







                               Lock Tools User Manual








                                    Steve Clarke
                                      May 1994



            Lock User Manual                                      Page 2


            INTRODUCTION

            The Lock Tools are provided as network independent tools
            which are used together to provide license limiting support
            to applications which are stored on a network file server.

            The tools work by attempting to book out a copy of an
            application when you select it, and then book the
            application back in when you have finished with it.

            PROGRAMS

            There are two user utilities provided to help in using the
            locked applications. These are:

                 LOCKINFO
                 LOCKRM

            These applications are discussed in the following sections.





































                                                                05/17/94



            Lock User Manual                                      Page 3


            LOCKINFO

            This application is used to enquire which applications are
            in use, and by whom.  The program has three modes of
            operation:

            i.   General Enquiry Mode

            Simply type lockinfo, and you will be presented with a list
            of applications, how many are available, and how many of
            those applications are being used.  The output of this mode
            will look something like this:

            L:\LOGIN>lockinfo
                 WIN:      0 copies running.  Maximum 5 copies
                 LOTUS:    0 copies running.  Maximum 3 copies
                 WINWORD:  1 copies running.  Maximum 2 copies
                 BC:       0 copies running.  Maximum 2 copies

            The program list the applications available, shows how many
            of those applications are in use, and how many copies of the
            applications are stored on the network.  When the list is
            more than one screen long, the output is paused - hit any
            key to continue.

            ii.  Specific Enquiry Mode

            To find out who and where people are who are using a
            specific application, type:

             lockinfo appname

            Where appname is the name of the application as displayed in
            the General Enquiry Mode.  The output of this mode will look
            something like this:


            L:\LOGIN>lockinfo winword

                 Microsoft Word for Windows Version 2.0c

                 Steve_Clarke      D  Sat May 14 13:43:57 1994
                 Diane_Clarke      E  Sat May 14 13:05:12 1994

                 2 copies running.  Maximum 8 copies


            L:\LOGIN>


            The output is split into three main sections, the first is
            the line which specifies the application name (in this case
            Word for Windows Version 2.0c), The next section is



                                                                05/17/94



            Lock User Manual                                      Page 4


            a series of lines, one for each copy of the application
            which is booked out.  These lines are made up of the user
            name, a one or two letter machine identification string, and
            the date that the application was run.  The final section is
            a summary specifying how many copies have been used, and how
            many copies are on the system.

            iii. Silent Mode

            This mode is provided for use in batch files.  It enables
            the batch file to find out if there are any applications
            free, by returning (in the DOS errorlevel variable) the
            number of available copies of a specific program.

            The following example shows how the program can be set up to
            run Windows 3.1, and if there are no copies left, run
            Windows 3.0.

            @echo off

            lockinfo -s win31
            if errorlevel 1 goto Ok31
            lockinfo -s win30
            if errorlevel 1 goto Ok30

            echo There are no copies of Windows 3.1 or Windows 3.0
            available
            goto Fin

            :Ok31
            L:\WIN31\WIN31
            goto Fin

            :Ok30
            echo There are no copies of Windows 3.1 available, running
            ver 3.0
            L:\WIN30\WIN30

            :Fin


            For Windows users, LOCKINWIN has been written by David
            Morris.













                                                                05/17/94



            Lock User Manual                                      Page 5


            LOCKRM

            One of the things that the locking system does, is not to
            allow the same user on the same machine to run the same
            program more than once.  This is done to avoid the user
            taking out two lock tokens unnecessarily.

            If the machine crashes whilst running the application, and
            the only way to get out of the situation is to reboot, any
            application which was being run at the time will still be
            locked out.

            Removing the locks for the machine involve the user logging
            in again, and typing:

            LOCKRM

            This will remove any locks, and then force the user to
            reboot the machine.

            Depending on the network type, the locks may be removed by:

            The Original User on the Original Machine
            Any User on the Original Machine
            The System Manager on Any Machine

            Please check with your system manager to find out which one
            of the above applies.




























                                                                05/17/94



            Lock User Manual                                      Page 6


                                   ERROR MESSAGES

            The following error messages are due to an inconsistency in
            the system configuration.  Report them immediately to your
            System Administrator.

            Unrecognised Machine Identification
            Unable to Find Overlay Application
            Unable to Create Application Lock
            Unable to Remove Application Lock
            Unable to Execute Application
                 - Invalid Program Path
                 - Invalid or Corrupt Program
                 - WinExec Error nn
            Unable to Access INI Data
            INIFile Error: ...


            Unable to Execute Application - Insufficient Memory

            This error message may be generated if you are attempting to
            load too many programs (or too large a program) into a
            Windows session.  To avoid the error message, shut down some
            running applications.  If this does not solve the problem,
            seek help from the System Administrator.

            This Application is Already Running on This Machine

            Either the application is running on the machine (another
            Windows application, a DOS application in a DOS Window, or a
            DOS application in an application DOS shell), or the machine
            has crashed when an application was running.  Either use the
            running application, or use LOCKRM to remove the incorrect
            locks.

            Too Many Copies.  Try Again Later

            You have attempted to book out one more copy of an
            application than has been allowed.  Use LOCKINFO to find out
            who and where the applications are being used, and wait.
















                                                                05/17/94



            Lock User Manual                                      Page 7


























































                                                                05/17/94
