home *** CD-ROM | disk | FTP | other *** search
Text File | 1997-11-02 | 29.6 KB | 1,224 lines |
- What's New in VirusScan for Windows 3.1x v3.1.2a (3009a)
- Copyright 1994-1997 by McAfee Associates, Inc.
- All Rights Reserved.
-
-
- Thank you for using McAfee's VirusScan for Windows 3.1x.
- This What's New file contains important information
- regarding the current version of this product. It is
- highly recommended that you read the entire document.
-
- McAfee welcomes your comments and suggestions. Please
- use the information provided in this file to contact us.
-
- ___________________
- WHAT'S IN THIS FILE
-
- - New Features
- - Known Issues
- - Installation
- - Documentation
- - Frequently Asked Questions
- - Contact McAfee
-
- ____________
- NEW FEATURES
-
- 1. VirusScan detects unknown macro viruses by using
- heuristic scanning technology. Unknown macro viruses
- are reported as "PROBABLE MACRO VIRUSES."
-
- 2. VirusScan is able to detect and clean macro virus
- infections in password-protected Microsoft Excel 95
- files without disturbing passwords.
-
- 3. VirusScan now has the ability to detect macro virus
- infections in password-protected German, French,
- Dutch, Italian, and Japanese Microsoft Word 95
- (Word 7.0) files.
-
- 4. VirusScan is designed to respect users' passwords
- and leave them intact as often as possible. Viruses
- that infect Word files, however, sometimes plant
- their own passwords. When VirusScan is instructed to
- clean a password-protected file, it will take one
- of two actions:
-
- A. If the macro virus cannot plant its own password:
- VirusScan notes the infection but will not clean it.
-
- B. If the macro virus can plant its own password:
- VirusScan cleans the file, removing the password
- along with the virus.
-
-
- * NEW VIRUSES DETECTED *
-
- This DAT file, 3009a, is compatible with VirusScan's
- v3.x engines only. This DAT file is not intended for
- use with VirusScan v2.x products.
-
- This DAT file detects the following 293 new viruses.
- Locations that have experienced particular problems
- with specific viruses are also identified.
-
- _1600
- ABCD
- AK.251
- ALEX.A:TW(INTENDED)
- ALEX.B:TW(INTENDED)
- ALEX.C/D:TW(INTENDED)
- ALEX.E:TW(INTENDED)
- ALIEN.259
- ALIEN.298
- ALIEN.304
- ALIEN.374
- ALIEN.G
- ANAK.B
- ANAK.C
- ANDRY.3791 (COM)
- ANT.C:TW (*)
- ANT.D:TW (*)
- APPARITION.1248
- APPARITION.700
- APPDER.J
- ARCHER.A
- ARCHER.B
- ARME.411
- ARME.414
- AWARE.1292
- BANDUNG.AZ
- BANDUNG.BA
- BATTYBUG.187
- BEDA.883
- BEDA.1301
- BLIN.1457
- BMBB.766
- CAP.K
- CAP.M
- CAP.Z
- CAP.AA
- CAP.AB
- CAP.AC
- CAP.AD
- CAP.AE
- CAP.AF
- CAP.AG
- CAP.AH
- CAP.AI
- CAP.AJ
- CAP.AK
- CAP.AL
- CAP.AM
- CAP.AN
- CEASE.382
- CHEAT.A
- CHEAT.B
- CHOLERA.2415
- CLOCK.J:DE
- CLOCK.K:DE
- CLOCK.L:DE
- COLORS.BO
- COLORS.BP
- COMPANION.5808
- CONCEPT.BF
- CONCEPT.BI
- CONCEPT.BJ
- CONCEPT.BK
- CONCEPT.BK1
- CONCEPT.BL
- CONCEPT.BM
- CONCEPT.BN
- COUNT10.E
- CRUZ.CMP.8262
- DARK.E
- DARK_ELF.2200
- DBF.990
- DENZUK-NAPOL
- DISHONOR.A:DE (*)
- DIVINA.I
- DMV.F
- DMV.G
- DREPO.2493
- DZT.D
- DZT.G
- EDDIE.565
- EDDIE.1093
- ELCON.374
- ELCON.424
- ELYTHNIA
- ENVIRONM.6752
- FACADE.B
- FATTY.3012
- FIRE.A:DE (*)
- FLI2MOD (TROJAN)
- FLOYD.1546 (Hong Kong)
- FLU.1160
- FORMATS.A (TROJAN) (*)
- FOUR.A
- FOUR.A (*)
- FRIDAY.E:DE
- GENESIS (TROJAN)
- GETTO.2000
- GLITTER.1462
- GLUP.403
- GLUP.404
- GOODNIGHT.C
- GROG.1349
- GYRO.OW.512
- HACKERZ.709
- HAFENSTRASSE.1641
- HEADACHE.269B
- HEADER.A
- HIAN
- HIDEOUS.1024.A
- HIDEOUS.1024.B
- HIDEOUS.1024.C
- HIDEOUS.1024.D
- HITMAN.A
- HLL.7336
- HLL.CMP.16052 (*)
- HLLO.17690.A
- HLLP.5850.E
- HLLP.5904
- HLLP.FECI.6000
- HONGKANG.1904
- HYBRID.I
- HYBRID.J
- ISLAND.3551
- IVP.VIVEK.924
- JOHNNY.O
- JOHNNY.O1
- KEYB.298
- KEYB.299
- KHIZHNJAK.494
- KHIZHNJAK.780A
- KHIZHNJAK.780B
- KOH-INSTALL
- KOMPU.E (*)
- KONKOOR
- LAHYANI.1381
- LAPIDARIO.766
- LIBERTY.2857.D (EXE)
- LICENTIOUS.1024
- LILITH
- LILO.1573
- LOADER.TCS (TROJAN)
- LOZ.684
- LOZ.724
- LPSK.OW.554
- LUCY.B
- LUNAR.A
- MACARONI.B:DE
- MALARIA.A:TW (*)
- MANZON.1404.DR
- MESS.A
- MINIMAD.322
- MINIMAD.340
- MINIMAD.345
- MINIMAD.346
- MINIMAD.347
- MINIMAD.349
- MINIMAD.349B
- MINIMAD.350
- MINIMAD.352
- MINIMAD.353
- MINIMAD.361
- MINIMAD.361B
- MINIMAD.385
- MINIMAD.386
- MINIMAD.388
- MINIMAD.407
- MINIMAL.S
- MKC_BOOT
- MORPHINE.3500
- MPC.LIATA.337
- MUCK.I
- MUCK.J
- MUCK.K
- MUCK.L
- MUCK.M
- MUCK.N
- NAZI.8600
- NICEDAY.N
- NIKNAT.A
- NJ-WMDLK1.G
- NOIEMBRIE.610
- NOP.M:DE (*)
- NOP.N
- NPAD.CT
- NPAD.CU
- NPAD.CV
- NPAD.CW
- NPAD.CX
- NPAD.CY
- NPAD.CZ
- NPAD.DA
- NUMIN.902
- NUTCRACKER.AB2 (BOOT)
- NUTCRACKER.MP.BOOT
- OBAY.A
- OBLOM.A
- OBLOM.C
- OBLOM.E
- OMINOUS.1846
- ORHEY.A
- P0P.2694
- PALMA
- PAYCHECK.F
- PAYCHECK.G
- PERCENT.A:TW (*)
- PESAN.B (US)
- PH33R.1418
- PHILE.204
- PIG.F:TW
- PITER.529
- POW
- POWERPUMP.CMP.A
- POXVAR.A
- POXVAR.B
- PREDATOR.1879
- PYSK.2464
- QBOOTDR76.VCS
- RADYU.274
- RADYU.278
- RADYU.332
- RADYU.333
- RAZER.A (*)
- REPLICATOR
- RICKDOGG (TROJAN)
- ROSEANNE.INTENDED.241
- RSM.A
- RUBIX.421
- RUBIX.422A
- SAILOR.B
- SAM.B:TW
- SCHUMANN.B (*)
- SCHUMANN.C:DE
- SCREW.A
- SHIFTER.760
- SHIN
- SHY.1603
- SHY.1608
- SOCKS.A
- SORPREN.1536 (Brasil)
- SPY.A
- STOOPID.353
- SUN.8176
- SUNSET (TROJAN)
- SUPERSTITION.A
- SVS.A
- SWAT.A (TROJAN)
- SWLABS.G (*) (US Military)
- TANGLE.378
- TEAR.B
- TEMPLE.A
- TEMPLE.H
- TMC.5036
- TWNO.A:TW (Word97) (Taiwan)
- VAMPIRE.E:TW
- VAMPIRE.F:TW
- VAMPIRE.I:TW
- VANITAS.2048 (Texas)
- VD.253
- VICISSIT.A
- WALLY.1029
- WANT.A:TW
- WAZZU.CG
- WAZZU.CH
- WAZZU.CI
- WAZZU.CM
- WAZZU.CN
- WAZZU.CO
- WAZZU.CP
- WAZZU.CQ
- WAZZU.CR
- WAZZU.CS
- WAZZU.CT
- WAZZU.CU
- XAVIER.367
- XM/DON.A (INTENDED)
- XM/HIT.A
- XM/HIT.B
- XM/HIT.D
- XM/LAROUX.H
- XM/LAROUX.J
- XM/LAROUX.K
- XRCE.664
- ZAHAK.960
- ZANY.225
- ZANY.253
- ZANY.270
- ZANY.292B
- ZANY.298
- ZANY.300
- ZANY.793
- ZANY.INTENDED.160
- ZUCA.677
-
- (*) Mistakenly included in the 3008a What's New list.
-
-
- * NEW VIRUSES CLEANED *
-
- This DAT file cleans the following 238 new viruses.
- Locations that have experienced particular problems
- with specific viruses are also identified.
-
- ABCD
- AK.251
- ALEX.A:TW(INTENDED)
- ALEX.B:TW(INTENDED)
- ALEX.C/D:TW(INTENDED)
- ALEX.E:TW(INTENDED)
- ALIEN.259
- ALIEN.298
- ALIEN.304
- ALIEN.374
- ALIEN.G
- ANAK.B
- ANAK.C
- ANT.C:TW (*)
- ANT.D:TW (*)
- APPDER.J
- ARCHER.A
- ARCHER.B
- ARME.411
- ARME.414
- AWARE.1292
- BANDUNG.AZ
- BANDUNG.BA
- BATTYBUG.187
- CAP.K
- CAP.M
- CAP.Z
- CAP.AA
- CAP.AB
- CAP.AC
- CAP.AD
- CAP.AE
- CAP.AF
- CAP.AG
- CAP.AH
- CAP.AI
- CAP.AJ
- CAP.AK
- CAP.AL
- CAP.AM
- CAP.AN
- CHEAT.A
- CHEAT.B
- CLOCK.J:DE
- CLOCK.K:DE
- CLOCK.L:DE
- COLORS.BO
- COLORS.BP
- COMPANION.5808
- CONCEPT.BI
- CONCEPT.BJ
- CONCEPT.BK
- CONCEPT.BK1
- CONCEPT.BL
- CONCEPT.BM
- CONCEPT.BN
- COUNT10.E
- CRUZ.CMP.8262
- DARK.E
- DENZUK-NAPOL
- DISHONOR.A:DE (*)
- DIVINA.I
- DMV.G
- DZT.G
- EDDIE.1093
- EDDIE.565
- ELCON.374
- ELCON.424
- ELYTHNIA
- ENVIRONM.6752
- FACADE.B
- FIRE.A:DE (*)
- FLOYD.1546 (Hong Kong)
- FORMATS.A (TROJAN) (*)
- FOUR.A (*)
- FRIDAY.E:DE
- GOODNIGHT.C
- GLUP.403
- GLUP.404
- HAFENSTRASSE.1641
- HEADACHE.269B
- HEADER.A
- HIAN
- HIDEOUS.1024.A
- HIDEOUS.1024.B
- HIDEOUS.1024.C
- HIDEOUS.1024.D
- HITMAN.A
- HLL.CMP.16052 (*)
- HLLP.5850.E
- HLLP.5850.E(PASS2)
- HYBRID.I
- HYBRID.J
- HONGKANG.1904
- JOHNNY.O
- JOHNNY.O1
- KEYB.298
- KEYB.299
- KHIZHNJAK.494
- KHIZHNJAK.780A
- KHIZHNJAK.780B
- KOH-INSTALL
- KOMPU.E (*)
- LAHYANI.1381
- LIBERTY.2857.D (EXE)
- LICENTIOUS.1024
- LILITH
- LILO.1573
- LOZ.684
- LOZ.724
- LUCY.B
- LUNAR.A
- MACARONI.B:DE
- MALARIA.A:TW (*)
- MESS.A
- MINIMAD.322
- MINIMAD.340
- MINIMAD.345
- MINIMAD.346
- MINIMAD.347
- MINIMAD.349
- MINIMAD.349B
- MINIMAD.350
- MINIMAD.352
- MINIMAD.353
- MINIMAD.361
- MINIMAD.361B
- MINIMAD.385
- MINIMAD.386
- MINIMAD.388
- MINIMAD.407
- MINIMAL.S
- MKC_BOOT
- MPC.LIATA.337
- MUCK.I
- MUCK.J
- MUCK.K
- MUCK.L
- MUCK.M
- MUCK.N
- NICEDAY.N
- NIKNAT.A
- NJ-WMDLK1.G
- NOIEMBRIE.610
- NOP.M:DE (*)
- NOP.N
- NPAD.CT
- NPAD.CU
- NPAD.CV
- NPAD.CW
- NPAD.CX
- NPAD.CY
- NPAD.CZ
- NPAD.DA
- NUMIN.902
- NUTCRACKER.AB2 (BOOT)
- OBAY.A
- OBLOM.A
- OBLOM.C
- OBLOM.E
- ORHEY.A
- PAYCHECK.F
- PAYCHECK.G
- P0P.2694
- PALMA
- PERCENT.A:TW (*)
- PESAN.B
- PHILE.204
- PIG.F:TW
- POW
- POXVAR.A
- POXVAR.B
- PREDATOR.1879
- QBOOTDR76.VCS
- RADYU.274
- RADYU.278
- RADYU.332
- RADYU.333
- (RAPI.AL2)
- RAZER.A (*)
- REPLICATOR
- RSM.A
- RUBIX.421
- RUBIX.422A
- SAILOR.B
- SAM.B:TW
- SCHUMANN.B (*)
- SCHUMANN.C:DE
- SCREW.A
- SHIN
- SOCKS.A
- SORPREN.1536 (Brazil)
- SPY.A
- STOOPID.353
- SUN.8176
- SUPERSTITION.A
- SVS.A
- SWLABS.G (*) (US Military)
- TEAR.B
- TMC.5036
- TWNO.A:TW (Word97) (Taiwan)
- VAMPIRE.E:TW
- VAMPIRE.F:TW
- VAMPIRE.I:TW
- VANITAS.2048 (Texas)
- VD.253
- VICISSIT.A
- WALLY.1029
- WANT.A:TW
- WAZZU.CG
- WAZZU.CH
- WAZZU.CI
- WAZZU.CM
- WAZZU.CN
- WAZZU.CO
- WAZZU.CP
- WAZZU.CQ
- WAZZU.CR
- WAZZU.CS
- WAZZU.CT
- WAZZU.CU
- XAVIER.367
- XM/DON.A (INTENDED)
- XM/HIT.A
- XM/HIT.B
- XM/HIT.D
- XM/LAROUX.H
- XM/LAROUX.J
- XM/LAROUX.K
- XRCE.664
- ZANY.225
- ZANY.253
- ZANY.270
- ZANY.292B
- ZANY.298
- ZANY.300
- ZANY.793
- ZUCA.677
-
- (*) Mistakenly included in the 3008a What's New list.
-
- ____________
- KNOWN ISSUES
-
- 1. When creating an Emergency Disk, in some cases,
- additional drivers must be loaded in order to access a
- driver specific hard drive (i.e. a compressed drive).
- Before modifying the Emergency Disk, please refer to
- your hard disk documentation for additional information
- on creating a boot disk.
-
- 2. If password protection is set for VShield or any
- scan task, when an associated program is launched, you
- will be prompted to verify the password. You must use
- the mouse to click in the text field to enter the
- password or click on cancel to exit. Keyboard strokes
- are not functional. This is a Microsoft issue as stated
- in Microsoft's Knowledge Base Article ID #Q84133.
-
- 3. If Move Infected File is selected on the Actions page,
- infected files will be moved to the directory specified.
- If the Windows Copy command fails during this procedure,
- a zero byte file size stamp may be left in the destin-
- ation directory when carrying out the Copy command.
-
- 4. The CTRL+C and CTRL+BREAK option to break out of DOS
- applications in a DOS window is disabled when you
- install VirusScan. This is to prevent a host of issues
- that would be caused by CTRL+C and CTRL+BREAK interfer-
- ing with VShield activity. Consequently, if a DIR
- command is executed in a DOS window, and then a CTRL+C
- or a CTRL+BREAK is executed, the DIR display will not
- be canceled and an incorrect DIR display may result.
-
- 5. If VShield detects an infected file that is decompress-
- ing in a DOS session and the DOS session is terminated,
- VShield as well as Pkunzip and any other program being
- run from the DOS window will be discontinued. Although
- the VShield icon will still be displayed in the Taskbar,
- VShield will be disabled. VShield must be re-enabled by
- restarting Windows to maintain maximum virus protection.
-
- 6. If the product is uninstalled while VirusScan
- (Scan16.exe) or the VirusScan Console (AVConsol.exe)
- are open, some files may not be removed (i.e.
- Scan16.exe, Mcscan16.dll, Mcgui16.dll, AVConsol.exe).
- If you try to delete the McAfee\Viruscan directory
- before restarting Windows, error messages will appear
- stating that the files are being used by Windows. Close
- all VirusScan related programs, excluding VShield,
- before uninstalling VirusScan.
-
- 7. The conversion utility preserves the scan targets
- but does not preserve the command-line parameters.
- When custom profiles include command-line parameters,
- the resulting task (.VSC file) will have one or more
- invalid scan items that will need to be manually
- updated.
-
- Command-line parameters in scan tasks must be manually
- added. Pre-existing profiles (.PRF files) will be moved
- to the target installation directory for reference
- purposes.
-
- 8. When scheduling multiple scan tasks through the
- VirusScan console, ensure that task schedules do not
- overlap. If the schedules overlap, only the first task
- will be implemented and tasks scheduled thereafter will
- be ignored.
-
- 9. If the AVCONSOLE.INI file is deleted and then recreated
- upon launching the AV Console, the default Scan16 task
- will change from "Scan Drive C" and "All Drives" to
- "VirusScan."
-
- 10. When the DEFAULT.VSC or DEFAULT.VSH files are renamed
- or deleted, VirusScan or VShield creates a new default
- file upon launch. The new default file is set to limit
- the size of the log file to 10KB and the Compressed
- option will be selected.
-
- 11. If you experience difficulties cleaning infected files
- with VirusScan for Windows, exit Windows and use
- SCAN.EXE or SCANPM.EXE, which are included in this
- product.
-
- ____________
- INSTALLATION
-
- * INSTALLING THE PRODUCT *
-
- 1. Take one of the following steps:
-
- - If you are installing from diskette or compact disc,
- insert the VirusScan for Windows 3.1x installation
- diskette or the CD-ROM.
- - If you are installing from files downloaded from a BBS
- or the McAfee website, decompress the zipped files
- into a directory on your local drive or the network.
-
- 2. Select Run from the File menu.
-
- 3. If you are installing from diskette, type: x:\SETUP.EXE
- (where x is the drive that contains the diskette).
- Click OK.
-
- If you are installing from compact disc, type:
- x:\win3x\SETUP.EXE (where x is the drive that contains
- the CD-ROM). Click OK.
-
- If you are installing from downloaded files, type:
- x:\path\SETUP.EXE (where x:\path is the location of the
- files). Click OK.
-
- 4. Follow the on-screen installation instructions to
- complete VirusScan installation.
-
-
- * PERFORMING A SILENT INSTALLATION *
-
- To perform a "silent" installation of this product,
- with minimal user interaction and with all default or
- "Typical" installation settings, add -s (i.e., SETUP.EXE -s)
- to the setup command when you install the product.
-
- Network administrators can customize the silent
- installation feature by following these steps:
-
- 1. Check the Windows directory to ensure that a
- file named SETUP.ISS does not already exist. If
- one does, rename it, back it up, or delete it.
-
- 2. Run SETUP.EXE with the -r switch, (i.e.,
- SETUP.EXE -r).
-
- 3. Select the components you want to install
- during the silent installation. Your choices will
- be recorded.
-
- 4. Finish the installation.
-
- Result: A SETUP.ISS file is created in the Windows
- directory that has your installation options recorded.
- Use this file to install all product files to the same
- installation directory on every client machine.
-
- The .ISS file specifies the installation directory under
- the [SdSetupType-0] header, szDir parameter, which was
- recorded in step 3. This overrides the default
- installation directory on each client machine, which
- might vary according to operating system. Having the
- same directory name on every client helps to ease
- administration in the future; for example, you might
- assign all client machines the directory C:\ANTIVIRUS.
-
- Note: If, however, you want to allow SETUP.EXE to
- determine where to locate the installed files, modify
- the SETUP.ISS file so that the target machine will
- disregard the szDir, as follows:
-
- A. Locate the section [SdSetupType-0] in the
- SETUP.ISS file and go to the line: Result = xxx.
- The actual value will most likely be 301, 302,
- or 303, depending on what options you selected
- durin the ISS file creation process.
-
- B. Add 100 to this number so that, for example, 301
- becomes 401. This tells each target machine to
- disregard the szDir and assign a directory according
- to its own particular operating system.
-
- 5. Copy the installation files onto a local or mapped
- drive; then rename, back up, or delete the SETUP.ISS
- file.
-
- Note: You cannot perform a silent install from
- multiple media because the silent operation will be
- compromised when the install prompts the user for
- more media.
-
- 6. Copy the new SETUP.ISS from the Windows directory
- to the location of the installation files.
-
- Note: The file used for the silent installation,
- SETUP.ISS, is product-specific. For example, you
- cannot use a SETUP.ISS file created by a
- VirusScan for Windows 95 installation for a
- VirusScan for Windows NT installation.
-
- 7. Run SETUP.EXE with the -s switch (i.e.,
- SETUP.EXE -s).
-
- Note: If you do not specify a "recorded" answer for
- all dialog boxes during the initial installation, the
- silent installation will fail.
-
- 8. When the silent installation is complete, the machine
- reboots automatically.
-
-
- * PRIMARY PROGRAM FILES FOR VIRUSSCAN FOR WINDOWS 3.1x *
-
- Files located in the Install directory:
- =======================================
-
- 1. Installed for VShield/DOS/VirusScan:
-
- README.1ST = License and registration
- information
- CLEAN.DAT = Virus clean definition data
- NAMES.DAT = Virus names definition data
- SCAN.DAT = Virus scan definition data
- VALIDATE.EXE = McAfee file validation program
- WCMDR.EXE = Windows Commander program
- MCFDU.EXE = McAfee floppy disk utility
- (for Zenith machines only)
- PRF2VSC.EXE = Conversion utility program
- CONFIG.EXE = VirusScan configuration
- program
- SETBROWS.EXE = Set browser program
- INETWH16.DLL = Library files
- INETWH32.DLL = Library files
- MCGUI16.DLL = VirusScan Console library file
- WCMDR.INI = Windows Commander configuration
- settings
- WCMDRSIL.INI = unInstallShield helper
- configuration
- DEISL1.ISU = Uninstall file
- PACKING.LST = Packing list
- WHATSNEW.TXT = What's New document
- RESELLER.TXT = McAfee authorized agents
-
-
- 2. Installed for VShield:
-
- MCKRNL16.DLL = Tools library
- MCUTIL16.DLL = Run-time support library
- CONFIG.EXE = VShield Configuration Manager
- VSHWIN.EXE = VShield on-access engine
- CHKVXD.EXE = VShield virtual device driver
- checking utility
- UNVSHVXD.EXE = Virtual device driver
- UNVSHVXD.INI = Initialization file
- DEFAULT.VSH = Default VSH settings
-
-
- 3. Installed for DOS:
-
- EDISK.EXE = Emergency Disk creation utility
- EDISK.SCR = Emergency Disk file
- EDAT.1 = Emergency Disk data file
- EDAT.2 = Emergency Disk data file
- EDAT.3 = Emergency Disk data file
- EDAT.4 = Emergency Disk data file
- EDAT.5 = Emergency Disk data file
- EDAT.6 = Emergency Disk data file
- EMCLEAN.DAT = Emergency Disk virus clean
- definition data
- EMNAMES.DAT = Emergency Disk virus names
- definition data
- EMSCAN.DAT = Emergency Disk virus scan
- definition data
- GETREPLY.EXE = Emergency diskette program component
- SCAN.EXE = MS-DOS scan program
- SCANPM.EXE = Protected mode scanner
-
- 4. Installed for VirusScan:
-
- AVCONSOL.EXE = VirusScan console program
- SCAN16.EXE = VirusScan for Windows 3.1x
- on-demand scanner
- VIRLIST16.EXE = Virus List program
- MCSCAN16.DLL = Library files
- SCAN16.HLP = VirusScan for Windows 3.1x
- online help
- AVCONSOL HLP = VirusScan Console online help
- AVCONSOL.INI = VirusScan console
- configuration file
- DEFAULT.VSC = Default VSC settings
- INETWH16.DLL = Internet library help file
- INETWH32.DLL = Internet library help file
-
- Files located in WINDOWS\SYSTEM directory:
- ==========================================
-
- 1. Installed for VShield/VirusScan:
-
- CTL3D.DLL = 16-bit 3D Windows controls
- library (*)
- CTL3DV2.DLL = 32-bit 3D Windows controls
- library (*)
-
- (*) File will be installed upon installation of VirusScan
- if it does not already exist, or if an older version
- is found.
-
-
- 2. Installed for VShield:
-
- MCFSHOOK.386 = File system hook
- MCKRNL.386 = Scan engine device driver
- MCSCAN32.386 = Scan engine device driver
- MCUTIL.386 = Utility device driver
- VSHIELD.386 = VShield device driver
-
-
- * TESTING YOUR INSTALLATION *
-
- The Eicar Standard AntiVirus Test File is a combined effort
- by anti-virus vendors throughout the world to come up with
- one standard by which customers can verify their anti-virus
- installations. To test your installation, copy the following
- line into its own file and name it EICAR.COM.
-
- X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
-
- When done, you will have a 69- or 70-byte file.
-
- When VirusScan is applied to this file, it will report
- finding the EICAR-STANDARD-AV-TEST-FILE virus.
-
- It is important to know that THIS IS NOT A VIRUS. However,
- users often have the need to test that their installations
- function correctly. The anti-virus industry, through the
- European Institute for Computer Antivirus Research, has
- adopted this standard to facilitate this need.
-
- Please delete the file when installation testing is
- completed so unsuspecting users are not unnecessarily
- alarmed.
-
-
- * MANUALLY UNINSTALLING VIRUSSCAN *
-
- McAfee recommends using VirusScan's uninstall program
- provided. You can access the McAfee Uninstall icon from
- the McAfee VirusScan program group. If, however, the
- uninstall program (WCMDR.EXE) is not present on
- your system, follow the instructions outlined below to
- manually uninstall VirusScan.
-
- 1. Edit the AUTOEXEC.BAT file:
-
- 1. From the File menu, select Run and type SYSEDIT
- in the space provided. Click Okay.
- 2. Remove VirusScan from the path statement. The
- default path is C:\MCAFEE\VIRUSCAN.
-
- 2. In the SYSTEM.INI file, remove the following lines:
-
- device=MCSCAN32.386
- device=MCUTIL.386
- device=MCKRNL.386
- device=MCFSHOOK.386
- device=VSHIELD.386
-
- 3. Remove the following lines from the WIN.INI file:
-
- 1. After LOAD =, remove all references to VirusScan.
- The default line is C:\MCAFEE\VIRUSCAN\VSHWIN.EXE.
-
- 2. Remove [VIRUSCAN] WSCAN=C:\McAfee\VIRUSCAN\
- SCAN16.EXE.
-
- 3. Delete VirusScan icons and the McAfee VirusScan
- program group from Windows in the Program Manager.
-
- 4. Exit Windows and reboot your system.
-
- 5. When Windows comes back up, open the File Manager
- and delete the McAfee directory.
-
- _____________
- DOCUMENTATION
-
- For more information, refer to the User's Guide, included
- on the CD-ROM versions of this program or available
- from McAfee's BBS and FTP site. This file is in Adobe
- Acrobat Portable Document Format (.PDF) and can be viewed
- using Adobe Acrobat Reader. This form of electronic
- documentation includes hypertext links and easy navigation
- to assist you in finding answers to questions about your
- McAfee product.
-
- Adobe Acrobat Reader is available on CD-ROM in the ACROREAD
- subdirectory. Adobe Acrobat Reader also can be downloaded
- from the World Wide Web at:
-
- http://www.adobe.com/Acrobat/readstep.html
-
- VirusScan documentation can be downloaded from McAfee's BBS
- or the World Wide Web at:
-
- http://www.mcafee.com
-
- For more information on viruses and virus prevention,
- see the McAfee Virus Information Library, included on
- the CD-ROM version of this product or available from
- McAfee's BBS and FTP site. A ViaGraphix Interactive
- Anti-virus Training program also is available on the
- CD-ROM version, or can be purchased from the McAfee
- website.
-
- __________________________
- FREQUENTLY ASKED QUESTIONS
-
- Regularly updated lists of frequently asked questions
- about McAfee products also are available on McAfee's
- BBS, website, and CompuServe and AOL forums.
-
-
- Q: What is the Parameters field of the Task Properties
- page used for?
-
- A: The field is provided to take to take advantage of
- command-line parameters for programs other than
- VirusScan. For example, a NotePad.exe task could
- be set to open a file by entering the filename
- (i.e., Whatsnew.txt) in the parameter field.
-
-
- Q: How can I create an Emergency Disk after VirusScan
- installation?
-
- A: You can create an Emergency Disk after installation by
- double-clicking the Emergency Disk Creation Utility icon
- in your McAfee VirusScan program group.
-
-
- Q: When I have an infected file, why does the infected
- counter increase by increments greater than one?
-
- A: The file system will typically access a file more than
- once. On each access, VirusScan scans the file and
- detects the infection.
-
-
- Q: Can I continue to use VirusScan for Windows 3.1x on my
- system after upgrading to Windows 95?
-
- A: VirusScan for Windows 3.1x can run on a Windows 95
- system; however, many key components, including VShield,
- will not be functional. If you upgrade your system to
- Windows 95, you should also upgrade your VirusScan
- software to VirusScan for Windows 95. As a licensed
- VirusScan user, you can upgrade your software for free.
- See your license agreement or contact your Network
- Administrator for details.
-
-
- Q: Does VShield detect Word Macro infections?
-
- A: Yes. VShield detects and cleans Word Macro infections.
-
-
- Q: Can I update VirusScan's data files to detect new
- viruses?
-
- A: Yes. If you have Internet access, you can download
- updated VirusScan data files from the McAfee website,
- BBS, or other online resources. To download
- from the McAfee Web Site, follow these steps:
-
- 1. Go to the McAfee website (http://www.mcafee.com).
-
- 2. Select Update DAT File in the left hand column
- or frame.
-
- 3. Scroll down and click Download DAT File - FREE to
- update your virus definition files.
-
- 4. Data file updates are stored in a compressed form
- to reduce transmission time. Unzip the files into
- a temporary directory, then copy the files to the
- appropriate directory, replacing your old files.
-
- 5. Before performing any scans, shut down your
- computer, wait a few seconds, and turn it on again.
-
- If you need additional assistance with downloading,
- contact McAfee Download Support at (408) 988-3832.
-
- ______________
- CONTACT McAFEE
-
- * FOR QUESTIONS, ORDERS, PROBLEMS, OR COMMENTS *
-
- Contact McAfee's Customer Care department:
-
- 1. Corporate-licensed customers, call (408) 988-3832
- Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time
-
- Retail-licensed customers, call (972) 278-6100
- Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time
-
- 2. Fax (408) 970-9727
- 24-hour, Group III fax
-
- 3. Fax-back automated response system (408) 988-3034
- 24-hour fax
-
- Send correspondence to any of the following McAfee
- locations:
-
- McAfee Corporate Headquarters
- 2805 Bowers Avenue
- Santa Clara, CA 95051-0963
-
- McAfee East Coast Office
- Jerral Center West
- 766 Shrewsbury Avenue
- Tinton Falls, NJ 07724-3298
-
- McAfee Central Office
- 4099 McEwen
- Suites 500 and 700
- Dallas, TX 75244
-
- McAfee Canada
- 139 Main Street
- Suite 201
- Unionville, Ontario
- Canada L3R2G6
-
- McAfee Europe B.V.
- Gatwickstraat 25
- 1043 GL Amsterdam
- The Netherlands
-
- McAfee (UK) Ltd.
- Hayley House, London Road
- Bracknell, Berkshire RG12 2TH
- United Kingdom
-
- McAfee France S.A.
- 50 rue de Londres
- 75008 Paris
- France
-
- McAfee Deutschland GmbH
- Industriestrasse 1
- D-82110 Germering
- Germany
-
- McAfee Japan KK
- Toranomon 33 Mori Bldg.
- 3-8-21 Toranomon
- Minato-Ku, Tokyo 105
- Japan
-
- Or, you can receive online assistance through any of the
- following resources:
-
- 1. Bulletin Board System: (408) 988-4004
- 24-hour US Robotics HST DS
-
- 2. Internet e-mail: support@mcafee.com
-
- 3. Internet FTP: ftp.mcafee.com
-
- 4. World Wide Web: http://www.mcafee.com
-
- 5. America Online: keyword MCAFEE
-
- 6. CompuServe: GO MCAFEE
-
-
- Before contacting McAfee, please make note of the
- following information. When sending correspondence,
- please include the same details.
-
- - Program name and version number
- - Type and brand of your computer, hard drive, and any
- peripherals
- - Operating system type and version
- - Network name, operating system, and version
- - Contents of your AUTOEXEC.BAT, CONFIG.SYS, and
- system LOGIN script
- - Microsoft service pack, where applicable
- - Network card installed, where applicable
- - Modem manufacturer, model, and baud, where
- applicable
- - Relevant browsers/applications and version number,
- where applicable
-
- - Problem
- - Specific scenario where problem occurs
- - Conditions required to reproduce problem
- - Statement of whether problem is reproducible on demand
-
- - Your contact information: voice, fax, and e-mail
-
- Other general feedback is also appreciated.
-
- Documentation feedback is welcome. Send e-mail to
- documentation@cc.mcafee.com.
-
-
- * FOR ON-SITE TRAINING INFORMATION *
-
- Contact McAfee Customer Service at (800) 338-8754.
-
-
- * FOR PRODUCT UPGRADES *
-
- To make it easier for you to receive and use McAfee's
- products, we have established a Reseller program to
- provide service, sales, and support for our products
- worldwide. For a listing of McAfee resellers near you,
- click Contact McAfee under the Information section on
- the McAfee website or see tge RESELLER.TXT file included
- with this product.
-
-
-
-
-