home *** CD-ROM | disk | FTP | other *** search
- The Detective v3.1 Soft-Tech REGISTRATION $ 25.00
- UTIL MAR90 DETECTIVE SOFT-TECH VIRUS TROJAN PROTECTION
- FILES: detct31a.sdn detct31b.sdn detct31c.sdn
-
- Complete File Tracking System
- for the IBM Personal Computers and Other Compatibles
-
- THE DETECTIVE is a program which allows a user to verify the
- integrity of files on his or her PC. THE DETECTIVE works on
- systems which are stand along, file servers for a network, or
- nodes within a network. Changes made to critical files
- (whether they are unintentional or intentional) can be
- detected quickly and accurately. This all in one program not
- only can detect viral infections, but also can allow the user
- to quickly review critical files on the system for any
- updating which may have occurred since the last review. As
- the PC world grows in size, connectivity and multi-user
- environments, this becomes more and more important. THE
- DETECTIVE is a must for Network Administrators who need a
- quick efficient way of verifying the integrity of their
- system as the program allows the user to specify exactly what
- drives, directories, and files that must be reviewed.
-
- THE DETECTIVE is available in two formats. The first is as
- share-ware from many public bulletin board systems. The
- second is through registration by sending $25.00 for a
- diskette containing the programs (see Appendix D for order
- form). Registered versions of THE DETECTIVE are available on
- 3 1/2" and 5 1/4" diskettes.
-
- File Tracking today is more important than ever. Take the
- case of a new or inexperienced PC user inadvertently deleting
- or moving a critical file. Or the case of a user getting on
- the network and changing a batch file needed by other users.
- Even normal updates to existing files can be important to
- detect.
-
- By invoking THE DETECTIVE on a regular basis, the operator
- can request that all changes made to any (or those
- designated) files, in any or all paths which have been
- changed or updated since the last time THE DETECTIVE ran, be
- highlighted in a concise report file. This file can be saved
- for future reference as well as be printed immediately.
-
- Another critical use of THE DETECTIVE is the ability to know
- what software is being used on a specific computer. If you
- are using THE DETECTIVE in a business environment and have
- expensive word processors, spreadsheets, or data base
- managers, and you find that the files created by these
- products are not changing, you can pretty well assume that
- the products are not being used very often and may wish to
- reexamine the need for the software product on a specific
- machine.
-
- THE DETECTIVE essentially takes a snapshot of all specified
- files in the specified paths of the specified drives. At a
- later point in time you run THE DETECTIVE again telling it to
- check for all differences since the last time it was run. A
- report will then be created detailing all changes that had
- occurred. These changes are composed of added and deleted
- directories, and added, deleted, or changed files. Doing
- this on a weekly basis (for example) would give you a history
- of all changes made. You also have the ability to run an
- unlimited number of scenarios since each scenario you define
- is stored in a user defined control file. All files that are
- created using this 'control file' retain the control file
- name but have a different file extension. With this control,
- you can let specific users track their own files in a number
- of different ways while the system administrator tracks
- system wide files. These are just two of many possible
- variations.
-
- (SDA format Copyright 1990 SDN Project for SDNet/Works! (sm))