III

Public Access Com puter Software · Management ·

BV RICHARD \NAVNE

24 JUNE 2004 ' COMPUTERS IN LIBRARIES feature: PAC management tools

ost libraries now recog­ nize that public access computers are essential M to providing excellent service to patrons. Managing these computers has become a major re­ sponsibility for library staffs. Patrons expect to find secure and well-main­ tained computers that have simple, stable, and predictable interfaces. In my capacity as assistant director for Information Systems at The Uni­ versity of Texas Southwestern Medical Center at Dallas (UT Southwestern) Library, I have grappled with public access computer issues for years. Ten years ago there were few software tools available; however, today there are many easy-to-use and cost-effective al­ ternatives to help manage public ac­ cess computers.

Tools to Help Manage PACs

I'm about to describe a representa­ tive sample of software tools in several important categories. This article does or not attempt to address all programs in Tools all software management categories • because there are too many products to do that. I'll discuss specific products LI rarl from specific vendors, but won't rec­ ommend any. You should do further re­ search and make a purchase decision appropriate to your environment. Most of the software discussed in this arti­ cle is available for testing prior to pur­ chase. Some of the programs are free. The categories of management soft­ ware that I will address are setup soft­ ware, security programs, integrity main­ Today, there are many tenance software, browser control tools, antivirus software, anti-spyware soft­ easy-to-use and cost-effective ware, patch management tools, session managers, print management systems, system utilities, and some Microsoft tools to help manage software options. However, I won't ad­ dress filtering software, anti-spam soft­ public access computers. ware, privacy tools, network trouble­ shooting tools, firewall software, and some other categories of management tools in this article.

}} COMPUTERS iN LIBRARIES feature: PAC management tools

Computer Setup configurations. In December 2003, Fortres 101 from Fortres Grand does Symantec acquired PowerQuest. not provide a menu, but it does lock I prefer an iterative method of de­ Develop a test environment ifpossi­ down specific Windows settings. By lock­ veloping a new computer configura­ ble. Then you can try various software ing Windows settings, you can control tion. Richard Wayne's Iterative Devel­ packages without impacting your pro­ what your patrons can and can't do. Fool­ opment Methodology goes something duction systems. Your test environment Proof Security from Riverdeep is another like this: should mimic your production environ­ product that provides desktop security ment as closely as possible. Microsoft's by locking down Windows features. • Start with the best available Virtual PC 2004 can help you to emu­ hardware. The new hardware late several operating system environ­ Integrity Maintenance Software ideally consists of identical models ments on a single test computer. to minimize deployment issues. Even with security software loaded, it is likely that, over time, your public • Talk to library and information Security Programs access computer software will become technology staff and patrons, and I will discuss security programs in corrupted and collect extraneous data. then create your first hardware and two sections. Those that prevent pa­ The solution to the problem is integrity software configuration for testing. trons from intentional or unintentional maintenance software. • Place the configuration someplace mischief and access are presented in Centurion Technologies provides where you can gather further this section. The programs that clean two alternatives. Centurion Guard uses staff feedback. up the potential clutter after patron both hardware and software. Drive­ sessions are listed in the next section Shield uses software only. Upon reboot, • Develop a second computer ("integrity maintenance software"). any changes patrons have made are re­ configuration based upon moved, and the system is restored to staff feedback. its initial configuration. • Place the configuration in a /I You need to have Deep Freeze from Faronics Tech­ location to gather further staff nologies and Clean Slate from Fortres and patron feedback. aggressive[ real-time Grand are also software-only options for integrity maintenance. All of the • Develop a third configuration based products in this category allow you to upon staff and patron feedback. . . virus scanning protect only the drives that you wish • Place the configuration in a to protect. For example, if you have an limited number of locations for 1f antivirus product on your D:\ drive, further staff and patron feedback. enabled at all times. then you could configure the software Further revise the configuration to protect your C: \ drive from changes, if necessary after usage. CybraryN from Computers By De­ but not your D: \ drive. sign prevents changes to a PC's config­ • Replicate the revised configuration uration. It can be configured to au­ by replacing the old configuration Browser Control Tools thenticate to your integrated library with the revision. system (ILS). For example, CybraryN Let's face it, the Web is tremendously works with systems from Innovative, popular with our library patrons. As a Once you have developed your final Dynix, Sirsi, Gaylord, and other ILS result, they will attempt to use every configuration, preserve it. Make a copy vendors. If a patron does not have a available computer for general Web ac­ of the configuration and place it on a valid bar code, has excessive overdues, cess. Sometimes, these can be comput­ server, another computer, an external or is not a valid patron type, then he or ers designated for OPAC or licensed hard drive, or a DVD. Then you can she will not be able to use the public ac­ database use only. When that happens, replicate your configuration using soft­ cess computer if you design it that way. you want to make sure that only the cat­ ware tools like these: CybraryN provides a menu and alog or subscription databases can be Symantec can back up, store, other features to prevent patrons from accessed from those computers. If you and replicate configuration images. corrupting the computer's software. The don't, they will end up becoming general PowerQuest's DeployCenter has su­ patron is locked into the CybraryN in­ Internet access computers. perseded PowerQuest's terface and cannot execute programs or Public Web Browser (PWB) from Pro and can also help deploy software utilities that damage the configuration. TeamSoftware Solutions controls Web

26 JUNE 2004 » COMPUTERS IN LIBRARIES feature: PAC management tools

browser sessions. PWB replaces the In­ cation (for non-commercial use) is Ad­ ured for use in a patron self-service ternet Explorer interface with an in­ aware from Lavasoft. mode or a staff-managed mode. It even terface that is highly configurable. It supports making reservations via the allows you to specifY sites that can or Patch Management Tools Web or telephone. can't be accessed via the browser. PWB also lets you customize a number of Information technology profession­ other options such as buttons, drop­ als have been accustomed to keeping II Running anti-spyware down menu items, home page default, antivirus software up-to-date. The pop-up policies, printing settings, and Blaster worm opened our eyes to a new software on a system for download capabilities. threat in 2003-we saw that Windows K-Meleon from kmeleon.org also al­ systems also needed to be kept up-to­ lows you to control many browser func­ date with critical updates issued by the first time can be tions. It is free, open source software. Microsoft. The industry has been in a WINSelect from Faronics gives you whirlwind of activity since Blaster, try­ control over many browser and Win­ ing to anticipate the next round of ma­ an enlightening and dows features. licious software. There are a number of applications available to help keep shocking experience. /I Antivirus Software systems patched and secure. Microsoft has developed a patch In 1992, extensive media coverage led management tool called Software Up­ Comprise Technologies offers Smart to Michelangelo virus hysteria. It was a date Services or SUS. It is used to de­ Access Management or SAM. It has a DOS-based virus and was a new expe­ ploy critical Windows updates through­ number of interesting modules for rience for computer users at that time. out your library. As ofthis writing, SUS time, reservation, Internet, desktop, At UT Southwestern, we distributed 1.0 with Service Pack 1 is available. and report management. Michelangelo detection and removal SUS 2.0 is in development and has been tools on diskette to hundreds of cus­ renamed ''Windows Update Services." Print Management Systems tomers at a centralized "crisis center." Shavlik Technologies provides a Virus writers have come a long way, powerful patch management product Print management systems help to and so have the applications to combat called HFNetChkPro. The Microsoft reduce wasted paper and ink cartridges. them. Today, you need to update your Baseline Security Analyzer (MBSA) They also make the printing cost-recov­ antivirus software at least daily. You uses the HFNetChkPro scanning en­ ery process more efficient for both pa­ need to have aggressive, real-time gine. MBSA is a free tool that allows trons and staff. virus scanning enabled at all times. systems administrators to identify re­ With LPT:One from EnvisionWare, A number of good tools are available quired patches for computers through­ you can set a price per page, a maximum to help with this effort. A few of the out the network. number of pages that a patron can print, major antivirus vendors are Computer and different prices per printer. A sim­ Associates, McAfee, Panda, Sophos, Session Managers ple dialogue leads the patron through and Symantec. the printing process and gives her an op­ Your staff members could spend a portunity to cancel printing altogether. Anti-Spyware Software great deal of their time matching pa­ Computers By Design, GoPrint Sys­ trons to available public access com­ tems, and Pharos Systems also offer Running anti-spyware software on puters as well as refereeing fights for solutions to manage printing. Most a system for the first time can be an en­ available computers. [Editor's Note: See systems can be controlled by staff or lightening and shocking experience. the feature on page lB.] However, the can work independently with both card It's not uncommon to find hundreds of process can be automated to free your and cash payment systems. pieces of spyware on a system. Spy­ staff for more sophisticated (and safer) ware can violate your privacy and com­ patron interactions. System Utilities promise the integrity of your systems. EnvisionWare 's PC Reservation con­ You can download free anti-spyware trols patron access to public access com­ System utilities is a broad category. software from several sites. One tool puters. It can work with an ILS to au­ However, it gives me the opportunity is Spybot - Search & Destroy from thenticate patrons prior to granting to mention some miscellaneous tools Patrick M. Kolla. Another free appli- access to a computer. It can be config- that I have found to be helpful. COMPUTERS IN LIBRARIES feature : PAC management tools

To Contact the Companies

Computer Setup Browser Control Tools Nicolas Stark Computing AB GoPrint Systems, Inc. (G S-3) 440 Regal Lily Lane, Suite 200 Symantec Corp. (Ghost, DeployCenter) TeamSoftware Solutions, In c. (Lamoft Ad -aware) San Ramon, CA 94583 555 International Way (Public Web Browser) Centrumvagen 39 925/648-5066 Springfield, OR 97477-1098 2017 24th St. SE Box 80 http://www.goprint.com 8001721 -3934 Rochester, MN 55904 52043 Falkoping Sweden http://enterprisesecurity.symantec 507/252-8344 Pharos Systems (Uniprint) 011 -4 6-515-530-03 .com/publicsector http://teamsoftware.bizland.com 333 West Commercial St., Suite 3500 http://www.lavasoftusa.com East Rochester, NY 14445 Microsoft Corp. (Virtual PC) kmeleon.org (K-Meleon) 888/864-7768 One Microsoft Way http://kmeleon.sourceforge.net http://www.pharos.com Redmond, WA 98052-6399 (Company works only through the Internet.) Patch Management Tools 425/882-8080 Faronics Tech nologies USA, Inc. (WINSelect) Microsoft Corp. (Software Update Services, http://www.microsoft.com 170-2411 Old Crow Canyon Rd. Windows Update Services, Microsoft System Utilities Baseline Security Analyzer) San Ramon, CA 9458 3 Symantec Corp. ( SystemWorks) One Microsoft Way 800/943-6422 555 International Way Security Programs Redmond, WA 98052-6399 http://www.faronics .com Springfield, OR 97477-1098 Computers By Design, Inc. (CybraryN) 425/882-8080 8001721 -3934 120 Lake Ave . S. Antivirus Software http://www.microsoft.com Nesconset, NY 11767 http:/ 1enterprisesecu rity .symantec 800ITHE-TOWN Computer Associates International, Inc. Shavlik Technologies (H FNetChkPro) .com/publicsector (eTrust Antivirus) Rosedale Corporate Plaza http://www.cbdusa.com VCommunications, Inc. One Computer Associates Plaza 2665 Long Lake Rd ., Suite 400 (Partition Commander) Fortres Grand Corp. (Fortres 10 I) Islandia, NY 11749 Roseville, MN 55113 2290 N. First St., Suite 101 P.O. Box 888 800/225-5224 800/690-6911 San Jose, CA 95131 Plymouth, IN 46563 http://www.ca.com http://www.shavlik.com 800/331-0372 800/648-8266 http://www.fortres.com Network Associates Corp. (McAfee Anti-Vi rus) http://www.v-com .com 3965 Freedom Ci rcle Session Managers XQDC, Ltd. (X-Setup Pro) Riverdeep Interactive Learning, Inc. Santa Clara, CA 95054 39/40 Calthorpe Rd. (FoolProof Security) 8881VIRUSNO Envisio nWare, Inc. (PC Reservation) BI 5 ITS Birmingham 500 Redwood Blvd. http://www.nai.com 2810 Premiere Parkway NW, Suite 350 Novato, CA 94947 Duluth, GA 30097-8912 United Kingdom 800/825-4420 Panda Headquarters USA (BusinesSecure) 800/216-8370 011-49-721-62811970 http://www.riverdeep.net 230 N. Maryland Ave. 303 http://www.envisionware.com (Phone is for German office.) P.O . Box 10578 http://www.xqdc.us Glendale, CA 91209 Comprise Technologies, Inc. Veteran Computer Solutions (TooIStar*Test) 818/543-690 I (Smart Access Management) Integrity 1026 Route 36 E. 33 Fourth St. N. , Suite 210 Maintenance Software http://www.pandasoftware.com P.O. Box 425 St. Petersburg, FL 3370 I Centurion Technologies, Inc. Sophos, Inc. (Sophos Anti -Viru s) Navesink, NJ 07752 800/908-1VCS (Centurion Guard, DriveShield) 6 Kimball Lane, 4th Floor 800/854-6822 http://www.toolhouseusa.com 512 Rudder Rd . Lynnfiel d, MA 01940 www.comprisetechnologies.com Fenton, MO 63026 8881767-4679 (Eastern, Central USA) Ultimate Boot CO 8001224-7977 888/866-2 802 (Western USA, Canada) http://www.ultimatebootcd.com (Company works only through the http://www.centurion-tech.com http://www.sophos.com Print Management Internet.) Faronics Technologies USA, Inc. Symantec Corp. (Symantec AntiVirus) Systems (Deep Freeze) 555 International Way EnvisionWare, Inc. (LPT:One) 170-2411 Old Crow Canyon Rd . Springfie ld, OR 97477 -1 098 2810 Pre miere Parkway NW, Suite 350 Some Microsoft San Ramon, CA 94583 8001721 -3934 Duluth, GA 30097-8912 Software Options 800/216-8370 800/943-6422 http:/ 1enterpr isesecu rity.symantec Microsoft Corp. (I nternet Explorer http://www.envisionware .com http://www.deepfreezeusa.com .com/publicsector Admin istration Kit, PowerToys, Fortres Grand Corp. (Clean Sl ate) Computers By Design, Inc. (CybraryPRINT) Systems Management Server) P.O . Box 888 Anti-Spyware Software 120 Lake Ave. S. One Microsoft Way Plymouth, IN 46563 Spybot (Spybot - Search & Destroy) Nesconse t, NY 11767 Redmond, WA 98052-6399 800/331-0372 http://www.spybot.info 800ITHE-TOWN 425/882-8080 http://www.fortres.com (Company works only through the Internet.) http://www.cbdusa.com http://www.microsoft.com

:t·

t' , •. JUNE 2004 29 COMPUTERS IN LIBRARIES feature: PAC management tools I

Norton SystemWorks from Syman­ ample, you can set read-only access to of the vendors mentioned have other tec includes a number of products, such a folder for specific users or groups. products that may also help you. as , which can detect Windows versions since NT have Software tools must be maintained Windows and disk problems and fix different user types. In Windows XP, and kept up-to-date in order to func­ them, as well as optimize file storage for example, the user "public" might be tion well. In many cases, vendors offer on your hard drive. a limited user (restricted to perform­ companion network tools that provide Partition Commander from VCOM ing only certain functions). The sysad­ the ability to maintain all computers can create a new partition on an exist­ min would be an "administrator" user. from a single administrative worksta­ ing system. I have used this product to Microsoft provides the Internet Ex­ tion or server. Some of the tools also create a new partition for antivirus soft­ plorer Administration Kit or lEAK to have extensive reporting capability to ware. That partition is treated differ­ manage IE. It was designed to help assist in decision making. ently than the others on the system. For configure and deploy the browser. Don't despair. There are a number example, on systems with Centurion of commercial and free products and Guard, the partition with antivirus soft­ resources to help you manage one of ware is not cleared at reboot. /J Print management your biggest challenges-the public ac- X-Setup Pro from XQDC, Ltd. is a cess computer. ~ tweaker program. It can help you to mod­ systems help to '\~ ifY Windows settings that are buried deep within the Windows registry. Richard Wayne has managed the Multiyear system warranties are reduce wasted paper systems group at The University of commonly available. Hardware has Texas Southwestern Medical Center also become more dependable. How­ at Dallas Library since 1992. He does ever, there are times when you still and ink cartridges." hands-on technical work with Windows, need a bootable hardware diagnostic UNIX, Macintosh, PDA, wireless, and program that can help troubleshoot Microsoft offers PowerToys for var­ other technologies. Prior to joining UT hardware-related problems. TooIStar" ious versions of Windows. Within Power­ Southwestern, he was in the informa­ Test from Veteran Computer Solutions Toys is a program called Tweak UI. It tion technology field for more than 10 has helped me out of a few jams. An­ is somewhat similar to X-Setup Pro years in a number of technical and other useful tool in this category is the mentioned earlier. It provides a graph­ m anagerial capacities. He is also the Ultimate Boot CD. ical interface that allows you to mod­ principal ofStrategic Information Man­ ify a number of Windows settings. agement Services, a library technology Some Microsoft Software Options Finally, Systems Management Server consulting firm. He has worked with a or SMS is offered by Microsoft as a com­ wide range of library technologies in Microsoft Windows, especially the prehensive solution for change and con­ public, academ ic, and special libraries. more recent versions, offers options to figuration management. It can help ad­ His particular area of expertise is in­ perform some ofthe functions that I've ministrators in the areas of application formation security in the library envi­ addressed in this article. In most cases, deployment, asset management, and ronment. H is e-mail address is richard features can be applied from a server security patch management. . [email protected]. or at individual workstations. Group Policy can control the Win­ Just a Quick Overview dows desktop as well as many other References Windows features. In Windows 2000 I have breezed through many soft­ Richard W. Boss, "PC Reservation & Print Management Software," and XP, you can run Microsoft Man­ ware tools. Many more are available to Public Library Association TechNotes , June 2003. http:// agement Console to set group policies. help you manage your public access www.ala.orF/ala/pla/plapubs/technotes/pcreservation.htm Michael P. Sauers and Louise E. Alcorn, Neal·Schuman Directory An example may help to demonstrate computers. Use this article as a start­ of Management Software For Public Access Computers, the feature's potential: In Windows ing point. After analyzing the needs of Neal-Schuman Publishers, Inc., 2003. XP, you can set Group Policy to prevent your particular library, you should do Jennifer Ward, "The Library Web Manager's Reference Center," patrons from seeing the Network further research. You can probably find Berkeley Digital Library SunSITE, May 20, 2003. http://sunsite Neighborhood icon on the desktop. a few affordable tools to meet the needs .berkeley.edu/Web4Lib/RefCenter/lwmrcpublic.html Richard Wayne, "Links to Desktop, Company, and Enterprise NTFS is the NT file system. A par­ of your environment. There are a num­ Security Resources," Strategic Information Management tition that is formatted with NTFS has ber of choices in most of the categories Services, March 10,2004. http://www.strategicinformation extensive security capabilities. For ex- of software that I have discussed. Many .com/d_security/secureJinks.htm