home *** CD-ROM | disk | FTP | other *** search
- VALIDATE Version 2.0.1
-
- QUICK COMMAND REFERENCE GUIDE
-
-
-
- Copyright 1995 by McAfee, Inc. All Rights Reserved.
-
- LICENSE AGREEMENT
-
-
- McAfee, Inc. assumes no responsibility for damages or lost data
- caused by the use or misuse of this program, including if used
- in accordance with the program documentation.
-
- Use of this program means compliance with this Agreement.
-
- VALIDATE is a file-authentication program that you can use to check
- program files for signs of tampering. VALIDATE uses two methods of
- generating Cyclic Redundancy Checks (CRC's), and then displays the
- information so you can compare these statistics against the "known
- value" for the program files. The known value you use for validation
- is usually provided by the author of the program, or you may receive
- it from a trusted information database. The dual CRC checking
- provides a high degree of security.
-
- To confirm that a program file has not been tampered with, run the
- VALIDATE program and then record the validation data produced.
- Compare this data against the file statistisc the program author has
- specified. If the information matches, most likely the program
- has not been modified by anyone other than the author.
-
- To run VALIDATE, enter the following command:
-
- VALIDATE <path spec>
-
- where <pathspec> is the name of a directory and file. (The wildcard
- characters, "*" and "?", may be used when specifying <pathspec>.)
-
- The VALIDATE program displays the following information:
-
- <name of directory>
-
- name of file (starting at row 1)
-
- extension of file (starting at row 10)
-
- size of file (starting at row 15)
-
- date of file (starting at row 25)
-
- time of file (starting at row 35)
-
- check method 1 (starting at row 44)
-
- check method 2 (starting at row 51)
-
- SAMPLE TXT 12345678 01-01-80 12:01a 1A2B 3C4D
-
- <number> file(s) have been validated.
-
-
-