home *** CD-ROM | disk | FTP | other *** search
- Congratulations! By purchasing the ThunderBYTE Anti-Virus utilities you
- have taken the basic step in building a massive anti-viral safety wall
- around your precious computer system. Setting up the appropriate defense
- using the TBAV utilities is a personal matter. Therefore, we recommend
- to read this manual thoroughly, so you are well aware of the different
- kinds of security measures you can take.
-
-
- This manual consists of six chapters.
-
- Chapter 1 provides you with the fastest way to get started with the
- TBAV utilities. It presents the major features of the program in a
- step-by- step format. We recommend that you start with this chapter.
-
- Chapter 2 contains instruction on how to prevent viruses from
- infecting your computer system and directions on how to handle
- viruses when they do strike. We recommend that you also read this
- chapter because it contains several useful tips.
-
- Chapter 3 contains a detailed description of both the purpose and
- functionality of all the TBAV for DOS utilities.
-
- Chapter 4 contains advanced user information for those users who
- are more technically oriented.
-
- Chapter 5 contains the documentation for TBAV for Windows and
- all of the associated Windows-based utilities. For more
- information about the Windows 95 or Windows NT versions of
- TBAV, please contact your nearest ThunderBYTE distributor.
-
- Chapter 6 contains the documentation for TBAV for Networks,
- the network version of the utilities. If you need this
- version, contact your nearest ThunderBYTE distributor.
-
- This manual also contains five appendices. Appendix A describes TBAV
- messages, Appendix B describes heuristic flags, Appendix C addresses some
- incompatibility problems, Appendix D lists various exit codes for use in
- batch files, and Appendix E contains information on naming viruses.
- Finally, the Index provides you with the means of quickly finding any
- major topic.
-
- NOTE:
- A complete reading of this manual is indispensable in order to
- become familiar with the many facets of the ThunderBYTE AntiVirus
- utilities; to know what steps you can, and must, take to ensure
- adequate protection and be fully prepared for a complete recovery,
- if and when disaster strikes.
-
-
-