home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-03-16 | 42.0 KB | 1,078 lines |
- SCAN Reference Copyright 1994 McAfee Inc. Page 1
-
- VirusScan REFERENCE
-
- VirusScan's Scan program detects, identifies, and
- disinfects more than 2,600 known DOS computer
- viruses. Scan checks memory and both the system
- and data areas of disks for virus infections. If
- Scan finds a known virus, in most cases it will
- eliminate the virus and fully restore infected
- programs or system areas to normal operation.
-
- The SCAN.DAT file that accompanies Scan lists all
- viruses that Scan identifies and removes. Use Scan
- with the /VIRLIST option to see a list of these
- viruses.
-
- In addition, Scan can also assign validation and
- recovery codes to files, and use those codes to
- detect and treat infection by new and unknown
- viruses. If Scan has stored validation or recovery
- data for files, it may detect file changes and
- warn that infection by an unknown virus may have
- occurred. Scan can also use the recovery codes to
- remove new or unknown viruses and restore infected
- files, master boot record (MBRs), and boot
- sectors.
-
- Scan runs on DOS, Windows, and OS/2. The program
- files are SCAN.EXE, WSCAN.EXE, and OS2SCAN.EXE,
- respectively.
-
- Because OS/2 operates in a protected mode
- environment, Scan for OS/2 does not check memory.
- To protect against viruses in OS/2 DOS and Win-
- OS/2 sessions, use the VShield (for DOS) virus
- prevention program.
-
- DO YOU NEED TO READ THIS DOCUMENT?
-
- Many users will not need the Scan command line
- options described in details here. We have
- designed Scan so that basic operations will detect
- most viruses in your system. The command line
- options described here offer additional power and
- control over virus detection. They enable you to
- run Scan from batch or script files, and are most
- useful in vulnerable environments and to network
- administrators and information services staff.
- SCAN Reference Copyright 1994 McAfee Inc. Page 2
-
- SYSTEM REQUIREMENTS AND SUPPORT
-
- Scan requires DOS 3.0 or later, Windows 3.1 or
- later, or IBM OS/2 Version 2.0 or later. Running
- Scan for DOS with command line options requires
- 360Kb of free RAM.
-
- Scan works with 3Com 3/Share and 3/Open, Artisoft
- LanTastic, AT&T StarLAN, Banyan VINES, DEC
- Pathworks, IBM LAN Server, Microsoft LAN Manager,
- Novell NetWare, and any other IBMNET- or NETBIOS-
- compatible network operating systems. Contact
- McAfee or your local authorized agent if you do
- not see your network listed.
-
- Scan is designed to check for pre-existing
- infections of known and unknown viruses on floppy,
- hard, CD-ROM, and compressed (SuperStor, Stacker,
- Doublespace, and so on) disks on both stand-alone
- and networked personal computers, as well as
- network file servers. If you have a Novell
- NetWare/386 V3.1X or 4.01 file server, you may
- want to use the NETShield virus prevention
- NetWare Loadable Module in conjunction with Scan.
-
- To use Scan to clean up (disinfect) virus-infected
- files, the CLEAN.DAT file must be present in the
- same subdirectory as Scan. If you don't have the
- CLEAN.DAT file, first verify whether you should
- contact your system administrator or information
- systems staff directly for virus clean-up.
- Otherwise, you can contact McAfee.
-
- TECHNICAL OVERVIEW
-
- KNOWN VIRUS DETECTION
-
- Scan detects known viruses by searching the system
- for known characteristics (sequences of code)
- unique to each computer virus and reporting their
- presence if found. For viruses that encrypt or
- cipher their code so that every infection is
- different, Scan uses detection algorithms that
- work by statistical analysis, heuristics, and code
- disassembly.
-
- NEW AND UNKNOWN VIRUS DETECTION
-
- Scan can also check for new or unknown viruses by
- comparing files against previously recorded
- validation data. If a file has been modified, it
- SCAN Reference Copyright 1994 McAfee Inc. Page 3
-
- will no longer match the validation data, and Scan
- will report that the file may have become
- infected. With certain options, Scan /CLEAN can
- use the validation and recovery data to restore
- infected files, master boot records (MBRs), or
- boot sectors.
-
- NOTE TO NETWORK USERS
-
- To use Scan on a network drive (or directory), you
- must be connected to that drive and have read
- access to it. Some command line options attempt to
- create, change, and delete files. To use these
- options, you must have sufficient access rights.
- If you have questions about access rights, contact
- your network administrator.
-
- VALIDATING SCAN
-
- The Scan program in your VirusScan package is
- supplied on a write-protected diskette (notchless)
- that should be secure from infection. We recommend
- that you update your copy of the VirusScan
- programs regularly. You can obtain an upgrade from
- several sources.
-
- Before using a new version of Scan for the first
- time, verify that it has not been tampered with or
- infected by using the Validate program. If your
- new copy of Scan differs from the validation data
- in the on-line documentation file, it may have
- been damaged. Don't use it, and obtain a clean
- copy of Scan from a known source.
-
- Scan performs a self-check when it runs. If Scan
- has been modified in any way, a warning appears
- and asks you whether to continue or quit. Scan may
- be infected. If you choose to continue, Scan can
- still check for viruses but may spread the
- infection. Therefore, if Scan reports that it has
- been damaged, we recommend that you quit, and then
- obtain a clean copy before continuing.
-
- Running Scan from the command line
-
- Scan checks files and other areas of the system
- that can contain computer viruses. When a virus is
- found, Scan identifies the virus and the system
- area or file where it was found.
-
- By default, Scan examines all files on a system.
- Once you've installed VirusScan and have
- SCAN Reference Copyright 1994 McAfee Inc. Page 4
-
- established a "sterile field", you might not need
- to scan every file on your system again, just the
- executable files (.EXE, .COM, .SYS, .BIN, .OVL,
- and .DLL files). Use the /STD option to scan
- executable files only. (Note that the list of
- extensions for standard executables has changed
- from previous versions of Scan.)
-
- From DOS or OS/2, you can run Scan from the system
- prompt. (From OS/2, open the Command Prompts
- folder in the OS/2 system folder, then choose OS/2
- Full Screen or OS/2 Window to see the system
- prompt.) The syntax is:
-
- DOS C> scan {drives} [options]
-
- OS/2 [C:\] os2scan {drives} [options]
-
- * {drives} indicates one or more drives to be
- scanned. You must specify one or more drives to
- scan. If you list a drive like c:, all of its
- subdirectories will be scanned. If you list \,
- only the root directory and boot area of the
- current disk will be scanned. If you list \ or a
- directory, its subdirectories will not be scanned
- unless you use the /SUB option.
-
- * [options] indicates one or more of the Scan
- options listed in "Scan command line option
- summary."
-
- SCAN COMMAND LINE OPTION SUMMARY (DOS-OS/2)
-
- /? or /HELP
-
- Display help screen (not available in Windows, use
- Help menu instead).
-
- /ADL
-
- Scan all local drives.
-
- /ADN
-
- Scan all network drives.
-
- /AF {filename}
-
- Store validation/recovery codes in filename.
- SCAN Reference Copyright 1994 McAfee Inc. Page 5
-
- /AV
-
- Add validation/recovery data to program files.
-
- /BOOT
-
- Scan boot sector and master boot record only.
-
- /CF {filename}
-
- Check validation/recovery codes in filename.
-
- /CLEAN
-
- Clean up infections in boot sector, master boot
- record, and files when possible.
-
- /CV
-
- Check validation/recovery data in files.
-
- /DEL
-
- Overwrite and delete infected files.
-
- /EXCLUDE {filename}
-
- Exclude from scan any files listed in filename.
- (with /AV).
-
- /FAST
-
- Speed up VirusScan's scanning; may detect fewer
- viruses.
-
- /HISTORY
-
- Append, rather than overwrite, the report file
- (/REPORT).
-
- /LOAD {filename}
-
- Use Scan settings stored in filename.
- SCAN Reference Copyright 1994 McAfee Inc. Page 6
-
- /LOG
-
- Save date and time VirusScan was last run in
- SCAN.LOG.
-
- /MOVE {directory}
-
- Move infected files to directory.
-
- /NOMEM
-
- Skip memory checking (not applicable to OS/2).
-
- /PAUSE
-
- Enable screen pause.
-
- /PLAD
-
- Preserve last access dates on network drives in a
- Novell network.
-
- /REPORT {filename}
-
- Create report of infected files found during scan
- in filename.
-
- /RF filename
-
- Remove validation/recovery codes in filename.
-
- /RPTCOR
-
- Add list of corrupted files to the report file
- (/REPORT).
-
- /RPTERR
-
- Add list of system errors to the report file
- (/REPORT).
-
- /RPTMOD
-
- Add list of modified files to the report file
- (/REPORT).
-
- /RV
-
- Remove validation/recovery data from files.
-
- /SHOWLOG
-
- Display information in SCAN.LOG.
- SCAN Reference Copyright 1994 McAfee Inc. Page 7
-
- /STD
-
- Scan executable files only (COM, EXE, SYS, BIN,
- OVL, DLL)
-
- /SUB
-
- Scan subdirectories inside a directory.
-
- /VIRLIST
-
- Display list of viruses stored in SCAN.DAT
-
- SCAN OPTION DESCRIPTIONS
-
- Here is a detailed description of Scan's options.
-
- /? or /HELP
-
- Display list of Scan options
-
- Does not scan. Instead, displays a list of Scan
- command line options with a brief description of
- each. Use these options alone on the command line.
-
- /ADL
-
- Scan all local drives
-
- Scans all local drives for viruses, in addition to
- those specified on the command line. In DOS, use
- /ADL to check all local drives, including
- compressed drives and CD-ROMs. To scan both local
- and network drives, use /ADL and /ADN together in
- the same command line.
-
- /ADN
-
- Scan all network drives
-
- Scans all network drives for viruses, in addition
- to those specified on the command line. To scan
- both local and network drives, use /ADL and /ADN
- together in the same command line.
-
- /AF filename
-
- Store validation/recovery codes in file
-
- Helps you detect and recover from new or unknown
- viruses. /AF logs validation and recovery data for
- executable files, boot sector, and master boot
- record (MBR) of a disk in the file you specify.
- SCAN Reference Copyright 1994 McAfee Inc. Page 8
-
- The log file is about 95 bytes per file validated.
- You must specify a filename, which can include the
- target drive and directory (such as
- D:\VSVALID\VALCODES.VSC). If the target path is a
- network drive, you must be able to create and
- delete files in that drive. If filename exists,
- Scan updates it. The /AF option adds about 300%
- more time to scanning.
-
- To exclude self-modifying or self-checking files
- that might cause false alarms, use the /EXCLUDE
- option. To recover from a virus using the /AF
- information, use the /CF and /CLEAN options
- together in the same command line. Using any of
- the /AF, /CF, or /RF options together in the same
- command line returns an error.
-
- /AF performs the same function as /AV, but stores
- its data in a separate file rather than changing
- the executable files themselves.
-
- /AV
-
- Add validation/recovery data to files
-
- Helps you detect and recover from new or unknown
- viruses. /AV adds recovery and validation data to
- each standard executable file (.EXE, .COM, .SYS,
- .BIN, .OVL. and .DLL), increasing the size of each
- file by 98 bytes. To update files on a shared
- network drive, you must have update access rights.
- The /AV option adds about 100% more time to
- scanning.
-
- To exclude self-modifying or self-checking files
- that might cause false alarms, use the /EXCLUDE
- option. To recover from a virus using the /AF
- information, use the /CV and /CLEAN options
- together in the same command line. Using any of
- the /AV, /CV, or /RV options together in the same
- command line returns an error.
-
- /BOOT
-
- Scan boot sector and master boot record only
- SCAN Reference Copyright 1994 McAfee Inc. Page 9
-
- Scans the boot sector and master boot record on
- the specified drive(s), but not files or
- directories on those drives.
-
- /CF filename
-
- Check validation/recovery codes in file
-
- Helps you detect new or unknown viruses. Checks
- validation data stored by
-
- the /AF option in filename. If a file or system
- area has changed, Scan reports that a viral
- infection may have occurred. The /CF option adds
- about 250% more time to scanning. You can use /CF
- and /CLEAN in the same command line to check
- validation/recovery codes and remove any viruses
- found. Using any of the /AF, /CF, or /RF options
- together in the same command line returns an
- error.
-
- Some older Hewlett-Packard and Zenith PCs modify
- the boot sector each time the system is booted. If
- you use /CF or /CV, Scan will continuously report
- that the boot sector has been modified even though
- no virus may be present. Check your system's
- technical reference manual to determine whether
- your PC has self-modifying boot code, or contact
- McAfee for help.
-
- OS/2 dual boot systems change the boot sector
- between DOS and OS/2 depending on which operating
- system is active. This causes Scan to report that
- the boot sector has been modified.
-
- /CLEAN
-
- Remove viruses from boot sector, master boot
- record, and infected files
-
- Attempts to restore the boot sector, if infected,
- and any infected files. Usually, between 10% and
- 20% of all viruses are not removable; they damage
- the file they infect beyond repair. If the
- infected file resides on a network drive, you must
- be able to modify files on that drive to clean it.
- If it cannot restore a file, you'll see a message
- that identifies the name of the unrecoverable
- file. To use /CLEAN, the CLEAN.DAT file must
- reside in the Scan directory.
-
- Use /CLEAN instead of /DEL when you want to
- restore infected files, not just delete or
- SCAN Reference Copyright 1994 McAfee Inc. Page 10
-
- overwrite them. The /CLEAN option can remove
- master boot record (MBR) and boot sector viruses,
- but the /DEL option cannot. If you use /CLEAN and
- /DEL in the same command line, Scan first attempts
- to disinfect an infected file, then deletes it
- only if it cannot be repaired. Similarly, if you
- use /CLEAN and /MOVE in the same command line,
- Scan attempts first to clean an infected file,
- then moves it automatically if the file is
- unrecoverable.
-
- You can use /CLEAN and /CF or /CV in the same
- command line to check validation/recovery codes
- and remove any viruses found. We strongly
- recommend that you get experienced help in dealing
- with viruses if you are unfamiliar with anti-virus
- software and methods. This is especially true for
- "critical" viruses and master boot record
- (MBR)/boot sector infections, because improper
- removal of these viruses can result in the loss of
- all data on the infected disks.
-
- When scanning a network drive using /CLEAN, you
- must have sufficient rights to update files on
- that drive.
-
- /CV
-
- Check validation/recovery data in files
-
- Helps you detect new or unknown viruses. Checks
- validation data added by the /AV option. If a file
- is modified, Scan reports that a viral infection
- may have occurred. The /CV option adds about 50%
- more time to scanning. You can use /CLEAN and /CV
- or /CF in the same command line to check
- validation/recovery codes and restore infected
- files. Using any of the /AV, /CV, or /RV options
- together in the same command line returns an
- error.
-
- /DEL
-
- Overwrite and delete infected files
-
- Deletes and overwrites each infected file. Files
- erased by the /DEL option cannot be recovered
- (generate a report so that you can restore them
- from backups). Instead of /DEL alone, we recommend
- using it in combination with the /CLEAN option to
- attempt to disinfect an infected file first, then
- delete it only if the file is unrecoverable. The
- /CLEAN option can remove master boot record and
- SCAN Reference Copyright 1994 McAfee Inc. Page 11
-
- boot sector viruses, but the /DEL option cannot.
-
- When scanning a network drive using /DEL, you must
- have sufficient access rights to delete files on
- that drive.
-
- /EXCLUDE filename
-
- Scan using exception list file
-
- Allows you to exclude files from /AF or /AV
- validation. Self-modifying or self-checking files
- can cause a false alarm during a scan. To create
- filename, see "Creating an exception list"
-
- /FAST
-
- Speed up VirusScan's scanning
-
- Reduces Scan time by about 15%. Using the /FAST
- option, Scan examines a smaller portion of each
- file for viruses, although it examines more files
- overall. Using /FAST might miss some infections
- found in a more comprehensive (but slower) scan.
- Do not use this option if you have found a virus
- or suspect one.
-
- /HISTORY
-
- Append to the report file.
-
- Used in conjunction with /REPORT, appends the
- report message text to the specified report file,
- if it exists. Otherwise, the /REPORT option
- overwrites the specified report file, if it
- exists.
-
- /LOAD {filename}
-
- Use Scan settings stored in filename.
-
- By default, Scan loads its internal default
- settings plus any options specified on the command
- line. You can store all custom settings in a
- separate ASCII text file, then use /LOAD to load
- SCAN Reference Copyright 1994 McAfee Inc. Page 12
-
- those settings from that file.
-
- /LOG
-
- Save date and time of last scan
-
- Stores the time and date Scan is being run by
- updating or creating a file called SCAN.LOG in the
- current directory.
-
- /MOVE {directory}
-
- Move infected files to directory
-
- Moves all infected files found during a scan to
- the specified directory. If you use /MOVE in
- conjunction with /CLEAN, Scan attempts to restore
- an infected file first, then moves it to the
- specified directory only if the file cannot be
- restored. Using /MOVE and /DEL in the same
- command line returns an error message.
-
- /NOMEM
-
- Skip memory checking
-
- Reduces scan time by omitting all memory checks
- for viruses. Use /NOMEM only when you are
- absolutely certain that your system is virus-free.
-
- By default, Scan checks system memory for critical
- known computer viruses that can inhabit memory. In
- addition to main memory from 0Kb to 640Kb, Scan
- checks system memory from 640Kb to 1088Kb that can
- be used by computer viruses on 286 and later
- systems. Memory above 1088Kb is not addressed
- directly by the processor and is not presently
- susceptible to viruses.
-
- /NOMEM is not applicable to OS/2.
-
- /PAUSE
-
- Enable screen pause
-
- If you specify /PAUSE, the More? (H = Help) prompt
- appears when Scan fills up a screen with messages.
- Otherwise, by default, Scan fills and scrolls a
- screen continuously without stopping, which allows
- Scan to run on PCs with severe infections without
- requiring you to attend. We recommend that you
- omit /PAUSE when keeping a record of Scan's
- messages using the report options (/REPORT,
- SCAN Reference Copyright 1994 McAfee Inc. Page 13
-
- /RPTCOR, /RPTMOD, and /RPTERR), or when using the
- /SHOWLOG or /VIRLIST options.
-
- /PLAD
-
- Preserve last access dates (on NetWare drives only).
-
- Prevents changing the last access date attribute
- for files stored on a network drive in a Novell
- network. Normally, NetWare updates the last access
- date when Scan opens and examines a file. However,
- some tape backup systems use this last access date
- to decide whether to back up the file. Use /PLAD
- to ensure that the last access date does not
- change as the result of scanning.
-
- /REPORT {filename}
-
- Create report of infected files and system errors
-
- Saves the output of Scan to filename in ASCII text
- file format. If filename exists, /REPORT erases
- and replaces it. You can include the destination
- drive and directory (such as D:\VSREPRT\ALL.TXT),
- but if the destination is a network drive, you
- must be able to create and delete files on that
- drive. You can also use /RPTCOR, /RPTMOD, and
- /RPTERR to add corrupted files, modified files,
- and system errors to the report.
-
- /RF filename
-
- Remove validation/recovery codes in file
-
- Removes recovery and validation data from filename
- created by the /AF option. If filename resides on
- a shared network drive, you must be able to delete
- files on that drive. Using any of the /AF, /CF, or
- /RF options together in the same command line
- returns an error.
-
- /RPTCOR
-
- Add corrupted files to Scan report
-
- Used in conjunction with /REPORT, adds the names
- of corrupted files to the report file. A corrupted
- file is a file that a virus has damaged beyond
- repair, which typically occurs in 10% to 20% of
- all viral infections. You can use /RPTCOR with
- /RPTMOD and /RPTERR on the same command line.
- SCAN Reference Copyright 1994 McAfee Inc. Page 14
-
- /RPTERR
-
- Add errors to Scan report
-
- Used in conjunction with /REPORT, adds system
- errors to the report file. System errors include
- problems reading or writing to a diskette or hard
- disk, file system or network problems, problems
- creating reports, and other system-related
- problems. You can use /RPTERR with /RPTCOR and
- /RPTMOD on the same command line.
-
- /RPTMOD
-
- Add modified files to the Scan report
-
- Used in conjunction with /REPORT, adds the names
- of modified files to the report file. Scan
- identifies modified files when the
- validation/recovery codes do not match (using the
- /CF or /CV options). You can use /RPTMOD with
- /RPTCOR and /RPTERR on the same command line.
-
- /RV
-
- Remove validation/recovery from files
-
- Removes validation and recovery data from files
- validated with the /AV option, along with the
- SCAN.LOG file on the specified drive. To update
- files on a shared network drive, you must have
- access rights to update them. Using any of the
- /AV, /CV, or /RV options together in the same
- command line returns an error.
-
- /SHOWLOG
-
- Display the contents of SCAN.LOG
-
- Shows you the date and time of previous scans that
- have been recorded in the SCAN.LOG file using the
- /LOG switch. The SCAN.LOG file contains text and
- some special formatting.
-
- /STD
-
- Scan executable files only (COM, EXE, SYS, BIN,
- OVL, and DLL)
-
- Reduces scan time when a full scan is not needed.
- Otherwise, Scan checks all files on the drive
- scanned and examines files in greater detail,
- which increases Scan's ability to detect viruses
- SCAN Reference Copyright 1994 McAfee Inc. Page 15
-
- in overlay files but substantially increases the
- scanning time required. Do not use this option if
- you have found a virus or suspect one. (The list
- of extensions for standard executables has changed
- from previous releases of VirusScan.)
-
- /SUB
-
- Scan subdirectories
-
- By default, when you specify a directory to scan
- rather than a drive, Scan will examine only the
- files it contains, not its subdirectories. Use
- /SUB to scan all subdirectories inside any
- directories you've specified. Do not use /SUB if
- you are scanning an entire drive.
-
- /VIRLIST
-
- Display the contents of SCAN.DAT
-
- Shows you the name and a brief description of the
- viruses that VirusScan detects.
-
- EXAMPLES
-
- These examples show different option settings. In
- OS/2, remember to use OS2SCAN instead of SCAN.
-
- scan c:
-
- Scan all executable files on drive C.
-
- scan f:
-
- Scan drive F, a network drive.
-
- scan c: /adl /adn
-
- Scan all local and network drives.
-
- scan f: g: h: /del
-
- Scan all files on drives F, G, and H, and delete
- any infected files found.
-
- scan c: d: e: /av
-
- Scan for viruses in all files and add
- validation codes to executable files on drives C,
- D, and E.
- SCAN Reference Copyright 1994 McAfee Inc. Page 16
-
- scan m: /report a:infectn.rpt /rptcor /rpterr
-
- Scan for viruses on network drive M: and
- create a log file of infections, corruptions, and
- errors in the file INFECTN.RPT on drive A.
-
- scan e:\user\jake e:\user\daisy e:\user\nick /sub
-
- Scan all subdirectories inside the directories
- USER\JAKE, USER\DAISY, and USER\NICK on drive E.
-
- scan c: d: e: /fast /cv
-
- Quickly scan drives C, D, and E, and report any
- executable files that do not have validation
- codes.
-
- scan c:\command.com
-
- Scan a single file.
-
-
- ERRORLEVELS
-
- This section is primarily for network
- administrators and information systems staff.
-
- After Scan has finished running, it sets the DOS
- ERRORLEVEL. You can use the ERRORLEVEL in
- AUTOEXEC.BAT to take different actions based on
- the results of the scan. See your DOS
- documentation for more information.
-
- Scan returns the following DOS ERRORLEVELs:
-
- <<Error levels to come>>
-
- APPLICATION NOTE 1
-
- UPDATING VALIDATION CODES
-
- If you install any new software or programs on
- your system, including a new version of DOS, and
- are running Scan or VShield with the /CF
- (preferred) or /CV -validation options, you need
- to install validation codes for the new files with
- Scan's /AF (preferred) or /AV options.
-
- The quickest way to update the validation codes is
- to remove all validation codes from the hard disk
- and then add them back. In other words, first run
- Scan with the /RF or /RV option, then run it again
- with the /AF or /AV option.
-
- SCAN Reference Copyright 1994 McAfee Inc. Page 17
-
- APPLICATION NOTE 2
-
- REFORMATTING INFECTED DISKETTES WITH DOS 5.0 AND
- LATER
-
- When reformatting infected diskettes using DOS 5.0
- and later versions, be sure to add the /U switch
- to the FORMAT command. This tells DOS to do an
- unconditional format of the diskette, without
- saving the original infected boot sector. This is
- necessary to erase certain infections, and will
- prevent reinfection by unformatting the diskette.
-
- TECHNICAL NOTE 1
-
- CREATING AN EXCEPTION LIST FILE FOR THE /EXCLUDE
- OPTION
-
- If you set up validation codes using Scan's /AF or
- /AV options, subsequent scans using the /CF or /CV
- options will detect changes in executable files.
- This can generate false alarms if the executable
- files are self-modifying or self-checking (most
- programs that do this will tell you to turn off
- your anti-virus software before running them; some
- of these files are listed below). Therefore, use
- the /EXCLUDE option in conjunction with /AF or /AV
- to identify such files and exclude them from the
- validation.
-
- The exception list is an ASCII or DOS text file.
- If you use a word processor to create it, be sure
- to save the file as ASCII or DOS Text. Each
- uncommented line in the file contains the path and
- file name of one file that should not be
- validated. Here is an example:
-
- C:\CLIPPER\BIN\CLIPPER.EXE
-
- C:\123\123.COM
-
- C:\FOX\FOXPROLX.EXE
-
- C:\DOS\SETVER.EXE
-
- C:\PKWARE\PKLITE.EXE
-
- C:\PKWARE\PKZIP.EXE
-
- C:\PKWARE\PKUNZIP.EXE
-
- C:\SEMWARE\Q.EXE
-
- SCAN Reference Copyright 1994 McAfee Inc. Page 18
-
- C:\SWAPVOL.COM
-
- C:\WORDSTAR\WS.EXE
-
- CLEANING VIRUSES
-
- Although /CLEAN removes many viruses and restores
- normal operation, viruses can be harmful and
- insidious, and no anti-virus program can undo all
- their damage. Usually, between 10% and 20% of all
- viruses corrupt the files they infect, making them
- unrecoverable. If the file is infected with an
- uncommon virus that /CLEAN can't remove, Scan
- notifies you and identifies the filename. Write
- down this filename so that you can restore it from
- a backup diskette or tape. If you use both the
- /CLEAN and the /DEL options, Scan will first
- attempt to repair an infected file and, if the
- file is damaged beyond repair, Scan will delete
- it. Deleted files are not recoverable except from
- backups.
-
- Some viruses damage or overwrite program (.EXE)
- files or overlay files. Removing the virus can
- truncate the file or otherwise render it
- inoperable. Others, like the common virus Stoned,
- infect the master boot record (MBR). On systems
- partitioned with programs other than DOS (such as
- Disk Manager and SpeedStor), removing the virus
- can cause loss of the master boot record (MBR) and
- all data on the disk if done improperly.
-
- BASIC PRINCIPLES TO MINIMIZE DAMAGE
-
- These considerations lead to the three important
- principles:
-
- 1 Before running Scan with the /CLEAN option, back
- up all of your programs and data.
-
- Of course, this works best if you back up
- regularly, so that you can restore from a backup
- made before your system was infected. But even a
- backup from an infected system can be useful for
- restoring data, because most viruses do not
- corrupt data. If a program no longer runs after
- being cleaned, replace it from the original disk
- or from a virus-free backup.
-
- When disinfecting an infected system, it is
- important to start from a "sterile field."
-
- 2 Before running Scan with the /CLEAN option for
- SCAN Reference Copyright 1994 McAfee Inc. Page 19
-
- DOS, restart your computer from a clean, write-
- protected diskette.
-
- Before running Scan with the /CLEAN option for
- OS/2, close all DOS and Win-OS/2 sessions.
-
- Preferably, use a clean anti-virus start-up
- diskette. And, because running any program can
- spread the infection:
-
- 3 Do not run any programs, including Windows,
- before running Scan /CLEAN.
-
- Run Scan /CLEAN from DOS instead of Windows. Exit
- completely from DOS. Do not run Scan /CLEAN from
- within a DOS window.
-
- Important: If you are at all unsure about how to
- proceed once you've found a virus, contact McAfee
- technical support, or your local authorized agent,
- for assistance.
-
- We strongly recommend that you get experienced
- help in dealing with viruses if you are unfamiliar
- with anti-virus software and methods. This is
- especially true for "critical" viruses and master
- boot record (MBR)/boot sector infections, because
- improper removal of these viruses can result in
- the loss of all data and use of the infected
- disks.
-
- RUNNING SCAN TO CLEAN UP INFECTIONS
-
- PREPARATION
-
- Before running Scan to clean up infections:
-
- 1 Clear the virus from system memory and prevent
- reinfection:
-
- * With DOS, turn off your PC, then restart from a
- clean start-up diskette, preferably the anti-virus
- diskette you prepared during installation.
-
- * With OS/2, close all DOS and Win-OS/2 sessions.
-
- * With an OS/2 dual-boot system infected by a boot
- sector virus (like Form, or others identified by
- Scan), boot (start up) OS/2 first, delete the
- BOOT.DOS file from the \OS2 directory, and then
- boot DOS to create a new, virus-free DOS boot
- sector file.
-
- SCAN Reference Copyright 1994 McAfee Inc. Page 20
-
- 2 Run the Scan program to locate and identify the
- infections.
-
- 3 Back up the files on the infected disks (be sure
- not to overwrite any previous backups).
-
- 4 Repeat Step 1.
-
- 5 Don't run any programs, including Windows,
- before running Scan /CLEAN. If you have Windows,
- run Scan /CLEAN from DOS.
-
- 6 When disinfecting a hard disk, always run Scan
- /CLEAN from a write-protected diskette to prevent
- infection of the Scan program. When disinfecting
- diskettes, make sure there is no active virus in
- memory before running Scan from your hard disk.
-
- SUCCESSFUL AND UNSUCCESSFUL RESULTS
-
- Scan /CLEAN reports the results of its attempt to
- remove the virus from each infected file. If a
- file has several infections, it will report on
- each.
-
- If viruses were not removed, contact technical
- support
-
- If Scan can't remove a virus, you'll see a message
- like:
-
- Virus cannot be safely removed from this file.
-
- Make sure to take note of the file name, because
- you will need to restore it from backups. If you
- have any questions about how to proceed, contact
- McAfee technical support or your local authorized
- agent.
-
- If viruses were safely removed, rescan and check
- diskettes
-
- If Scan /CLEAN has successfully removed all the
- viruses, turn your computer off again and restart
- from the system disk. Scan your hard disks again
- to make sure they are virus-free. If you suspect
- that your system was infected from a diskette, run
- Scan from your hard disk to examine and disinfect
- the diskettes you use.
-
- CREATING A CUSTOM SETTINGS FILE
-
- When you run the Scan program, Scan uses its own
- internal default settings plus any options listed
- in the command line. You can create an ASCII text
- file to contain the settings you want to run with
- Scan, then load the settings using the /LOAD
- option.
-
- Your VirusScan package includes sample settings
- files that you can copy and change, using a DOS
- text editor, to suit your needs. The <<filename>>
- file contains the following text: <<sample to come>>
-
- <<end of text file>>
-
-
-
-
-
-
-
-