home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
New Star Software Collection
/
NSS_Collection.iso
/
3-239 scan 214
/
1.imz
/
1.IMA
/
VALIDATE.TXT
< prev
next >
Wrap
Text File
|
1994-12-19
|
4KB
|
101 lines
VALIDATE Version 2.00
QUICK COMMAND REFERENCE GUIDE
Copyright 1993, 1994 by McAfee, Inc. All Rights Reserved.
Brought to you by:
Igor Grebert Project Leader
Jivko Koltchev Lead Programmer
David Mai TSR Programmer
Vadim Ivanov Algorithms/Emulation Programmer
Tatyana Shishkina Virus Librarian, Programmer
Dmitri Orlov DOS UI Programmer
Spencer Clark SQA Manager
Aryeh Goretsky Documentation Review
With special thanks to Bob Chappelear, Rudite Emir, and Bill Larson
╔═══════════════════╗
║ LICENSE AGREEMENT ║
╚═══════════════════╝
McAfee, Inc. assumes no responsibility for damages or lost data
caused by the use or misuse of this program, including if used
in accordance with the program documentation.
Use of this program means compliance with this Agreement.
Validate Version 2.00 Page 1
VALIDATE is a file-authentication program that may be used to check
other programs for signs of tampering. VALIDATE uses two discrete
methods to generate Cyclic Redundancy Checks (CRC's), which are then
displayed for the user to compare against the known value for the
program(s) validated. The known validation data can be published by
the author of the program or be obtained from a trusted information
database. The dual CRC checking provides a high degree of security.
To confirm that a program is in its original, untampered state,
run the VALIDATE program on it, record the validation data produced,
and compare it against the record in the online database. If they
match, than it is highly improbable that the program has been modified.
To run VALIDATE, type:
VALIDATE <path spec>
where <pathspec> is the name of a file or directory. The wildcard
characters, "*" and "?", may be used when specifying <pathspec>/
The VALIDATE program will then display the following information:
<name of directory>
name of file (starting at row 1)
│
│ extension of file (starting at row 10)
│ │
│ │ size of file (starting at row 15)
│ │ │
│ │ │ date of file (starting at row 25)
│ │ │ │
│ │ │ │ time of file (starting at row 35)
│ │ │ │ │
│ │ │ │ │ check method 1 (starting at row 44)
│ │ │ │ │ │
│ │ │ │ │ │ check method 2 (starting at row 51)
│ │ │ │ │ │ └────────────────────────────────────┐
│ │ │ │ │ └────────────────────────────────┐ │
│ │ │ │ └─────────────────────────┐ │ │
│ │ │ └─────────────────┐ │ │ │
│ │ └─────────┐ │ │ │ │
│ └──────┐ │ │ │ │ │
│ │ │ │ │ │ │
V V V V V V V
SAMPLE TXT 12345678 01-01-80 12:01a 1A2B 3C4D
<number> file(s) have been validated.