system. Please register me as a Address: ________________________________________________user of the X-Lock family. This Telephone: _____________________ registration entitles me to Product: _______________________ warranty, manuals, update information Serial Number: ________________ and support.
Received From: __________________________________________$25 REGISTRATION FEE $8 X-LOCK T-SHIRT IMPORTANT ! Resale or Export of this equipment from USA may be subject to control by the U.S. Department of StateMETHOD OF PAYMENT MC VISA YES! I am enclosing an additional $8.00 for an X-LOCK T-SHIRT (The latest in Security Fashion) __________________
Make Payment to: __________________ MAGEE ENTERPRISES INC. SIGNATURE/EXP DATE POST OFFICE BOX 1587 NORCROSS, GEORGIA 30091 USA CHECK ENCLOSED