home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hall of Fame
/
HallofFameCDROM.cdr
/
util4
/
detct31a.lzh
/
REL3_1.TXT
< prev
Wrap
Text File
|
1990-03-05
|
6KB
|
155 lines
THE DETECTIVE and THE DETECTIVE LOG
Release Update Notes
March 10, 1990
=====================================================================
UPDATE SUMMARY FOR VERSION 3.1
THE DETECTIVE:
o The path name size has been changed from 64 to 128
characters. This has been done to accomodate the Novell
Netware feature that provides for path names up to 128
characters.
o The number of paths that the program can handle has been
changed from 1024 to roughly 2500. This number is variable
depending on the amount of free storage available. The
program will allocate all available memory to the table
that stores path names. With 512k free memory, this will
top out around 2500.
o The control file format has changed to provide for the
128 character path name. See below for information on the
conversion program.
THE DETECTIVE LOG:
o The B-TREE file index routines have been optimized as
promised. The indexing routines will allocate buffers
(not to be confused with DOS buffers) to store indexes
based on available memory. The more memory available,
the faster the database accesses.
o The path name size was fixed at 64 characters based on
DOS's limit. This has been increased to a maximum of
128 characters to support the Novell Netware feature
that provides for path names up to 128 characters.
o The path name size stored in the database is now
variable. When the database is first loaded or when
purging the database is done, you can (or must) specify
the length of the path. Most non-network users can get
by with a path name size of 20 to 30 characters. Users
of Novell Netware may need a path size of 64 to 128
characters depending on how their network is structered.
The programs will scan the files to determine the
minimum possible size. If a path is later encountered
that is bigger than that defined in the database, you
can reorganize the database while making the path size
larger.
For current users of our products, we have conversion programs
that will convert your current DETECTIVE LOG files and DETECTIVE
control file to their new formats. RELEASE 3.1 PROGRAMS WILL
NOT FUNCTION PROPERLY UNLESS THE FILES THEY USE AND CREATE ARE
CONVERTED!!!
The conversion programs are available free of charge from our
bulletin board service. The phone number of our BBS is
(414) 241-9125. It operates 24 hours a day, 7 days a week with
periodic down time for maintenance. Make sure to set your
communcations parameters to 9066,N,8,1.
=====================================================================
UPDATE SUMMARY FOR VERSION 3.0
Release 3.0 of "THE DETECTIVE" has had virtually no changes made.
However, THE DETECTIVE LOG has been added to the product line. The
Log feature consists of several programs written in Turbo C that
will maintain a history, for as long as you like, of all file
changes. A summary of the features in the LOG is as follows:
o Browse and search for files in history based on file name
and extension (wildcards accepted), path name (wildcards
accepted), from and to log date, additions, changes, or
deletions, and displayed in either path or file name
sequences.
o Ability to maintain comments for any file revision in
history.
o Ability to print files and optionally their comments with
the same selectivity as the browse feature.
o Graphically display disk space usage (requires a graphics
card).
o Utilities to delete old records, reorganize, and re-index
databases.
o Color and monochrome display, context sensative help, and
pop up windows for a very elegant appearance and feel.
The changes made to THE DETECTIVE were for a more gracefull exit,
nothing more. Also, release 3.0 is totaly compatible with
release 2.0. THE DETECTIVE LOG will also read files created by
release 2.0 of THE DETECTIVE. If you have not yet seen what the
LOG feature provides, you may call our bulletin board system at
(414) 241-9125, 9600,N,8,1 to download the shareware version. The
shareware version of THE DETECTIVE LOG, like THE DETECTIVE, will
not process any files in root directories.
=====================================================================
UPDATE SUMMARY FOR VERSION 2.0
Release 2.0 of "THE DETECTIVE" has been greatly enhanced to provide:
- Sub-directory inclusions and exclusions
- File tracking and CRC checking in the same run
- Multiple scenario control files
- User defined file names
- Increased limits of 1024 directories and 4096 files per
directory
- Support for an unlimited number of drives (A through Z)
- Complete network support to handle locked files
- 20% to 30% increase in speed
You should read the documentation prior to using the new version, but
since help information is displayed throughout the entry process, it
may not be necessary.
To upgrade to this release, you should run "THE DETECTIVE" (or "VIRUS
DETECTER" as it was named earlier) one last time if needed, delete all
old files, and copy the new version in its place.