; This is the ThunderBYTE Anti-Virus / Windows language file.
;
; All language-dependent information is enclosed between the rightmost pair
; of hooked brackets ('<' and '>') on a line. This rightmost block is
; separated from the other blocks by one or more spaces. You may place comments
; everywhere in the file; a line with comments starts with a semicolon (';').
; If you need to use a new line in a text block, you can specify this by
; using two '~' characters. Thus, a block like <First line~~Second line>
; will be shown on the screen like:
; First line
; Second line
;
; UNLESS YOU ARE AN EXPERIENCED USER, DO NOT ALTER THE NON-TEXT BLOCKS !!!
;
; BEFORE YOU START CHANGING THIS LANGUAGE FILE, MAKE SURE YOU HAVE A BACKUP
; OF THIS FILE !!!
;
GlobalBegin
Title <ThunderBYTE Anti-Virus Utilities for Windows V6.24>
String<1> <OK>
String<2> <Cancel>
String<3> <Abort>
String<4> <Retry>
String<5> <Ignore>
String<6> <Yes>
String<7> <No>
String<8> <Viewing commandline>
;
; The '%s' sequence in the the following two lines represents the name
; of the utility (such as TbSetup, TbScan). So make sure you use this '%s'
; sequence also !
;
String<9> <These are the disks, files or paths that %s will process when executed. You can change them if you want.>
String<10> <Executing %s>
String<11> <{Default}>
String<12> <{Internal}>
String<13> <Continue>
String<14> <Stop Scanning>
String<15> <looking...>
String<16> <checking...>
String<17> <tracing...>
String<18> <scanning...>
String<19> <skipping...>
String<20> <decrypting...>
String<21> <Information about the >
String<22> < Trojan Horse.~~This is not a virus but a Trojan Horse. It does not spread but simply causes damage. Determine the source of the file and simply delete it.>
String<23> < dropper.~~This file is not a virus, but a dropper of a virus. If you run this file it will install a virus on your system. It is highly recommended to delete the file.>
String<24> < joke.~~This file is completely innocent. It merely imitates virus activity but is actually harmless. Just delete it if you do not like it.>
String<25> < 'virus'.~~This is NOT a virus, but is detected as such because it has been identified as a virus by some independent tester and is being used in virus scanner tests. To avoid an undeserved penalty in such tests, TbScan detects this file too!>
String<26> < virus.>
String<27> <This virus is known to infect >
String<28> <COM files, >
String<29> <EXE files, >
String<30> <device drivers, >
String<31> <boot sectors, >
String<32> <but unknown variants may infect other items as well.>
String<33> <It remains resident in memory and infects/damages its victims in the background.>
String<34> <Actually, this is not just a virus, but a class of viruses. They are all created with the same tool. It is hardly possible to divide and describe all viruses created with this tool individually. Be aware of unknown side-effects. It is highly recommended to restore all files from a reliable backup.>
String<35> <The virus is polymorphic, which means that it looks different each time it infects a file. Some anti-virus products may have difficulties detecting this virus reliably. Also some false alarms may occur, especially on non-executable files.>
String<36> <The virus is encrypted using a trivial encryption scheme. There is no simple signature that can be used to find it. However, the better anti-virus scanners should not have any problems detecting this virus.>
String<37> <This is a companion virus. It does not alter existing executable files, instead it creates a new file with the same name, but with a filename extension that has a higher execution priority than the existing one. DOS will start this virus file instead of the original program. After execution, the virus executes the original program.>
String<38> <The virus is not written in assembly language, as usual, but in a high-level language. Since all components of the virus are the same as the other programs developed with the same programming language, it is difficult to detect such viruses without false alarms.>
String<39> <Because the source code of this virus is widely spread, there are many variants of this virus. It is hardly possible to divide and describe all variants individually. Be aware of unknown side-effects. It is highly recommended to restore all files from a reliable backup.>
String<40> <This virus has 'stealth' capabilities, which means that it is able to hide its presence from most people, and even virus scanners and checksummers, unless the virus has not yet been loaded in memory. It is highly recommended to boot from a clean diskette before scanning or cleaning!>
String<41> <The speaker of your PC may emit unusual sounds.>
String<42> <Unusual messages or effects may appear on the screen.>
String<43> <Unexpected system hangs may occur.>
String<44> <This virus is very obvious, and it is therefore extremely unlikely that the virus will succeed in spreading unnoticed. If you ever get it on your system, it has probably been put there intentionally! Anyway, you will find out that you have a virus immediately, even without a scanner.>
String<45> <This virus is very buggy and/or requires a special setup. It is hardly possible that the virus will ever succeed to infect another file. Therefore this virus is not a serious threat, but can be classified as a LAB virus.>
String<46> <This virus almost never appears 'in the wild'. It is very unlikely that you will ever encounter it, except in virus collections.>
String<47> <CLEANING INFORMATION:~~Before cleaning or restoring, it is HIGHLY RECOMMENDED to boot from a clean, write-protected system diskette first! This is necessary to ensure that no viruses are active in memory, and to reduce the risk that you execute an infected file by accident>
String<48> <WARNING!~~This virus is known to corrupt data files. Although the damage may not be visible immediately, the integrity of your data has been affected once this virus got active in your system. There is no other option than restoring all information from a reliable backup.>
String<49> <This virus uses an infection method which makes it impossible to remove it from the file afterwards. Part of the victim file is destroyed by the virus. Therefore you have no other option than to restore everything from a reliable backup.>
String<50> <Removing this virus is easy, just delete it!>
String<51> <The best thing to do is to restore all executable files from a backup, or to re-install them from their original disks. If speed or ease is more important than data integrity, you may attempt to separate the virus from the file with a cleaner, such as TbClean. Results are always depending on the exact virus variant you may have, on the lay-out of the victim file, and your system configuration.>
String<52> <You need to restore the original DOS bootsector and/or system files. Enter 'SYS C:' on the DOS command line. You also need to check and clean all your diskettes! Otherwise the virus will return sooner or later! You can clean the diskettes with the 'TbUtil -immunize' command.>
String<53> <You need to clean the partition code. You can do so with the DOS FDISK program ('FDISK /MBR'), or with TbUtil ('TbUtil C: -immunize'). The latter is recommended.>
String<54> <As new variants of existing viruses appear almost daily, it is possible that you will encounter a variant of this virus which will still be identified by our scanner, but behaves differently than described above. The information above is therefore intended as a basic guideline.>
String<55> <INFECTED!>
String<56> <CHANGED!>
String<57> <has been changed!>
String<58> <might be infected by an unknown virus.>
String<59> <probably infected by an unknown virus.>
String<60> <Error reading signature file>
String<61> <Error while allocating memory>
String<62> <No 'WhatsNew' files found!>
String<63> <Please specify which action you want to take!>
String<64> <BootSector>
String<65> <Master Boot Record>
String<66> <no access>
String<67> <probably>
String<68> <might be>
String<69> <infected by>
String<70> <damaged by>
String<71> <Trojan Horse>
String<72> <dropper>
String<73> <joke>
String<74> <virus>
String<75> <The scanning process is completed,>
String<76> <no executable files found!>
String<77> <no infected/changed files found.>
String<78> <some files have been infected or changed!>
; The heuristic flags
;
String<100> <Heuristic flags:>
String<101> <c No checksum / recovery information (Anti-Vir.Dat) available.>
String<102> <C The checksum data does not match! File has been changed!>
String<103> <F Suspicious file access. Might be able to infect a file.>
String<104> <R Relocator. Program code will be relocated in a suspicious way.>
String<105> <A Suspicious Memory Allocation. The program uses a non-standard way to search for, and/or allocate memory.>
String<106> <N Wrong name extension. Extension conflicts with program structure.>
String<107> <S Contains a routine to search for executable (.COM or .EXE) files.>
String<108> <# Found a code decryption routine or debugger trap. This is common for viruses but also for some copy-protected software.>
String<109> <V This suspicious file has been validated to avoid heuristic alarms.>
String<110> <E Flexible Entry-point. The code seems to be designed to be linked on any location within an executable file. Common for viruses.>
String<111> <L The program traps the loading of software. Might be a virus that intercepts program load to infect the software.>
String<112> <D Disk write access. The program writes to disk without using DOS.>
String<113> <M Memory resident code. The program might stay resident in memory.>
String<114> <! Invalid opcode (non-8088 instructions) or out-of-range branch.>
String<115> <T Incorrect timestamp. Some viruses use this to mark infected files.>
String<116> <J Suspicious jump construct. Entry point via chained or indirect jumps. This is unusual for normal software but common for viruses.>
String<117> <? Inconsistent exe-header. Might be a virus but can also be a bug.>
String<118> <G Garbage instructions. Contains code that seems to have no purpose other than encryption or avoiding recognition by virus scanners.>
String<119> <U Undocumented interrupt/DOS call. The program might be just tricky but can also be a virus using a non-standard way to detect itself.>
String<120> <Z EXE/COM determination. The program tries to check whether a file is a COM or EXE file. Viruses need to do this to infect a program.>
String<121> <O Found code that can be used to overwrite/move a program in memory.>
String<122> <B Back to entry point. Contains code to re-start the program after modifications at the entry-point are made. Very usual for viruses.>
String<123> <K Unusual stack. The program has a suspicious stack or an odd stack.>
String<124> <Y Bootsector violates IBM bootsector format. Missing 55AA-marker.>
String<125> <p Packed program. A virus could be hidden inside the program.>
String<126> <i Additional data found at end of file. Probably internal overlay.>
String<127> <h The program has the hidden or system attribute set.>
String<128> <w The program contains a MS-Windows or OS/2 exe-header.>
String<998> <Help>
;
; You can change the colors of the dialog boxes, if you don't like the default
; These colors are specified in R(ed)-G(reen)-B(lue) values:
; R G B
ColorDlgBg <224><224><224>
ColorButton <192><192><192>
ColorEdit <255><255><255>
ColorListBox<255><255><255>
ColorMsgBox <192><192><192>
ColorScrBar <192><192><192>
ColorStatic <192><192><192>
ColorText < 0>< 0>< 0>
GlobalEnd
;
; The main menu. A line of text used in the following 'MenuBegin' block,
; should contain a '&'-character. The character following this '&' character,
; denotes the key with which to access the concearend item using the keyboard.
; For example, if you specify a popup-menu with '&File', you can access this
; popup-menu, using your keyboard, with ALT+'F'. If you specify a menu item
; 'E&xit', you can access this item using the 'x' key on your keyboard.
DialogControl<12><6><275><48><1056><0x50020000><0x82> <~~The Thunderbyte Anti-Virus utilities provide a collection of sophisticated programs which offer various ways to check for, identify and remove known as well as unknown viruses from hard and floppy disks on PCs or across networks.>