|TerminatorX quick start instructions (expert)
Location of TerminatorX's files
Unless you selected a different folder, TerminatorX's files have been placed into C:\TXsiteTrial2
Setting up TerminatorX Site License
Brief setup notes are included here but more detailed instructions for each section are available by accessing the main menu (see top). To ensure success, please print out the instructions and follow them closely.
In the preferred installation method, TerminatorX is placed it in a secure folder on the network server and login or logon scripts are used to run it on the workstations when the users log in:
- run the TerminatorX Data Generator 20.exe program to select (by ticking the boxes) which programs you want to ban. The settings are recorded in a file called xlist20.txt. You can add new web sites and applications as they become a nuisance.
- create a folder on the network server and allow the users only Read and Execute rights to any files that it contains.
- copy TerminatorX's program file (TXtrial20.exe) and its data file (xlist20.txt) into the secure server folder.
- if the workstations have each got 128MB or more of memory then copy the file msvbvm60.dll to the same secure server folder. If not, copy it to the system folder of each workstation.
- set the users logon or login scripts so that TerminatorX (TXtrial20.exe) is started as they log in to the workstations. You can, on some network operating systems, set up group logon scripts.
- you can, if you want, set up TerminatorX to send details of attempts to access applications and sites to the TerminatorX Monitor program. This shows on YOUR screen in real time the details of users, their computers and the banned applications and sites they have tried to access. See the Monitor instructions for details.
- you can also (optionally) create a plain text file called Warning.txt containing a message which is shown to a user when they access something which is banned. For contents of the warning message see the main menu.
TerminatorX will then run invisibly on the workstations, checking activity and preventing the use of the banned applications that are selected for that user. If you have chosen to do so, details of any attempted use of banned web sites or applications are sent to a monitoring program on the Network Administrator's computer (see above).