GENERAL SYSTEM DE ACCOMMONMENT




GUIDE GUIDE












1.- DESCRIPTION OF SGA.


SGA (Fig.-1) is a software that allows you to handle the information of files on the computer in different ways, so use that The program can be given is very broad and diverse. For example, it is can use systems to migrate, encrypt data, perform a logical deletion of the information or blocking access to files. You can also manage UNIX and WINDOWS networks remotely.


SGA fully exploits available resources and bandwidth and It adapts to them dynamically. If for any reason the resources or the bandwidth run out, SGA stops its execution and remains the Wait until they're available again. So, SGA doesn't annoying and is completely transparent to network users while performing a mirror or a migration.



Fig.-1













2.- MIGRATION.


To stop use the SGA to migrate data or make logical copies of the disk it is necessary first to select the directory of the origin, (Fig. 2, 1) if the recursive directory tab is selected you will select all the subdirectories of that directory(Fig. 2, 2. If a mask other than *.* is selected if you select it is selected all files matching that mask (for example in the mask we put *.doc will only select the files with extension .doc). (Fig. 2, 3)


Fig.-2


There's to bear in mind that the date used by default SGA is the last save. It can also be dealt with with dates of creation or last access to the file, for this you have to select the Proper tab. (Fig. (3)


Fig.-3


Later the . . . . . . . . . . . . . . . . . . . 4, (1) and this is added to the origin of migration. The files are show ordered by size (from less to greater) unless you have selected the tab to order by name with what They will be ordered alphabetically. (Fig. 4, (2)


Fig.-4


A The DESTINO DIRECTORIO (Fig.5,) is selected, 1) and Generate List (Fig. 5, 2). This button generates the names of the new files of migration in their destination


Fig.-5


Al al Generate the target list is asked to the user if they want to create all empty directories (Fig.-6), if this option is cancelled only directories where files exist are generated, but not the empty directories.

Important: The list of new directories is generated automatically when generating the list with empty directories or not as selected, but is important knowing that when generating the list, the new directories are believe, even if you don't start copying yet.


Fig.-6



The Update list button deletes original generated list and reorganizes it to generate it again. (Fig. 7 (1)

The delete list button deletes the destination list (Fig. 7, 2) and every time it hits button - generate list - add a new list to the existing one.(Fig. 7, (3)


Fig.-7



Finally, the LIST COP/dates button (Fig. 8, 1) generates and start copying. If the selected tab - Copy by dates (Fig. 8 2) only generates migration to coincide with the selected dates.


The copy is generated complete or only coinciding with the dates depending on whether or not selected, the copying tab by Dates.(Fig. 8, (2)


Fig.-8



It's important knowing that any device that can be mapped to through the network you can migrate with SGA whenever you have Reading access.



SGA is currently configured so that every time you make a migration, put in all files a new creation date and on all three dates of the file. Now the last dates access and the last modification creates them when creating the file, but you could configure (in code) to keep the dates original files copied.



Temporarily, so that the program generates the right logs on the Copy button / Lists / Dates must also be put on the comparator list list of origin.




3.- ENCRIPTATION TO GENERING MIGRATION IN ORIGIN IN DESTINO.


SGA allows encrypting files with a key file. This key can be any file and any size, that is, it can be a text file, sound, an image, etc.


The - Encode origin buttons (Fig. 9, 1) and decode origin. (Fig. 9, (2) encode or decode only the origin list.


The Buttons copying encoding. (Fig. 9, 3) and copy decoding. (Fig. 9, (4) allow for a migration at destination encoding or decoding.


The key file is selected with - select file. (Fig. 9, 5)


Attention, it is important to know that in order to decode correctly you have to select the same file with the same saved data as the make encryption, i.e. if the file has been modified, the decoding will be impossible.



Fig.-9








4.- COMPARATION OF FICHEROS.


SGA allows to compare files in the Search / Compare window, in this window first the files to be compared are selected by choosing the directory (Fig.10, 1) and the mask (Fig. 10, 2) the same than on the home list. Then they are added by pressing the Add list to compareer. (Fig. 10, 3) and generating the Comparison in the "compare" button. (Fig. 10, (4)


Yes, yes also to compare duplicate files (i.e. with the the same name) should be selected the tab .compare What are you. (Fig. 10, (5)


The comparison of files can be by size, checksum , CRC , or by content (by selecting the maximum number of bits compared), selecting the right radio button.


The button delete list, delete the list in the - Compare. (Fig. 10, 6)


Fig.-10











The Comparison comes out in the window. (Fig. 11, (1) and this can be exported to a text document in the "export" button - I'm comparing. (Fig. 11, (2)



Fig.-11























5.- LGICO BORRADO.


I know can completely delete the selected files in the Origin window in two different ways:

With the source logical erasure button, (Fig. 12, 1) the files they are erased in a logical way, i.e. replacing the file information by zeros. In this mode, if you find a file read only, this one leaves it untouched and writes in a log all the operations of correct erasure and errors.


With the button . delete win32, (Fig 12, 2) the files are deleted from a stronger way than with logical erasure. This option of erasing is very useful when it comes to, for example, eliminating some virus Impossible to erase through the S.O. This erasing option It also generates a log of results. (Note: In the deleted Win32, yes you will find a file .read only the program gives an error and is closed by the system when attempting to delete these files. This one. is a known bug that will be solved in future versions of the GHS. In addition, the deletion of the files will be implemented "read only."


Fig.-12


There's to emphasize that the S.O. deletes the files so that with a data recovery software information may be rescued. With the SGA erasure system, recovery is totally impossible what guarantees the privacy of the data in the hard drive.





6.- CWDrive (Working Director).


It's it is important to know that all processes remain in the logs of the programme and these are always left in the working directory, which can be Selected by pressing the CWDrive button (Fig.-13).


Fig.-13


To stop create the working directory (where the Logs and data are saved within the program first select the directory you want use for that purpose. (Fig. 14, 1) Later I clicked on . Okay create selected work directory. (Fig.14, 2)


- Show content of the directory displays the content of the directory Selected above. (Fig. 14, (3)


Fig.-14

7.- MIGRADOEN CALIENT IN SGA2.


The migration of files can be done hot, i.e. with files opened by other people and may be being What's the point? This allows the execution of the SGA2 application. (Fig. 15).


Fig.-15


In this program can load a configuration generated in SGA (Origin Figs and Copy Listlists) (Fig. 16, 1) and do a hot migration with the button to copy. (Fig. 16, 2). If desired, file copies can be monitored and confirmed in file. (Fig. 16, 3).


The button static mirror copy makes a continuous copy and He asked at the end of the question whether the copy would be repeated. (Fig. 16,4).


Fig.-16


In SGA2 can be added to the lists of origin and destinations new files. (Fig. 17, 1) and (Fig. 17, 2) (Do not forget that if you are uploads a file at source must be loaded or created a new one in destination). As well as deleting files of origin or - Destiny. (Fig. 17, 3) and (Fig. 17, (4)


I know can delete and add individual files to the copy list, but you have to keep in mind that the copying is always with the order of the matching number lists in order, is say, the first with the first and the last with the last in position numbering. When one of the list is selected, your contraption changes status too and selected in the field from the window.


Also a configuration can be saved to load it later. (Fig. 17.5)


Fig.- 17



















8.- COMPLETE MIGRED AND ENCRIPTATION IN SGB.


The Mything of files in SGB (Fig.- 18) is like the SGA2 file, but SGB is not allows modifications of files that are being copied.


Fig.- 18


The program asks if you want to pass the SGA data to SGB and, yes, accepted, the screen configuration is saved and when SGB is opened opens with the saved configuration.


In this program can load a configuration generated in SGA (Origin Figs and Copy Listlists) (Fig. 19, (1) and do a hot migration with the button to copy. (Fig. 19, 2). If desired, file copies can be monitored and confirmed in file. (Fig. 19, 3).


The button static mirror copy makes a continuous copy and He asked at the end of the question whether the copy would be repeated. (Fig. 19.4).


Fig.-19

In SGB can be added to the lists of origin and destinations new files. (Fig. 20, 1) and (Fig. 20: 2) (Do not forget that if you know uploads a file at source must be loaded or created a new one in destination). As well as deleting files of origin or - Destiny. (Fig. 20, 3) and (Fig. 20, (4)


I know can delete and add individual files to the copy list, but you have to keep in mind that the copying is always with the order of the matching number lists in order, is say, the first with the first and the last with the last in position numbering. When one of the list is selected, your contraption changes status too and selected in the field from the window.


Also a configuration can be saved to load it later. (Fig. 20.5)


Fig.- 20


SGB also allows to encode with a key file the data in origin as at destination or in the copy, the operation of SGB is as the SGA2 with added encryption functions, selecting the corresponding key file.


It's important to know that all operations can be done about any machine is Unix or Windows with a ftp-drive or any interface that maps a unit, i.e. you can manage any machine regardless of the S.O. that it owns.


When a logical deletion or copying operation of the SGA fails, always A warning and a log file that is a .bat in which the operation comes out can be terminated by the user running it.





The SGB cryptography functions allow:


Codify copying (Fig. 21, 1).


Decode copying (Fig. 21, 2).


Codify and Decode The Origin List (Fig. 21, 3).


Codify and Decode The Destiny List (Fig. 21, 4).



Fig.- 21



















9.- UNIX MÁCHS.


One Once an FTP has been established with a UNIX machine, this application allows manage and operate on it, as well as manage all networks UNIX you want, as you can open so many UNIX screens as desired, which allows to manage such networks regardless.(Fig. -22)


Fig.- 22


First an FTP (Fig) has to be opened. 23, 1) against the machine corresponding and then you can apply all Unix commands And Linux. It also has in Command / parameters (Fig. 23 (2) the possibility to write any command that is not in the - Buttons.


All of them. the buttons first give the help of the linux manual and then allow execute them.


Fig.- 23


(Note : All UNIX screens are programmed, but not tested, so it is in BETA phase and may contain a failure in the absence of polishing the code).

These. are some of the UNIX commands supported:


alias ........ Allows see the current aliases.

awk ........ Allows The user search for a pattern inside a file.

bdiff ......... Compara dos ficheros grandes.

bfs .......... Escanea ficheros grandes.

cal ......... Muestra el calendario.

cat ......... Concatena e imprime un fichero.

cc ......... Compilador de C

cd ........ Cambia los directorios.

chgrb ......... Change a group file.

chmod ....... Change permissions from a file.

chown .......... Change the individual owner of a file.

cmp ......... Compara dos ficheros.

comm .......... Compare two files to determine which lines are common.

cp .......... Copy a file somewhere else.

cu ......... Call to another UNIX system.

date .......... Sample The date and time.

df ......... Sample all units mounted on the system.

diff ......... Sample the difference between two files.

du ......... Sample the occupied space of a disk in blocks for a directory.

echo ........ Send data to the screen or file.

ed ........ Editor de texto.

env ......... List the variables of the environment in use.

ex ........ Otro editor de texto.

expr ........ Evaluate a mathematical formula.

... find...... Look for a File.

f77 .......... Compilador Fortran.

format ........ Formatea un disco.

grep ......... Busca un pattern en un fichero.

help ......... Muestra la ayuda.

kill ........ Detiene un proceso.

ln ........ Create a link between two files.

lpr ......... Copy the file to the printer.

ls ......... List the files of a directory.

mail ........ Allows to the user send and receive mail.

mkdir .......... Crea un directorio.

more ......... Sample a data file on screen.

mv ........... Mueve o renombra ficheros.

nohup ........ Allows to continue running a command even if you make a log out.

nroff ......... Used to format a text.

passwd ........ Cambia la contraseña.

pkgadd ......... Install a new program on the machine.

ps ........... List the open processes.

pwd ........ Sample the directory name in use.

rm ........ Borra ficheros.

rmdir ........ Borra directorios.

set ......... List all the variables of the shell in use.

setenv ......... Sets the variables of the environment.

sleep ......... Inactiva un proceso.

source ......... Allows to the user run a file and update any changed value of it.

sort .......... Ordena los ficheros.

spell ......... Check spelling errors in a file.

split ........ Divide un fichero.

stty ......... sets the terminal options

tail ......... Sample end of the file.

tar ......... Copy all files specified in one.

touch ........ Create a empty file or updates the time or date of a file.

troff ......... Muestra las salidas formateadas.

tset ........ Sets the terminal guy.

umask ......... Specifies a new creation mask.

uniq ......... Compare Two files.

uucp ......Execution unix a Unix.

I saw ........ Full screen editor.

vipw ......... Open up. the editor saw as well as the password file to edit it.

volcheck ......... Check if there is a floppy mounted on the system.

wc ......... Muestra los detalles.

who ........ Indica users who are online

write ......... Send a message to another user.

- Oh, it's a . ...... Repeat commands.


Also allows the creation of macros to keep all executions of - You commando. This function works as follows:


First the name of the macro should be defined (Fig. 24, 1). Then, already you can go to commands in the box. (Fig. 24, 2) to create the macro. Every time I know Insert a command, you must press in -keep. (Fig. 24, 3). One Once all macro commands are defined, you can already run clicking on the button of the same name (Fig. 24, 4). During the execution, the program will be asking command by command if The execution is carried out.


Fig.- 24







10.- WINDOWS MORE OF MÁQUINAS.


This one. SGA program allows you to manage all windows networks (Fig.-25) that are wanted and that are mapped in the system.


The system name used is any local or remote system of the network, i.e. the selected command can be executed in any network machine.


Allows open as many screens as you need.


Fig.- 25


The program divided 4 Areas these are:

Area 1: Process / System area. (Fig. 26, (1)

Area 2: System Command Area (Fig. 26, (2)

Area 3: Area of Commands typical of the S.O. (Windows) (Fig. 26, 3)

Area 4: S.O. Management Program Area (Windows) (Fig. 26, (4)


Fig.- 26

In Remote system, Local / Modifiers: The Name of the system where the command is to be executed. (Fig. 27, (1)


In Ask, Process, Id, User...: Processes must be introduced, user, etc.

(Fig. 27, (2)


Fig.- 27


To stop Area 2. (Fig. 28) The field . Remote system, Local / Modifiers must be stuffed. And in "Pid Process /Id /User /...The modifiers must be (User, Id, Pid...).

Fig.- 28


To stop Zone 3. Ask Process /Id /User /... it must be empty. And in Remote system, Local / Modifiers. the parameters or modifiers of the command. (Fig. 29)

Fig.- 29


Yes, yes In addition to Remote / Local System, They're empty. /Id /User /.... Execute the help of the command. (Fig.30)

Fig.- 30

11.- RELATN IN WINDOWS WITH MACROS .EXECWIN.


Allows manage windows machines by means of commands and macros (Fig.- 31).


Fig.- 31



In Name file, the name of the output file of the - I'm applying.

(Fig. 32, (1)


The button .View opens the application output file and the shows for editing or consultation. (Fig. 32, (2)


The button - Delery Content button, deletes the contents of the exit of the application. (Fig. 32, (3)


Fig.- 32

The execution order is always:


Command (Fig.33, a)

Parameter (Fig.33, b)

Processing (Path process) (Fig.33, c)


Exec. execute the command (Fig.33, 1)


Clear. It erases the screen. (Fig.33, 2)


Soft saves the application output file by adding the execution of the screen command. (Fig.33, 3)


Load locates the application output file to read it and Add it to the screen. (Fig.33, 4)


Oh, help. shows the help of the command. (Fig.33, 5)


- Snart. exit from the application (Fig.33, 6)



Fig.- 33



This one. program is very useful as it allows you to manage very quickly with macros all commands saved for windows administration.




In The name of the macro is written. (Fig. 34, (1)

The Macros run button, run the macro corresponding to the name written in the macro superior dialogue. (Fig. 34, (2)


The Watch Macro button, lets you see the macro document that is execute and change it by hand if applicable. (Fig. 34, 3)


The Macros Save button, save the execution of the screen add to the macro file a new execution line shown by the current screen. (Fig. 34, (4)



Fig.- 34


















12.- ENVIOS OF FIGHTS IN SENDFILES . . . . . . . . . . . . . . . . . . . . .


SGA, by means of "send files," you can send and receive files in any network (even via the internet) (Fig.- 35).


Fig.- 35



SendFiles can send and receive files from a network IP via a certain port.


The Ping button makes a ping to the selected server to see if it is active on the network.(Fig. 36, 1)


The Checkbox of No Console receives. activated by default is so that No transmission data appear in a MSDOS window while the transmission is done. (Fig. 36, 2)


It's important to know that to send files, the receiver must have press the receive button (Fig. 36, 3) before the send in press the button on the "send" button (Fig. 36, (4)


Fig.- 36

13.- PUERED ESCANEADO DE EN TERMINAL IN THE RED TCP Scan.


TcpScan (Fig.- 37) is a port scanner that also allows to establish connection to a host as well as the sending and receiving of operations of the terminal and the service option.


Fig.-37



In Scanner's tab we can:

Select a range of IP addresses to scan. (Fig.- 38, 1)

Select a list of ports. (Fig.- 38, 2) (Porces must go separated by coma,

Select a range of ports. (Fig.- 38, 3)

Pulsing with the right button over the window (Fig.- 38, 4)

Loading Scanner from the register

Loading Port List from Services

Delete Port list


Fig.-38

In Connecting tab:

Introduce The host IP. (Fig.- 39, 1)

Select the port of communication. (Fig.- 39, 2)

Avoid. - You commando. (Fig.- 39, 3)

Receive data (Fig.- 39, 4)


Fig.-39


In the Service tab:

Read a list of services. (Fig.- 40, 1)

Doing right-click on the service window: (Fig.- 40, (2)

Add a service.

Read the registration service.

Read the services of the Windows database.

Fig.-40

14.-- FICHEROS' BLOQUES WITH AGA BLOCKER.


SgaBlocker (Fig.- 41) is a program that blocks files in a way that, once locked down, they're only accessible via SGA. If any other program or process called the file, it would be denied access.


The locked files only unlock from SgaBlocker or Automatically when the program closes.


It works via network allowing to block any file of any accessible network.



Fig.-41




Al al Execution, SGA asks if you want to pass the selection of the list He's the SgaBloker. If accepted, it will reopen the time necessary until you finish with the list in batches of up to 50 files for every program.











SgaBloquer allows: - Add files to a list one to one (Fig.- 42, 1)




Fig.-42






















15.- MONTING UNITIES IN DISCO FOR YOUR ACCESS FROM SGA CON -SGAMounter.


SgaMounter Mount any drive or device accessible through network in the system. (Fig.- 43)


Fig.- 43


Al al running it will appear a connection window to the device (Fig.- 44) from where you can: - Enter the username, (Fig.- 44, 1)

- Password, (Fig.- 44, 2)

- supplier, (Fig.- 44, 3)

- recourse to share (Fig. 44, 4)

- mounting unit. (Fig.- 44, 5)


Fig.- 44


NOTE: When executed, a MSDOS window will appear in black (Fig.- 44) that does not will allow access to the SGA until that window closes through the user or close at the end of the SgaMounter program.


This one. program can be called as many times as you want and while you are in execution will keep the unit assembled.


16.- FINAL NOTES.


SGA is currently configured so that every time you make a migration, put in all files a new creation date and on all three dates of the file. Now the last dates access and the last modification creates them when creating the file, but can be configured (in code) to keep the dates original files copied.


The execution of the SGA is perfectly possible in any terminal of the network on which the program is called and its disk execution is in any point on the network where you start.


Any terminal where SGA runs can send an e-mail to the server mail to be appointed. (in code)


Temporarily, so that the program generates the right logs on the Copy button / Lists / Dates must also be put on the comparator list list of origin.