WinProxy Read Me File Contents: 1) WinProxy Product Description 2) Installation 3) Known Bugs 4) Ositis Software Contact Information and Support Options 5) Quick Start Guide 6) License Agreement __________________________________________________________________________ WinProxy Lite Version 1.1 Ositis Software WinProxy is a Windows 95/NT based proxy server that supports most popular internet protocols. WinProxy can be used as an external firewall, an internal firewall (securing one subnet from another), or to create a subnet that is connected to the internet with only one IP address. WinProxy will automatically be enabled for 60 days of use. After 60 days, you will need to contact Ositis Software, or a WinProxy reseller to purchase a permanent license for WinProxy. If you purchase direct from Ositis Software, it may take one to two weeks to deliver your serial number. Please plan accordingly. Resellers, such as Maagnum Resources at https://secure.safesite.com/cgi-bin/safesell1/winproxy can deliver a registration immediately over the Internet. Maagnum Resources provides a secure site with RSA encryption to process credit card orders. Send e-mail to Sales@Ositis.com for information on purchasing WinProxy. Please check our web page at http://www.WinProxy.com often to look for new releases and prmotions on WinProxy. __________________________________________________________________________ Installation: Please read the complete license agreement before installing this software, by installing this software you agree to the conditions of that agreement. To install WinProxy, unzip the entire .ZIP file into a temporary directory and execute SETUP.EXE. This will guide you through the installation of WinProxy and its components. This will also create a WinProxy program group containing WinProxy, this file, the logging application and an un-installer in case you later want to remove the program. Run WinProxy and select the Properties Wizard from the File menu. This will start a wizard, which will help you through the configuration process. After you have configured WinProxy, select 'Show Client Configuration' from the WinProxy File menu. This will show you how to configure your client computers. This document changes as your settings change. We recommend that you check this document each time you reconfigure WinProxy. __________________________________________________________________________ Contacting Ositis Software For additional information, support questions, bug reports or feature requests, please send mail to: Info@Ositis.COM For support questions or bug reports, please send e-mail to: Support@Ositis.COM Please include the following information: - Your name, company name, e-mail address, telephone number and postal address. - The WinProxy version number (from the About box). - Your WinProxy serial number (even if it is an evaluation number). - The operating system and type of computer you are using. We will not respond to support requests without the above information. Product updates and future releases will be available on our web page at: http://www.Ositis.com Postal Mail: Ositis Software 19364 Stanton Pl. Castro Valley, CA 94546 Fax: (510) 537-6626 Phone: (510) 537-6676 __________________________________________________________________________ Quick Start Guide 1. Configuring a secure firewall: The usual configuration for WinProxy is as an internet firewall. In this instance, WinProxy is run on a Windows NT or Windows ’95 computer that has one IP address connected to the internet, and another connected to the internal network. WinProxy listens for connections on the internal IP address, and makes requests on the internet on behalf of the users behind the network. The users on the network must configure their browsers to proxy through WinProxy. To setup a Windows 95 or NT computer as a firewall, routing should be disabled (if using NT), the external network card should be configured to support TCP/IP, but not NetBEUI or IPX. You should not any TCP/IP services other than WinProxy. If you send and receive electronic mail from an external post office (SMTP & POP3) you should configure WinProxy to use it, otherwise you may choose to run a post office server and SMTP (Simple Mail Transport Protocol) server along with WinProxy. For added security the internal IP addresses can be set to invalid numbers on the internet, so that it is impossible for them to be used, even if a hacker managed to enable routing on the firewall. We recommend using IP Addresses 90.0.0.1 through 90.0.0.254 internally. 2. Configuring a secure subnet: If you want to secure an internal network from another network, but still provide the ability for that network to connect to the outside, then you should use the cascading capabilities of WinProxy. In this case people behind the secure subnet will connect to WinProxy, which will connect them directly to another external proxy server. From there they can access the internet, essentially tunneling through another subnet. This will cause the secure subnet to have slower access than the other network, but it will also provide additional security for that workgroup. 3. Connecting a subnet to the internet with a single IP address: Many access providers do not allow an entire workgroup to connect to the internet because they only provide a single IP address. WinProxy can solve that problem by acting as a proxy for several users. In order to do this WinProxy should be configured as if it was acting as a firewall, but many of the security features can be disabled if security is not a primary concern. When a user behind the firewall requests a document through WinProxy, another request is made from the proxy computer, from the one valid IP address. The response is forwarded back and as far as the remote server is concerned, the request came from the proxy server. As far as the requesting application is concerned, the response came from the proxy server. 4. Logging WinProxy provides the ability to log all proxy activity. This is done by sending messages to an external logging application. A sample logging application, complete with source code is provided with WinProxy to enable network administrators to more easily monitor network activity. The logging application can be run on the same computer as WinProxy or on a separate computer inside the firewall. WinProxy can not be configured to transmit logging information externally. _____________________________________________________________________________ Ositis Software excessively comprehensive License Agreement: CAREFULLY READ THE TERMS AND CONDITIONS OF THIS AGREEMENT. BY USING THIS SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, DO NOT USE THIS SOFTWARE. 1. Ositis Software grants to you a non-exclusive, non-sublicensable, license to use this trial version of WinProxy for Windows (the "Software"), in binary executable form for evaluation and trial use purposes only. THIS SOFTWARE MAY CONTAIN CODE THAT DISABLES MOST OF ITS FEATURES AFTER A DATE SPECIFIED IN THE ABOUT BOX. 2. OSITIS SOFTWARE MAKES NO REPRESENTATIONS ABOUT THE SUITABILITY OF THIS SOFTWARE OR ABOUT ANY CONTENT OR INFORMATION MADE ACCESSIBLE BY THE SOFTWARE, FOR ANY PURPOSE. THE SOFTWARE IS PROVIDED 'AS IS' WITHOUT EXPRESS OR IMPLIED WARRANTIES, INCLUDING WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. THIS SOFTWARE IS PROVIDED GRATUITOUSLY AND, ACCORDINGLY, OSITIS SOFTWARE SHALL NOT BE LIABLE UNDER ANY THEORY OR ANY DAMAGES SUFFERED BY YOU OR ANY USER OF THE SOFTWARE. OSITIS SOFTWARE WILL NOT SUPPORT THIS SOFTWARE AND WILL NOT ISSUE UPDATES TO THIS SOFTWARE. 3. All content accessed through the Software is the property of the applicable content owner and may be protected by applicable copyright law. This License gives you no rights to such content. 4. While Ositis Software intends to distribute a commercial release of the Software, Ositis Software reserves the right at any time not to release a commercial release of the Software or, if released, to alter prices, features, specifications, capabilities, functions, licensing terms, release dates, general availability or other characteristics of the commercial release. 5. Title, ownership rights, and intellectual property rights in and to the Software shall remain in Ositis Software and/or its suppliers. You agree to abide by the copyright law and all other applicable laws of the United States including, but not limited to, export control laws. You acknowledge that the Software in source code form remains a confidential trade secret of Ositis Software and/or its suppliers and therefore you agree not to modify the Software or attempt to decipher, decompile, disassemble or reverse engineer the Software, except to the extent applicable laws specifically prohibit such restriction. 6. Ositis Software may terminate this License at any time by delivering notice to you and you may terminate this License at any time by destroying or erasing your copy of the Software. Upon termination of this License, or in any event within thirty (30) days following Ositis Software’s release of a commercial version of the Software, you agree to destroy or erase the Software. In the event of termination, the following sections of this License will survive: 2, 3, 4, 5, 6 and 7. This License is personal to you and you agree not to assign your rights herein. This License shall be governed by and construed in accordance with the laws of the State of California and, as to matters affecting copyrights, trademarks and patents, by U.S. federal law. This License sets forth the entire agreement between you and Ositis Software. 7. Use, duplication or disclosure by the Government is subject to restrictions set forth in subparagraphs (a) through (d) of the Commercial Computer-Restricted Rights clause at FAR 52.227-19 when applicable, or in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, and in similar clauses in the NASA AR Supplement. Contractor/ manufacturer is Ositis Software, 19364 Stanton Pl., Castro Valley, CA 94546. 8. OSITIS SOFTWARE OR ITS SUPPLIERS SHALL NOT BE LIABLE FOR (a) INCIDENTAL, CONSEQUENTIAL, SPECIAL OR INDIRECT DAMAGES OF ANY SORT, WHETHER ARISING IN TORT, CONTRACT OR OTHERWISE, EVEN IF OSITIS SOFTWARE HAS BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES, OR (b) FOR ANY CLAIM BY ANY OTHER PARTY. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. 9. HIGH RISK ACTIVITIES. THE Software is not fault-tolerant and is not designed, manufactured or intended for use or resale as on-line control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines, or weapons systems, in which the failure of the Software could lead directly to death, personal injury, or severe physical or environmental damage ("High Risk Activities"). Ositis Software and its suppliers specifically disclaim any express or implied warranty of fitness for High Risk Activities.