What's New in VirusScan for Windows 3.1x v3.1.2a (3009a) Copyright 1994-1997 by McAfee Associates, Inc. All Rights Reserved. Thank you for using McAfee's VirusScan for Windows 3.1x. This What's New file contains important information regarding the current version of this product. It is highly recommended that you read the entire document. McAfee welcomes your comments and suggestions. Please use the information provided in this file to contact us. ___________________ WHAT'S IN THIS FILE - New Features - Known Issues - Installation - Documentation - Frequently Asked Questions - Contact McAfee ____________ NEW FEATURES 1. VirusScan detects unknown macro viruses by using heuristic scanning technology. Unknown macro viruses are reported as "PROBABLE MACRO VIRUSES." 2. VirusScan is able to detect and clean macro virus infections in password-protected Microsoft Excel 95 files without disturbing passwords. 3. VirusScan now has the ability to detect macro virus infections in password-protected German, French, Dutch, Italian, and Japanese Microsoft Word 95 (Word 7.0) files. 4. VirusScan is designed to respect users' passwords and leave them intact as often as possible. Viruses that infect Word files, however, sometimes plant their own passwords. When VirusScan is instructed to clean a password-protected file, it will take one of two actions: A. If the macro virus cannot plant its own password: VirusScan notes the infection but will not clean it. B. If the macro virus can plant its own password: VirusScan cleans the file, removing the password along with the virus. * NEW VIRUSES DETECTED * This DAT file, 3009a, is compatible with VirusScan's v3.x engines only. This DAT file is not intended for use with VirusScan v2.x products. This DAT file detects the following 293 new viruses. Locations that have experienced particular problems with specific viruses are also identified. _1600 ABCD AK.251 ALEX.A:TW(INTENDED) ALEX.B:TW(INTENDED) ALEX.C/D:TW(INTENDED) ALEX.E:TW(INTENDED) ALIEN.259 ALIEN.298 ALIEN.304 ALIEN.374 ALIEN.G ANAK.B ANAK.C ANDRY.3791 (COM) ANT.C:TW (*) ANT.D:TW (*) APPARITION.1248 APPARITION.700 APPDER.J ARCHER.A ARCHER.B ARME.411 ARME.414 AWARE.1292 BANDUNG.AZ BANDUNG.BA BATTYBUG.187 BEDA.883 BEDA.1301 BLIN.1457 BMBB.766 CAP.K CAP.M CAP.Z CAP.AA CAP.AB CAP.AC CAP.AD CAP.AE CAP.AF CAP.AG CAP.AH CAP.AI CAP.AJ CAP.AK CAP.AL CAP.AM CAP.AN CEASE.382 CHEAT.A CHEAT.B CHOLERA.2415 CLOCK.J:DE CLOCK.K:DE CLOCK.L:DE COLORS.BO COLORS.BP COMPANION.5808 CONCEPT.BF CONCEPT.BI CONCEPT.BJ CONCEPT.BK CONCEPT.BK1 CONCEPT.BL CONCEPT.BM CONCEPT.BN COUNT10.E CRUZ.CMP.8262 DARK.E DARK_ELF.2200 DBF.990 DENZUK-NAPOL DISHONOR.A:DE (*) DIVINA.I DMV.F DMV.G DREPO.2493 DZT.D DZT.G EDDIE.565 EDDIE.1093 ELCON.374 ELCON.424 ELYTHNIA ENVIRONM.6752 FACADE.B FATTY.3012 FIRE.A:DE (*) FLI2MOD (TROJAN) FLOYD.1546 (Hong Kong) FLU.1160 FORMATS.A (TROJAN) (*) FOUR.A FOUR.A (*) FRIDAY.E:DE GENESIS (TROJAN) GETTO.2000 GLITTER.1462 GLUP.403 GLUP.404 GOODNIGHT.C GROG.1349 GYRO.OW.512 HACKERZ.709 HAFENSTRASSE.1641 HEADACHE.269B HEADER.A HIAN HIDEOUS.1024.A HIDEOUS.1024.B HIDEOUS.1024.C HIDEOUS.1024.D HITMAN.A HLL.7336 HLL.CMP.16052 (*) HLLO.17690.A HLLP.5850.E HLLP.5904 HLLP.FECI.6000 HONGKANG.1904 HYBRID.I HYBRID.J ISLAND.3551 IVP.VIVEK.924 JOHNNY.O JOHNNY.O1 KEYB.298 KEYB.299 KHIZHNJAK.494 KHIZHNJAK.780A KHIZHNJAK.780B KOH-INSTALL KOMPU.E (*) KONKOOR LAHYANI.1381 LAPIDARIO.766 LIBERTY.2857.D (EXE) LICENTIOUS.1024 LILITH LILO.1573 LOADER.TCS (TROJAN) LOZ.684 LOZ.724 LPSK.OW.554 LUCY.B LUNAR.A MACARONI.B:DE MALARIA.A:TW (*) MANZON.1404.DR MESS.A MINIMAD.322 MINIMAD.340 MINIMAD.345 MINIMAD.346 MINIMAD.347 MINIMAD.349 MINIMAD.349B MINIMAD.350 MINIMAD.352 MINIMAD.353 MINIMAD.361 MINIMAD.361B MINIMAD.385 MINIMAD.386 MINIMAD.388 MINIMAD.407 MINIMAL.S MKC_BOOT MORPHINE.3500 MPC.LIATA.337 MUCK.I MUCK.J MUCK.K MUCK.L MUCK.M MUCK.N NAZI.8600 NICEDAY.N NIKNAT.A NJ-WMDLK1.G NOIEMBRIE.610 NOP.M:DE (*) NOP.N NPAD.CT NPAD.CU NPAD.CV NPAD.CW NPAD.CX NPAD.CY NPAD.CZ NPAD.DA NUMIN.902 NUTCRACKER.AB2 (BOOT) NUTCRACKER.MP.BOOT OBAY.A OBLOM.A OBLOM.C OBLOM.E OMINOUS.1846 ORHEY.A P0P.2694 PALMA PAYCHECK.F PAYCHECK.G PERCENT.A:TW (*) PESAN.B (US) PH33R.1418 PHILE.204 PIG.F:TW PITER.529 POW POWERPUMP.CMP.A POXVAR.A POXVAR.B PREDATOR.1879 PYSK.2464 QBOOTDR76.VCS RADYU.274 RADYU.278 RADYU.332 RADYU.333 RAZER.A (*) REPLICATOR RICKDOGG (TROJAN) ROSEANNE.INTENDED.241 RSM.A RUBIX.421 RUBIX.422A SAILOR.B SAM.B:TW SCHUMANN.B (*) SCHUMANN.C:DE SCREW.A SHIFTER.760 SHIN SHY.1603 SHY.1608 SOCKS.A SORPREN.1536 (Brasil) SPY.A STOOPID.353 SUN.8176 SUNSET (TROJAN) SUPERSTITION.A SVS.A SWAT.A (TROJAN) SWLABS.G (*) (US Military) TANGLE.378 TEAR.B TEMPLE.A TEMPLE.H TMC.5036 TWNO.A:TW (Word97) (Taiwan) VAMPIRE.E:TW VAMPIRE.F:TW VAMPIRE.I:TW VANITAS.2048 (Texas) VD.253 VICISSIT.A WALLY.1029 WANT.A:TW WAZZU.CG WAZZU.CH WAZZU.CI WAZZU.CM WAZZU.CN WAZZU.CO WAZZU.CP WAZZU.CQ WAZZU.CR WAZZU.CS WAZZU.CT WAZZU.CU XAVIER.367 XM/DON.A (INTENDED) XM/HIT.A XM/HIT.B XM/HIT.D XM/LAROUX.H XM/LAROUX.J XM/LAROUX.K XRCE.664 ZAHAK.960 ZANY.225 ZANY.253 ZANY.270 ZANY.292B ZANY.298 ZANY.300 ZANY.793 ZANY.INTENDED.160 ZUCA.677 (*) Mistakenly included in the 3008a What's New list. * NEW VIRUSES CLEANED * This DAT file cleans the following 238 new viruses. Locations that have experienced particular problems with specific viruses are also identified. ABCD AK.251 ALEX.A:TW(INTENDED) ALEX.B:TW(INTENDED) ALEX.C/D:TW(INTENDED) ALEX.E:TW(INTENDED) ALIEN.259 ALIEN.298 ALIEN.304 ALIEN.374 ALIEN.G ANAK.B ANAK.C ANT.C:TW (*) ANT.D:TW (*) APPDER.J ARCHER.A ARCHER.B ARME.411 ARME.414 AWARE.1292 BANDUNG.AZ BANDUNG.BA BATTYBUG.187 CAP.K CAP.M CAP.Z CAP.AA CAP.AB CAP.AC CAP.AD CAP.AE CAP.AF CAP.AG CAP.AH CAP.AI CAP.AJ CAP.AK CAP.AL CAP.AM CAP.AN CHEAT.A CHEAT.B CLOCK.J:DE CLOCK.K:DE CLOCK.L:DE COLORS.BO COLORS.BP COMPANION.5808 CONCEPT.BI CONCEPT.BJ CONCEPT.BK CONCEPT.BK1 CONCEPT.BL CONCEPT.BM CONCEPT.BN COUNT10.E CRUZ.CMP.8262 DARK.E DENZUK-NAPOL DISHONOR.A:DE (*) DIVINA.I DMV.G DZT.G EDDIE.1093 EDDIE.565 ELCON.374 ELCON.424 ELYTHNIA ENVIRONM.6752 FACADE.B FIRE.A:DE (*) FLOYD.1546 (Hong Kong) FORMATS.A (TROJAN) (*) FOUR.A (*) FRIDAY.E:DE GOODNIGHT.C GLUP.403 GLUP.404 HAFENSTRASSE.1641 HEADACHE.269B HEADER.A HIAN HIDEOUS.1024.A HIDEOUS.1024.B HIDEOUS.1024.C HIDEOUS.1024.D HITMAN.A HLL.CMP.16052 (*) HLLP.5850.E HLLP.5850.E(PASS2) HYBRID.I HYBRID.J HONGKANG.1904 JOHNNY.O JOHNNY.O1 KEYB.298 KEYB.299 KHIZHNJAK.494 KHIZHNJAK.780A KHIZHNJAK.780B KOH-INSTALL KOMPU.E (*) LAHYANI.1381 LIBERTY.2857.D (EXE) LICENTIOUS.1024 LILITH LILO.1573 LOZ.684 LOZ.724 LUCY.B LUNAR.A MACARONI.B:DE MALARIA.A:TW (*) MESS.A MINIMAD.322 MINIMAD.340 MINIMAD.345 MINIMAD.346 MINIMAD.347 MINIMAD.349 MINIMAD.349B MINIMAD.350 MINIMAD.352 MINIMAD.353 MINIMAD.361 MINIMAD.361B MINIMAD.385 MINIMAD.386 MINIMAD.388 MINIMAD.407 MINIMAL.S MKC_BOOT MPC.LIATA.337 MUCK.I MUCK.J MUCK.K MUCK.L MUCK.M MUCK.N NICEDAY.N NIKNAT.A NJ-WMDLK1.G NOIEMBRIE.610 NOP.M:DE (*) NOP.N NPAD.CT NPAD.CU NPAD.CV NPAD.CW NPAD.CX NPAD.CY NPAD.CZ NPAD.DA NUMIN.902 NUTCRACKER.AB2 (BOOT) OBAY.A OBLOM.A OBLOM.C OBLOM.E ORHEY.A PAYCHECK.F PAYCHECK.G P0P.2694 PALMA PERCENT.A:TW (*) PESAN.B PHILE.204 PIG.F:TW POW POXVAR.A POXVAR.B PREDATOR.1879 QBOOTDR76.VCS RADYU.274 RADYU.278 RADYU.332 RADYU.333 (RAPI.AL2) RAZER.A (*) REPLICATOR RSM.A RUBIX.421 RUBIX.422A SAILOR.B SAM.B:TW SCHUMANN.B (*) SCHUMANN.C:DE SCREW.A SHIN SOCKS.A SORPREN.1536 (Brazil) SPY.A STOOPID.353 SUN.8176 SUPERSTITION.A SVS.A SWLABS.G (*) (US Military) TEAR.B TMC.5036 TWNO.A:TW (Word97) (Taiwan) VAMPIRE.E:TW VAMPIRE.F:TW VAMPIRE.I:TW VANITAS.2048 (Texas) VD.253 VICISSIT.A WALLY.1029 WANT.A:TW WAZZU.CG WAZZU.CH WAZZU.CI WAZZU.CM WAZZU.CN WAZZU.CO WAZZU.CP WAZZU.CQ WAZZU.CR WAZZU.CS WAZZU.CT WAZZU.CU XAVIER.367 XM/DON.A (INTENDED) XM/HIT.A XM/HIT.B XM/HIT.D XM/LAROUX.H XM/LAROUX.J XM/LAROUX.K XRCE.664 ZANY.225 ZANY.253 ZANY.270 ZANY.292B ZANY.298 ZANY.300 ZANY.793 ZUCA.677 (*) Mistakenly included in the 3008a What's New list. ____________ KNOWN ISSUES 1. When creating an Emergency Disk, in some cases, additional drivers must be loaded in order to access a driver specific hard drive (i.e. a compressed drive). Before modifying the Emergency Disk, please refer to your hard disk documentation for additional information on creating a boot disk. 2. If password protection is set for VShield or any scan task, when an associated program is launched, you will be prompted to verify the password. You must use the mouse to click in the text field to enter the password or click on cancel to exit. Keyboard strokes are not functional. This is a Microsoft issue as stated in Microsoft's Knowledge Base Article ID #Q84133. 3. If Move Infected File is selected on the Actions page, infected files will be moved to the directory specified. If the Windows Copy command fails during this procedure, a zero byte file size stamp may be left in the destin- ation directory when carrying out the Copy command. 4. The CTRL+C and CTRL+BREAK option to break out of DOS applications in a DOS window is disabled when you install VirusScan. This is to prevent a host of issues that would be caused by CTRL+C and CTRL+BREAK interfer- ing with VShield activity. Consequently, if a DIR command is executed in a DOS window, and then a CTRL+C or a CTRL+BREAK is executed, the DIR display will not be canceled and an incorrect DIR display may result. 5. If VShield detects an infected file that is decompress- ing in a DOS session and the DOS session is terminated, VShield as well as Pkunzip and any other program being run from the DOS window will be discontinued. Although the VShield icon will still be displayed in the Taskbar, VShield will be disabled. VShield must be re-enabled by restarting Windows to maintain maximum virus protection. 6. If the product is uninstalled while VirusScan (Scan16.exe) or the VirusScan Console (AVConsol.exe) are open, some files may not be removed (i.e. Scan16.exe, Mcscan16.dll, Mcgui16.dll, AVConsol.exe). If you try to delete the McAfee\Viruscan directory before restarting Windows, error messages will appear stating that the files are being used by Windows. Close all VirusScan related programs, excluding VShield, before uninstalling VirusScan. 7. The conversion utility preserves the scan targets but does not preserve the command-line parameters. When custom profiles include command-line parameters, the resulting task (.VSC file) will have one or more invalid scan items that will need to be manually updated. Command-line parameters in scan tasks must be manually added. Pre-existing profiles (.PRF files) will be moved to the target installation directory for reference purposes. 8. When scheduling multiple scan tasks through the VirusScan console, ensure that task schedules do not overlap. If the schedules overlap, only the first task will be implemented and tasks scheduled thereafter will be ignored. 9. If the AVCONSOLE.INI file is deleted and then recreated upon launching the AV Console, the default Scan16 task will change from "Scan Drive C" and "All Drives" to "VirusScan." 10. When the DEFAULT.VSC or DEFAULT.VSH files are renamed or deleted, VirusScan or VShield creates a new default file upon launch. The new default file is set to limit the size of the log file to 10KB and the Compressed option will be selected. 11. If you experience difficulties cleaning infected files with VirusScan for Windows, exit Windows and use SCAN.EXE or SCANPM.EXE, which are included in this product. ____________ INSTALLATION * INSTALLING THE PRODUCT * 1. Take one of the following steps: - If you are installing from diskette or compact disc, insert the VirusScan for Windows 3.1x installation diskette or the CD-ROM. - If you are installing from files downloaded from a BBS or the McAfee website, decompress the zipped files into a directory on your local drive or the network. 2. Select Run from the File menu. 3. If you are installing from diskette, type: x:\SETUP.EXE (where x is the drive that contains the diskette). Click OK. If you are installing from compact disc, type: x:\win3x\SETUP.EXE (where x is the drive that contains the CD-ROM). Click OK. If you are installing from downloaded files, type: x:\path\SETUP.EXE (where x:\path is the location of the files). Click OK. 4. Follow the on-screen installation instructions to complete VirusScan installation. * PERFORMING A SILENT INSTALLATION * To perform a "silent" installation of this product, with minimal user interaction and with all default or "Typical" installation settings, add -s (i.e., SETUP.EXE -s) to the setup command when you install the product. Network administrators can customize the silent installation feature by following these steps: 1. Check the Windows directory to ensure that a file named SETUP.ISS does not already exist. If one does, rename it, back it up, or delete it. 2. Run SETUP.EXE with the -r switch, (i.e., SETUP.EXE -r). 3. Select the components you want to install during the silent installation. Your choices will be recorded. 4. Finish the installation. Result: A SETUP.ISS file is created in the Windows directory that has your installation options recorded. Use this file to install all product files to the same installation directory on every client machine. The .ISS file specifies the installation directory under the [SdSetupType-0] header, szDir parameter, which was recorded in step 3. This overrides the default installation directory on each client machine, which might vary according to operating system. Having the same directory name on every client helps to ease administration in the future; for example, you might assign all client machines the directory C:\ANTIVIRUS. Note: If, however, you want to allow SETUP.EXE to determine where to locate the installed files, modify the SETUP.ISS file so that the target machine will disregard the szDir, as follows: A. Locate the section [SdSetupType-0] in the SETUP.ISS file and go to the line: Result = xxx. The actual value will most likely be 301, 302, or 303, depending on what options you selected durin the ISS file creation process. B. Add 100 to this number so that, for example, 301 becomes 401. This tells each target machine to disregard the szDir and assign a directory according to its own particular operating system. 5. Copy the installation files onto a local or mapped drive; then rename, back up, or delete the SETUP.ISS file. Note: You cannot perform a silent install from multiple media because the silent operation will be compromised when the install prompts the user for more media. 6. Copy the new SETUP.ISS from the Windows directory to the location of the installation files. Note: The file used for the silent installation, SETUP.ISS, is product-specific. For example, you cannot use a SETUP.ISS file created by a VirusScan for Windows 95 installation for a VirusScan for Windows NT installation. 7. Run SETUP.EXE with the -s switch (i.e., SETUP.EXE -s). Note: If you do not specify a "recorded" answer for all dialog boxes during the initial installation, the silent installation will fail. 8. When the silent installation is complete, the machine reboots automatically. * PRIMARY PROGRAM FILES FOR VIRUSSCAN FOR WINDOWS 3.1x * Files located in the Install directory: ======================================= 1. Installed for VShield/DOS/VirusScan: README.1ST = License and registration information CLEAN.DAT = Virus clean definition data NAMES.DAT = Virus names definition data SCAN.DAT = Virus scan definition data VALIDATE.EXE = McAfee file validation program WCMDR.EXE = Windows Commander program MCFDU.EXE = McAfee floppy disk utility (for Zenith machines only) PRF2VSC.EXE = Conversion utility program CONFIG.EXE = VirusScan configuration program SETBROWS.EXE = Set browser program INETWH16.DLL = Library files INETWH32.DLL = Library files MCGUI16.DLL = VirusScan Console library file WCMDR.INI = Windows Commander configuration settings WCMDRSIL.INI = unInstallShield helper configuration DEISL1.ISU = Uninstall file PACKING.LST = Packing list WHATSNEW.TXT = What's New document RESELLER.TXT = McAfee authorized agents 2. Installed for VShield: MCKRNL16.DLL = Tools library MCUTIL16.DLL = Run-time support library CONFIG.EXE = VShield Configuration Manager VSHWIN.EXE = VShield on-access engine CHKVXD.EXE = VShield virtual device driver checking utility UNVSHVXD.EXE = Virtual device driver UNVSHVXD.INI = Initialization file DEFAULT.VSH = Default VSH settings 3. Installed for DOS: EDISK.EXE = Emergency Disk creation utility EDISK.SCR = Emergency Disk file EDAT.1 = Emergency Disk data file EDAT.2 = Emergency Disk data file EDAT.3 = Emergency Disk data file EDAT.4 = Emergency Disk data file EDAT.5 = Emergency Disk data file EDAT.6 = Emergency Disk data file EMCLEAN.DAT = Emergency Disk virus clean definition data EMNAMES.DAT = Emergency Disk virus names definition data EMSCAN.DAT = Emergency Disk virus scan definition data GETREPLY.EXE = Emergency diskette program component SCAN.EXE = MS-DOS scan program SCANPM.EXE = Protected mode scanner 4. Installed for VirusScan: AVCONSOL.EXE = VirusScan console program SCAN16.EXE = VirusScan for Windows 3.1x on-demand scanner VIRLIST16.EXE = Virus List program MCSCAN16.DLL = Library files SCAN16.HLP = VirusScan for Windows 3.1x online help AVCONSOL HLP = VirusScan Console online help AVCONSOL.INI = VirusScan console configuration file DEFAULT.VSC = Default VSC settings INETWH16.DLL = Internet library help file INETWH32.DLL = Internet library help file Files located in WINDOWS\SYSTEM directory: ========================================== 1. Installed for VShield/VirusScan: CTL3D.DLL = 16-bit 3D Windows controls library (*) CTL3DV2.DLL = 32-bit 3D Windows controls library (*) (*) File will be installed upon installation of VirusScan if it does not already exist, or if an older version is found. 2. Installed for VShield: MCFSHOOK.386 = File system hook MCKRNL.386 = Scan engine device driver MCSCAN32.386 = Scan engine device driver MCUTIL.386 = Utility device driver VSHIELD.386 = VShield device driver * TESTING YOUR INSTALLATION * The Eicar Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to come up with one standard by which customers can verify their anti-virus installations. To test your installation, copy the following line into its own file and name it EICAR.COM. X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* When done, you will have a 69- or 70-byte file. When VirusScan is applied to this file, it will report finding the EICAR-STANDARD-AV-TEST-FILE virus. It is important to know that THIS IS NOT A VIRUS. However, users often have the need to test that their installations function correctly. The anti-virus industry, through the European Institute for Computer Antivirus Research, has adopted this standard to facilitate this need. Please delete the file when installation testing is completed so unsuspecting users are not unnecessarily alarmed. * MANUALLY UNINSTALLING VIRUSSCAN * McAfee recommends using VirusScan's uninstall program provided. You can access the McAfee Uninstall icon from the McAfee VirusScan program group. If, however, the uninstall program (WCMDR.EXE) is not present on your system, follow the instructions outlined below to manually uninstall VirusScan. 1. Edit the AUTOEXEC.BAT file: 1. From the File menu, select Run and type SYSEDIT in the space provided. Click Okay. 2. Remove VirusScan from the path statement. The default path is C:\MCAFEE\VIRUSCAN. 2. In the SYSTEM.INI file, remove the following lines: device=MCSCAN32.386 device=MCUTIL.386 device=MCKRNL.386 device=MCFSHOOK.386 device=VSHIELD.386 3. Remove the following lines from the WIN.INI file: 1. After LOAD =, remove all references to VirusScan. The default line is C:\MCAFEE\VIRUSCAN\VSHWIN.EXE. 2. Remove [VIRUSCAN] WSCAN=C:\McAfee\VIRUSCAN\ SCAN16.EXE. 3. Delete VirusScan icons and the McAfee VirusScan program group from Windows in the Program Manager. 4. Exit Windows and reboot your system. 5. When Windows comes back up, open the File Manager and delete the McAfee directory. _____________ DOCUMENTATION For more information, refer to the User's Guide, included on the CD-ROM versions of this program or available from McAfee's BBS and FTP site. This file is in Adobe Acrobat Portable Document Format (.PDF) and can be viewed using Adobe Acrobat Reader. This form of electronic documentation includes hypertext links and easy navigation to assist you in finding answers to questions about your McAfee product. Adobe Acrobat Reader is available on CD-ROM in the ACROREAD subdirectory. Adobe Acrobat Reader also can be downloaded from the World Wide Web at: http://www.adobe.com/Acrobat/readstep.html VirusScan documentation can be downloaded from McAfee's BBS or the World Wide Web at: http://www.mcafee.com For more information on viruses and virus prevention, see the McAfee Virus Information Library, included on the CD-ROM version of this product or available from McAfee's BBS and FTP site. A ViaGraphix Interactive Anti-virus Training program also is available on the CD-ROM version, or can be purchased from the McAfee website. __________________________ FREQUENTLY ASKED QUESTIONS Regularly updated lists of frequently asked questions about McAfee products also are available on McAfee's BBS, website, and CompuServe and AOL forums. Q: What is the Parameters field of the Task Properties page used for? A: The field is provided to take to take advantage of command-line parameters for programs other than VirusScan. For example, a NotePad.exe task could be set to open a file by entering the filename (i.e., Whatsnew.txt) in the parameter field. Q: How can I create an Emergency Disk after VirusScan installation? A: You can create an Emergency Disk after installation by double-clicking the Emergency Disk Creation Utility icon in your McAfee VirusScan program group. Q: When I have an infected file, why does the infected counter increase by increments greater than one? A: The file system will typically access a file more than once. On each access, VirusScan scans the file and detects the infection. Q: Can I continue to use VirusScan for Windows 3.1x on my system after upgrading to Windows 95? A: VirusScan for Windows 3.1x can run on a Windows 95 system; however, many key components, including VShield, will not be functional. If you upgrade your system to Windows 95, you should also upgrade your VirusScan software to VirusScan for Windows 95. As a licensed VirusScan user, you can upgrade your software for free. See your license agreement or contact your Network Administrator for details. Q: Does VShield detect Word Macro infections? A: Yes. VShield detects and cleans Word Macro infections. Q: Can I update VirusScan's data files to detect new viruses? A: Yes. If you have Internet access, you can download updated VirusScan data files from the McAfee website, BBS, or other online resources. To download from the McAfee Web Site, follow these steps: 1. Go to the McAfee website (http://www.mcafee.com). 2. Select Update DAT File in the left hand column or frame. 3. Scroll down and click Download DAT File - FREE to update your virus definition files. 4. Data file updates are stored in a compressed form to reduce transmission time. Unzip the files into a temporary directory, then copy the files to the appropriate directory, replacing your old files. 5. Before performing any scans, shut down your computer, wait a few seconds, and turn it on again. If you need additional assistance with downloading, contact McAfee Download Support at (408) 988-3832. ______________ CONTACT McAFEE * FOR QUESTIONS, ORDERS, PROBLEMS, OR COMMENTS * Contact McAfee's Customer Care department: 1. Corporate-licensed customers, call (408) 988-3832 Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time Retail-licensed customers, call (972) 278-6100 Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time 2. Fax (408) 970-9727 24-hour, Group III fax 3. Fax-back automated response system (408) 988-3034 24-hour fax Send correspondence to any of the following McAfee locations: McAfee Corporate Headquarters 2805 Bowers Avenue Santa Clara, CA 95051-0963 McAfee East Coast Office Jerral Center West 766 Shrewsbury Avenue Tinton Falls, NJ 07724-3298 McAfee Central Office 4099 McEwen Suites 500 and 700 Dallas, TX 75244 McAfee Canada 139 Main Street Suite 201 Unionville, Ontario Canada L3R2G6 McAfee Europe B.V. Gatwickstraat 25 1043 GL Amsterdam The Netherlands McAfee (UK) Ltd. Hayley House, London Road Bracknell, Berkshire RG12 2TH United Kingdom McAfee France S.A. 50 rue de Londres 75008 Paris France McAfee Deutschland GmbH Industriestrasse 1 D-82110 Germering Germany McAfee Japan KK Toranomon 33 Mori Bldg. 3-8-21 Toranomon Minato-Ku, Tokyo 105 Japan Or, you can receive online assistance through any of the following resources: 1. Bulletin Board System: (408) 988-4004 24-hour US Robotics HST DS 2. Internet e-mail: support@mcafee.com 3. Internet FTP: ftp.mcafee.com 4. World Wide Web: http://www.mcafee.com 5. America Online: keyword MCAFEE 6. CompuServe: GO MCAFEE Before contacting McAfee, please make note of the following information. When sending correspondence, please include the same details. - Program name and version number - Type and brand of your computer, hard drive, and any peripherals - Operating system type and version - Network name, operating system, and version - Contents of your AUTOEXEC.BAT, CONFIG.SYS, and system LOGIN script - Microsoft service pack, where applicable - Network card installed, where applicable - Modem manufacturer, model, and baud, where applicable - Relevant browsers/applications and version number, where applicable - Problem - Specific scenario where problem occurs - Conditions required to reproduce problem - Statement of whether problem is reproducible on demand - Your contact information: voice, fax, and e-mail Other general feedback is also appreciated. Documentation feedback is welcome. Send e-mail to documentation@cc.mcafee.com. * FOR ON-SITE TRAINING INFORMATION * Contact McAfee Customer Service at (800) 338-8754. * FOR PRODUCT UPGRADES * To make it easier for you to receive and use McAfee's products, we have established a Reseller program to provide service, sales, and support for our products worldwide. For a listing of McAfee resellers near you, click Contact McAfee under the Information section on the McAfee website or see tge RESELLER.TXT file included with this product.