home *** CD-ROM | disk | FTP | other *** search
- VALIDATE Version 2.0.1
-
- QUICK COMMAND REFERENCE GUIDE
-
-
-
- Copyright 1993, 1994 by McAfee, Inc. All Rights Reserved.
-
-
-
-
- Brought to you by:
-
- Igor Grebert Project Leader
- Jivko Koltchev Lead Programmer
- David Mai TSR Programmer
- Vadim Ivanov Algorithms/Emulation Programmer
- Tatyana Shishkina Virus Librarian, Programmer
- Bruce de Graaf GUI Programmer
- Dmitri Orlov DOS UI Programmer
- Geoff Brandenburg GUI Artist
- Spencer Clark SQA Manager
- David Pierce Lead SQA Engineer
- Sean Birch SQA Engineer
- John Zussman Documentation Project Leader
- Eric Ivory Technical Writer
- Aryeh Goretsky Documentation Review
-
- With special thanks to Bob Chappelear, Rudite Emir, and Bill Larson
-
- ---------------------
- | LICENSE AGREEMENT |
- ---------------------
-
- McAfee, Inc. assumes no responsibility for damages or lost data
- caused by the use or misuse of this program, including if used
- in accordance with the program documentation.
-
- Use of this program means compliance with this Agreement.
-
-
- VALIDATE is a file-authentication program that may be used to check
- other programs for signs of tampering. VALIDATE uses two discrete
- methods to generate Cyclic Redundancy Checks (CRC's), which are then
- displayed for the user to compare against the known value for the
- program(s) validated. The known validation data can be published by
- the author of the program or be obtained from a trusted information
- database. The dual CRC checking provides a high degree of security.
-
- To confirm that a program is in its original, untampered state,
- run the VALIDATE program on it, record the validation data produced,
- and compare it against the record in the online database. If they
- match, than it is highly improbable that the program has been modified.
-
- To run VALIDATE, type:
-
- VALIDATE <path spec>
-
- where <pathspec> is the name of a file or directory. The wildcard
- characters, "*" and "?", may be used when specifying <pathspec>/
-
- The VALIDATE program will then display the following information:
-
- <name of directory>
-
- name of file (starting at row 1)
- |
- | extension of file (starting at row 10)
- | |
- | | size of file (starting at row 15)
- | | |
- | | | date of file (starting at row 25)
- | | | |
- | | | | time of file (starting at row 35)
- | | | | |
- | | | | | check method 1 (starting at row 44)
- | | | | | |
- | | | | | | check method 2 (starting at row 51)
- | | | | | | |-------------------------------------
- | | | | | |--------------------------------- |
- | | | | |-------------------------- | |
- | | | |------------------ | | |
- | | |---------- | | | |
- | |------- | | | | |
- | | | | | | |
- V V V V V V V
- SAMPLE TXT 12345678 01-01-80 12:01a 1A2B 3C4D
-
- <number> file(s) have been validated.
-
-
-
-