home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Cream of the Crop 20
/
Cream of the Crop 20 (Terry Blount) (1996).iso
/
virus
/
cm211.zip
/
MAN211.TXT
< prev
next >
Wrap
Text File
|
1996-05-20
|
39KB
|
1,043 lines
╓───╖ ╖ ╥ ╓──╥──╖ ╖
║ ╨ ║ ║ ╓ ║ ║ ║ ╫──
║ ╟───╖ ╓───╖ ╟──╨╖ ║ ║ ║ ╓───╥ ║ ╓───╖
║ ╖ ║ ║ ╟───╜ ║ ║ ║ ╨ ║ ║ ║ ║ ╟───╜
╙───╜ ╙ ╜ ╙───╜ ╨ ╙ ╜ ╨ ╙───╨─ ╙──┘╙───╜
Known\Unknown Virus
Detection Utility
Copyright (c) 1994,1995,1996 Martin Overton
(ChekWARE)
All rights reserved.
Written by: Internet:
Martin Overton,(ChekWARE) ChekMate@salig.demon.co.uk
51 Cook Road,
Horsham,
West Sussex,
RH12 5GJ,
UNITED KINGDOM
_________________________________________________________________________
THE INFORMATION AND CODE PROVIDED IS PROVIDED AS IS WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL MARTIN OVERTON OR HIS AGENT(S) BE LIABLE FOR ANY DAMAGES
WHATSOEVER INCLUDING GENERAL, DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES. EVEN IF THE AUTHOR HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
_________________________________________________________________________
The UNREGISTERED version of this program, its executables, bait files
and related files may be distributed freely as long as no money is charged
for the program itself or any of its components.
This program MUST be distributed as a whole with its associated files
and this document.
This version of ChekMate may not be distributed as a part of any commercial
package without prior written agreement of the author.
It has been tested on many different PCs and Operating System versions
with no major problems encountered.
This program was developed entirely using personal time and personal
resources. This program has no connection with, or is in any way
endorsed by my employers.
License:
_______
This version of ChekMate is hereby released under the Shareware concept.
ChekMate can be evaluated for up to 30 days without having to register.
After that period of time, please either register ChekMate or remove it
from your system.
Registration will entitle you to the registered version which is free of
the 'nag-screen' and has additional features, such as a repair facility.
See REGISTER.TXT for full details.
The author retains the copyright of ChekMate and all of its components
(except MD5 which is copyright RSA Data Security, Inc.)
ChekMate or any of its components may not be used as part of any other
package unless written agreement is obtained from the author.
ChekMate must not be modified in any way.
MD5 is the RSA Data Security, Inc. MD5 Message-Digest Algorithm,
Copyright 1991 RSA Data Security, Inc.
Requirements:
____________
ChekMate requires you to have an IBM PC Compatible running DOS 3.3 or later
or one of the other supported operating systems and at least 384Kb of memory
and a Hard Disk.
To use ChekWord, you will need a copy of Microsoft Word 6.0 or later.
What is ChekMate:
________________
ChekMate was written to detect new and known file, Word macro, boot and
partition sector viruses.
It should be used alongside a good quality, up-to-date virus scanner.
!!! ChekMate is NOT a substitute for a virus scanner. !!!
ChekMate can be integrated with your current DOS based virus scanner.
It will detect most file infector, boot or partition sector viruses,
the ChekWord module will also detect macros in any Word document.
ChekMate makes no wild claims about 'Providing 100% protection against all
current and future viruses!' (I'll leave that to other products.)
ChekMate is simply an extra layer for a virus to try to defeat. When
combined with 'frequent' backups and a good up-to-date virus scanner,
ChekMate WILL help to protect your data from many known and unknown viruses.
One of ChekMate's users said: "ChekMate has been a real security blanket"
Another ChekMate user wrote: "I wouldn't boot up without it."
ChekMate will NOT bombard you with lots of false alarms (unless your
system is always in a state of flux!). It just monitors the areas/files
that a virus will frequently target.
!!! Think of ChekMate as a viral smoke alarm. !!!
Before Installation:
___________________
Before installation, scan the target PC with a good quality up-to-date
virus scanner.
*** Only once the PC is found to be free of viruses ***
*** should you proceed with the installation of ChekMate. ***
Copy all the files to a floppy disk and write protect it. In the event
of a virus outbreak, this disk can then be used to replace infected
ChekMate files.
Also, after ChekMate is run for the first time, copy the .CHK files to
the floppy disk you've just created (above).
Below are the MD5 hash values for key ChekMate files. Please check
these values before you run ChekMate to ensure the files have not been
tampered with by a third party. If they do not match, then do NOT run
them. Please contact me if the files have been changed.
MD5 Validation Information:
__________________________
MD5 (chekmate.exe) = 2fd92293d39fa6b7ecc727c8e7369846
MD5 (chekmate.chk) = 1bb8c9e8ee668d111fddace2e0915a9e
MD5 (setup.exe) = de9ec68d36c9db9e426e06acb083974b
MD5 (md5.exe) = 7881d18adf5f4406984cd863beaecda7
MD5 (filechk1.chk) = 2f7ef57505f1eaf11bce7a33459c97d1
MD5 (filechk2.chk) = c3d93fa3a6cf5f137f7217051ed7f6c5
MD5 (four.com) = ae199cf3e7cdb865d363ae0565968313
MD5 (four.exe) = c48dc146c0013ce9d2dcc5b56e7d1a35
MD5 (ten.com) = 82e08f193cefa2fc67b5b23f7e341640
MD5 (ten.exe) = d70dd3547b8d8160003e2d05cb1c48ae
MD5 (thirtytw.com) = f3845983f560a6b20d29ebf622b7c6fd
MD5 (thirtytw.exe) = 3770b6bc9a2bf8ab59331dc6068a999f
MD5 (chekword.doc) = 7895f5a2d85c3fe54ca73a430421ae4a
To validate the files, run MD5.EXE as below for each file listed above:
MD5 <FileName>
e.g MD5 CHEKMATE.EXE
Install (ALL Operating Systems):
_______________________________
Create a directory (e.g., C:\CHEKMATE) and copy the files listed below
to that directory:
CHEKMATE.EXE -> The Main Program File
CHEKMATE.ICO -> Windows Icon File for ChekMate
CHEKMATE.PIF -> Windows PIF File for ChekMate
CHEKMATE.CHK -> ChekMate Finger-Print file
CHEKWORD.DOC -> Word Macro detection document
SETUP.EXE -> Setup program for modifying CHEKMATE.INI
CHEKMATE.INI -> Program INI File (See Later)
MD5.EXE -> RSA's MD5 hash generator (PUBLIC DOMAIN)
FILECHK1.CHK -> Bait files Finger-Print file (Start of Files)
FILECHK2.CHK -> Bait files Finger-Print file (End of Files)
FOUR.COM \
FOUR.EXE \
TEN.COM \
TEN.EXE / Bait files
THIRTYTW.COM /
THIRTYTW.EXE /
(Bait files are simple files that display a message and return to the OS,
they act as a decoy to tempt a virus into infecting it. They have no other
purpose and DO NOT execute any other code or files.)
The BAIT files MUST not be replaced with your own versions of BAIT or any
other executable files as MD5 hash values for the files are stored within
the main CHEKMATE.EXE file.
They must also be left in the same order in the CHEKMATE.INI provided,
you can though, rename them if you so wish. Renaming them can help to
stop a targeted virus attack.
Install (DOS):
_____________
From the directory where you copied ChekMate.
1) Enter SETUP /AUTO <return>
Th