home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Jason Aller Floppy Collection
/
270.img
/
VIREXPC.ZIP
/
READ_ME.1ST
< prev
next >
Wrap
Text File
|
1990-04-20
|
7KB
|
138 lines
Additional product information is available on this disk
.print on
.screen on
1. VPCScan scans all subdirectories beginning with the current directory of
a specified drive. Typing `VPCSCAN A:\' searches the entire A: drive.
Typing `VPCSCAN C:' scans the default directory of the C: drive and its
subdirectories. To determine the default directory of a drive, type
`CD d:', where `d' is the specific drive letter.
2. There are two command line options for VPCScan, which are placed on the
command line after the directory specification:
VPCSCAN C:\MYDIR -<options>
The first option is -O, for Only, which scans only the specified directory
and does not scan any subdirectories. The second option is -L, for Long
scan, which scans the entire contents of a file. If the -L option is not
used, VPCScan limits its search to the areas of a file that are most likely
to be infected. Since use of the -L option causes VPCScan to examine a
file more closely, it increases the time that it takes to scan the file.
For this reason, it is recommended that the -L option be used only on new
files, the first time your hard disk is scanned, or before Virex-PC has
been installed on your system. These options can be combined on the same
command line, causing VPCScan to perform a long scan of files contained
in the current directory.
3. Version 1.0 of Virex-PC is not completely network compatible. Because of
this, the network driver software must be loaded before starting Virex-PC.
Version 1.1 of Virex-PC will be network compatible.
4. You should not edit the Virex-PC Protection File while Virex-PC is in
operation. Editing the Protection File while Virex-PC is in operation can
result in damage to the Protection File, necessitating a reinstallation
of Virex-PC. If you wish to edit the Protection File directly or with the
Install program, do so prior to starting Virex-PC. In some instances,
damage to the data on your disk may occur if you edit the Protection File
while Virex-PC is running.
5. Disallowing direct disk operations by pressing "any other key" when a
direct disk write alert appears can damage the file or the integrity of the
disk. If you are sure an operation is safe and is not the result of a
virus or Trojan, allow the direct disk operations. Damage, including
partial disk formatting, can result from disallowing a direct disk
operation.
6. Some computers with LCD displays, such as Toshiba and IBM portables, are
unable to display the Virex-PC installation procedure because they perform
LCD color monitor emulation. To allow Virex-PC to be displayed, set the
computer to monochrome mode. A future release of Virex-PC will address
this issue.
7. On an IBM PS/2, Virex-PC recognizes only the left ALT and CTRL
keys as the default action keys. The right ALT and CTRL keys will
not toggle the Virex-PC program or status display unless they were
specified in the installation procedure. Future versions of Virex-PC
will address this issue.
8. When configuring Virex-PC for multiple users, the Log-in option must be
specified on the Virex-PC command line (e.g., C:\VIREXPC -L) rather than in
the default Protection File as specified by the Install program. Using the
Log-in option as specified in the Install program will require that users
log in and will use the default Protection File settings. Specifying the
Log-in option on the Virex-PC command line will require that users log in
and will allow them to use their own individual protection files.
9. Your configuration file, CONFIG.SYS, should include lines to specify that
the number of buffers allocated and the number of file handles available
are each at least 30. Your CONFIG.SYS file should include the following
two lines:
BUFFERS= <n>
FILES= <n>
where <n> is 30 or greater. If your CONFIG.SYS file does not include such
lines, or if it includes such lines with <n> less than 30, you should
modify it to conform with this requirement. If the CONFIG.SYS file does
not exist, you should create a CONFIG.SYS file that includes these two
lines. Consult your DOS manual.
10 As described in the Virex-PC User's Guide, responding to any alert with a
"G" allows the program or command that created the alert to operate until
it is exited without causing any further alerts, even though the program
may take further actions that would normally create an alert. Unless you
completely trust the program that is creating an alert, you should respond
with a "Y".
11. When a DOS command takes action on a group of files by using wildcards in
the command-line arguments (for example: DEL *.*), there will be only one
alert created by Virex-PC for the command. Virex-PC examines the
Protection File for the first protected file that would cause an alert if
the command were invoked, and presents the appropriate alert if it finds
such a file. This may allow a user to delete, write to, or rename a file
with restricted access if the first protected file in the Protection File
is not protected with restricted access. Should you wish to disallow all
such actions, you should make certain that the first file listed in the
Protection File for write-protection is listed with restricted access
(P=<filename>!).
12. When running in the login mode at startup, level 1 users must have their
sleep time set to a large enough number to allow time for login. (45+
seconds is recommended.)
13. A number of new virus detectors have been added to Virex-PC since the
User's Guide was written. The following is a list of the additional
viruses that Virex-PC can detect:
Alabama
Amstrad
December 24th
Devil's Dance
Do Nothing
Eddie-2
GhostBalls
Hallochcen
MachoSoft
Mistake Boot
Number of the Beast
Oropax Music
Perfume
Pixel 1
Pixel 2
Suriv 1.01
Suriv 2.01
Suriv 3.01
Swap
Sylvia
Typo
V-Alert
Vcomm
Virus-90
W13
Yankee1
Yankee2
4096
.page