home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hall of Fame
/
HallofFameCDROM.cdr
/
util4
/
detect31.doc
< prev
next >
Wrap
Text File
|
1990-05-01
|
4KB
|
74 lines
The Detective v3.1 Soft-Tech REGISTRATION $ 25.00
UTIL MAR90 DETECTIVE SOFT-TECH VIRUS TROJAN PROTECTION
FILES: detct31a.sdn detct31b.sdn detct31c.sdn
Complete File Tracking System
for the IBM Personal Computers and Other Compatibles
THE DETECTIVE is a program which allows a user to verify the
integrity of files on his or her PC. THE DETECTIVE works on
systems which are stand along, file servers for a network, or
nodes within a network. Changes made to critical files
(whether they are unintentional or intentional) can be
detected quickly and accurately. This all in one program not
only can detect viral infections, but also can allow the user
to quickly review critical files on the system for any
updating which may have occurred since the last review. As
the PC world grows in size, connectivity and multi-user
environments, this becomes more and more important. THE
DETECTIVE is a must for Network Administrators who need a
quick efficient way of verifying the integrity of their
system as the program allows the user to specify exactly what
drives, directories, and files that must be reviewed.
THE DETECTIVE is available in two formats. The first is as
share-ware from many public bulletin board systems. The
second is through registration by sending $25.00 for a
diskette containing the programs (see Appendix D for order
form). Registered versions of THE DETECTIVE are available on
3 1/2" and 5 1/4" diskettes.
File Tracking today is more important than ever. Take the
case of a new or inexperienced PC user inadvertently deleting
or moving a critical file. Or the case of a user getting on
the network and changing a batch file needed by other users.
Even normal updates to existing files can be important to
detect.
By invoking THE DETECTIVE on a regular basis, the operator
can request that all changes made to any (or those
designated) files, in any or all paths which have been
changed or updated since the last time THE DETECTIVE ran, be
highlighted in a concise report file. This file can be saved
for future reference as well as be printed immediately.
Another critical use of THE DETECTIVE is the ability to know
what software is being used on a specific computer. If you
are using THE DETECTIVE in a business environment and have
expensive word processors, spreadsheets, or data base
managers, and you find that the files created by these
products are not changing, you can pretty well assume that
the products are not being used very often and may wish to
reexamine the need for the software product on a specific
machine.
THE DETECTIVE essentially takes a snapshot of all specified
files in the specified paths of the specified drives. At a
later point in time you run THE DETECTIVE again telling it to
check for all differences since the last time it was run. A
report will then be created detailing all changes that had
occurred. These changes are composed of added and deleted
directories, and added, deleted, or changed files. Doing
this on a weekly basis (for example) would give you a history
of all changes made. You also have the ability to run an
unlimited number of scenarios since each scenario you define
is stored in a user defined control file. All files that are
created using this 'control file' retain the control file
name but have a different file extension. With this control,
you can let specific users track their own files in a number
of different ways while the system administrator tracks
system wide files. These are just two of many possible
variations.
(SDA format Copyright 1990 SDN Project for SDNet/Works! (sm))