Settings Lock Instruction Manual

Settings Lock is a software program for Windows 95/98/Me/2000/XP/NT/Vista computers that allows you to password protect 15 Windows settings and functions. These settings are:

1) The computer clock time and date

2) System Restore

3) Video display properties, such as wallpaper and screen saver (called Display Personalization in Vista)

4) Internet Options

5) Add/Remove Programs (called Programs and Features in Vista)

6) User Accounts

7) Windows Security Center

8) System Properties

9) Add Hardware Wizard

10) Network Connects and Setup Wizard (called Network and Sharing Center in Vista)

11) Properties of individual files (such as read-only)

12) Task Manager

13) Windows Explorer and My Computer folder options

14) DOS access

15) System Configuration Utility (MSConfig)

Settings Lock protects these functions by blocking the Windows programs that allow you to access them. For example, if you password protect the System Restore, Settings Lock will not allow the System Restore program to run until you deactivate the Settings Lock protection. There is a button on the Settings Lock control panel that allows you to temporarily turn off all protections, provided you know the supervisor or administrator password. You an also permanently turn of any one or more of the protections if you know the administrator password.

Initializing Settings Lock

When you first run Settings Lock, it will ask you to set an administrator password and a supervisor password. These passwords should not be the same. The supervisor password is required to temporarily disable Settings Lock protection. The administrator password is required to make permanent changes in the settings, or to uninstall Settings Lock. Note: The passwords you create are case sensitive. This means, for example, that "Good" is not the same as "good" or "GOOD". Be sure to remember the EXACT password you select, including capitalization.

Once you select these two passwords, Settings Lock will ask you to select which Windows functions to protect. You do this by clicking on the box beside the desired functions to place a check mark in the box. You can click on the Help button for additional information about each function. Select the protections you want and then click on the Set button. The protections screen will then disappear.

Settings Lock will automatically run every time Windows starts. Although the control screen will not be visible, there will be an icon that looks like a key on the system tray (lower right corner of the screen). There will also be an icon on the desktop. Clicking on the system tray icon or double clicking on the desktop icon will cause the Settings Lock control screen to appear. From this control screen you can temporarily pause protections or change your settings using the menu bar at the top of the control screen.

Registering Settings Lock

From the time you first run Settings Lock, you have a 30-day trial period to evaluate it. During that time, Settings Lock will be fully functional. If you decide you like Settings Lock, you should register and pay for it ($25). At the end of the trial period, if you do not pay for Settings Lock and input the registration code you receive, Settings Lock will be deactivated. That is, it will no longer protect the computer settings. It will be reactivated when you input the registration code, which you will receive when you pay for Settings Lock.

There are several ways to pay for Settings Lock. The easiest way to register a single copy is to go to the LeithauserResearch.com site. From there, you can go to the payment page (links are in the third paragraph on the home page). Scroll down the page to the place where Settings Lock is listed. Input the serial number that appears on the registration screen for Settings Lock (the screen that asks you to register and input your registration code) and then click on the "PayPal buy now" button. You will be sent the registration code by email. You will normally receive this code within a day, although it may take a little longer under unusual circumstances (Internet problems, etc.).

You can also pay for Settings Lock by clicking on the Print button to print a form. You can then mail this form to the address given on the form or fax it to the fax number given on the form. You can pay by enclosing a check or by filling out the credit card information on the form. You can also pay by phone using your credit card. The number to call is 386-410-6769.

Volume discounts are available. Call 386-410-6769 or send an email to [email protected] with information on how many copies you want to license for a price quote.

Using Settings Lock

Settings Lock will automatically run every time Windows starts. Although the control screen will not be visible, there will be an icon that looks like a key on the system tray (lower right corner of the screen). There will also be an icon on the desktop. Clicking on the system tray icon or double clicking on the desktop icon will cause the Settings Lock control screen to appear. From this control screen you can temporarily pause protections or change your settings using the menu bar at the top of the control screen. The menus are explained below. Where you see two words or phrases separated by a slash (/), it means that you click on the word or phrase before the slash, which will be in the menu bar at the top of the Settings Lock control screen. You then click on the word or phrase after the slash, which will appear in a drop down menu that will drop down. For example, File/Exit means that you click on the File menu, then on Exit from the drop down list of options.

File/Uninstall Settings Lock

This option will permanently uninstall Settings Lock from your computer. You can also uninstall Settings Lock by using the Windows Control Panel Add/Remove Programs function (called Programs and Features in Vista). In either case, you will need your administrator password to uninstall Settings Lock.

File/Exit

This function turns off Settings Lock until the next time you reboot your computer.

Configure/Protections

This option displays the Protections selection screen. You will need to input the administrator password to access this screen. Note: The password is case sensitive. This means, for example, that "Good" is not the same as "good" or "GOOD". Be sure to use the EXACT password you selected when you set up the password, including capitalization. When inputting passwords, you can mask the password so that it cannot be read on the screen. You do this by clicking on the "Conceal password while typing" box to put a check in this box. When this box is checked, anything you type in the password box will be displayed as asterisks. The check box retains its last value, even if you exit the Settings Lock control panel or even reboot the computer.

The protections screen allows you to turn on and off individual protections. To turn on a protection, put a check mark in the small box beside the text by clicking on that box with the mouse when there is no check mark in the box. Clicking on the box when there is a check mark already there will turn off the protection. The following is an explanation of the settings and functions that Settings Lock can protect:

Set Time/Date - If you right click on the clock in the lower right corner of your computer screen, a menu will appear that includes Adjust Time/Date (exact wording may vary in different operating systems). Clicking on this will display a Windows screen that allows you to change the computer's clock settings. Turning on this protection will block that screen from appearing. This can be using if you have employees changing the computer clock before they sign in for work or children changing the computer clock to allow them to get past child safety programs that limit their computer time. Note that this protection does not block other programs from changing the time, such as programs that contact sites on the Internet that set the time on your computer automatically.

System Restore - This function allows you to reset you computer to a previous condition in case your computer is invaded by a virus or a faulty installation corrupts your configuration. However, it can unfortunately also be used to uninstall security software that you have installed, such as Settings Lock, if a restore point was created before the software was installed. Careless use can also erase data and cause similar problems. Therefore, it can be useful to restrict its use to authorized personnel. It can be particularly useful when used in combination with password protecting Add/Remove Programs, described below.

Video Display properties - This is properties such as your wallpaper and screen saver, as well as more important functions like your screen video size. While this may seem trivial, it can be a nuisance when students start playing around with school computer video settings, or similar situations.

Internet Options and Properties - This includes settings such as your security level, your privacy options, your home page, and so on. It also includes the ability to delete history files. Parents or employers who want to monitor Internet use by checking these files need to be able to prevent people from simply erasing them. You also want to make sure that unauthorized people do not carelessly (or in some cases, deliberately) change your security settings.

Add/Remove Programs (called Programs and Features in Vista) - This function allows you to remove programs from the computer. You may wish to prevent children or employees from removing security programs you have installed. If you use this, you should probably also activate protection against System Restore, as explained above.

User Accounts - This function allows you to add or remove user accounts. Some people may try to sneak around security programs by creating new accounts and then accessing the computer using these accounts.

Windows Security Center - This center controls the firewall, virus protection, and automatic updates, for example. If you use these to control access by children or employees to the Internet, for example, you might want to protect these from tampering.

System Properties - This function allows you to view and control a wide range of settings on your computer.

Add Hardware Wizard - This is the program that allows you to add new hardware to your computer. Blocking this function may help to prevent people from making physical changes to the computer. Note that with many Plug and Play devices, running this program is not necessary, so password protecting it provides limited protection.

Network Connections and setup wizard - This program helps you to add or modify network connections. If you want to restrict people getting on the network or Internet on your computer, blocking access to this program can help.

File Properties - This program makes it hard to alter the settings of files on the computer, such as whether the file is read-only. If you want to protect some of your files from tampering by making them read-only, this setting can help. However, please be aware that there are many ways to alter a file's properties, so Settings Lock can only provide limited protection. It is not possible to protect against every method of tampering with files.

Task Manager is the program that allows you to shut down running programs. It can even shut down security programs that you may have installed to restrict the computer. Settings Lock has many layers of protection against being shut down by Task Manager or other programs, but some other security programs do not. You can use Settings Lock to restrict access to Task manager in order to protect those other programs.

Windows Explorer Folder options - This function allows you to change the settings of Windows Explorer and My Computer (really the same program). Settings include things like whether to view invisible files. Besides security concerns if people can change the folder options, it can be a nuisance if children or other people who have access to your computer start changing the Windows Explorer configuration without your knowledge, so you are no longer viewing what you think you are viewing.

DOS access - This is the DOS command prompt that allows you access to the DOS level. At this level, users have access to the core of the operating system, which can be dangerous. It can also allow direct access to many basic functions, like the system clock and file properties. Therefore, if you are blocking access to the system clock and some other functions, it is best to block access to DOS. As explained above, this protection is automatically turned on when you activate Date/Time setting protection.

System Configuration Utility (MSConfig) - This Windows program allows you to alter the basic Windows configuration, such as what programs run at startup, what services run, what mode your computer boots up in, and so on.

Once you have checked or unchecked the boxes to indicate what you want to protect, click on the Set button. No changes are made until you click on this button. Once you click on this button, the Protections screen will disappear. You can shut down the Protections screen by clicking on the cancel button, but this will not save or put into effect any of the changes you have made.

Configure/Set Administrator Password - This menu option lets you change your administrator password. You should do this if you suspect that someone has learned this password. Of course, you have to input your current password before you change your password to a new one.

Configure/Set Supervisor Password - This menu option lets you change your supervisor password. You should do this if you suspect that someone has learned this password. Of course, you have to input your current password before you change your password to a new one. However, you can input the administrator password when Settings Lock asks for your supervisor password.

Pause Protection - Clicking on this pauses the protection. Settings Lock will require you to input your supervisor password (you may use the administrator password instead) in order to pause the protection. When you pause protections, the menu will change from Pause Protection to Resume Protection. Clicking on it again will resume protection. The password is not required to resume protection.

Help/Instructions - This menu option will display this instruction manual.

Help/About - This will display a small screen giving you version information and copyright notices.

Register

If you have not yet registered Settings Lock, this option will appear on the menu bar. Clicking on it will display the registration screen, which also appears when you first run Settings Lock until it is registered. This will allow you to register Settings Lock so that it will run beyond the 30-day free trial.

Uninstalling Settings Lock

There are two ways to uninstall Settings Lock. The preferred method is to click on Files and then Uninstall Settings Lock on the Settings Lock control panel. If this generates an error message, the alternative is to use the uninstall procedure in the Windows Control Panel by clicking on Settings under the Start button, then select Control Panel and then select Add/Remove Programs or Programs and Features and pick Settings Lock from the list of programs. Note: Exit the Settings Lock control panel before using this method.

Bug reports, help requests, suggestions

If you need help with this program, have found a bug, or have a request for additional feature, please contact Leithauser Research. The best way is to send an email to [email protected]. You can also call Leithauser Research at 386-410-6769 .

If you are suggesting an additional feature or other improvement, we will make these changes and release a new version soon if we believe these improvements would have broad appeal. You will be notified when the new version is released. If we feel that the changes you suggest are not commercially viable, we can still create a custom version of Settings Lock for you for a fee. Contact Leithauser Research if you are interested in this.

Go to Leithauser Research home page

Go to Computer Security page

Go to Access Control page

Go to Settings Lock download page