SCOUG Logo


Next Meeting: Sat, TBD
Meeting Directions


Be a Member
Join SCOUG

Navigation:


Help with Searching

20 Most Recent Documents
Search Archives
Index by date, title, author, category.


Features:

Mr. Know-It-All
Ink
Download!










SCOUG:

Home

Email Lists

SIGs (Internet, General Interest, Programming, Network, more..)

Online Chats

Business

Past Presentations

Credits

Submissions

Contact SCOUG

Copyright SCOUG



warp expowest
Pictures from Sept. 1999

The views expressed in articles on this site are those of their authors.

warptech
SCOUG was there!


Copyright 1998-2024, Southern California OS/2 User Group. ALL RIGHTS RESERVED.

SCOUG, Warp Expo West, and Warpfest are trademarks of the Southern California OS/2 User Group. OS/2, Workplace Shell, and IBM are registered trademarks of International Business Machines Corporation. All other trademarks remain the property of their respective owners.

The Southern California OS/2 User Group
USA

SCOUG OS/2 For You - July 1994


The Secure Workplace - For Desktop Security

by Richard Frank

Have you ever wanted to take your computer to a Team OS/2 demo but were afraid that your carefully crafted desktop would be destroyed? Do you get tired of loading programs on a store machine that you know will be inoperable the next day? Ever fumble for the location of an item using someone elses system? Enter "The Secure Workplace."

The Secure Workplace is a desktop security program from Syntegration. While other programs perform similar functions, none that I have seen match the price/performance and Workplace Shell integration achieved here. Whether you want to secure your deskto during a demo, prevent your children from getting into desktop trouble, stop a beginner from trashing their own setup, make a store machine tamper proof or setup a large secure LAN, The Secure Workplace has something for you.

Installation is easy, although the installation program is not as polished as the rest of the user interface. After you tell the program where to find OS/2, the installation informs you as it adds functions. Once complete, your system is ready for action.

Special Templates Provide Security

You start with the addition of several templates to your templates folder that give you Secure Programs, Secure Folders, Restricted Folders and Password Folders. You use these new secure templates the same way that you would any other templates with the addition of separate pages for setting local and global passwords and the details of how secure you want your setup to be. By checking boxes, you decide whether you want to be able to copy, move, shadow, delete, rename, drag, select, sort, arrange or get the details view of an object. This makes it extremely easy to protect your desktop with a minimum of fuss using a very intuitive user interface.

The Secure Program template allows creation of a program object that you can use without restriction, but most menu options are removed and optionally the settings are password protected. This function could be used to lock an icon in place and prevent accidental deletion, sorting, etc. without removing the ease of using that program object. Great for new users, or for tech support. Since you can lock an item in place, remote tech support personnel can direct a user to the exact location of an object without fear that the object has been moved or destroyed. This also prevents "adventurous" new users from making an irrecoverable error before they learn the ropes.

The Restricted Folder works the same way as the Secure Program but with a folder instead of an individual program. Again, this can be used to protect a folder that contains programs shared among users. A note of caution is needed here, however. Creating a Restricted Folder and dropping program objects into it does not make the objects secure. You must use the Secure Program template to do that.

The Password Folder goes one step further in protecting your programs. As the name suggests, it password locks the folder so that unauthorized personnel cannot open it. In addition, it optionally has a different password for unlocking the settings of th folder. It shares the features of the Secure Folder. The Password Folder could be used to limit entry to critical program objects to knowledgeable people while keeping newer users away from the heart of OS/2.

The Secure Folder is not really meant for an end user. Everything from opening the folder to adjusting any setting to opening a program is password controlled. This would generally be used for very sensitive data or those few very vital objects that the user would not need to deal with.

Now on to the other utilities provided with The Secure Workplace.

The Window List Manager is another tool to prevent the end user from making an end run around your security protection. With it, you can make a window list entry invisible, or grayed out, along with making the program "non-jumpable." This means that when you cycle through the open programs using <alt> - <esc>, a non-jumpable program will be skipped. This is very useful in a LAN environment when you want the server window to be transparent to the user. You can use this utility from the command line, or interactively through a PM object.

The Object-Maker is a script file that allows you to make custom objects. While an end user may find this tedious, a LAN manager would be able to use this to update or restore all of the systems under his control with one script, saving a great deal of time per system. The Secure Workplace comes with sample files to get you started.

The Object Relocator uses a REXX script to move existing program objects to new locations, again allowing for easy and uniform customization of a series of desktops.

What's in the near future for desktop security? Well, how about a Log-On Folder that would allow for remote log-on to a LAN and then create that user's particular custom folder on the machine they are using at the time. The folder is destroyed upon log-off, allowing a user to go anywhere and still have their familiar setup waiting for them. Can't you see the opportunities here?

In Conclusion

The Secure Workplace allows the end user to decide how much security is needed on a particular system. It allows tech support to rely on programs and documentation being where they should be. It provides the new user with a reliable, consistent desktop. For a suggested retail price of $59.95, The Secure Workplace is cheap insurance for your system.

The Secure Workplace is available in both a single user version ($59.95) and a broader enterprise edition ($549 for a 10 workstation license). For more information about this product, contact Syntegration, 13241 Norton Avenue, Chino, CA 91710; phone(909) 464-9450; FAX (909) 464-9438. It can be found at Indelible Blue, Inc., (800) 776-8284; The Corner Store, (800) I-BUY-OS2; and locally at Office Solutions, (800) 897-APPS or (310) 439-5567.



The Southern California OS/2 User Group
P.O. Box 26904
Santa Ana, CA 92799-6904, USA

Copyright 1994 the Southern California OS/2 User Group. ALL RIGHTS RESERVED.

SCOUG is a trademark of the Southern California OS/2 User Group.
OS/2, Workplace Shell, and IBM are registered trademarks of International Business Machines Corporation.
All other trademarks remain the property of their respective owners.