; This is the ThunderBYTE Anti-Virus / Windows language file.
;
GlobalBegin
Title <ThunderBYTE Anti-Virus Utilities for Windows, V6.12▀>
String<1> <OK>
String<2> <Cancel>
String<3> <Abort>
String<4> <Retry>
String<5> <Ignore>
String<6> <Yes>
String<7> <No>
String<8> <Viewing commandline>
String<9> <These are the disks, files or paths that %s will process when executed. You can change them if you want.>
String<10> <Executing %s>
String<11> <{Default}>
String<12> <{Internal}>
String<13> <Continue>
String<14> <Stop Scanning>
String<15> <looking...>
String<16> <checking..>
String<17> <tracing...>
String<18> <scanning..>
String<19> <skipping..>
String<20> <Information about the >
String<21> < Trojan Horse.~~This is not a virus but a Trojan Horse. It does not spread but simply causes damage. Determine the source of the file and simply delete it.>
String<22> < dropper.~~This file is not a virus, but a dropper of a virus. If you run this file it will install a virus on your system. It is highly recommended to delete the file.>
String<23> < joke.~~This file is completely innocent. It merely imitates virus activity but is actually harmless. Just delete it if you do not like it.>
String<24> < 'virus'.~~This is NOT a virus, but is detected as such because it has been identified as a virus by some independent tester and is being used in virus scanner tests. To avoid an undeserved penalty in such tests, TbScan detects this file too!>
String<25> < virus.>
String<26> <This virus is known to infect >
String<27> <COM files, >
String<28> <EXE files, >
String<29> <device drivers, >
String<30> <boot sectors, >
String<31> <but unknown variants may infect other items as well.>
String<32> <It remains resident in memory and infects/damages its victims in the background.>
String<33> <Actually, this is not just a virus, but a class of viruses. They are all created with the same tool. It is hardly possible to divide and describe all viruses created with this tool individually. Be aware of unknown side-effects. It is highly recommended to restore all files from a reliable backup.>
String<34> <The virus is polymorphic, which means that it looks different each time it infects a file. Some anti-virus products may have difficulties detecting this virus reliably. Also some false alarms may occur, especially on non-executable files.>
String<35> <The virus is encrypted using a trivial encryption scheme. There is no simple signature that can be used to find it. However, the better anti-virus scanners should not have any problems detecting this virus.>
String<36> <This is a companion virus. It does not alter existing executable files, instead it creates a new file with the same name, but with a filename extension that has a higher execution priority than the existing one. DOS will start this virus file instead of the original program. After execution, the virus executes the original program.>
String<37> <The virus is not written in assembly language, as usual, but in a high-level language. Since all components of the virus are the same as the other programs developed with the same programming language, it is difficult to detect such viruses without false alarms.>
String<38> <Because the source code of this virus is widely spread, there are many variants of this virus. It is hardly possible to divide and describe all variants individually. Be aware of unknown side-effects. It is highly recommended to restore all files from a reliable backup.>
String<39> <This virus has 'stealth' capabilities, which means that it is able to hide its presence from most people, and even virus scanners and checksummers, unless the virus has not yet been loaded in memory. It is highly recommended to boot from a clean diskette before scanning or cleaning!>
String<40> <The speaker of your PC may emit unusual sounds.>
String<41> <Unusual messages or effects may appear on the screen.>
String<42> <Unexpected system hangs may occur.>
String<43> <This virus is very obvious, and it is therefore extremely unlikely that the virus will succeed in spreading unnoticed. If you ever get it on your system, it has probably been put there intentionally! Anyway, you will find out that you have a virus immediately, even without a scanner.>
String<44> <This virus is very buggy and/or requires a special setup. It is hardly possible that the virus will ever succeed to infect another file. Therefore this virus is not a serious threat, but can be classified as a LAB virus.>
String<45> <This virus almost never appears 'in the wild'. It is very unlikely that you will ever encounter it, except in virus collections.>
String<46> <CLEANING INFORMATION:~~Before cleaning or restoring, it is HIGHLY RECOMMENDED to boot from a clean, write-protected system diskette first! This is necessary to ensure that no viruses are active in memory, and to reduce the risk that you execute an infected file by accident>
String<47> <WARNING!~~This virus is known to corrupt data files. Although the damage may not be visible immediately, the integrity of your data has been affected once this virus got active in your system. There is no other option than restoring all information from a reliable backup.>
String<48> <This virus uses an infection method which makes it impossible to remove it from the file afterwards. Part of the victim file is destroyed by the virus. Therefore you have no other option than to restore everything from a reliable backup.>
String<49> <Removing this virus is easy, just delete it!>
String<50> <The best thing to do is to restore all executable files from a backup, or to re-install them from their original disks. If speed or ease is more important than data integrity, you may attempt to separate the virus from the file with a cleaner, such as TbClean. Results are always depending on the exact virus variant you may have, on the lay-out of the victim file, and your system configuration.>
String<51> <You need to restore the original DOS bootsector and/or system files. Enter 'SYS C:' on the DOS command line. You also need to check and clean all your diskettes! Otherwise the virus will return sooner or later! You can clean the diskettes with the 'TbUtil -immunize' command.>
String<52> <You need to clean the partition code. You can do so with the DOS FDISK program ('FDISK /MBR'), or with TbUtil ('TbUtil C: -immunize'). The latter is recommended.>
String<53> <As new variants of existing viruses appear almost daily, it is possible that you will encounter a variant of this virus which will still be identified by our scanner, but behaves differently than described above. The information above is therefore intended as a basic guideline.>
String<54> <INFECTED!>
String<55> <Error reading signature file>
String<56> <Error while allocating memory>
String<57> <No 'WhatsNew' files found!>
String<58> <BootSector>
String<998> <Help>
;
; You can change the colors of the dialog boxes, if you don't like the default
;
ColorDlgBg <224><224><224>
ColorButton <192><192><192>
ColorEdit <192><192><192>
ColorListBox<192><192><192>
ColorMsgBox <192><192><192>
ColorScrBar <192><192><192>
ColorStatic <192><192><192>
ColorText < 0>< 0>< 0>
;
; About the messages. The first parameter in the following statement
; represents the number of messages (0 = none), the second parameter
; is the time interval (in milli-seconds) with which to change the messages.
; The text for the messages can be changed in the MessageBegin...MessageEnd
; block
;
Messages<3><5000>
GlobalEnd
;
; The messages. Always use 6 lines, and make sure the width of the lines