home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Chip 1997 February
/
CHIP Şubat 1997.iso
/
mmed
/
imagstor
/
validate.txt
< prev
Wrap
Text File
|
1996-01-25
|
2KB
|
63 lines
VALIDATE Version 2.0.1
QUICK COMMAND REFERENCE GUIDE
Copyright 1995 by McAfee, Inc. All Rights Reserved.
LICENSE AGREEMENT
McAfee, Inc. assumes no responsibility for damages or lost data
caused by the use or misuse of this program, including if used
in accordance with the program documentation.
Use of this program means compliance with this Agreement.
VALIDATE is a file-authentication program that you can use to check
program files for signs of tampering. VALIDATE uses two methods of
generating Cyclic Redundancy Checks (CRC's), and then displays the
information so you can compare these statistics against the "known
value" for the program files. The known value you use for validation
is usually provided by the author of the program, or you may receive
it from a trusted information database. The dual CRC checking
provides a high degree of security.
To confirm that a program file has not been tampered with, run the
VALIDATE program and then record the validation data produced.
Compare this data against the file statistisc the program author has
specified. If the information matches, most likely the program
has not been modified by anyone other than the author.
To run VALIDATE, enter the following command:
VALIDATE <path spec>
where <pathspec> is the name of a directory and file. (The wildcard
characters, "*" and "?", may be used when specifying <pathspec>.)
The VALIDATE program displays the following information:
<name of directory>
name of file (starting at row 1)
extension of file (starting at row 10)
size of file (starting at row 15)
date of file (starting at row 25)
time of file (starting at row 35)
check method 1 (starting at row 44)
check method 2 (starting at row 51)
SAMPLE TXT 12345678 01-01-80 12:01a 1A2B 3C4D
<number> file(s) have been validated.