

                                  LOG & COPY

                        Usage and copy limiting utility
                                      for
                                Novell Netware



I.      Abstract:

         This utility has two functions.  First it allows for the
         logging of programs run on a NOVELL file server for
         accounting purposes.  It creates entries into the SYS$LOG.MSG
         file that Novell keeps in SYS:SYSTEM directory.  You can
         select all or some programs to be audited.  The second
         function of LOG&COPY is to limit the number of executions of
         a software product.  This allows a system administrator to
         purchase a limited number of copies of certain software to be
         run on the Novell file server.

II.     Programs used:

         LOG&COPY.EXE - required by all users.  Can be executed many
         times.

         SETCOPY.EXE - Required only by system supervisor.  This sets
         up the correct number of copies available and whether the
         program execution is logged into a file.

         LOG&COPY.DAT - data file created by SETCOPY.EXE.

         NET$LOG.MSG - Data file recording program executions, created
         by Novell system.

III.    Installation:

         A. Copy the LOG&COPY.EXE file into SYS:PUBLIC or any area
         that a user will have at least read, open and search (ROS)
         rights to at login time.

         B. Copy SETCOPY.EXE into an area only a system supervisor can
         access.  SYS:SYSTEM may be a good area for this.  This
         program sets up the number of copies available and logging
         options.  This program is used only by the system
         administrator.

IV.     Use:

         A. LOG&COPY - This program is a terminate and stay resident
         (TSR) program that needs to run on each user station.  The
         program is small (8K) and can be re-run without memory
         penalty (it does not re-load multiple times.)  Each time the
         program is run, the copy limiting data base is loaded.  The
         program should be run at LOGIN, but can also be run from a
         menu system or batch programs.  For the protection to work,
         the program MUST be run at least once at login.  This program
         can be run from an AUTOEXEC.BAT file at login or can be run
         as the EXIT program from the system login script.  Users
         should not be able to break out of the program before
         LOG&COPY is executed.  Here is an example of a system login
         script:

                        MAP DISPLAY OFF
                        MAP S1:=FS1/SYS:PUBLIC
                        MAP INSERT S1:=FED/SYS:SUPUBLIC/BATCH
                        (other stuff here)
                        #SPOOL /NB /TIMEOUT=5 /P=0
                        EXIT LOG&COPY

         If you exit to a menu program, just make have the first lines
         of the menu program execute LOG&COPY.EXE.  The program is
         very small, and there is no penalty for multiple executions.

         B. SETCOPY - This program is used by the system administrator
         for two functions:  Set the number of available copies for
         use and optionally keep a log of program executions.  The
         program creates or modifies a file named LOG&COPY.DAT that is
         always kept in the SYS:PUBLIC area.  This program is menu
         driven and self- explanatory.  The system administrator
         should read the next section about LOGGING usage data.

V.      Notes about LOGGING usage data.

         A. When using SETCOPY, enter the complete name of the program
         to copy limit, including the directory name.  The LOG&COPY
         program matched from right to left the name of the protected
         program.  By including the name of the directory, you will
         guarantee the correct program is protected.  Enter the name
         of the program like this:

                \PUBLIC\WORDPERF\WP.EXE   or
                \PUBLIC\UTIL\BROWSE.COM

         you may NOT include a Novell volume name. (like SYS:)

         B. The logging of program executions is an accounting
         function that keeps track of some or all .EXE or .COM that
         are run.  This feature can be turned on or off using the
         SETCOPY program.  The SETCOPY program will ask if a certain
         piece of software should be logged or not when you create the
         number of available copies.  Also, the SETCOPY program will
         allow you to set DEFAULT LOGGING on or off.  DEFAULT LOGGING
         is the recording of every .EXE or .COM execution on the
         system, except programs in the LOG&COPY.DAT file that has
         logging off.  This can be very useful in watching traffic on
         your network but remember, THIS CAN BECOME A LOT OF DATA REAL
         FAST!  Data is stored in the system file called NET$LOG.MSG
         and is always in the SYS:SYSTEM area.  Users do not need any
         special rights for this function.  The system administrator
         should watch the size of this file and copy it off the
         network whenever it get too big, or at the end of an
         accounting period.  The format of the NET$LOG.MSG file is as
         follows:

                Column  Description
                ------  -----------------------
                1-8     Date in MM/DD/YY format
                10-14   Time in HH:MM format
                16-22   Logical station number in STN nn: format
                25-26   Execution key (@S = start, @E = end,
                        @F = failed excecution, %% = exceeded copy
                        limit, execution failed.)
                28-80   Program name including full path name

         The NET$LOG.MSG file can be erased at any time.  If the file
         does not exist, the system will create it.

         Here is a hint for default logging.  When default logging is
         ON, all .EXE or .COM files are logged, even trivial ones that
         you may not wish to keep track of.  For these files, simply
         run SETCOPY, make an entry for the trivial program, and
         request no logging or copy limit.  This will allow all users
         to use the program without restriction but will not clutter
         your accounting data set.

