ebook img

Computernews: April 1992 PDF

40 Pages·1992·3.4 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Computernews: April 1992

university oftoronto computing services Artist's conception Exclusive to ComputerSnoop Da of ainging computer Spirit of Elvis Serenades at Faculty of Music! Staff at the U of T’s Faculty of Music were stunned recently when the voice of Elvis reached out to them from beyond the grave. A nameless source confided to the Daily that when employees turned on their computers in the morning, a ghostly image of Elvis appeared on their screens while the King crooned “Love Me Tender” on networked machines. Those with standalone terminals were treated to “My Way.” Bin Blue Turns Green Over Pink: Michael Wilson IEM/Apple Merger on the Rocks Virus Discovered ComputerSnoop Daily’s Computer Specialist, C.P.U. on Campus 1 Mouseman, has learned that the once rosy relationship that was Alert staff members at blossoming between Apple and IBM now stands little chance of Computing Services are survival. Apple’s alleged involvement with a third party has sent IBM running to the lawyer’s office. credited with stopping the spread of the “How can we possibly be expected to maintain an honest newly-discovered Michael relationship with a company that will run around with any Wilson Virus. First common little number cruncher?” a high-ranking IBM encountered on a computer executive questioned. in the accounting Em Pathy, ComputerSnoop’s Advice Columnist, suggests that department, the Michael both parties get counselling. Details on page 42. Wilson Virus annoys users by displaying the following poem: How to tell if your neighbour is a Canadians are we hacker> Details inside on page 57. We love the GST Taxes are such fun Please give us a new one Space Aliens Contact And fill us all with glee. 0 of T Computers through D of T // Satellite Dish / L Exciting Features Inside “Send us more TETRIS,” was the message that Computer Monitor an appeared on dozens of Electronic Valet? monitors across the cam- / page 13 Computer Possessed by Ghost of Reznikoff /page 36 ISSN 0315-4661 April 1992 No. 277 Macworld Exposition in San Francisco LAN Security Software Piracy 7 Half Price Manuals Sale! 8 INTERNET Notes Help from Advising & Consulting Microcomputer Short Courses Dual Processing Using Computer Monitors 13 Statistical Software News 14 Maple Corner: News for Maple Users at U of T 15 A Successor to UNPACK and EISPACK: LAPACK Available 17 PV-Wave Demonstration Tape 18 UTCS Services 19 Consulting & Enquiries 20 UTCS Directory 20 Terminal and Advising Sites 21 UTCS Site Licences 22 PC Maintenance 27 UTCS Software List 28 Publisher Unless otherwise indicated, network addresses University of Toronto Computing Services appearing after the author's name pertain to Toronto, Ontario NetNorth/BITNET/EARN. Canada M5S 1C1 Permission is granted to reprint articles from Editor: Patricia Hood ComputerNews for noncommercial purposes provided the author, publication, and issue are Editorial Assistant: Maureen Monne acknowledged. Publication Date: April 1, 1992 IBM PC, PC-XT, PC-AT, Personal System/2, Operating Subscriptions System/2 are trademarks of IBM. Subscriptions run for one year, beginning each Intel is a registered trademark of Intel Corporation. January. Changes should be entered on the LaserWriter is a registered trademark of Apple form at the back of this issue and mailed to: Computer, Inc. Lotus 1 -2-3 is a registered trademark of Lotus ComputerNews, 4 Bancroft Avenue, Room 217 Corporation. (or phone 416-978-4034). FAX: (416)978-7159. Macintosh 512K, Plus, SE are trademarks of Apple ComputerNews is published eight times yearly Computer, Inc. Microsoft Word and Microsoft Windows are trademarks by the University of Toronto Computing Services of Microsoft Corporation. (UTCS). Enquiries should be directed to: MultiFinder is a trademark of Apple Computer, Inc. The Editor Paintbrush is a trademark of Microsoft Corporation. PostScript is a registered trademark of Adobe Systems ComputerNews Inc. University of Toronto Computing Services SAS is a trademark of SAS Institute Inc., Cary, N.C. 4 Bancroft Avenue, Room 217 SPSS* is a trademark of SPSS Inc. Toronto, Ontario UNIX is a trademark of AT & T Laboratories. Canada M5S 1A1 Acknowledgements Network address: Thanks to Amanda Wagner for her assistance in [email protected] editing this issue. (NetNorth/BITNET/EARN) Special Thanks Many thanks to A.F. Technologies for giving us exclusive rights to publish a review of the StaubSauger,M. This newsletter was entirely produced on a Macintosh using PageMaker and other related Macintosh software. Features Macworld Exposition in San Francisco Dariusz Dabek dabek@gpu. utcs. utoronto. ca Everyone in the Macintosh two standard media types: digitized to the QuickTime documentation, it community anticipates great things video and digitized sound. Other doesn’t work as well for small or low- from the annual pilgrimage to the types not supported at present such resolution images. That’s why Apple Macworld Exposition in San Fran¬ as MIDI easily can be added to the came up with their own algorithm, cisco. Over 60,000 Macintosh Movie Toolbox repertoire. Apple-Video, for video data. This enthusiasts attended the Expo this The Image Compression Manager doesn’t compress as well as JPEG, year. Major attractions included is responsible for manipulation of but it works well on small images of QuickTime and substantial upgrades both still images and image se¬ to popular Macintosh applications. quences. Since high quality colour stills and full motion video take large amounts of disk storage, Compres¬ Creating QuickTime movies is QuickTime sion Manager provides different easy. Adobe Premiere, shown algorithms for squeezing QuickTime below, is one of several pro¬ Editing video is now as easy as data. Among the standard compres¬ grams designed for digital movie cutting and pasting text. QuickTime sion schemes included are the Joint manipulation. It uses a “video is a new Apple architecture that Photographic Experts Group (JPEG) paste-up” table to assemble, edit, allows full motion video, animation, Standard for still images, and Apple- and merge together digital and music with stereo sound to be Video for moving images. JPEG is sound, video, and special effects. manipulated as easily as text. Static an ISO-standard algorithm, and is The final output, a self-contained pictures can now be replaced by very time-consuming to perform QuickTime movie, can be saved moving images accompanied by entirely in software. Also, according on disk or “printed” to a VCR. stereo sound, thereby creating dynamic documents and presenta¬ t File Edit Project Clip Windows tions. Any application that supports g <3 traditional Macintosh graphics can now include QuickTime movies. For example, resumes no longer have to be one-dimensional, but can include video “postcards” of the applicant, giving prospective employers a greater sense of the applicant’s personality. The QuickTime Architecture Project: I-Sample Project Special Effects Juggler [i i a Band Slide The architecture contains three Movie Image B slides over Image A in Duration . 0.00 :01 .20 horizontal or vertical bars main components: the Movie 160 x 120 A Band Wipe Toolbox, the Image Compression Image B is revealed under Image A by Jump dancer ii horizontal or vertical bars. Manager, and the Component Movie Duration: 0:00:05.04 - A Barn Doors Manager. 160 x 120 * Image B is revealed under Image A from the center outwards The Movie Toolbox deals with Liue [i | A CheckerBoard time-dependent data, i.e., movies. Still Image Two sets of alternating boxes wipe to Duration: 0:00:01.26 reveal image B under image A. Each movie is composed of tracks, 340x 280 A Cross Oissolue and each track contains different Image A fades into image B forms of media. Currently there are ComputerNews April 1992 1 Features QuickTime allows the Word¬ i File Edit Search Layout Tools Macro Font Style Perfect document at left to Doc 2: 3 NASH R Legacy incorporate moving images as NASA well as still images. The Legacy of Manned Spacecraft The United States space mankind", program began as a response making history to the launching of the Sputnik for all ages Soviet Satellite in the early The Apollo 1950's JohnF Kennedy space program furthered the grand aspirations sent almost of the program, vhen he twenty declared that the United States missions into would land men on the moon outer space And in 1969, this goal become Following the reality, as human beings set Apollo foot on the moon, declaring program, we "one small step for man, one witnessed giant leap for mankind", making history for all man's first CAN$500. For the educator, it is an ages launch-able and economical way of bringing multime¬ The Apollo space program sent almost re-landable twenty missions into outer space Following spacecraft, the dia into the classroom, and for the the Apollo program, we witnessed man's first Space launch-able and re-landable spacecraft, the Shuttle. The amateur videographer, QuickTime flown satellites into low-earth orbit and has Space Shuttle represents a quick and inexpensive repaired satellites as well The United States has flown space program began as a response to the satellites into low-earth orbit and has repaired way of creating flashy home videos. launching of the Sputnik Soviet Satellite in the satellites as well. Scientific and military early 1950's. JohnF Kennedy furthered the missions have each seen various payloads been The following are examples of how grand aspirations of the program, when he sent into outer space . The United States space QuickTime can be used: Education around 160 * 120 pixels (which tions, since almost every Macintosh seems to be a standard size that will be capable of running QuickTime Apple is recommending for many without any additional expense or QuickTime movies and animations common uses), and it will decom¬ hardware. are featured in an interactive feature press images of this size fast Vendors are now beginning to magazine at Syracuse University. enough to play back 10-12 frames include QuickTime support for their Syracuse’s interactive magazine, per second in real time, even on a applications, one example being created in HyperCard and Director Macintosh LC. DeltaPoint with its popular graphing 3.0, will be available on the campus¬ The Component Manager is an and presentation package, wide network this fall. A forthcoming interesting addition to the core DeltaGraph Professional. With it you project includes an Architectural system software. It allows you to can use QuickTime movies to Digest, an interactive walkthrough of install pieces of software, called emphasize points in presentations, the main campus. “components," to perform various e.g., moving graphs and charts useful services not restricted to which show changes in values over Training QuickTime. Within QuickTime, time. image compressors and For programs that support only decompressors are implemented as PICT, Apple France has created a An airplane engine manufacturer classes of components. Movie system extension called WildMagic. is using QuickTime movies in a media handlers are another class, as This allows any Macintosh applica¬ HyperCard-based electronic manual are video digitizer drivers. Compo¬ tion supporting PICT, such as for factory mechanics. Technicians nents can be installed at any time, Microsoft Excel, to play QuickTime use HyperCard stacks to learn about for example by running applications, movies. assembly procedures instead of not just at system startup. Creating QuickTime movies is flipping through paper manuals. The The main piece of bad news about easy. Necessary equipment in¬ electronic manuals include QuickTime is that it will only work on cludes any consumer video camera QuickTime movies and traditional colour-capable Macintoshes, and or VCR, a suitable digitizing card, Macintosh graphics with a scrollable those with a built-in 68020 CPU or and compatible software. At window for instructional text. better; that is, a Macintosh LC or Macworld 1992, the combination that better. generated the most interest was Presentations Providing this base for every SuperMac’s Video Spigot, Adobe’s system, Apple hopes to persuade Premiere, and a Sony Handycam. developers to included more Excluding the camcorder, the total Ben & Jerry’s ice cream company QuickTime support in future applica¬ cost of the starter setup is less than is using QuickTime movies in a 2 ComputerNews April 1992 Features Macintosh-based presentation for search for all files containing the The 4D Server program is a stand¬ the 300,000 tourists who visit the phrase “Gothic cathedrals”, and alone application requiring a dedi¬ company's Waterbury, Vermont ice¬ documents that include the phrase cated Macintosh computer. Blyth cream factory each year. The would be presented for review. Software showed Omnis 7, a System interactive presentation, created with MacWrite Pro was once again 7-savvy improvement to Omnis 5. DiVA Corp.’s VideoShop and demonstrated in the Claris booth. On the high end, Oracle Corporation HyperCard, takes visitors on an The latest estimate on its release rolled out a host of Macintosh electronic tour of the factory, pro¬ date is late summer 1992. When development tools and a new vides a history of the company and completed, MacWrite Pro will include version of the Oracle Server for the includes an on-screen form for all sought-after text processing Macintosh, now fully compliant with ordering gifts, T-shirts, and ice features such as tables, style sheets, Oracle version 6.0. cream. The keynote session at and macro language scripting. A disappointment again was Fox Macworld 1992 included a brief In desktop publishing, Aldus Software and their inability to demo of the stack, along with a produced fractional improvements to complete the much needed special QuickTime movie postcard PageMaker from version 4.1 to 4.2. FoxPRO/Macintosh. from the company founders, the real Ben and Jerry. Personal Information Spreadsheets Managers New Features, Old Previous competitors have not Faces threatened Microsoft Excel’s position as spreadsheet leader. However, This year the favourite Macintosh that may change. Lotus Corporation applications were the Personal With all the excitement over the was exhibiting Lotus 1-2-3 for the Information Managers (PIMs). The new QuickTime architecture, we Macintosh, except this time one new Macintosh PowerBooks must should not overlook the sometimes could actually purchase the product. have reignited this phenomenon. small, but nonetheless important Early observations indicate that 1-2- Today’s must-have feature for PIMs changes made to more familiar 3 will not appeal to the hard-core is the ability to exchange data with Macintosh applications. Most Excel aficionados; however, to users pocket electronic organizers. noteworthy were the upgrades from migrating from the PC to the Macin¬ Another important feature was the Microsoft and Claris, and the arrival tosh, 1-2-3 will be a welcome, ability to send alarms or reminders to of Lotus 1-2-3 for the Macintosh. comfortable, and familiar environ¬ users through any network media Oracle, Blyth, and Acius also ment. imaginable. The most popular showed up with new database Claris Resolve, based on Wingz, option here was the pocket pager. features. the first Macintosh spreadsheet to This is a portable device which feature the ability to incorporate allows you to receive mail messages graphs on the worksheet page, fully sent from a computer via a modem Word Processing and Desktop integrates with other popular Claris to a number specific to your pager. Publishing programs. For example, one could The message appears on a tiny produce a report in MacWrite Pro screen on your pager. and include a chart created in Innovative and unusual products Microsoft Word’s first major Resolve from data originally main¬ were also in abundance, among upgrade in a couple of years was on tained in MacProject, all done them Macintosh video display. Judging from the crowds automatically with System 7 Apple teleconferencing and paging devices surrounding the Microsoft booth, Events and Inter-Application- triggered by Apple Events-based users were fascinated by Word 5.0's Communication (IAC). software. Many users will finally see new features. Most questions some real-life applications that use centred around Word’s “open the much-talked about Inter-Applica¬ Database architecture" (i.e., the ability for the tion-Communication (IAC) feature user to install various functions in the found in System 7. word processor by dragging required All major database players For more information on products components into magic extensions displayed their wares. Acius was exhibited at Macworld Expo 1992, folders). The file find/search feature running the 4D Server program, contact Dariusz Dabek at 978-6878 was of major interest. Word has the reporting a 20 to 400 fold improve¬ or via electronic mail to ability to search all its files anywhere ment in database access speed. dabek@utcs. utoronto. ca. on the desktop for words and phrases. For example, one could ComputerNews April 1992 3 Features_ LAN Security Wilfred L. Camilleri • The security features of individual user identifies himself/herself to the Security Administration Manager applications. system by entering a User ID, • The physical protection of usually consisting of the user’s Systems Development resources (e.g., LAN server, initials. The user’s identity is workstations, backup media). confirmed when the user enters his/ • The presence of links to remote her confidential password. Local Area Networks (LANs) make users, whether through other Considerations: information and computing resources LANs or dial-in modems, and the ✓ Assign each user his or her own readily available throughout an protection afforded to those links. unique ID. Each user should only organization. LANs also enable • The access users have to the have one User ID. groups of users to share resources LAN (e.g., the information they ✓ Assign each user his or her own and communicate with each other have access to, the information confidential password. more effectively. They are designed they share, their knowledge). ✓ Passwords should be encrypted to be user friendly and there is a lot All these factors should be and known only to the user. of flexibility built into their operating considered when assessing the ✓ The minimum password length systems. Unfortunately, this often security of a particular LAN. Assess¬ should be six characters. leads to situations where LANs are ing the security requirements of the ✓ The password change frequency set up with little centralized control or LAN is especially important if it is should be set at thirty days. planning. This can result in very going to be used for business or ✓ Make sure that users can only loose or in some instances no registrarial applications or if confi¬ choose unique passwords (i.e., consideration being given to the dential and/or sensitive information is users should not be able to pick security of the LAN and the informa¬ being processed and stored on it. the current password as their new tion stored and processed on it. The following checklist provides a password when the system LAN administrators are normally navigable road map for administra¬ requires them to change it). given a wide choice of options in tors to evaluate and adjust the ✓ The number of grace login days setting up the security of the LAN, security of their LAN. Not all following the expiry of the current and without careful planning, the requirements listed are applicable to password should not exceed five administrator may inadvertently all LAN environments. Review the days. leave the LAN and its users wide requirements listed and identify the ✓ Limit the number of consecutive open to attacks from unscrupulous ones that apply to your LAN. Once unsuccessful login attempts to a users. you have identified the applicable maximum of five attempts. Third party access control and requirements, use them to evaluate ✓ Make sure that the password is security software is also available for your LAN and make any changes not echoed back to the screen most LAN environments. If the LAN necessary to enhance its security. (i.e., the password should not be is being used to process and store The checklist is divided into eight displayed on the screen when it is production, confidential, or sensitive categories: User Identification and entered). data, you should consider imple¬ Authentication, Access Controls, ✓ Delete passwords and access for menting an access control package Guest Accounts, Security Adminis¬ users whose accounts are being on your LAN. If you require assist¬ tration, Backup and Recovery, terminated. ance or if you wish to discuss LAN Physical Security, Virus Protection, ✓ Cancel old passwords and security further, please contact the and Miscellaneous. reissue passwords for users who Manager, Security Administration, forget theirs. UTSDat 978-1267. ✓ Prevent all input to the server PC LAN Security without a valid ID and password Checklist (mouse input as well as Assessing Your LAN’s keyboard). Security User Identification and Access Controls Authentication The level of a LAN’s security depends on a number of factors, Access controls are defined for such as: This is the ability to identify the and assigned to specific data files, • The security features of the LAN user to the system and to confirm utilities, resources, and other system operating system. the claimed identity of the user. The privileges. Access controls can be 4 ComputerNews April 1992 Features specific to individual users or to a users should not be allowed ✓ Consider the files and services group of users. In a LAN environ¬ concurrent sign-on privileges (i.e., available to guest accounts ment, you should: the ability to use more than one carefully. Guest accounts should ✓ Make sure that users have workstation at the same time). not have the same privileges as access only to those directories ✓ Allocate disk space carefully. normal accounts. they need to perform their job. Giving users unlimited disk space ✓ Do not allow an invalid sign-on to Only give users the rights (e.g., may result in the need for default to a guest status. READ, WRITE, CREATE, purchasing additional disk DELETE, PURGE, FILE SCAN, capacity. Security Administration etc.) they need to do their job for ✓ Consider restricting users to each directory to which they are specific workstations. given access. ✓ Consider using time restriction Assigning administration responsi¬ ✓ Make sure that Trustee rights are features to control access during bilities for the LAN is absolutely the minimum required for the user non-business hours. necessary to maintain LAN security. to do his/her job. Once a right is ✓ Restrict network commands (e.g., The LAN administrator should be no longer required, remove it FLAG, HIDEFILE, SECURITY, aware of his/her responsibilities vis- immediately. PAUDIT, etc.) to those users who a-vis administration of the LAN, as ✓ Consider and assign the minimum have a need for them. well as its security and the integrity file access attributes (i.e., of the data and information stored EXECUTE only, READ only, and processed on it. Guest Accounts READ/WRITE). ✓ Provide the administrator with the ✓ Be careful when assigning proper training, including security SHAREABLE, NON-SHARABLE ✓ Limit the number of guest issues related to the LAN. and HIDDEN file attributes. Files accounts on the system to the ✓ Identify an individual as a backup containing confidential or absolute minimum. to the administrator. sensitive information should be ✓ If possible, assign responsibility restricted to a minimum number for administration of LAN security of users. to an individual other than the ✓ If you enable an account on a LAN administrator. This is temporary basis, make sure that especially important if third party the account is disabled when it is access control and security no longer required. software are implemented on the ✓ With the exception of the LAN LAN. Administrator and his/her backup, ComputerNews April 1992 5 Features Backup and Recovery two servers working in tandem in the data stored on a hard drive. case one server fails) could Considerations: Backup and recovery of databases provide you with sufficient ✓ Scan the server for RAM-resident in a mainframe environment are security. and passive viruses. mostly automated processes. ✓ Provide users with scan and Unfortunately a LAN environment is clean programs so that they are Physical Security not always as stable as a mainframe able to check their hard drives environment; therefore, it is very and diskettes for known viruses. important that backup and recovery Physical security of the LAN, ✓ Consider giving users diskless requirements are identified and including the server and work¬ workstations to prevent viruses implemented. stations, is critical to the overall from infecting the LAN. Considerations: security of the LAN, but is often ✓ Run scheduled, unattended overlooked. It is important that the Miscellaneous backups of the server. access to critical pieces of equip¬ ✓ Establish scheduled server- ment is restricted to a small number initiated backups of workstations of individuals (usually the administra¬ ✓ Consider implementing encryption over the network. tor and his/her backup.) Other software to protect confidential or ✓ Establish a rotation schedule for considerations should include sensitive data stored on the backup tapes and maintain protection of the equipment against server or data being transmitted several generations of backups. fire and electrical hazards. over the network. Encryption ✓ Generate at least two copies of Considerations: software enables you to scramble the server backups. One copy ✓ Consider installing an the data so that it cannot be read should be available on-site in Uninterruptible Power Supply by unauthorized individuals. case recovery is required. (UPS) system to protect the ✓ When highly proprietary Another copy should be stored in server against power failures, information is accessed, an off-site location in case of a fire power surges, and other similar temporarily disable local disk or some other contingency. occurrences. drives, printers, and ✓ Consider mutual agreements with ✓ Provide workstations with power communication ports to prevent other departments for off-site bars that have built-in surge downloading or transferring the storage of backup tapes. protection circuitry to protect information. ✓ Store backup tapes in a data against damage caused by ✓ Be careful before allowing dial-in safe. (Data safes are fire- sudden and extreme power access to the LAN. If there is a resistant safes specially designed fluctuations. real need for dial-in access, use a to protect magnetic media from ✓ Secure the server by locating it in call-back facility at a minimum. If damage caused by fire, heat, a locked room to which access is the LAN is used for production water, and air-borne limited. systems (e.g., business contaminants such as smoke and ✓ Beware of housekeeping and application systems) or if it is dust.) maintenance personnel connected to the central ✓ Restrict backup and recovery unknowingly disabling the administrative mainframe, special functions to the administrator and network by unplugging the server measures must be taken before his/her backup. to plug in their equipment. dial-in access is allowed. ✓ Employ various backup ✓ Provide users with locking and ✓ Restrict installation of techniques including full and anchoring mechanisms for their unauthorized software on the incremental backups. workstations, especially in areas LAN. Establish a procedure by ✓ Make sure that the entire server open to access by the public. which the LAN administrator is operating system, as well as data notified and is involved in the files, are recoverable from backup review and installation of personal Virus Protection tape. software on the LAN. ✓ Consider server backup ✓ Ensure that users are aware that requirements carefully. Mirroring Virus infections are becoming pirated software should not be (i.e., writing data to two separate increasingly widespread. A virus installed or used on the network. hard drives simultaneously) and infection may be, at the least, an ✓ Ensure that the LAN administrator duplexing (i.e., installing two hard annoyance to the users of personal or some other individual is drive control cards) may not be computers and LANs. However, in assigned the responsibility of sufficient if you are running some instances, a virus may end up reviewing system-generated audit production and time-sensitive costing the user a lot of time through reports. Develop review and systems on the LAN. A hot- destruction of data or by preventing reporting procedures especially backup arrangement (i.e., having the user from being able to access for access violation reports. 6 ComputerNews April 1992 News Software Piracy The University of Oregon Continuation Center settled a copyright lawsuit with the Software Publishers Association to pay $130,000as well as organize and host a national conference on copyright law and software use. This was the first software copyright suit brought against a higher education institution. The federal suit was filed against the school in February 1990 on behalf of several software vendors, including Lotus Development Corp., Microsoft Corp., and WordPerfect Corp. The suit alleged that the center employees made unauthorized copies of the software companies’ program [sic] and training manuals. — Ledger, Association of College and University Auditors, Nov. 1991 f_ breaches of the contract through program is for company business, software piracy, and in many cases the use of it within the workplace is ent visions come to mind. The first is the culprits are not even aware of legal. Most licence agreements of a latter-day swashbuckling ruffian the illegalities of their actions. require that each machine or work¬ who captures cargo ships and steals Sometimes, just breaking the seal of station that uses the program must the riches and wealth aboard for a disk package constitutes a legal have a purchased copy of that himself. The second is a person and binding acceptance of the program. who copies software from a source licence’s conditions. Situation #2: A computer which to their own PC, without purchasing Don’t make U of T the target for “belonged” to the employee you are it from a legal vendor. We may see the next search warrant. The replacing is now yours. All sorts of both as underdogs, fighting the embarrassment that would be wonderful programs are on it and injustice of “the system,” while caused by a lawsuit would be you assume that they are legal remaining worthy at heart, and damaging to the reputation of the copies. If you are audited and are therefore somehow admirable. No University, and the fines can be very found to have illegal software on wonder software piracy is not viewed expensive. Don’t be fooled into your machine, are you responsible? as a crime by most people. thinking that only the University will Answer: You may be responsible, In fact, software piracy is a crime. be liable and have to pay. Depend¬ depending on policies within your It is theft. ing on policies in place within your department. Just because some¬ When a software package is department, you too might be liable. body else put the software on the purchased from a legal vendor, a What follows are some common machine doesn’t mean that you are contract exists between the vendor situations that will test your knowl¬ blameless. Essentially, you turned a and the purchaser. This contract, edge of what is legal and what is not blind eye and benefited from the called a licence, can be found in when it comes to software duplica¬ existence of the software on the various places: in the instruction tion. machine. Ways to determine manuals, other documentation, or on Situation #1: A software program whether or not your software is legal the disk itself. Most people believe has been purchased by an office for are: check to see if official documen¬ that once they have purchased the one of its employees. Other employ¬ tation exists for your machine: check software, they own it. This is not ees in the same office hear of the to see if there are any official quite true. In fact, what has been program and discover that it would diskettes for the program; check for purchased is the licence which be great to help them in their work. official templates on your computer allows the purchaser to use the Can legal copies be made? keyboard. If none of these three product. The software company still Answer: No, legal copies cannot exists, be prepared to find out that owns the product. This lack of be made. Many people make this the software is illegal. You may want understanding often leads to mistake, believing that as long as the to speak to the person in your ComputerNews April 1992 7 News department who keeps track of such as a technical support person, [Editor’s Note: This article, written purchasing software for more about the details before you copy by Wendy Alexander and Teresa information on the programs installed anything. Tenisci, was adapted from Campus on your machine. If you find yourself in a situation Computing, the University Computing Situation #3: The office operates like this and don’t know the answer, Services newsletter at the University on a network. Since one person has someone else does. The Software of British Columbia, January 1992, a legal copy of a software program, Publishers Association operates a Volume 7, Number 1.] and has installed it on the network, toll-free hotline number through The pamphlet Using Software: A everyone is allowed to use it. True which you can access information Guide to the Ethical and Legal Use or False? about how to order an anti-piracy of Software for Members of the Answer: Either answer may be video or a self-audit kit, or just get University Community is available correct, depending on what the some anti-piracy information. The from the UTCS Information Office, 4 software licence says. Some number is: 1-800-388-7478. The Bancroft Avenue, Room 201. You licences are strict and insist that Canadian Alliance Against Software are welcome to take multiple copies every person who uses the program, Theft (416-598-8988) is an additional for distribution within your office or whether it be on a network or not, source of information. department. must purchase the program. Some software companies sell site li¬ cences, and these allow everyone Half Price Manuals on the network to use the program without purchasing copies for each individual who will use it. Situation #4: An update for your Sale! spreadsheet program arrives. Your co-worker has been asking you for a copy of the program, but you know that it is illegal so you refused. But now that the new version has Patricia Hood arrived, and you have no need for phood@vm. utcs. utoronto. ca the old version, can you give it to your co-worker? The UTCS Information Office has a limited number of manuals that it is Answer: No. Updates are defined selling at half the original price. Most of the manuals document older as enhancements to the original versions of software presently used at U of T. The SAS manuals, in package that you purchased. Once particular, are a bargain for those of you using SAS version 5 on the the package has been updated, the mainframe. Since the quantities are limited, please contact the Informa¬ old package should be destroyed or tion Office at 978-4990, as soon as possible, to reserve your purchases. used solely as a backup. Purchases may be paid by cash, cheque, UTCS Customer Account Situation #5: You have a big (CAN), or U of T Appropriation Account. presentation to give tomorrow and, as five o’clock rolls around, you Title Sale Price realize that you have to be home to SAS Introductory Guide, Third Edition .3.75 baby-sit your children, Once the kids SAS/ETS User’s Guide, Version 5 Edition.12.25 are settled in bed, can you use the SAS/FSP User’s Guide, Version 5 Edition.17.00 software from the office on your SAS/IML User's Guide Version 5 Edition.11.40 home machine? SAS/GRAPH User’s Guide, Version 5 Edition .19.50 Answer: Maybe. Again, it SAS Companion for the CMS Operating System, 1986 .5.00 depends on what the software SAS Companion for the OS Operating System and TSO.6.75 licence says. Some licences say SAS System for Linear Models, 1986 Edition .10.00 that software can be used both at SAS System for Regression, 1986 Edition.9.00 home and at the office. Some say that the program can be used on LISREL User’s Guide.2.50 several machines, provided that no MINPACK-1 User’s Guide 1980.2.50 two are running at the same time. Some programs are very restrictive, WATCOM C Library Reference 1989.11.90 and say that the program can only WATCOM C Language Reference 1987.10.40 be used on one machine. If you WATCOM C Optimizing Compiler and Tools User’s Guide 1987.... 10.40 don’t have access to the licence, or if WATCOM Express C User’s Guide 1987.7.90 you find it ambiguous or unclear, make sure you check with someone 8 ComputerNews April 1992

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.