home *** CD-ROM | disk | FTP | other *** search
- Virus Protection System - VIRUSAFE(tm) V7.0
- --------------------------------------------
- EliaShim (c)1996
- P.O.Box 25333, Haifa 31250, ISRAEL
- Phone: +972 4 8728899 Fax: +972 4 8729966
-
- Tel-Aviv Branch: 13 Beith Alpha Street, Phone +972 3 5628620
-
- BBS: +972 4 8423949 (28800 baud)
- E-Mail: info.eliashim.co.il
-
- WWW: www.eliashim.com
-
-
- New Features which are not Documented in the Manual:
- ==========================================
-
- New Features in ViruSafe v7.0
- -----------------------------
-
- 1. While installing the program you will have to choose between an
- evaluation or registration mode.
- If you choose the registration mode, you will have to type, during the
- installation process, the unique serial number that appears on your
- Product Registration Card.
-
- 2. The file VSWINMSG.EXE was changed and its new name is EAGENT.EXE.
- It has a new message text file named EAGENT.MSG
-
- 3. You can display the EliaShim massage agent icon in Windows by adding
- the line:
- VSwnd=1
- to the EAGENT.MSG file.
-
- 4. VS.COM supports more viruses in memory.
-
- New Features in ViruSafe v6.8
- -----------------------------
-
- All Modules have the new Memory management (VREMOVE, VC, VSMENU, PIC)
- system. If there is not enough memory to run the applications in
- conventional memory, the virus tables are swapped into XMS memory. If
- the computer does not have XMS memory, /FS=<path> will swap the
- virus tables into a temporary file.
-
-
- New Features in ViruSafe v6.7
- -----------------------------
-
- 1. WORD 6 Viruses (Macro viruses):
-
- To scan new Macro Viruses that infect WORD 6 Documents ("Concept",
- "Neuclear" etc...), select "Scan All files" (/A) in VREMOVE.
-
- or
-
- Add in VSMENU Configuration in "File Extension To Scan" - *.DOC.
- This ensures that WORD 6 documents are checked every scan.
-
-
- 2. Module VREMOVE.EXE
-
- New Error level on exit:
- 0 - If no virus.
- 1 - if virus found.
- 2 - if the virus was not removed.
-
- 3. Module VREMOVE.EXE & VC.EXE
-
-
- /QT="String" -
- Load only Virus Tables whose names start
- with "String". For example:
-
- VREMOVE /QT="AC" - check only for viruses whose
- names start with "AC*".
-
- This option is useful in case of memory shortage.
-
- /TT - Do not prompt the user during operation. Only exit with
- Error Level.
-
- New Features in version 6.6:
- ---------------------------
-
- New VS.COM switch: /WN - Do not load VSWINMSG.EXE when loading
- Windows.
-
-
- New Features in version 6.5:
- ----------------------------
-
- ViruSafe automatically installs the "ViruSafe Message Agent",
- VSWINMSG.EXE, without load= statement in WIN.INI.
-
- The VS.COM (resident filter) occupies only 10K of memory.
-
-
- New switches in version 6.4:
- ----------------------------
-
- All modules (VSMENU, VREMOVE, VC, VS, PIC) support special INI files.
- These INI files contain one line of default switches. These switches are as the ones
- in the command line.
-
- For example: VREMOVE.INI can contain: /D/N
-
- The VS.COM has special .INI files as follows:
- VS_8086.INI - contains default switches if 8086 CPU is found.
- VS_80286.INI - contains default switches if 80286 CPU is found
- VS.INI - contains default switches if 80386 or better is found
-
- VSMENU - New switches:
- /AA - Auto-install ViruSafe lines in AUTOEXEC.BAT.
- /AR - Auto-remove ViruSafe lines from AUTOEXEC.BAT.
-
- VREMOVE - New switches:
- /RP=<path> - path for report files.
-
- VS.COM was changed to handle large OXR files. The previous VS.COM cannot
- work with new OXR files!
-
-
- Installation of stand alone:
- - Ask to install ViruSafe in the first or Last line
- of the AUTOEXEC.BAT.
-
- - Automatically install VIRUSAFE for WINDOWS during prime
- installation procedure.
-
-
- New switches in version 6.2:
- ----------------------------
-
- /QS load to memory a short version of virus tables
-
- /AL do not check for diskettes in A: when ALT+CTRL+DEL is pressed
-
- /CD do not check programs when executed on the HD,
- only copy programs from other drivers to the HD.
-
- Memory management switches:
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
- /NH do not load into UMB
-
- /NE do not load into EMS
-
- /NX do not load into XMS
-
-
- ┌────────────────────────────────────────────────────┐
- │ Typing /? after any of EliaShim's programs gives │
- │ all possible switches! │
- └────────────────────────────────────────────────────┘
-
- ---------------------------------------------------------------------
-
- EliaShim Subsidiaries and International Distributors
- ++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- EliaShim is on Internet at: http://www.eliashim.com
-
- Main Office (ISRAEL)
- ==================================
- EliaShim, Ltd.
- P.O.Box 25333, Haifa 31250
- ISRAEL
- Tel: +972-4-8728899
- Fax: +972-4-8729966
- BBS: +972-4-8423949
- EMail: sales@eliashim.co.il
-
- European Office (The Netherlands)
- ==================================
- EliaShim Europe, B.V.
- Fultonbaan 52
- NL-3439 NE Nieuwegein
- Tel: +31 30 605 4747
- Fax: +31 30 605 4867
- EMail: pvruiten@eliashim.nl
-
- USA Office
- ===========
- EliaShim, Inc.
- 1 SW 129th Ave. Suite 105
- Pembroke Pines, FL 33027
- Tel: (954) 450 9611
- Fax: (954) 450 9612
- EMail: sales@eliashim.com
-
- Russian Office
- ==============
- Applied Logistics
- 5th Donezky Proyezd, 21-B
- Moscow, 117419
- Tel: (095) 955-5372
- Fax: (095) 954-7265
- EMail: apl@glas.apc.org
-
-
- EliaShim Distributors
- +++++++++++++++++++++
-
- FRANCE:
- ============
- CTI
- 30 Bd. Vital Bouhot
- F-92521 Neuilly
- Tel: +33 1 47381617
- Fax: +33 1 47382328
- EMail: security@cti.worldnet.fr
-
- BELGIUM
- ============
- Oxygen Belgium bvba
- Excelsiorlaan 36-38
- B-1930 Zaventem
- Tel: +32 70233088
- Fax: +32 27201610
-
- NORWAY:
- ============
- PDI Consult a/s
- Rosenhoiveien 40,
- N-1411 Kolbotn
- Tel: +47 66806622
- Fax: +47 66806670
- EMail: perhans@oslonett.no
-
- GERMANY:
- ============
- DataSafe International
- Bahnhofstrasse 48-50
- Postfach 1249
- D-21602 Buxtehude
- Tel: +49 4161 54367
- Fax: +49 4161 53235
- EMail: 101565.2711@compuserve.com
-
- SWITZERLAND
- ============
- Distrix Systems
- Niderreggweg 23
- CH-8605 Gutenswil
- Tel: +41 1 9971911
- Fax: +41 1 9971918
- EMail: distrix@dial.eunet.ch
-
- HUNGARY
- ============
- HUBEL
- Henguermalom Koz 4
- H-1116 Budapest
- Tel: +36 1 2042326
- Fax: +36 1 2042328
-
- SOUTH AFRICA
- ============
- Gauteng Technologies Pte Ltd.
- PoBox 1541
- Bramley 2018
- Johannesburg
- Tel: +27 11 8852960
- Fax: +27 11 8852963
- EMail: helpyou@iafrica.com
-
- PORTUGAL:
- ============
- Portugamatica
- Rua do Salitre 149, 1
- Esq.
- PT-1250 Lisboa
- Tel: +35 113161753
- Fax: +35 113520286
- EMail: portugam@mail.telepac.pt
-
- SPAIN
- ============
- Socored Seguridad
- de la Informacion SL
- C/Santa Hortensla, no 15,
- Local I
- ES-28002 Madrid
- Tel: +34 14159361
- Fax: +34 14133891
-
- CHECK REPUBLIC
- ==============
- ComFu Chech
- Safarikovy Sady 3
- 301 15 Plzen
- Tel: +42 192225062
- Fax: +42 192225062
-
- MALTA
- ===========
- DIX Co. Ltd.
- 1, Triq N. Tomasucci
- BKR 06 Birkirkara
- Tel: +356 446371
- Fax: +356 496279
- EMail: agrim@unlmt.mt
-
- POLAND
- ===========
- Highland Systems s.c.
- ul. Powstancow S1.116
- 53 333 Wroclaw
- Tel: +48 71 672455
-
- *********************************************************
-
-
- New Virus signatures that were added in this version
- ====================================================
-
- Name Infects Type
- ^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^ ^^^^^^^^^^^
- _1793.Dropper COM+EXE Resident
- AntiCAD.4096.K1 COM Resident
- AntiCAD.4096.K2 EXE Resident
- Ash.1604 COM Encrypted
- Atomic.425 COM Destructive
- Baby.83 COM+EXE Resident
- Backform.2000.A COM+EXE Resident
- Bad_Brains.554 COM Destructive
- Bandit.Dropper COM+EXE Destructive
- Bios Drop HD/DOS Boot Stealth
- Bit_Addict.477 COM Resident
- BootM2 HD/DOS Boot
- Bosnia COM+EXE Stealth
- Burglar.1150 EXE Stealth
- BW.Archer.799 COM+EXE Stealth
- Bye HD/DOS Boot Resident
- Caesar.867 COM
- Chance HD/DOS Boot Resident
- Claws.684 EXE Encrypted
- Combi.1106 COM
- Crawen EXE Destructive
- Dark_Avenger.1783 COM+EXE Resident
- Dead.1364 COM+EXE Resident
- Deinonychus.1000 COM
- Dick.1242 COM+EXE Stealth
- Entity.1997 COM+EXE Encrypted
- Exe2Win.710 EXE Destructive
- ExeHeader.NLA EXE Stealth
- Faillure.1366 COM+EXE
- Freak.847 COM
- Funky.325 COM
- Gisela.99 COM+EXE Destructive
- Hallo.749 COM
- Hallo.812 COM
- Hamlet.1144 COM
- Hemlock Boot HD/DOS Boot
- Henry.IV.857 COM
- Henry.V.735 COM
- Henry.VI.592 COM
- Henry.VIII.1263 COM
- HLL.Cookie.7392 COM+EXE
- HLLC.4768.A COM+EXE Destructive
- HLLC.EvenBeeper.A EXE Destructive
- HLLC.EvenBeeper.B EXE Destructive
- HLLC.EvenBeeper.D COM+EXE
- HLLO.4032.B COM+EXE Destructive
- Httm.112 COM Destructive
- Httm.475 COM Stealth
- Httm.80 COM Destructive
- Httm.87 COM Destructive
- Immortal.2174 EXE Stealth
- Inquisitor.625 COM Stealth
- IVP.Flipper COM+EXE Encrypted
- Kali.641 COM
- Kali.655 COM
- Kat.623 COM Resident
- Keeper.Acid COM+EXE Resident
- KingJohn.667 COM
- KingLear.917 COM
- Kobrin.489 COM
- Kobrin.491 COM
- Loves.1198 COM
- Mackbeth.753 COM
- Marzia.D COM+EXE Resident
- Marzia.D Boot HD/DOS Boot Resident
- MDS.302 COM+EXE Resident
- MegaStealth Boot HD/DOS Boot Resident
- MegaStealth.945 COM Resident
- Merchant.793 COM
- Midsummer.813 COM
- Mobius.231 COM
- MuchAdo.565 COM
- Murphy.1250.A COM+EXE Resident
- No_of_the_Beast.512 COM+EXE Stealth
- NRLG.899 COM Encrypted
- Ontario.2048 COM+EXE Stealth
- Othello.585 COM
- Parity Boot.enc HD/DOS Boot
- Pascal.3072.B COM+EXE
- Ph33r.1332 COM+EXE Resident
- PinWorm COM+EXE Encrypted
- PME.3788 COM+EXE Stealth
- Pojer.4028 COM+EXE Stealth
- Prodigy3 COM+EXE Encrypted
- Proto.720 COM Resident
- PS-MPC(?) COM+EXE Encrypted
- PS-MPC.719 COM
- PS-MPC.Abominog COM
- PS-MPC.Abx.420 COM
- PS-MPC.Polder.A COM+EXE Encrypted
- PSMPC.Draculea EXE Encrypted
- Romeo.625 COM
- Rubbit.3164 COM+EXE Stealth
- SillyC.787 COM
- SillyCR.303 COM Resident
- SillyCR.416 COM Resident
- Small COM+EXE Resident
- SMEG.Queeg COM+EXE Stealth
- SX.731 EXE Encrypted
- Tip.554 COM Stealth
- Trance.1688 COM Stealth
- Trance.1982 COM Stealth
- Trivial.Batch COM+EXE Destructive
- Turbo.846 COM+EXE Resident
- Turner.YooHoo COM+EXE Stealth
- Uruguay COM+EXE Stealth
- Valentine.2332 EXE Encrypted
- VCL.Kmee COM Encrypted
- Vienna.Bush COM+EXE
- Vinchuca COM Encrypted
- WereWolf.1208 COM+EXE Stealth
- WereWolf.1500 COM+EXE Stealth
- WereWolf.658 EXE Encrypted
- WereWolf.685 EXE Encrypted
- Win32.Vlad (BOZA) EXE
- WinWord.Butoopen COM
- WinWord.Colors COM
- WinWord.Concept COM
- WinWord.DMV COM
- WinWord.DMV_2 COM
- WinWord.Goatvir COM
- WinWord.Nemesis COM
- WinWord.Nuclear COM
- Xuxa.1656 COM+EXE Stealth
-
-
-
-
-
-
-
-
-