home *** CD-ROM | disk | FTP | other *** search
- Program: VBase
- Version: 1.0b
- Author: George Spafford
- Date: 06/01/92
-
- Purpose:
-
- To pull McAfee Associate's VIRLIST.TXT data file into a database
- to facilitate rapid lookups.
-
- Note:
-
- This program only attempts to provide a summary. For in depth viral info,
- use Patricia Hoffman's excellent VSUM program. It is definitely the best
- source of detailed information.
-
- Operation:
-
- VBASE uses a btree ISAM method for its database functions. By pulling VIRLIST
- into this tree, and indexing on multiple keys, rapid look ups are
- accomplished. With McAfee's version 91 VIRLIST, the imported data file
- required 229,376 bytes and the VBASE.EXE file requires 104,539 bytes.
-
- VBASE.EXE VALIDATE results:
-
- File Name: vbase.exe
- Size: 104,555
- Date: 6-1-1992
- File Authentication:
- Check Method 1 - 6D79
- Check Method 2 - 0FD4
-
- Installation:
-
- VBASE must be able to locate VIRLIST.TXT in the same directory as the VBASE.EXE
- program. The first time you run VBASE, the VBASE.DAT data file will be
- automatically created because it does not exist. To update the data file in
- the future, just copy the latest version of the VIRLIST.TXT file into the
- VBASE directory and select the "Create Data File" option from the main menu.
- If you put the VBASE.EXE file in a directory that is included in your PATH
- statement, you can access it from anywhere on your drive. VBASE uses a DOS
- function to get the directory from which it executed and it then assumes that
- it will be able to find VBASE.DAT there. If it can not locate the data file,
- it will exit with an error message.
-
- ****** ATTENTION: V1.0A USERS ********
-
- Version 1.0a users - if you upgrade to 1.0b, make sure that you delete
- VBASE.DAT before you run VBASE.EXE. The data record lengths vary and you will
- get an odd message pertaining to a variable type mismatch.
-
- Using VBase:
-
- VBase can be run either from the command line or from its internal menu
- system.
-
- From the command line, you can specify either the virus name that you want to
- look up or you can specify the virus code that SCAN returns. If you specify
- the code, make sure to enclose it in brackets just as SCAN does.
-
- Examples:
-
- VBASE 405 <- Gets info on the 405 virus
-
- VBASE JERUSALEM <- Gets info on the JERUSALEM virus.
-
- VBASE [4096] <- Shows what virii use this disinfector.
- From the displayed list, you can view and/or
- print out details on each virus.
- Note how 4096 is in brackets "[4096]"
-
- By invoking VBASE by itself, you can make use of the menu system and a set
- of specialized search functions. Let's begin with the Main Menu:
-
- NAME
- CHARACTERISTICS
- SIZE
- DAMAGE CAUSED
- CREATE DATA FILE
-
- NAME
-
- This allows you to look up virii by name. Look down at the bottom of your
- screen and you will see F2 and F4. F2 toggles on/off a Soundex routine that
- allows for fuzzy name searching based on the relatively standard SOUNDEX
- algorhthym. F4 toggles on/off partial name searching. Toggle this on
- if you only know the first three letters or if you want to see all of the
- virii that begin with a certain character.
-
- CHARACTERISTICS
-
- Use this menu to search for virii that meet a certain set of characteristics.
-
- Stealth Techniques
- Self-Encryption
- Memory Resident
- Infects COMMAND.COM
- Infects .COM files
- Infects .EXE files
- Infects .OVL files
- Infects Floppy Boot
- Infects Hard Disk Boot
- Infects Hard Disk Partition
-
- Use the arrow keys to move, the space bar to tag and hit ENTER to begin the
- search process. Note, at this time, you must identically match the
- viral characteristics to find a virus. In other words, you can't look up
- all virii that infect .COM files among other things. You must specifically
- tell it what you are finding.
-
- SIZE
-
- Use this to search for virii based on how much infected program's sizes
- change in terms of bytes.
-
- DAMAGE CAUSED
-
- Use this menu to look for virii based on the damage that they cause.
-
- Corrupts/Overwrites the boot sector
- Corrupts data files
- Formats or overwrites all/part of disk
- Directly or indirectly corrupts file linkage
- Affects system run-time operation
- Corrupts program or overlay files
-
- Use the arrows to move, the space bar to tag and hit ENTER to begin the
- search process. As with the characteristics menu, you must identically
- match damage criteria in order to identify possible candidates.
-
- CREATE DATA FILE
-
- Use this to import new VIRLIST.TXT data files when you get them or use
- it to rebuild the current file if it becomes corrupted.
-
- -----------------------------
-
- When the viral name display menu comes up, use the arrow keys to move
- around on the list, ENTER to view the detailed information for that virus
- or ESC to exit back one step (If you keep hitting ESC, you will return to
- DOS). When you are viewing the detail information, F3 will print the info
- to LPT1 and if you want a form feed, hit F3 again or any other key if you do
- NOT want a form feed.
-
- REGISTRATION
-
- If you find this program to be useful, please register it within
- 30 days of its initial use. If you continue to use it after this
- period of time, you are violating your license to use it. Only
- by registering the program can you legally continue to use it.
- And only by registering your copy can I continue to develop shareware
- programs such as this.
-
- VBASE is priced at $10 per concurrently used copy. Site licenses are
- available based on the number of machines that will use it on the site
- concurrently.
-
- Please send payments in American funds to (please no cash):
-
- George Spafford
- 3001 Lakeshore Drive #329
- St. Joseph, MI 49085
-
- Queued Access BBS 19200-8-N-1 ANSI (616) 468-5026
- Sysop: Tim Akright NEC/NC
-
- If you have any comments or suggestions, I'd really like to hear them
- too. I try to respond to all of my mail.
-
-
- SHAREWARE DISTRIBUTORS:
-
- You may distribute this program as long as it is made clear that you are
- only a distributor and that the program is not registered until they make
- payment to me. Please do not charge more than $5 per disk to distribute
- VBASE to your customers (unless of course VBASE is on a CDROM with 100's of
- other programs).
-
-
- ::::: Legal :::::
-
- VBASE IS DISTRIBUTED AS IS. THE AUTHOR (GEORGE SPAFFORD) MAKES
- NO WARRANTIES OF APPROPRIATENESS, MERCHANTABILITY OR FITNESS FOR A
- PARTICULAR PURPOSE. THE AUTHOR ASSUMES NO LIABILITY FOR ANY DAMAGES
- (INCLUDING LOST PROFITS, WAGES OR ANY OTHER CONSEQUENTIAL OR INCIDENTAL
- DAMAGES) ARISING OUT OF THE MISUSE OR INABILITY TO USE THIS PRODUCT PACKAGE.
-
-
- VIRLIST.TXT, VIRUSCAN, CLEAN-UP are all trademarks of McAfee Associates.
- VSUM is the copyright of Patricia Hoffman.
-