home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
High Voltage Shareware
/
high1.zip
/
high1
/
DIR4
/
SWEEPER.ZIP
/
MANUAL.DOC
< prev
next >
Wrap
Text File
|
1993-10-20
|
67KB
|
1,813 lines
Disk Sweeper Version 2.0
Unregistered Shareware Version
User's Guide and Reference Manual
October 1993
May Be Freely Distributed For Evaluation Purposes
Information Age
Post Office Box 651
Canton, NC 28716
(704) 648-8585
Table Of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
System Requirements. . . . . . . . . . . . . . . . . . . . . . . . 1
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Printing This Manual . . . . . . . . . . . . . . . . . . . . . . . 1
What is Disk Sweeper?. . . . . . . . . . . . . . . . . . . . . . . 2
Reporting Missing Files. . . . . . . . . . . . . . . . . . . . . . 2
How Does Disk Sweeper Work?. . . . . . . . . . . . . . . . . . . . 3
How Do I Use Disk Sweeper? . . . . . . . . . . . . . . . . . . . . 3
A Warning About Copy-Protected Software. . . . . . . . . . . . . . 4
Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . 5
Copyright. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Distribution Policy. . . . . . . . . . . . . . . . . . . . . . . . 6
How To Register. . . . . . . . . . . . . . . . . . . . . . . . . . 6
The Lab/Network Version. . . . . . . . . . . . . . . . . . . . . . 6
What You Get When You Register . . . . . . . . . . . . . . . . . . 7
Using CAPTURE and SWEEP . . . . . . . . . . . . . . . . . . . . . . . . 8
Command-Line Parameters. . . . . . . . . . . . . . . . . . . . . . 8
Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Canceling The Programs . . . . . . . . . . . . . . . . . . . . . . 8
The CAPTURE Program. . . . . . . . . . . . . . . . . . . . . . . . 8
Examples of Using the CAPTURE Program. . . . . . . . . . . . . . . 9
The SWEEP Program. . . . . . . . . . . . . . . . . . . . . . . . . 9
Examples of Using the SWEEP Program. . . . . . . . . . . . . . . . 11
Excluding Directories. . . . . . . . . . . . . . . . . . . . . . . 13
Excluding Directories With Indirection Files . . . . . . . . . . . 13
Embedding Comments In an Indirection File. . . . . . . . . . . . . 14
Using /EXCLUDE and /MISSING Together . . . . . . . . . . . . . . . 14
Using /SILENT and /VERIFY Together . . . . . . . . . . . . . . . . 14
Other Conflicting Switches . . . . . . . . . . . . . . . . . . . . 14
Tutorial. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Lesson 1: Locating Alien Files and Directories . . . . . . . . . . 15
Lesson 2: Deleting Alien Files and Directories . . . . . . . . . . 16
Lesson 3: Scanning Only For Missing Files and Directories. . . . . 17
Lesson 4: Scanning Only For Alien Files and Directories. . . . . . 18
Lesson 5: Excluding a Directory From Being Scanned . . . . . . . . 18
Lesson 6: Creating a Log File, and Running in Silent Mode. . . . . 19
Lesson 7: Naming an Alternate Snapshot File. . . . . . . . . . . . 19
Lesson 8: Using Disk Sweeper From a Floppy Diskette. . . . . . . . 20
Lesson 9: A Visit To Your Computer Lab . . . . . . . . . . . . . . 21
Using Disk Sweeper in a Computer Lab. . . . . . . . . . . . . . . . . . 23
Installing Individual Copies of Disk Sweeper . . . . . . . . . . . 23
Preparations For Installing Individual Copies on Each Computer . . 23
Running Disk Sweeper From a Floppy Diskette. . . . . . . . . . . . 24
Preparations For Running Disk Sweeper From a Floppy Diskette . . . 24
Running Disk Sweeper Across a Network. . . . . . . . . . . . . . . 24
Preparations For Running Disk Sweeper Across a Network . . . . . . 25
Using the Same Snapshot File on Multiple Computers . . . . . . . . 25
i
Other Uses For Disk Sweeper . . . . . . . . . . . . . . . . . . . . . . 26
Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Messages Displayed by the CAPTURE Program. . . . . . . . . . . . . 27
Messages Displayed by the SWEEP Program. . . . . . . . . . . . . . 27
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
ii
Introduction
System Requirements
o PC with 256K memory or higher
o DOS version 2.1 or higher
Installation
Before you proceed with the installation, you should make a working copy of
the original diskette, and then store the original diskette in a safe place.
If you are planning to use Disk Sweeper from a floppy diskette, this is all
you need to do.
Installing Disk Sweeper on your hard drive is a simple matter of creating a
directory and copying the contents of the program diskette into the
directory. The following instructions assume you are installing Disk Sweeper
onto drive C:. If you are installing it onto a drive other than C:, use the
appropriate drive name.
First you must create a directory to hold the Disk Sweeper software. It is
recommended that you use the name SWEEPER for this directory. Type the
following command, and press the ENTER key:
MD C:\SWEEPER
Next you must copy the files from the program diskette into the SWEEPER
directory. Assuming you are copying the files from drive A:, type the
following command and press the ENTER key:
COPY A:*.* C:\SWEEPER
If you are copying the files from a drive other than A:, use the appropriate
drive name in the command above.
If you completed the steps listed above without encountering any errors, Disk
Sweeper should be installed and ready to run. If you encountered errors,
perform the installation again, making sure to type the commands just as they
appear.
Printing This Manual
It is recommended that you print this manual on your printer by typing
the following command at the DOS prompt:
COPY MANUAL.DOC PRN
Page 1
What is Disk Sweeper?
Disk Sweeper is a software package for people who are constantly having to
remove unwanted files and directories from computer disks. It is primarily
intended for persons responsible for managing large numbers of computers,
such as those who oversee the computer labs at schools, colleges,
universities, or training organizations.
No matter what safeguards are taken, students will find ways to store files
in places they're not supposed to. Although this is usually an honest
mistake, the accumulation of unwanted files and directories over an extended
period of time can lead to the following problems:
o Precious hard disk space starts disappearing.
o All sorts of student-generated files get mixed in with system and
application files.
o Lab assignments, reports and projects that were accidentally saved on
the hard drives can easily be copied by dishonest students.
o Commercial software can be illegally copied to hard drives. A good
example is computer games. When a student illegally installs a
software package on a school computer, it creates a risk of legal
prosecution.
o Courses in subjects such as MS-DOS become difficult to teach. The
students may have trouble finding the system files when they have to
sift through screen after screen of garbage.
o Some computers falsely report that there is no more disk space. This
can happen when the maximum number of files in the root directory has
been reached.
The only way to combat these problems is to keep a vigilant watch over all
the computers, in however many labs you are responsible for. Even if you use
programs such as DOS Shell, Windows File Manager, or other directory
utilities, it can still be very time consuming.
That's exactly why Disk Sweeper was created. It automatically locates, and
can even erase any file or directory on a computer disk that does not belong
there. It doesn't matter if the file is hidden or read-only, Disk Sweeper can
find it. Kiss those long hours of scanning directory listings good-bye!
Reporting Missing Files
Finding and dealing with unwanted files and directories isn't the only thing
Disk Sweeper can do. It can also tell you if a file or directory that is
supposed to be on a disk has been erased. That can be especially helpful in
a school computer lab where students have the power to remove things from the
hard drives.
Page 2
You might think the files in your lab are protected from malicious or
accidental erasure, but are they? Locking your students into a DOS menu
package wont keep them from accessing the command line because many
applications have drop to DOS features. Making critical files read-only
doesn't completely solve the problem either because programs like DOS Shell
let anyone erase read-only files. Besides, most technically adept students
learn how to remove the read-only attribute by using the ATTRIB command.
Although it is very difficult to make your files 100% secure, Disk Sweeper
will let you know if any are missing.
How Does Disk Sweeper Work?
The Disk Sweeper package comes with two programs, CAPTURE and SWEEP. CAPTURE
is a program that very quickly takes a snapshot of a disk. Once the snapshot
is taken, it is stored in a file. When SWEEP is run, it scans the contents of
the disk. Anything it finds that is not in the snapshot is reported as an
alien file or directory. You can optionally have SWEEP delete alien files
and directories when they are found. Also, any file or directory that is
listed in the snapshot, but is not found on the disk is reported as missing.
You might be thinking that these programs will be slow, but in actuality they
are quite fast. (Besides, the alternative is to scan the disk manually. You
cant get any slower than that!)
How Do I Use Disk Sweeper?
It's a safe assumption that you presently scan your computers hard drives
manually, either with a directory utility or the DOS command line. Before you
first use Disk Sweeper, you'll have to do this one more time. Get the
contents of the disk drive just the way you want them, with no alien files
present, and no needed files missing. (Take heart, this is the last time
you'll have to do it manually.)
You are now ready to use CAPTURE to take a snapshot of the disk. After the
snapshot has been taken, you can scan the disk for alien or missing files and
directories by running SWEEP. It will compare the contents of the disk with
the items in the snapshot file, and report any discrepancies. SWEEPs actions
will vary, depending upon how you have configured it. Here is an overview of
some of the different configurations possible:
o SWEEP can be configured to simply list any alien files and
directories, or delete them as soon as they are found.
o SWEEP can be configured to ask for permission before deleting any
alien file or directory.
o SWEEP can optionally delete alien files that have been marked as
read-only.
o SWEEP can be given a list of directories to exclude from the scanning
process. These directories will simply be skipped, and their contents
will not be checked for alien or missing items.
Page 3 o By default, SWEEP checks for both alien and missing files and
directories. It can be configured to only check for alien items, or
to only check for missing items.
o You can instruct SWEEP to create a log file listing its activities.
You specify the name and location of the log file.
o SWEEP can be configured to run in silent mode, which means it displays
no screen output. This might be appropriate if you want to run SWEEP
from a batch file.
o SWEEP can be run from the hard drive, a floppy diskette, or across a
network. You can tell SWEEP the name and location of the snapshot file
to use.
The next section details how to run Disk Sweeper in any of these
configurations.
*******************************************
* A Warning About Copy-Protected Software *
*******************************************
Although copy-protection mechanisms are extremely unpopular these days, there
is still a chance that you may be using some copy-protected software. If so,
you must take every precaution that Disk Sweeper will not erase any files
that are part of a copy-protection scheme. If this happens, the
copy-protected software may become permanently disabled. DO NOT run the SWEEP
program with the /DELETE, /VERIFY, or /ZAP switches until you are ABSOLUTELY
SURE that the files related to the copy-protection mechanism will not be
erased.
Page 4
Limited Warranty
THIS SOFTWARE, INSTRUCTION MANUAL, AND REFERENCE MATERIALS ARE SOLD "AS IS,"
WITHOUT WARRANTY AS TO THEIR PERFORMANCE, MERCHANTABILITY, OR FITNESS FOR A
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE RESULTS AND PERFORMANCE OF THIS
SOFTWARE IS ASSUMED BY YOU. GOOD DATA PROCESSING PROCEDURE DICTATES THAT ANY
PROGRAM BE THOROUGHLY TESTED WITH NON-CRITICAL DATA BEFORE RELYING ON IT. ANY
LIABILITY OF THE SELLER WILL BE LIMITED EXCLUSIVELY TO PRODUCT REPLACEMENT OR
REFUND OF PURCHASE PRICE.
TO THE ORIGINAL PURCHASER ONLY, INFORMATION AGE WARRANTS THE MAGNETIC
DISKETTE ON WHICH THE SOFTWARE IS RECORDED TO BE FREE FROM DEFECTS IN
MATERIALS AND FAULTY WORKMANSHIP UNDER NORMAL USE FOR A PERIOD OF NINETY DAYS
FROM THE DATE OF PURCHASE. IF DURING THIS NINETY-DAY PERIOD THE DISKETTE
SHOULD BECOME DEFECTIVE, IT MAY BE RETURNED TO INFORMATION AGE FOR A
REPLACEMENT WITHOUT CHARGE, PROVIDED YOU HAVE PREVIOUSLY SENT THE
REGISTRATION CARD TO INFORMATION AGE OR SEND PROOF OF PURCHASE OF THE
SOFTWARE PACKAGE.
YOUR SOLE AND EXCLUSIVE REMEDY IN THE EVENT OF A DEFECT IS EXPRESSLY LIMITED
TO REPLACEMENT OF THE DISKETTE AS PROVIDED ABOVE. IF FAILURE OF A DISKETTE
HAS RESULTED FROM ACCIDENT OR ABUSE, INFORMATION AGE SHALL HAVE NO
RESPONSIBILITY TO REPLACE THE DISKETTE UNDER THE TERMS OF THIS LIMITED
WARRANTY.
ANY IMPLIED WARRANTIES RELATING TO THE DISKETTE, INCLUDING ANY IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE
LIMITED TO A PERIOD OF NINETY DAYS FROM DATE OF PURCHASE. INFORMATION AGE
SHALL NOT BE LIABLE FOR INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES RESULTING
FROM THE USE OF THIS PRODUCT. SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION
MIGHT NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND
YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE.
Copyright
Disk Sweeper software and this document is (C) Copyright 1993 Information
Age. All rights reserved. Disk Sweeper is a Trademark of Information Age.
Any specific hardware/software names used in this document are trademarks of
specific manufacturers.
Although Disk Sweeper is partially marketed through Shareware channels, it is
not in the public domain. It is copyrighted by Information Age. All rights
are reserved. Copying, duplicating, selling or otherwise distributing this
product is a violation of the Law. However, we would like to encourage you to
make and distribute as many copies of this UNREGISTERED Shareware version as
you wish, with the following provisions:
Page 5
Distribution Policy
1. Please feel free to distribute this UNREGISTERED Shareware version as
often as you like, to any interested parties.
2. Please do not distribute the program without all of its original files,
documentation and this notice.
3. Please do not alter the program or documentation in any manner.
4. This UNREGISTERED Shareware version of Disk Sweeper is licensed for use
and evaluation for 60 days. After the 60 day evaluation period, the
REGISTERED version of Disk Sweeper must be purchased or the use of this
UNREGISTERED version must be discontinued.
Any DISTRIBUTION of the REGISTERED version of the Disk Sweeper software
is in violation of the license agreement and copyright Law!
How To Register
You may register this copy of Disk Sweeper by printing the file ORDER.FRM,
and filling it out. To print the file, type the following command at the DOS
prompt:
COPY ORDER.FRM PRN
Send the completed order form, along with a check or money order (in US
funds) for $35.00 + 2.50 shipping/handling to:
Information Age
Post Office Box 651
Canton, NC 28716
If you are in North Carolina, don't forget to add 6% sales tax. If you have
any questions, please call us at (704) 648-8585.
The Lab/Network Version
If you wish to run multiple copies of Disk Sweeper simultaneously in your
computer lab, you should send in the registration for a Lab/Network License.
This license will allow you to install up to 10 copies of Disk Sweeper, or
run Disk Sweeper over a network on up to 10 stations simultaneously. The cost
in US funds is only $90.00 + 2.50 shipping and handling. You will receive 1
physical copy of the software and 1 manual. (Additional manuals may be
purchased for only $7.00 each.)
Page 6
What You Get When You Register
o The latest version of Disk Sweeper.
o An attractive, professionally printed manual.
o Technical Support.
o Announcements of other Information Age products.
o Upgrade pricing on future releases of Disk Sweeper.
Page 7
Using CAPTURE and SWEEP
The Disk Sweeper software consists of two programs: CAPTURE.EXE and
SWEEP.EXE. This section shows you how to run them and use their options.
Command-Line Parameters
When you run either the CAPTURE or SWEEP program, you must specify certain
parameters. A parameter is a piece of information that must be typed on the
DOS command line after the program name. For example, if you want to take a
snapshot of drive C:, you must specify C: as a parameter to the CAPTURE
program. Heres how you would type it:
CAPTURE C:
Some parameters are optional, and some are required. Optional parameters are
shown in this section with brackets around them.
Switches
A switch is a special kind of parameter that changes the way a program
operates. All switches begin with the / character. For example, if you want
the SWEEP program to scan drive C: only for missing files and directories,
you would use the following command:
SWEEP C: /MISSING
The /MISSING switch causes the SWEEP program to only look for items that are
missing from the disk.
Spaces
You must separate all parameters and switches with spaces. If you do not put
a space in front of each parameter and switch, you will get an error message.
Canceling The Programs
You may cancel either the CAPTURE or SWEEP programs by pressing the Escape
key.
The CAPTURE Program
The CAPTURE program is run from the command line, using the following syntax:
CAPTURE drive: [filename] [/?]
The first parameter, drive:, is the name of the disk drive you want to take
a snapshot of. The second parameter is optional. It is the name and location
of the snapshot file that is to be created if the default is not desired.
By default, the snapshot is stored in a file named SNAPSHOT.LST, in the same
Page 8
location as the CAPTURE program itself. If the capture program is located in
the root directory of drive A:, the default snapshot file will be
A:\SNAPSHOT.LST.
There is only one switch available with the CAPTURE program: /? It causes a
brief help screen to be displayed. (You also get the same help screen by
running CAPTURE with no parameters and no switches.)
Examples of Using the CAPTURE Program
Here are some examples of different methods of using the CAPTURE program.
Each example is followed by a brief description of what the command will do.
CAPTURE C:
The snapshot will be taken of drive C:, and stored in the file SNAPSHOT.LST.
It will be located on the same drive and in the same directory as the CAPTURE
program itself.
CAPTURE C: A:\MACHINE1.LST
The snapshot will be taken of drive C:, and stored in the file MACHINE1.LST.
It will be located in the root directory of drive A:.
CAPTURE C: D:\ADMIN\LAB4.LST
The snapshot will be taken of drive C:, and stored in the file LAB4.LST. It
will be located in the \ADMIN directory of drive D:.
CAPTURE C: A:\
The snapshot will be taken of drive C:, and stored in the file SNAPSHOT.LST.
It will be located in the root directory of drive A:. Since only the name of
a directory is given in the second parameter, the filename will be
SNAPSHOT.LST.
CAPTURE /?
A help screen will be displayed. No snapshot will be taken.
The SWEEP Program
The SWEEP program is run from the command line, using the following syntax:
SWEEP drive: [filename] [/DELETE] [/VERIFY] [/ZAP]
[/EXCLUDE=path] [/MISSING] [/NOMISSING] [/SILENT]
[/LOGFILE=path] [/P] [/?]
The first parameter, drive:, is the name of the disk drive you want to scan.
The second parameter is the optional name and location of the snapshot file
that is to be used. By default, the file SNAPSHOT.LST in the same location as
the SWEEP program will be used.
Page 9
As you can see, there are numerous optional switches that can be used. By
default, SWEEP simply scans the designated drive and reports to the screen
any alien files or directories AND any missing files or directories. You may
alter this by using any of the following switches:
/DELETE
Causes SWEEP to AUTOMATICALLY delete any alien files or directories it finds.
If the /VERIFY switch is not used, SWEEP will NOT ask for permission before
it deletes. When SWEEP deletes an alien directory, it also deletes all files
and subdirectories stored under it.
/VERIFY
Causes SWEEP to automatically ask for permission to delete any alien files or
directories it finds. (You do not have to specify both /DELETE and /VERIFY.)
Also, with this switch specified, when SWEEP encounters an alien directory it
will ask for permission to delete every item stored under it.
/ZAP
Instructs SWEEP to automatically delete all alien files and directories, even
if they are marked read-only. Without the /ZAP switch specified, SWEEP will
not delete a read-only file. When used with the /VERIFY switch, SWEEP will
ask for permission before it deletes anything.
/EXCLUDE=path
The path specifies a directory that is to be excluded when scanning for alien
items. (The directory will still be scanned for missing items, unless the
/NOMISSING switch is also specified.) This switch may be used multiple times
on a single command line, to specify several directories to exclude. There
cannot be any spaces before or after the equal sign.
If the first character of the path is the @ symbol, the name that follows is
the path of an indirection file. An indirection file is a text file that
contains a list of directories to be excluded. See the section on Excluding
Directories With Indirection Files for more details.
/MISSING
Causes SWEEP to only report missing files and directories. Alien items will
not be reported.
/NOMISSING
Causes SWEEP to only scan for alien files and directories. Missing items will
not be reported.
/SILENT
Causes SWEEP to run in silent mode. All screen output is suppressed.
SHAREWARE NOTIFICATION WILL NOT BE SUPPRESSED IN THE UNREGISTERED VERSION.
Page 10
/LOGFILE=path
Path specifies the name and location of a log file. This will cause SWEEP to
log its activities to the log file, which later can be displayed on the
screen or printed out. The /SILENT switch has no affect on the log file.
There cannot be any spaces before or after the equal sign.
/P
Cause SWEEP to pause after it has filled the screen with any scrolling
output. If a large number of alien or missing items were found, this switch
will cause the output to pause so you will have time to read it.
/?
Displays a brief help screen. No scanning will take place. (The same help
screen will be displayed if you run SWEEP with no parameters and no
switches.)
**********
NOTE -- ALWAYS BE SURE TO USE THE RIGHT SNAPSHOT FILE WHEN YOU RUN THE SWEEP
PROGRAM. IF YOU SWEEP A COMPUTERS DISK USING THE WRONG SNAPSHOT FILE, MANY
FILES AND DIRECTORIES WILL BE INCORRECTLY REPORTED AS BEING ALIEN OR MISSING.
THIS COULD RESULT IN THE UNINTENTIONAL ERASURE OF FILES AND DIRECTORIES!
**********
Examples of Using the SWEEP Program
Here are some examples of different methods of using the SWEEP program. Each
example is followed by a brief description of what the command will do.
SWEEP C:
Drive C: will be scanned. The file SNAPSHOT.LST in the same location as the
SWEEP program will be used as the snapshot file. If there are any alien files
or directories, their names will displayed on the screen, but they will not
be erased. If there are any files or directories missing, their names will be
displayed on the screen.
SWEEP C: /MISSING
Drive C: will be scanned. The file SNAPSHOT.LST in the same location as the
SWEEP program will be used as the snapshot file. Alien files and directories
will NOT be reported. If there are any files or directories missing, their
names will be displayed on the screen.
SWEEP C: /NOMISSING
Drive C: will be scanned. The file SNAPSHOT.LST in the same location as the
SWEEP program will be used as the snapshot file. If there are any alien files
or directories, their names will be displayed on the screen, but they will
not be erased. Missing files and directories will NOT be reported.
Page 11
SWEEP C: A:\MACHINE1.LST
Drive C: will be scanned. The file MACHINE1.LST in root directory of drive A:
will be used as the snapshot file. If there are any alien files or
directories, their names will be displayed on the screen, but they will not
be erased. If there are any files or directories missing, their names will be
displayed on the screen.
SWEEP C: A:\MACHINE1.LST /DELETE
Drive C: will be scanned. The file MACHINE1.LST in root directory of drive A:
will be used as the snapshot file. If there are any alien files or
directories, their names will be displayed on the screen AND they will
automatically be erased, without asking for permission first. (Read-only
alien files will not be deleted.) If there are any files or directories
missing, their names will be displayed on the screen.
SWEEP C: A:\MACHINE1.LST /VERIFY
Drive C: will be scanned. The file MACHINE1.LST in root directory of drive A:
will be used as the snapshot file. If there are any alien files or
directories, you will be prompted for permission to delete them. (Read-only
alien files will not be deleted.) If there are any files or directories
missing, their names will be displayed on the screen.
SWEEP C: A:\LAB4.LST /ZAP
Drive C: will be scanned. The file LAB4.LST in root directory of drive A:
will be used as the snapshot file. If there are any alien files or
directories, their names will be displayed on the screen AND they will
automatically be erased, without asking for permission first. Read-only alien
files WILL BE DELETED.) If there are any files or directories missing, their
names will be displayed on the screen.
SWEEP C: D:\PC401.LST /ZAP /VERIFY
Drive C: will be scanned. The file PC401.LST in root directory of drive D:
will be used as the snapshot file. If there are any alien files or
directories, you will be prompted for permission to delete them. Read-only
alien files WILL BE DELETED if you give permission. If there are any files
or directories missing, their names will be displayed on the screen.
SWEEP C: /DELETE /EXCLUDE=C:\TEMP
All of drive C: except the directory C:\TEMP will be scanned for alien items.
The file SNAPSHOT.LST located in the same directory as the SWEEP program will
be used as the snapshot file. If there are any alien files or directories (in
places other than C:\TEMP), their names will be displayed on the screen AND
they will automatically be erased. The program will not ask for permission
first. (Read-only alien files will not be deleted, however.) If there are any
files or directories missing, their names will be displayed on the screen.
Page 12
SWEEP C: A:\MACHINE1.LST /DELETE /SILENT
Drive C: will be scanned. The file MACHINE1.LST in root directory of drive A:
will be used as the snapshot file. There will be no screen output while the
program is running (except in the UNREGISTERED version). If there are any
alien files or directories found, they will automatically be erased without
asking for permission first. (Read-only alien files will not be deleted.)
SWEEP C: /DELETE /SILENT /LOGFILE=A:\LOG.TXT
Drive C: will be scanned. The file SNAPSHOT.LST in the same directory as the
SWEEP program will be used as the snapshot file. There will be no screen
output while the program is running (except in the UNREGISTERED version). All
activity of the program will be recorded in the file A:\LOG.TXT. If there are
any alien files or directories found, they will automatically be erased
without asking for permission first. (Read-only alien files will not be deleted.)
Excluding Directories
With the /EXCLUDE switch, you can specify the name of a directory that is not
to be scanned for alien items. Here is an example of its usage:
SWEEP C: /EXCLUDE=C:\WINDOWS
The command above specifies that all of drive C: is to be scanned for alien
items except the directory C:\WINDOWS. The SWEEP program will not look for
alien items under this directory. (Missing items will still be
reported, however.) You may specify multiple /EXCLUDE switches. Here is
another example:
SWEEP C: /EXCLUDE=C:\WINDOWS /EXCLUDE=C:\TEMP
This command specifies that both the C:\WINDOWS and C:\TEMP directories are
to be excluded from the scan for alien items.
Excluding Directories With Indirection Files
If you need to exclude several directories, using multiple /EXCLUDE switches
can be cumbersome. Another approach is to store the names of the directories
in a text file for the SWEEP program to read. This type of file is called an
indirection file. An indirection file has the name of a directory on each
line. You can create the file with any text editor such as DOS's EDIT
program, or the older EDLIN editor.
Suppose you create an indirection file called SKIP.TXT, which contains the
following lines:
C:\TEMP
C:\WORK
C:\WP\LETTERS
C:\WINDOWS
Page 13
You can instruct SWEEP to read the file with the following command:
SWEEP C: /EXCLUDE=@SKIP.TXT
The @ symbol indicates that SKIP.TXT is the name of an indirection file.
SWEEP will skip each of the directories listed in the file when scanning for
alien items.
Embedding Comments In an Indirection File
You can embed a comment in an indirection file by putting a semi-colon in the
very first character position of a line. SWEEP will ignore any line
that begins with the ; symbol. Here is an example of the contents of an
indirection file with embedded comments:
; This is the indirection file for computer
; number 4 in lab number 2.
C:\STUDENTS
C:\PROJECTS
Comments mean nothing to the SWEEP program, but they give you the ability to
put reminders and general information in the file as a means of
documentation.
Using /EXCLUDE and /MISSING Together
The /EXCLUDE switch will be ignored when used with the /MISSING switch. This
is because the /MISSING switch causes SWEEP to scan for missing items alone.
The /EXCLUDE switch only works when SWEEP is scanning for alien items.
Using /SILENT and /VERIFY Together
There is a slight conflict between the /SILENT and /VERIFY switches. The
/SILENT switch specifies that SWEEP should suppress all screen output, and
the /VERIFY switch requires that a message be printed on the screen, asking
for permission to delete a file. If you use these two switches together,
SWEEP will run silently until it finds an alien file or directory. It will
then ask for permission to delete the alien item. (Remember, /SILENT does not
suppress all output in the UNREGISTERED version.)
Other Conflicting Switches
Here are some other conflicting combinations of switches:
/MISSING and /NOMISSING
/MISSING and /DELETE
/MISSING and /VERIFY
/MISSING and /ZAP
If you use any of these switch combinations, SWEEP will print an error
message.
Page 14
Tutorial
This section provides you with several lessons that will help you get started
with Disk Sweeper. If you have not installed the software, proceed with the
installation instructions at this time. Since you are just learning how to
use this software, it is highly recommended that you have current backups of
the computers disk.
Lesson 1: Locating Alien Files and Directories
The next few lessons assume that you have installed Disk Sweeper in the
directory C:\SWEEPER. If this is not the case, substitute the appropriate
drive letter and path when needed in the following instructions.
Lets begin by taking a snapshot of the disk. If you are not in the \SWEEPER
directory, enter the following command at the DOS prompt:
CD \SWEEPER
You may now use the CAPTURE program to take a snapshot of the disk by
entering the following command:
CAPTURE C:
After you have entered the command above, the file SNAPSHOT.LST will be
created in the C:\SWEEPER directory. You may verify this by entering the
following command:
DIR
The DIR command will show you a list of the files in the current directory.
Among them, you should see a listing for the file SNAPSHOT.LST.
If you run the SWEEP program now, you wouldn't expect to find any alien or
missing files or directories. Go ahead and run SWEEP, just to start getting
a feel for it. Enter the following command:
SWEEP C:
After the initial copyright message, SWEEP will begin scanning for alien
files and directories. It should report that it found 0 alien files and 0
alien directories. It will also scan for missing files and directories, which
should also be reported as 0.
Lets test the SWEEP program to see how it handles alien files when it finds
them. You will need to create an alien file for this exercise. You can do so
by making a copy of any file on the disk. Enter the following command to make
a copy of the snapshot file:
COPY SNAPSHOT.LST BADFILE.DAT
This command will create a file, BADFILE.DAT, which is a copy of
Page 15
SNAPSHOT.LST. Since BADFILE.DAT is not in the snapshot, SWEEP should report
it as an alien file. Run the SWEEP program again:
SWEEP C:
This time C:\SWEEPER\BADFILE.DAT should be reported as an alien file. The
file was not deleted since you did not specify any of the delete-mode
switches.
Now lets make an alien directory. Enter the following command:
MD SURPRISE
This will create the new directory C:\SWEEPER\SURPRISE. Now run SWEEP again
with the following command:
SWEEP C:
This time C:\SWEEPER\BADFILE.DAT should be reported as an alien file and
C:\SWEEPER\SURPRISE should be reported as an alien directory. Once again,
neither was deleted because you did not instruct SWEEP to do so. In the next
lesson we will run SWEEP in one of its delete-modes, which will erase these
alien items.
Lesson 2: Deleting Alien Files and Directories
Make sure you are in the directory that contains the Disk Sweeper software.
If you are not, type the following command, and press Enter:
CD \SWEEPER
In this lesson you will see how the SWEEP program can delete the alien file
and directory that was created in the previous lesson. By default, SWEEP only
shows you the names of files and directories that are either alien or
missing. It does not automatically delete alien items. To delete alien items,
you must run SWEEP in one of its 4 delete-modes. You specify one of the 4
sets of switches below to run SWEEP in delete-mode:
/DELETE
Automatically delete all alien files and directories that are not read-only.
The program will NOT ask for permission before deleting.
/VERIFY
Ask for permission before deleting any alien file or directory that is not
read-only.
/ZAP
Automatically delete all alien files and directories, including alien files
that are read-only. The program will NOT ask for permission before deleting.
Page 16
/ZAP and /VERIFY
Ask for permission before deleting any alien file or directory, including any
alien file that is read-only.
In this lesson you will run SWEEP in verify mode, which means it will ask for
permission before it deletes any alien file or directory.
Enter the following command:
SWEEP C: /VERIFY
Unless you have made other changes to the contents of your hard drive, SWEEP
should only find the 1 alien file and 1 alien directory you created in lesson
1. The program will prompt you for permission to delete the alien items as it
finds them. When asked, press the Y key to delete the file and remove the
directory.
If you had used the /DELETE switch instead of /VERIFY, the SWEEP program
would have deleted the alien items without asking you for permission first.
Lesson 3: Scanning Only For Missing Files and Directories
Make sure you are in the directory that contains the Disk Sweeper software.
If you are not, type the following command, and press Enter:
CD \SWEEPER
You may want to run the SWEEP program only to see if any files or directories
have been deleted. When you run SWEEP with the /MISSING switch, it will not
look for alien items. Only files and directories that are missing will be
reported.
To see how SWEEP reports missing items, you will need to create a new file
and a new directory, and then run the CAPTURE program again to make sure they
get included in the snapshot file.
First, make a copy of the SNAPSHOT.LST file by entering the following
command:
COPY SNAPSHOT.LST LESSON3.DAT
The command above created a new file named LESSON3.DAT. It is a copy of
SNAPSHOT.LST. Next, create a new directory by entering the following command:
MD LEARNING
The command above creates a new directory named LEARNING. You must now make
a new snapshot file to include the file and directory you just created. Enter
the following command:
Page 17 CAPTURE C:
The command above will cause a new snapshot file to be created. The file will
be called SNAPSHOT.LST, and it will be located in the same directory as the
SWEEP program.
The object of this lesson is to see how SWEEP behaves when it discovers
missing files or directories. Delete the file you created by entering the
following command:
DEL LESSON3.DAT
Now remove the directory you created by entering the following command:
RD LEARNING
You are now ready to scan the disk for missing items. Enter the following
command:
SWEEP C: /MISSING
The SWEEP program will show you that \SWEEPER\LESSON3.DAT is a missing file
and \SWEEPER\LEARNING is a missing directory.
Lesson 4: Scanning Only For Alien Files and Directories
Make sure you are in the directory that contains the Disk Sweeper software.
If you are not, enter the following command:
CD \SWEEPER
If you are not concerned with items that may be missing from your disk, you
can cause SWEEP to only scan for alien items by using the
/NOMISSING switch. Enter the following command:
SWEEP C: /NOMISSING
The SWEEP program will scan for alien items, but it will not show the names
of missing items.
Lesson 5: Excluding a Directory From Being Scanned
Make sure you are in the directory that contains the Disk Sweeper software.
If you are not, enter the following command:
CD \SWEEPER
You may want one or more directories to be skipped by the SWEEP program, when
looking for alien items. The /EXCLUDE=path switch causes SWEEP to skip a
specified directory.
As you did in lesson 1, you will create an alien directory. Enter the
following command:
Page 18 MD BADSTUFF
Now run the SWEEP program, but instruct it to skip the BADSTUFF directory.
Enter the following command:
SWEEP C: /EXCLUDE=BADSTUFF
When SWEEP encounters the BADSTUFF directory, it will only display a message
on the screen indicating that it is excluding it. If there had been any files
or any other directories in the BADSTUFF directory, they would have been
skipped too. (Excluded directories will still be scanned for missing items,
however, unless the /NOMISSING switch is used.)
Be sure to remove the BADSTUFF directory before you continue. Enter the
following command:
RD BADSTUFF
Lesson 6: Creating a Log File, and Running in Silent Mode
Make sure you are in the directory that contains the Disk Sweeper software.
If you are not, enter the following command:
CD \SWEEPER
You will probably want to create a log file when you run SWEEP in silent
mode. Silent mode causes SWEEP to suppress all screen output. You might want
SWEEP to run in silent mode if you are calling it from a batch file. The
following command will invoke SWEEP in silent mode, and cause it to create a
log file. Enter the following command:
SWEEP C: /SILENT /LOGFILE=LESSON6.LOG
SWEEP will not display any output to the screen (except in the UNREGISTERED
version). The log file will still be created, however, and it will contain
all of the results. Look at the contents of the log file by entering the
following command:
TYPE LESSON6.LOG
Lesson 7: Naming an Alternate Snapshot File
Make sure you are in the directory that contains the Disk Sweeper software.
If you are not, enter the following command:
CD \SWEEPER
By default, CAPTURE creates a snapshot file in the same directory that
CAPTURE.EXE resides in, with the name SNAPSHOT.LST. You can specify an
alternate file or path name, if you desire. Enter the following command:
CAPTURE C: DRIVEC.LST
Page 19
The command you entered specifies that the snapshot file should be named
DRIVEC.LST. Since you did not specify a full path, the file will be located
in the current directory (the directory you are currently in). Enter the
following command to get a directory listing:
DIR
You should see a directory listing for DRIVEC.LST. Invoke the SWEEP program,
and instruct it to use the snapshot file you just created. Enter the
following command:
SWEEP C: DRIVEC.LST
This feature of Disk Sweeper would be helpful if you have more than one hard
drive on your computer, and you want to create a separate snapshot file for
each one. It could also be used if you are maintaining multiple computers.
Separate snapshot files with unique names could be created, and stored
together.
**********
ALWAYS BE SURE TO USE THE RIGHT SNAPSHOT FILE WHEN YOU RUN THE SWEEP PROGRAM.
IF YOU SWEEP A COMPUTERS DISK USING THE WRONG SNAPSHOT FILE, MANY FILES AND
DIRECTORIES WILL BE INCORRECTLY REPORTED AS BEING ALIEN OR MISSING. THIS
COULD RESULT IN THE UNINTENTIONAL ERASURE OF FILES AND DIRECTORIES!
**********
Lesson 8: Using Disk Sweeper From a Floppy Diskette
For this lesson you will need a formatted floppy diskette for drive A: of
your computer.
If you are using Disk Sweeper to help maintain a computer lab, you could
store all of your snapshot files on a floppy diskette, along with the Disk
Sweeper software. You could take the diskette to each computer, and run the
SWEEP program with the appropriate snapshot file.
Make sure you are in the directory that contains the Disk Sweeper software.
If you are not, enter the following command:
CD \SWEEPER
Insert the formatted floppy diskette into drive A:. Enter the following
command:
COPY *.* A:
The command above copies all of the Disk Sweeper files to the floppy
diskette. When the operation is finished, log onto drive A: by entering the
following command:
A:
Page 20
You can run the CAPTURE program from the floppy diskette. Enter the following
command:
CAPTURE C:
Since you did not specify a file or path name for the snapshot file, CAPTURE
will store the snapshot in SNAPSHOT.LST. Since CAPTURE.EXE is on the floppy
diskette in drive A:, the snapshot file will be stored there as well.
Invoke the SWEEP program by entering the following command:
SWEEP C:
Since you did not specify a snapshot file name, SWEEP will look in the
directory where SWEEP.EXE resides for SNAPSHOT.LST.
Lesson 9: A Visit To Your Computer Lab
This lesson is intended for persons who are using Disk Sweeper in a computer
lab. You will need to create a working copy of Disk Sweeper on a floppy
diskette (as you did in lesson 8). Once you have the software on a diskette,
take it to your computer lab. You will need to boot up two computers. Insert
the diskette into drive A: of the first computer. Log onto drive A: by
entering the following command:
A:
Use the CAPTURE program to make a snapshot of drive C:. You will need to
store the snapshot in a file other than SNAPSHOT.LST, so enter the following
command:
CAPTURE C: MACHINE1.LST
The snapshot will be stored in A:\MACHINE1.LST. Now remove the diskette, and
insert it into drive A: of the second computer. Log onto drive A: by entering
the following command:
A:
Use the CAPTURE program to make a snapshot of drive C: of this computer.
Store the snapshot in MACHINE2.LST by entering the following command:
CAPTURE C: MACHINE2.LST
You now have two snapshot files on the diskette: MACHINE1.LST and
MACHINE2.LST. When you want to san the hard drive of either machine, just
insert the diskette in drive A:, and run the SWEEP program with the
appropriate snapshot file.
Remove the diskette from the drive and insert it into drive A: of the first
computer. Make sure you are logged onto drive A: by entering the following
command:
Page 21 A:
Now run the SWEEP program with the MACHINE1.LST snapshot file. Enter the
following command:
SWEEP C: MACHINE1.LST
If there had been any files stored on drive C: since you made the snapshot
file, they would be listed, as would the names of any missing files or
directories. You can scan the disk of the second computer by inserting the
diskette into its drive, and running SWEEP with the MACHINE2.LST snapshot
file.
Page 22
Using Disk Sweeper in a Computer Lab
Basically, there are three different strategies to using Disk Sweeper in a
computer lab:
A) You can install a copy of Disk Sweeper on each computer in the lab.
B) You can have a single working copy of Disk Sweeper on a floppy
diskette. You also store the snapshot files for all the computers
in the lab on this same diskette.
C) You can run Disk Sweeper across a network.
This section will discuss each of these strategies so you can decide which
you want to adopt.
Installing Individual Copies of Disk Sweeper
The simplest strategy is to install a copy of Disk Sweeper on each computer
in your lab. Each computer would have its own snapshot file. If you decide to
do this, you must either register an individual copy of the software for each
computer, or have a Lab/Network License. The Lab/Network License is very
inexpensive, and will legally entitle you to run up to 10 copies of the
software.
You might want to think twice, however, before using this strategy. It might
be possible for a student to locate the software and tamper with it. The
snapshot file could become corrupt, or the CAPTURE program could be run while
alien items are on the disk. Either way, the software would become
ineffective.
Preparations For Installing Individual Copies on Each Computer
Here are the steps you will need to take if you decide to install a copy of
Disk Sweeper on each computer in your lab:
1. Send in your registration for a Lab/Network License, or the
desired number of individual licenses.
2. Perform manual housekeeping on each of the computers in your lab. Make
sure there are no unwanted files or directories on the disk. Also,
make sure all of the files and directories that are supposed to be on
the drive are. (This should be the last time you'll have to do manual
housekeeping.)
3. Use the installation instructions to install a copy of Disk Sweeper to
each computer.
4. Invoke the CAPTURE program to take a snapshot of each computers disk.
Anytime you want to do housekeeping, just run the SWEEP program on each
computer. Your own experience will help you decide which delete-mode (if any)
you want to use.
Page 23
Running Disk Sweeper From a Floppy Diskette
The least expensive strategy is to have a single working copy of Disk Sweeper
on a floppy diskette. You also store the snapshot files for each computer on
the diskette (the files are relatively small, and several should easily fit
on a diskette). Housekeeping is a simple matter of taking the diskette to
each computer, and running the SWEEP program with the appropriate snapshot
file.
Preparations For Running Disk Sweeper From a Floppy Diskette
Here are the steps you will need to take if you decide to run Disk Sweeper
from a floppy diskette:
1. Send in your registration.
2. Perform manual housekeeping on each of the computers in your lab. Make
sure there are no unwanted files or directories on the disk. Also,
make sure all of the files and directories that are supposed to be on
the drive are. (This should be the last time you'll have to do manual
housekeeping.)
3. Copy the Disk Sweeper software to a floppy diskette.
4. Take the diskette to each computer and run the CAPTURE program. You
will have to save each snap shot with a different file name. Use some
naming strategy that is easy to remember. For instance, you could name
the files PC1.LST, PC2.LST, PC3.LST, and so on.
Anytime you want to do housekeeping, just take the diskette to each computer
and run the SWEEP program (with the appropriate snapshot file). Your own
experience will help you decide which delete-mode (if any) you want to use.
**********
ALWAYS BE SURE TO USE THE RIGHT SNAPSHOT FILE WHEN YOU RUN THE SWEEP PROGRAM.
IF YOU SWEEP A COMPUTERS DISK USING THE WRONG SNAPSHOT FILE, MANY FILES AND
DIRECTORIES WILL BE INCORRECTLY REPORTED AS BEING ALIEN OR MISSING. THIS
COULD RESULT IN THE UNINTENTIONAL ERASURE OF FILES AND DIRECTORIES!
**********
Running Disk Sweeper Across a Network
If you are fortunate enough to have a network in your computer lab, running
Disk Sweeper will be simple. First, make sure you obtain a Lab/Network
License. The Lab/Network License is very inexpensive, and will legally
entitle you to run the software on up to 10 network stations simultaneously.
To implement Disk Sweeper on a network, you install it in a location on the
file server that each station has access to. You run the CAPTURE and SWEEP
programs from each station, while the files reside on the server. Make sure
you limit the access rights to the Disk Sweeper files, however, so only
responsible parties can use them.
Page 24
Preparations For Running Disk Sweeper Across a Network
Here are the steps you will need to take if you decide to run Disk Sweeper
across a network:
1. Send in your registration for a Lab/Network License.
2. Install the Disk Sweeper software in a location on the file server
that each station can access.
3. Perform manual housekeeping on each of the computers in your lab. Make
sure there are no unwanted files or directories on the disk. Also,
make sure all of the files and directories that are supposed to be on
the drive are. (This should be the last time you'll have to do manual
housekeeping.)
4. Log into the network on each computer and run the CAPTURE program. You
will have to save each snapshot to the server, with a different file
name. Use some naming strategy that is easy to remember. For instance,
you could name the files PC1.LST, PC2.LST, PC3.LST, and so on.
Anytime you want to do housekeeping, just log into the network on each
computer and run the SWEEP program (with the appropriate snapshot file). Your
own experience will help you decide which delete-mode (if any) you want to
use.
**********
ALWAYS BE SURE TO USE THE RIGHT SNAPSHOT FILE WHEN YOU RUN THE SWEEP PROGRAM.
IF YOU SWEEP A COMPUTERS DISK USING THE WRONG SNAPSHOT FILE, MANY FILES AND
DIRECTORIES WILL BE INCORRECTLY REPORTED AS BEING ALIEN OR MISSING. THIS
COULD RESULT IN THE UNINTENTIONAL ERASURE OF FILES AND DIRECTORIES!
**********
Using the Same Snapshot File on Multiple Computers
If each computer in your lab is set up identically, with the same software,
same directories, and same files, you can use the same snapshot file for
each. If there are any differences in the content of any of the hard drives,
however, you will need to create a separate snapshot file for each computer.
Page 25
Other Uses For Disk Sweeper
Disk Sweeper is not only a tool for managing hard drives in a computer lab,
but it can also be used for software installation management.
Some software packages, like Windows applications, create files on your hard
drive in various places. If you decide to remove such an application, you
might not know where all of the files are located. Disk Sweeper can be used
to create a log of all the files that belong to a particular application.
Heres how you do it:
1. Before you install the application, take a snapshot of your disk.
2. Install the application.
3. Run the SWEEP program, and use the /LOGFILE=path switch to create a
log file.
If you decide to remove the application, the log file will show you where all
of the files are located.
Page 26
Messages
This section shows you an alphabetized list of error and informative messages
that are displayed by the CAPTURE and SWEEP programs.
Messages Displayed by the CAPTURE Program
Cannot open snapshot file
The snapshot file specified cannot be opened. Make sure the path
specified is correct, and the name is a valid DOS filename.
/EXCLUDE has no effect when used with /MISSING
The /EXCLUDE switch is ignored when used with the /MISSING switch. The
/EXCLUDE switch only works when scanning for alien items.
Invalid drive designation
You have specified an invalid drive for the CAPTURE program to take a
snapshot of.
Invalid filename
The snapshot filename you have specified is invalid. Make sure you
specify a valid DOS filename.
Invalid number of arguments
You have specified an invalid number of parameters and/or switches on
the command line.
Please specify the name of the drive you wish to take a snapshot of.
You must specify the name of a drive on the command line.
Messages Displayed by the SWEEP Program
Cannot open exclude indirection file
The indirection file specified in the /EXCLUDE=path switch cannot be
opened. Make sure the file exists, and the path specified is correct.
Cannot open filename
The snapshot file specified cannot be opened. Make sure the file exists,
and the path specified is correct.
Page 27
** Deleted **
This message appears next to the name of an alien file when it is
successfully deleted. (Some switches cause the message "Deleting Alien
File" to be displayed in front of the name of the file.)
ERROR DELETING!
This message will be displayed next to the name of an alien file when an
attempt to delete the file has failed. This can happen when an alien
file is READ-ONLY, and the /ZAP switch has not been specified.
ERROR REMOVING!
This message will be displayed next to the name of an alien directory
when an attempt to remove the directory has failed. This can happen when
the directory is not empty. This situation most frequently occurs when
there are READ-ONLY alien files in an alien directory, and the /ZAP
switch has not been used.
FATAL ERROR: Insufficient Memory
There is not enough memory to run. If you are using the /MISSING switch,
try running sweep without it.
File is READ-ONLY
This message will be displayed next to the name of an alien file if the
file has been marked READ-ONLY.
Invalid exclude indirection filename
The indirection filename specified is invalid. Make sure you specify a
valid DOS filename.
Invalid snapshot filename
The snapshot filename specified is invalid. Make sure you specify a
valid DOS filename.
Invalid switch
You have specified an invalid switch. Make sure you specify valid
switches, and place a space in front of each switch.
/MISSING and /DELETE are conflicting switches
The /MISSING switch specifies that SWEEP should not scan for alien
items. The /DELETE switch specifies that SWEEP should delete alien
items. These two switches conflict.
Page 28
/MISSING and /NOMISSING are conflicting switches
The /MISSING switch specifies that SWEEP should not scan for alien
items. The /NOMISSING switch specifies that SWEEP should not scan for
missing items. These two switches conflict.
/MISSING and /VERIFY are conflicting switches
The /MISSING switch specifies that SWEEP should not scan for alien
items. The /VERIFY switch specifies that SWEEP should delete alien
items. These two switches conflict.
/MISSING and /ZAP are conflicting switches
The /MISSING switch specifies that SWEEP should not scan for alien
items. The /VERIFY switch specifies that SWEEP should delete alien
items. These two switches conflict.
(NOT DELETED)
If you respond with N when asked for permission to delete an alien file,
this message appears next to the name of the file.
(NOT REMOVED)
If you respond with N when asked for permission to remove an alien
directory, this message appears next to the name of the directory.
Please specify the name of the drive you want to sweep
You must specify the name of a drive on the command line.
** Removed **
This message appears next to the name of an alien directory when it is
successfully removed. (Some switches cause the message "Removing Alien
Directory" to be displayed in front of the name of the directory.)
Unable to open log file
SWEEP cannot create the log file specified. Make sure you have specified
a valid DOS filename, and that there is free space on the disk.
Page 29
Technical Support
All registered users of Disk Sweeper may obtain technical support. Please
have the following information when you contact Information Age:
o The version number of Disk Sweeper you are using.
o The version number of DOS you are using.
o Detailed information about the problem you are having.
If Disk Sweeper is reporting errors, please have the exact error message.
You are encouraged to send questions, suggestions, and comments directly to
Tony Gaddis, the author of Disk Sweeper. If you have access to FidoNet or the
Internet, send all messages to him at the following addresses:
FidoNet 1:379/607
Internet tony.gaddis@f607.n379.z1.fidonet.org
You may contact Information Age directly at the following telephone number:
(704) 648-8585
Page 30
Index
/?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9, 11
/DELETE . . . . . . . . . . . . . . . . . . . . . .4, 10, 12-14, 16, 17, 28
/EXCLUDE=path . . . . . . . . . . . . . . . . . . . . . . . . . .10, 18, 27
/LOGFILE=path . . . . . . . . . . . . . . . . . . . . . . . . . . . .11, 26
/MISSING. . . . . . . . . . . . . . . . . . . .8, 10, 11, 14, 17, 18, 27-29
/NOMISSING. . . . . . . . . . . . . . . . . . . . . .10, 11, 14, 18, 19, 29
/P. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
/SILENT . . . . . . . . . . . . . . . . . . . . . . . . .10, 11, 13, 14, 19
/VERIFY . . . . . . . . . . . . . . . . . . . . . 4, 10, 12, 14, 16, 17, 29
/ZAP. . . . . . . . . . . . . . . . . . . . . 4, 10, 12, 14, 16, 17, 28, 29
Alien Directories . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Alien Files . . . . . . . . . . . . . . . . . . . .3, 10-13, 15, 16, 18, 28
ATTRIB Command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
CAPTURE . . . . . . . . . . . . . . . . . 3, 8, 9, 15, 17-19, 21, 23-25, 27
Comments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14, 30
Computer Lab. . . . . . . . . . . . . . . . . . . .2, 6, 20, 21, 23, 24, 26
Conflicting Switches. . . . . . . . . . . . . . . . . . . . . . .14, 28, 29
Copy-Protected Software . . . . . . . . . . . . . . . . . . . . . . . . . 4
Copyright . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5, 6, 15
DOS Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2, 3
Error . . . . . . . . . . . . . . . . . . . . . . . . . . 8, 14, 27, 28, 30
Excluding Directories . . . . . . . . . . . . . . . . . . . . . . . .10, 13
FidoNet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
Floppy Diskette . . . . . . . . . . . . . . . . . . . . . .1, 4, 20, 21, 24
Help Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9, 11
Indirection File. . . . . . . . . . . . . . . . . . . . . . .10, 13, 14, 27
Installation. . . . . . . . . . . . . . . . . . . . . . . . . 1, 15, 23, 26
Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
Log File. . . . . . . . . . . . . . . . . . . . . . . . . 4, 11, 19, 26, 29
Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27, 30
Missing Files . . . . . . . . . . . . . . . .2-4, 8, 10, 11, 15, 17, 18, 22
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4, 6, 23-25
Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . .8, 9, 11, 27
Read-Only . . . . . . . . . . . . . . . . . . .2, 3, 10, 12, 13, 16, 17, 28
Register. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6, 7, 23
Silent Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 4, 10, 19
Snapshot. . . . . . . . . . . . . . . . . . . . . .3, 4, 8, 9, 11-13, 15-28
SNAPSHOT.LST. . . . . . . . . . . . . . . . . . . . .8, 9, 11-13, 15-19, 21
Software Installation Management. . . . . . . . . . . . . . . . . . . . .26
SWEEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3, 4, 8-29
Switches. . . . . . . . . . . . . . . . . . . . .4, 8-11, 13, 14, 16, 27-29
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . 7, 30
Trademark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Tutorial. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Warranty. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Windows File Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Page 31