What's New in McAfee VirusScan for Windows 3.1x v3.1.6 (3102) Copyright (c) 1994-1998 by Network Associates, Inc., and its Affiliated Companies. All Rights Reserved. Thank you for using McAfee VirusScan for Windows 3.1x. This What's New file contains important information regarding the current version of this product. It is highly recommended that you read the entire document. Network Associates welcomes your comments and suggestions. Please use the information provided in this file to contact us. ___________________ WHAT'S IN THIS FILE - New Features - Known Issues - Installation - Documentation - Frequently Asked Questions - Contacting Network Associates ____________ NEW FEATURES 1. The new AutoUpdate feature (included with corporate versions of VirusScan only) allows you to configure VirusScan so that it effortlessly updates .DAT files and upgrades the entire product to protect your system from the latest virus threats. You can use AutoUpdate to perform updates and upgrades on a scheduled basis, automatically, or on demand. You can also request updates and upgrades from an FTP site or from a mapped drive on a local network computer. VirusScan also supports proxy servers. Note: VirusScan includes a default FTP fite for AutoUpdate. Once you receive the new .DAT files, you must restart your computer to load and use them. 2. VirusScan detects unknown macro viruses by using heuristic scanning technology. Unknown macro viruses are reported as "PROBABLE MACRO VIRUSES." 3. VirusScan is able to detect and clean macro virus infections in password-protected Microsoft Excel 95 files without disturbing passwords. 4. VirusScan now has the ability to detect macro virus infections in password-protected German, French, Dutch, Italian, and Japanese Microsoft Word 95 (Word 7.0) files. 5. If a password-protected Word 7.0 (Word for Office 95) file is infected by a virus that can plant its own password, VirusScan now cleans the file and removes the password. If a password-protected Word 7.0 or (Word for Office 95) file is infected by a virus that cannot plant its own password, VirusScan now cleans the file without disturbing the password. * NEW VIRUSES DETECTED * This .DAT file, 3102, is compatible with VirusScan's v3.x engines only. This .DAT file is not intended for use with VirusScan v2.x products. This .DAT file detects the following 232 new viruses. Locations that have experienced particular problems with specific viruses are also identified. 500 AB6A.3500 ALAR.5088 ANDROMEDA.1140 ANTINUKE.TROJAN ANXIETY.POPPY (Internet) ANXIETY.POPPY.II (Internet) ARARA.1375 AUSPAR BANDUNG.BF BLEE.A BLEE.B BLEE.D (Internet) BLEE.E (Internet) BOOT.666 BOX.D BOX.F BREEDER.A BRR.BOO BURMA.442.D CAP.BZ CAP.CA CAP.CB CAP.CC CAP.CD CAP.CE CAP.CF CAP.CG CAP.CH CAP.CI CAP.CJ CAP.CK CAP.CL CAP.CM CAP.CN CAP.CO CAP.CP CAP.CQ CAP.CR CAP.CS CAP.CT CAP.CU CAP.CV CAP.CW CAP.CX CIUDAD.590 (Europe) CLEANUP.A (Europe) COAHUILA CONCEPT.CA CONCEPT.CB CONCEPT.CC CONCEPT.CD CONCEPT.CE COOKIE.MONSTER.TROJAN DEMON.B DENZUKO.V1526 DIAMETRIC.3514 DRIVEL EDDY.1386 EIGHT-CLOCK.A (US) ERMUA.A ERMUA.B ERMUA.C FAKE.A FEINT_7F_(BS/MBR) GOODNIGHT.M GROG.1146 HABIR.A HASSLE.B HLLP.FECI.6000 HLLT.KRILE.4608 (Internet) HLLT.KRILE.5831 (Internet) HNL.A (US) HOT.B IBLIS.252 IBLIS.252 DROPPER IVP.967 IWASHERE.710 JERUSALEM.1808.CT.B DROPPER JOHNNY.S JOHNNY.T KELA.1171 KHIZHNJAK.1011 KHIZHNJAK.509 KHIZHNJAK.565 KILLDOS.A:TW KLA.A KOMCON.A (US) KOMPU.J KYOKUSHINKAI LAPIDARIO.766 LARRY LEONARD.1194 LIGHT.A LIZARD.1967 (Portugal, US) MBR-COM.1410 MDMA.AO MDMA.AP MDMA.AQ MDMA.AR MDMA.AS MINIMAL.AA MINIMAL.Y MINIMAL.Z MIRC/7TH_SPERE MIRC/REPRO_V1 MUCK.AP MUCK.AQ MULTI MWIM.BOO NGKOEN NICEDAY.P NICEDAY.Q NIKNAT.D NIKNAT.E NIKNAT.F NIKNAT.G NJVCK2.D NJVCK2.E NJVCK2.F NJVCK2.G NJVCK2.H NJVCK2.I NJVCK2.J NJVCK2.K NJVCK2.L NJVCK2.M NJVCK2.N NO2.A (TWNO variant) (Taiwan) NOP.R:BR NOP.S:ES NOP.T:IT NOSTARDAMUS.3584 NPAD.FD NPAD.FE NPAD.FF NPAD.FG NPAD.FH NPAD.FI NPAD.FJ NPAD.FK NPAD.FL NPAD.FM NPAD.FN NPAD.FO NPAD.FP NPAD.FQ NPAD.FR NPAD.FS NPAD.FT NPAD.FU NPAD.FV NPAD.FW NPAD.FX NPAD.FY ORPHAN.174 PASTIK.2049 PAYCHECK.J PAYCHECK.K PINGPONG.M PRESIDENT.MP.1504 RAZER.B SARCOMA.1328 SCHUMANN.G (Europe) SCHUMANN.H (Europe) SCHUMANN.I SCHUMANN.J (Europe) SCHUMANN.L (Europe) SEEYOU SHOWOFF.CN SHOWOFF.CO SHOWOFF.CP SHOWOFF.CQ SHOWOFF.CR SHOWOFF.CS SILLYC.124 SILLYC.144 SILLYC.166 SILLYC.169 SILLYC.264 SILLYC.302 SILLYC.331 SILLYC.343 SILLYC.498 SILLYC.511 SILLYC.563 SILLYC.626 SILLYC.657 SPHINX.2520 SPHINX.2536 SPHINX.2548 SWISS_BOOT (Switzerland) SWISS_BOOT_2 (Switzerland) SWLABS.H TAGUCHI.A (Brazil) TALON.L TEDY.4350 TEMPLE.L TPVO.3463 TPVO.3626 TPVO.3654 TPVO-OPEN.1569 TRASH.B TROUT.6787 TWNO.AB:TW VAMPIRE.K:TW VAMPIRE.L/M:TW VHDL.B:TW VIENNA.BETABOYS DROPPER WAZZU.DM WAZZU.DN WAZZU.DP WAZZU.DQ WAZZU.DR XF/PAIX.A (Requires 3.1.6 engine or later) XM/LAROUX.AF XM/LAROUX.AH XM/LAROUX.AP XM/LAROUX.BC XM/LAROUX.BE XM/LAROUX.BG XM/LAROUX.BH XM/LAROUX.BI XM/LAROUX.BJ XM/LAROUX.BK XM/LAROUX.BL XM/LAROUX.BM XM/LAROUX.BN XM/LMV.A (TROJAN) XM/NINJA.D (Japan) XM/NOCAL.A (Japan) ZHENGZHOU.3584.B * NEW VIRUSES CLEANED * This .DAT file cleans the following 167 new viruses: ANDROMEDA.1140 BANDUNG.BF BLEE.A BLEE.B BLEE.D (Internet) BLEE.E (Internet) BOX.F BREEDER.A CAP.BZ CAP.CA CAP.CB CAP.CC CAP.CD CAP.CE CAP.CF CAP.CG CAP.CH CAP.CI CAP.CJ CAP.CK CAP.CL CAP.CM CAP.CN CAP.CO CAP.CP CAP.CQ CAP.CR CAP.CS CAP.CT CAP.CU CAP.CV CAP.CW CAP.CX CIUDAD.590 (Europe) CLEANUP.A (Europe) COAHUILA CONCEPT.CA CONCEPT.CB CONCEPT.CC CONCEPT.CD CONCEPT.CE DEMON.B DIAMETRIC.3514 EIGHT-CLOCK.A (US) ERMUA.A ERMUA.B ERMUA.C FAKE.A FEINT_7F_(BS/MBR) GOODNIGHT.M GROG.1146 HABIR.A HASSLE.B HNL.A (US) HOT.B IBLIS.252 IBLIS.252 DROPPER IWASHERE.710 JERUSALEM.1808.CT.B DROPPER JOHNNY.S JOHNNY.T KILLDOS.A:TW KLA.A KOMCON.A (US) KOMPU.J LARRY LEONARD.1194 LIZARD.1967 (Portugal, US) MDMA.AP MDMA.AQ MDMA.AR MDMA.AS MINIMAL.Y MINIMAL.Z MINIMAL.AA MUCK.AP MUCK.AQ MWIM.BOO NICEDAY.P NICEDAY.Q NIKNAT.E NIKNAT.F NIKNAT.G NJVCK2.D NJVCK2.E NJVCK2.F NJVCK2.G NJVCK2.H NJVCK2.I NJVCK2.J NJVCK2.K NJVCK2.L NJVCK2.M NJVCK2.N NO2.A (TWNO variant) (Taiwan) NOP.R:BR NOP.S:ES NOP.T:IT NPAD.FD NPAD.FE NPAD.FF NPAD.FG NPAD.FH NPAD.FI NPAD.FJ NPAD.FK NPAD.FL NPAD.FM NPAD.FN NPAD.FO NPAD.FP NPAD.FQ NPAD.FR NPAD.FS NPAD.FT NPAD.FU NPAD.FV NPAD.FW NPAD.FX NPAD.FY PAYCHECK.J PAYCHECK.K RAZER.B SARCOMA.1328 SCHUMANN.G (Europe) SCHUMANN.H (Europe) SCHUMANN.J (Europe) SCHUMANN.L (Europe) SHOWOFF.CN SHOWOFF.CO SHOWOFF.CP SHOWOFF.CQ SHOWOFF.CR SHOWOFF.CS SWISS_BOOT (Switzerland) SWISS_BOOT_2 (Switzerland) SWLABS.H TAGUCHI.A (Brazil) TALON.L TEDY.4350 TEMPLE.L TRASH.B TWNO.AB:TW VAMPIRE.K:TW VAMPIRE.L/M:TW VHDL.B:TW VIENNA.BETABOYS DROPPER WAZZU.DM WAZZU.DN WAZZU.DP WAZZU.DQ WAZZU.DR XM/LAROUX.AF XM/LAROUX.AP XM/LAROUX.BC XM/LAROUX.BE XM/LAROUX.BG XM/LAROUX.BH XM/LAROUX.BI XM/LAROUX.BJ XM/LAROUX.BK XM/LAROUX.BL XM/LAROUX.BM XM/LAROUX.BN XM/LMV.A (TROJAN) XM/NINJA.D (Japan) XM/NOCAL.A (Japan) ____________ KNOWN ISSUES 1. When creating an Emergency Disk, in some cases, additional drivers must be loaded in order to access a driver specific hard drive (i.e. a compressed drive). Before modifying the Emergency Disk, please refer to your hard disk documentation for additional information on creating a boot disk. 2. If password protection is set for VShield or any scan task, when an associated program is launched, you will be prompted to verify the password. You must use the mouse to click in the text field to enter the password or click Cancel to exit. Keyboard strokes are not functional. This is a Microsoft issue as stated in Microsoft's Knowledge Base Article ID #Q84133. 3. If Move Infected File is selected on the Actions page, infected files will be moved to the directory specified. If the Windows Copy command fails during this procedure, a zero byte file size stamp may be left in the destin- ation directory when carrying out the Copy command. 4. The CTRL+C and CTRL+BREAK option to break out of DOS applications in a DOS window is disabled when you install VirusScan. This is to prevent a host of issues that would be caused by CTRL+C and CTRL+BREAK interfer- ing with VShield activity. Consequently, if a DIR command is executed in a DOS window, and then a CTRL+C or a CTRL+BREAK is executed, the DIR display will not be canceled and an incorrect DIR display may result. 5. If VShield detects an infected file that is decompress- ing in a DOS session and the DOS session is terminated, VShield as well as Pkunzip and any other program being run from the DOS window will be discontinued. Although the VShield icon will still be displayed in the Taskbar, VShield will be disabled. VShield must be re-enabled by restarting Windows to maintain maximum virus protection. 6. If the product is uninstalled while VirusScan (Scan16.exe) or the VirusScan Console (AVConsol.exe) are open, some files may not be removed (i.e. Scan16.exe, Mcscan16.dll, Mcgui16.dll, AVConsol.exe). If you try to delete the NETA\Viruscan directory before restarting Windows, error messages will appear stating that the files are being used by Windows. Close all VirusScan related programs, excluding VShield, before uninstalling VirusScan. 7. The conversion utility preserves the scan targets but does not preserve the command-line parameters. When custom profiles include command-line parameters, the resulting task (.VSC file) will have one or more invalid scan items that will need to be manually updated. Command-line parameters in scan tasks must be manually added. Pre-existing profiles (.PRF files) will be moved to the target installation directory for reference purposes. 8. If the AVCONSOLE.INI file is deleted and then recreated upon launching the AV Console, the default Scan16 task will change from "Scan Drive C" and "All Drives" to "VirusScan." 9. If you experience difficulties cleaning infected files with VirusScan for Windows, exit Windows and use SCAN.EXE or SCANPM.EXE, which are included in this product. 10. A VirusScan scan task that is scheduled to run while another scan task is in progress will not start because only one instance of VirusScan can be run at one time. Due to variations in system configurations, the time required to complete a particular scan task will vary between users. Therefore, you should determine the time required to complete the various scan tasks you perform on your system. Then, when scheduling scan tasks in the McAfee AntiVirus Console, allow enough time for one scheduled scan task to be completed before another one begins. ____________ INSTALLATION * INSTALLING THE PRODUCT * 1. Take one of the following steps: - If you are installing from diskette or compact disc, insert the VirusScan for Windows 3.1x installation diskette or the CD-ROM. - If you are installing from files downloaded from a BBS or the Network Associates website, decompress the zipped files into a directory on your local drive or the network. 2. Select Run from the File menu. 3. If you are installing from diskette, type: x:\SETUP.EXE (where x is the drive that contains the diskette). Click OK. If you are installing from compact disc, type: x:\win3x\SETUP.EXE (where x is the drive that contains the CD-ROM). Click OK. If you are installing from downloaded files, type: x:\path\SETUP.EXE (where x:\path is the location of the files). Click OK. 4. Follow the on-screen installation instructions to complete VirusScan installation. * PERFORMING A SILENT INSTALLATION * To perform a "silent" installation of this product, with minimal user interaction and with all default or "Typical" installation settings, add -s (i.e., SETUP.EXE -s) to the setup command when you install the product. Network administrators can customize the silent installation feature by following these steps: 1. Check the Windows directory to ensure that a file named SETUP.ISS does not already exist. If one does, rename it, back it up, or delete it. 2. Run SETUP.EXE with the -r switch, (i.e., SETUP.EXE -r). 3. Select the components you want to install during the silent installation. Your choices will be recorded. 4. Finish the installation. Result: A SETUP.ISS file is created in the Windows directory that has your installation options recorded. Use this file to install all product files to the same installation directory on every client machine. The .ISS file specifies the installation directory under the [SdSetupType-0] header, szDir parameter, which was recorded in step 3. This overrides the default installation directory on each client machine, which might vary according to operating system. Having the same directory name on every client helps to ease administration in the future; for example, you might assign all client machines the directory C:\MCAFEEAV. Note: If you want to allow SETUP.EXE to determine where to locate the installed files, modify the SETUP.ISS file so that the target machine will disregard the szDir, as follows: A. Locate the section [SdSetupType-0] in the SETUP.ISS file and go to the line: Result = xxx. The actual value will most likely be 301, 302, or 303, depending on what options you selected during the ISS file creation process. B. Add 100 to this number so that, for example, 301 becomes 401. This tells each target machine to disregard the szDir and assign a directory according to its own particular operating system. 5. Copy the installation files onto a local or mapped drive; then rename, back up, or delete the SETUP.ISS file. Note: You cannot perform a silent install from multiple media because the silent operation will be compromised when the install prompts the user for more media. 6. Copy the new SETUP.ISS from the Windows directory to the location of the installation files. Note: The file used for the silent installation, SETUP.ISS, is product-specific. For example, you cannot use a SETUP.ISS file created by a VirusScan for Windows 95 installation for a VirusScan for Windows NT installation. 7. Run SETUP.EXE with the -s switch (i.e., SETUP.EXE -s). Note: If you do not specify a "recorded" answer for all dialog boxes during the initial installation, the silent installation will fail. 8. When the silent installation is complete, the machine reboots automatically. * PRIMARY PROGRAM FILES FOR VIRUSSCAN FOR WINDOWS 3.1x * Files located in the Install directory: ======================================= 1. Installed for VShield/DOS/VirusScan: README.1ST = License and registration information CLEAN.DAT = Virus clean definition data NAMES.DAT = Virus names definition data SCAN.DAT = Virus scan definition data VALIDATE.EXE = McAfee file validation program WCMDR.EXE = Windows Commander program MCFDU.EXE = McAfee floppy disk utility (for Zenith machines only) PRF2VSC.EXE = Conversion utility program CONFIG.EXE = VirusScan configuration program SETBROWS.EXE = Set browser program INETWH16.DLL = Library files INETWH32.DLL = Library files MCGUI16.DLL = VirusScan Console library file WCMDR.INI = Windows Commander configuration settings WCMDRSIL.INI = unInstallShield helper configuration DEISL1.ISU = Uninstall file PACKING.LST = Packing list WHATSNEW.TXT = What's New document RESELLER.TXT = Network Associates authorized agents 2. Installed for VShield: MCKRNL16.DLL = Tools library MCUTIL16.DLL = Run-time support library CONFIG.EXE = VShield Configuration Manager VSHWIN.EXE = VShield on-access engine CHKVXD.EXE = VShield virtual device driver checking utility UNVSHVXD.EXE = Virtual device driver UNVSHVXD.INI = Initialization file DEFAULT.VSH = Default VSH settings 3. Installed for DOS: EDISK.EXE = Emergency Disk creation utility EDISK.SCR = Emergency Disk file EDAT.1 = Emergency Disk data file EDAT.2 = Emergency Disk data file EDAT.3 = Emergency Disk data file EDAT.4 = Emergency Disk data file EDAT.5 = Emergency Disk data file EDAT.6 = Emergency Disk data file EMCLEAN.DAT = Emergency Disk virus clean definition data EMNAMES.DAT = Emergency Disk virus names definition data EMSCAN.DAT = Emergency Disk virus scan definition data GETREPLY.EXE = Emergency diskette program component SCAN.EXE = MS-DOS scan program SCANPM.EXE = Protected mode scanner 4. Installed for VirusScan: AVCONSOL.EXE = VirusScan console program SCAN16.EXE = VirusScan for Windows 3.1x on-demand scanner VIRLST16.EXE = Virus List program MCSCAN16.DLL = Library files SCAN16.HLP = VirusScan for Windows 3.1x online help AVCONSOL.HLP = VirusScan Console online help AVCONSOL.INI = VirusScan console configuration file DEFAULT.VSC = Default VSC settings INETWH16.DLL = Internet library help file INETWH32.DLL = Internet library help file Files located in WINDOWS\SYSTEM directory: ========================================== 1. Installed for VShield/VirusScan: CTL3D.DLL = 16-bit 3D Windows controls library (*) CTL3DV2.DLL = 32-bit 3D Windows controls library (*) (*) File will be installed upon installation of VirusScan if it does not already exist, or if an older version is found. 2. Installed for VShield: MCFSHOOK.386 = File system hook MCKRNL.386 = Scan engine device driver MCSCAN32.386 = Scan engine device driver MCUTIL.386 = Utility device driver VSHIELD.386 = VShield device driver * TESTING YOUR INSTALLATION * The Eicar Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to come up with one standard by which customers can verify their anti-virus installations. To test your installation, copy the following line into its own file and name it EICAR.COM. X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* When done, you will have a 69- or 70-byte file. When VirusScan is applied to this file, it will report finding the EICAR-STANDARD-AV-TEST-FILE virus. It is important to know that THIS IS NOT A VIRUS. However, users often have the need to test that their installations function correctly. The anti-virus industry, through the European Institute for Computer Antivirus Research, has adopted this standard to facilitate this need. Please delete the file when installation testing is completed so unsuspecting users are not unnecessarily alarmed. * MANUALLY UNINSTALLING VIRUSSCAN * Network Associates recommends using VirusScan's uninstall program provided. You can access the McAfee Uninstall icon from the McAfee VirusScan program group. If, however, the uninstall program (WCMDR.EXE) is not present on your system, follow the instructions outlined below to manually uninstall VirusScan. 1. Edit the AUTOEXEC.BAT file: 1. From the File menu, select Run and type SYSEDIT in the space provided. Click Okay. 2. Remove VirusScan from the path statement. The default path is C:\NETA\VIRUSCAN. 2. In the SYSTEM.INI file, remove the following lines: device=MCSCAN32.386 device=MCUTIL.386 device=MCKRNL.386 device=MCFSHOOK.386 device=VSHIELD.386 3. Remove the following lines from the WIN.INI file: 1. After LOAD =, remove all references to VirusScan. The default line is C:\NETA\VIRUSCAN\VSHWIN.EXE. 2. Remove [VIRUSCAN] WSCAN=C:\NETA\VIRUSCAN\ SCAN16.EXE. 3. Delete VirusScan icons and the McAfee VirusScan program group from Windows in the Program Manager. 4. Exit Windows and reboot your system. 5. When Windows comes back up, open the File Manager and delete the NETA directory. _____________ DOCUMENTATION For more information, refer to the User's Guide, included on the CD-ROM versions of this program or available from the Network Associates BBS and FTP sites. This file is in Adobe Acrobat Portable Document Format (.PDF) and can be viewed using Adobe Acrobat Reader. This form of electronic documentation includes hypertext links and easy navigation to assist you in finding answers to questions about your Network Associates product. Adobe Acrobat Reader is available on CD-ROM in the ACROREAD subdirectory. Adobe Acrobat Reader also can be downloaded from the World Wide Web at: http://www.adobe.com/prodindex/acrobat/readstep.html VirusScan documentation can be downloaded from the Network Associates's BBS or the World Wide Web at: http://www.nai.com For more information on viruses and virus prevention, see the Network Associates Virus Information Library, included on the CD-ROM version of this product or available from the Network Associates BBS and FTP sites. __________________________ FREQUENTLY ASKED QUESTIONS Regularly updated lists of frequently asked questions about Network Associates products also are available on the Network Associates BBS, website, and CompuServe and AOL forums. Q: I am installing new software and the instructions say that I need to disable my anti-virus software. How do I disable VShield without uninstalling it? A: Right click on the VShield icon, then click disable. This will disable VShield until you enable it or restart Windows. Q: What is the Parameters field of the Task Properties page used for? A: The field is provided to take advantage of command-line parameters for programs other than VirusScan. For example, a NotePad.exe task could be set to open a file by entering the filename (i.e., Whatsnew.txt) in the parameter field. Q: How can I create an Emergency Disk after VirusScan installation? A: You can create an Emergency Disk after installation by double-clicking the Emergency Disk Creation Utility icon in your McAfee VirusScan program group. Q: When I have an infected file, why does the infected counter increase by increments greater than one? A: The file system will typically access a file more than once. On each access, VirusScan scans the file and detects the infection. Q: Can I continue to use VirusScan for Windows 3.1x on my system after upgrading to Windows 95? A: VirusScan for Windows 3.1x can run on a Windows 95 system; however, many key components, including VShield, will not be functional. If you upgrade your system to Windows 95, you should also upgrade your VirusScan software to VirusScan for Windows 95. As a licensed VirusScan user, you can upgrade your software for free. See your license agreement or contact your Network Administrator for details. Q: Can I update VirusScan's data files to detect new viruses? A: Yes. If you have Internet access, you can download updated VirusScan data files from the Network Associates website, BBS, or other online resources. To download from the Network Associates website, follow these steps: 1. Go to the Network Associates website (http://www.nai.com). 2. Select Update DAT File in the left column or frame. 3. Scroll down and click Download DAT File - FREE to update your virus definition files. 4. Data file updates are stored in a compressed form to reduce transmission time. Unzip the files into a temporary directory, then copy the files to the appropriate directory, replacing your old files. 5. Before performing any scans, shut down your computer, wait a few seconds, and turn it on again. Q: How do I scan compressed files? A: To scan compressed files with VirusScan: Prior to starting your scan, select Compressed Files from the VirusScan Main Window. To scan compressed files with VShield: Open the VShield Configuration Manager, click the Detection tab and click Compressed files. VirusScan and VShield are able to scan LZexe and PKLite. Files with *.zip, *.lzh, and other compressed formats are not scanned. Q: Is VShield TSR still enabled when I am in Windows? A: No. If VirusScan for Windows 3.1x is installed, the VShield TSR is disabled during Windows sessions. If you need additional assistance with downloading, contact Network Associates Download Support at (408) 988-3832. _____________________________ CONTACTING NETWORK ASSOCIATES * FOR QUESTIONS, ORDERS, PROBLEMS, OR COMMENTS * Contact the Network Associates Customer Care department: 1. Corporate-licensed customers, call (408) 988-3832 Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time Retail-licensed customers, call (972) 278-6100 Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time 2. Fax (408) 970-9727 24-hour, Group III fax 3. Fax-back automated response system (408) 988-3034 24-hour fax Send correspondence to any of the following Network Associates locations: Network Associates Corporate Headquarters 2805 Bowers Avenue Santa Clara, CA 95051-0963 Network Associates Canada 139 Main Street, Suite 201 Unionville, Ontario Canada L3R 2G6 Network Associates Europe B.V. Gatwickstraat 25 1043 GL Amsterdam The Netherlands Network Associates International Ltd. Minton Place, Victoria Street Windsor, Berkshire SL4 1EG United Kingdom Network Associates France S.A. 50 rue de Londres 75008 Paris France Network Associates Deutschland GmbH Industriestrasse 1 D-82110 Germering Germany Network Associates Japan Co, Ltd. Toranomon 33 Mori Bldg. 3-8-21 Toranomon Minato-Ku, Tokyo 105 Japan Network Associates Korea 135-090, 18th Fl., Kyoung Am Bldg. 157-27 Samsung-Dong, Kangnam-Ku Seoul, Korea Network Associates South East Asia 7 Temasek Boulevard The Penthouse #44-01, Suntec Tower One Singapore 038987 Network Associates Australia Level 1, 500 Pacific Highway St. Leonards, NSW 2065 Australia Network Associates Latin America 150 South Pine Island Road, Suite 205 Plantation, FL 33324 USA Or, you can receive online assistance through any of the following resources: 1. Bulletin Board System: (408) 988-4004 24-hour US Robotics HST DS 2. Internet e-mail: support@nai.com 3. Internet FTP: ftp.nai.com 4. World Wide Web: http://www.nai.com 5. America Online: keyword MCAFEE 6. CompuServe: GO MCAFEE Before contacting Network Associates, please make note of the following information. When sending correspondence, please include the same details. - Program name and version number - Type and brand of your computer, hard drive, and any peripherals - Operating system type and version - Network name, operating system, and version - Contents of your AUTOEXEC.BAT, CONFIG.SYS, and system LOGIN script - Microsoft service pack, where applicable - Network card installed, where applicable - Modem manufacturer, model, and baud, where applicable - Relevant browsers/applications and version number, where applicable - Problem - Specific scenario where problem occurs - Conditions required to reproduce problem - Statement of whether problem is reproducible on demand - Your contact information: voice, fax, and e-mail Other general feedback is also appreciated. Documentation feedback is welcome. Send e-mail to documentation@nai.com. * FOR ON-SITE TRAINING INFORMATION * Contact Network Associates Customer Service at (800) 338-8754. * FOR PRODUCT UPGRADES * To make it easier for you to receive and use Network Associates products, we have established a Reseller program to provide service, sales, and support for our products worldwide. For a listing of Network Associates resellers near you, click Contact on the Network Associates website or see the RESELLER.TXT file included with this product.