home *** CD-ROM | disk | FTP | other *** search
Text File | 1998-03-29 | 30.2 KB | 1,127 lines |
- What's New in McAfee VirusScan for Windows 3.1x v3.1.6 (3102)
- Copyright (c) 1994-1998 by Network Associates, Inc.,
- and its Affiliated Companies. All Rights Reserved.
-
-
- Thank you for using McAfee VirusScan for Windows 3.1x. This
- What's New file contains important information regarding the
- current version of this product. It is highly recommended
- that you read the entire document.
-
- Network Associates welcomes your comments and suggestions.
- Please use the information provided in this file to contact
- us.
-
- ___________________
- WHAT'S IN THIS FILE
-
- - New Features
- - Known Issues
- - Installation
- - Documentation
- - Frequently Asked Questions
- - Contacting Network Associates
-
- ____________
- NEW FEATURES
-
- 1. The new AutoUpdate feature (included with corporate
- versions of VirusScan only) allows you to configure
- VirusScan so that it effortlessly updates .DAT files
- and upgrades the entire product to protect your
- system from the latest virus threats. You can use
- AutoUpdate to perform updates and upgrades on a
- scheduled basis, automatically, or on demand.
- You can also request updates and upgrades from an
- FTP site or from a mapped drive on a local network
- computer. VirusScan also supports proxy servers.
-
- Note: VirusScan includes a default FTP fite for
- AutoUpdate. Once you receive the new .DAT files,
- you must restart your computer to load and use
- them.
-
- 2. VirusScan detects unknown macro viruses by using
- heuristic scanning technology. Unknown macro viruses
- are reported as "PROBABLE MACRO VIRUSES."
-
- 3. VirusScan is able to detect and clean macro virus
- infections in password-protected Microsoft Excel 95
- files without disturbing passwords.
-
- 4. VirusScan now has the ability to detect macro virus
- infections in password-protected German, French,
- Dutch, Italian, and Japanese Microsoft Word 95
- (Word 7.0) files.
-
- 5. If a password-protected Word 7.0 (Word for Office 95)
- file is infected by a virus that can plant its own
- password, VirusScan now cleans the file and removes the
- password.
-
- If a password-protected Word 7.0 or (Word for Office 95)
- file is infected by a virus that cannot plant its own
- password, VirusScan now cleans the file without
- disturbing the password.
-
-
- * NEW VIRUSES DETECTED *
-
- This .DAT file, 3102, is compatible with VirusScan's
- v3.x engines only. This .DAT file is not intended for
- use with VirusScan v2.x products.
-
- This .DAT file detects the following 232 new viruses.
- Locations that have experienced particular problems with
- specific viruses are also identified.
-
- 500
- AB6A.3500
- ALAR.5088
- ANDROMEDA.1140
- ANTINUKE.TROJAN
- ANXIETY.POPPY (Internet)
- ANXIETY.POPPY.II (Internet)
- ARARA.1375
- AUSPAR
- BANDUNG.BF
- BLEE.A
- BLEE.B
- BLEE.D (Internet)
- BLEE.E (Internet)
- BOOT.666
- BOX.D
- BOX.F
- BREEDER.A
- BRR.BOO
- BURMA.442.D
- CAP.BZ
- CAP.CA
- CAP.CB
- CAP.CC
- CAP.CD
- CAP.CE
- CAP.CF
- CAP.CG
- CAP.CH
- CAP.CI
- CAP.CJ
- CAP.CK
- CAP.CL
- CAP.CM
- CAP.CN
- CAP.CO
- CAP.CP
- CAP.CQ
- CAP.CR
- CAP.CS
- CAP.CT
- CAP.CU
- CAP.CV
- CAP.CW
- CAP.CX
- CIUDAD.590 (Europe)
- CLEANUP.A (Europe)
- COAHUILA
- CONCEPT.CA
- CONCEPT.CB
- CONCEPT.CC
- CONCEPT.CD
- CONCEPT.CE
- COOKIE.MONSTER.TROJAN
- DEMON.B
- DENZUKO.V1526
- DIAMETRIC.3514
- DRIVEL
- EDDY.1386
- EIGHT-CLOCK.A (US)
- ERMUA.A
- ERMUA.B
- ERMUA.C
- FAKE.A
- FEINT_7F_(BS/MBR)
- GOODNIGHT.M
- GROG.1146
- HABIR.A
- HASSLE.B
- HLLP.FECI.6000
- HLLT.KRILE.4608 (Internet)
- HLLT.KRILE.5831 (Internet)
- HNL.A (US)
- HOT.B
- IBLIS.252
- IBLIS.252 DROPPER
- IVP.967
- IWASHERE.710
- JERUSALEM.1808.CT.B DROPPER
- JOHNNY.S
- JOHNNY.T
- KELA.1171
- KHIZHNJAK.1011
- KHIZHNJAK.509
- KHIZHNJAK.565
- KILLDOS.A:TW
- KLA.A
- KOMCON.A (US)
- KOMPU.J
- KYOKUSHINKAI
- LAPIDARIO.766
- LARRY
- LEONARD.1194
- LIGHT.A
- LIZARD.1967 (Portugal, US)
- MBR-COM.1410
- MDMA.AO
- MDMA.AP
- MDMA.AQ
- MDMA.AR
- MDMA.AS
- MINIMAL.AA
- MINIMAL.Y
- MINIMAL.Z
- MIRC/7TH_SPERE
- MIRC/REPRO_V1
- MUCK.AP
- MUCK.AQ
- MULTI
- MWIM.BOO
- NGKOEN
- NICEDAY.P
- NICEDAY.Q
- NIKNAT.D
- NIKNAT.E
- NIKNAT.F
- NIKNAT.G
- NJVCK2.D
- NJVCK2.E
- NJVCK2.F
- NJVCK2.G
- NJVCK2.H
- NJVCK2.I
- NJVCK2.J
- NJVCK2.K
- NJVCK2.L
- NJVCK2.M
- NJVCK2.N
- NO2.A (TWNO variant) (Taiwan)
- NOP.R:BR
- NOP.S:ES
- NOP.T:IT
- NOSTARDAMUS.3584
- NPAD.FD
- NPAD.FE
- NPAD.FF
- NPAD.FG
- NPAD.FH
- NPAD.FI
- NPAD.FJ
- NPAD.FK
- NPAD.FL
- NPAD.FM
- NPAD.FN
- NPAD.FO
- NPAD.FP
- NPAD.FQ
- NPAD.FR
- NPAD.FS
- NPAD.FT
- NPAD.FU
- NPAD.FV
- NPAD.FW
- NPAD.FX
- NPAD.FY
- ORPHAN.174
- PASTIK.2049
- PAYCHECK.J
- PAYCHECK.K
- PINGPONG.M
- PRESIDENT.MP.1504
- RAZER.B
- SARCOMA.1328
- SCHUMANN.G (Europe)
- SCHUMANN.H (Europe)
- SCHUMANN.I
- SCHUMANN.J (Europe)
- SCHUMANN.L (Europe)
- SEEYOU
- SHOWOFF.CN
- SHOWOFF.CO
- SHOWOFF.CP
- SHOWOFF.CQ
- SHOWOFF.CR
- SHOWOFF.CS
- SILLYC.124
- SILLYC.144
- SILLYC.166
- SILLYC.169
- SILLYC.264
- SILLYC.302
- SILLYC.331
- SILLYC.343
- SILLYC.498
- SILLYC.511
- SILLYC.563
- SILLYC.626
- SILLYC.657
- SPHINX.2520
- SPHINX.2536
- SPHINX.2548
- SWISS_BOOT (Switzerland)
- SWISS_BOOT_2 (Switzerland)
- SWLABS.H
- TAGUCHI.A (Brazil)
- TALON.L
- TEDY.4350
- TEMPLE.L
- TPVO.3463
- TPVO.3626
- TPVO.3654
- TPVO-OPEN.1569
- TRASH.B
- TROUT.6787
- TWNO.AB:TW
- VAMPIRE.K:TW
- VAMPIRE.L/M:TW
- VHDL.B:TW
- VIENNA.BETABOYS DROPPER
- WAZZU.DM
- WAZZU.DN
- WAZZU.DP
- WAZZU.DQ
- WAZZU.DR
- XF/PAIX.A (Requires 3.1.6 engine or later)
- XM/LAROUX.AF
- XM/LAROUX.AH
- XM/LAROUX.AP
- XM/LAROUX.BC
- XM/LAROUX.BE
- XM/LAROUX.BG
- XM/LAROUX.BH
- XM/LAROUX.BI
- XM/LAROUX.BJ
- XM/LAROUX.BK
- XM/LAROUX.BL
- XM/LAROUX.BM
- XM/LAROUX.BN
- XM/LMV.A (TROJAN)
- XM/NINJA.D (Japan)
- XM/NOCAL.A (Japan)
- ZHENGZHOU.3584.B
-
-
- * NEW VIRUSES CLEANED *
-
- This .DAT file cleans the following 167 new viruses:
-
- ANDROMEDA.1140
- BANDUNG.BF
- BLEE.A
- BLEE.B
- BLEE.D (Internet)
- BLEE.E (Internet)
- BOX.F
- BREEDER.A
- CAP.BZ
- CAP.CA
- CAP.CB
- CAP.CC
- CAP.CD
- CAP.CE
- CAP.CF
- CAP.CG
- CAP.CH
- CAP.CI
- CAP.CJ
- CAP.CK
- CAP.CL
- CAP.CM
- CAP.CN
- CAP.CO
- CAP.CP
- CAP.CQ
- CAP.CR
- CAP.CS
- CAP.CT
- CAP.CU
- CAP.CV
- CAP.CW
- CAP.CX
- CIUDAD.590 (Europe)
- CLEANUP.A (Europe)
- COAHUILA
- CONCEPT.CA
- CONCEPT.CB
- CONCEPT.CC
- CONCEPT.CD
- CONCEPT.CE
- DEMON.B
- DIAMETRIC.3514
- EIGHT-CLOCK.A (US)
- ERMUA.A
- ERMUA.B
- ERMUA.C
- FAKE.A
- FEINT_7F_(BS/MBR)
- GOODNIGHT.M
- GROG.1146
- HABIR.A
- HASSLE.B
- HNL.A (US)
- HOT.B
- IBLIS.252
- IBLIS.252 DROPPER
- IWASHERE.710
- JERUSALEM.1808.CT.B DROPPER
- JOHNNY.S
- JOHNNY.T
- KILLDOS.A:TW
- KLA.A
- KOMCON.A (US)
- KOMPU.J
- LARRY
- LEONARD.1194
- LIZARD.1967 (Portugal, US)
- MDMA.AP
- MDMA.AQ
- MDMA.AR
- MDMA.AS
- MINIMAL.Y
- MINIMAL.Z
- MINIMAL.AA
- MUCK.AP
- MUCK.AQ
- MWIM.BOO
- NICEDAY.P
- NICEDAY.Q
- NIKNAT.E
- NIKNAT.F
- NIKNAT.G
- NJVCK2.D
- NJVCK2.E
- NJVCK2.F
- NJVCK2.G
- NJVCK2.H
- NJVCK2.I
- NJVCK2.J
- NJVCK2.K
- NJVCK2.L
- NJVCK2.M
- NJVCK2.N
- NO2.A (TWNO variant) (Taiwan)
- NOP.R:BR
- NOP.S:ES
- NOP.T:IT
- NPAD.FD
- NPAD.FE
- NPAD.FF
- NPAD.FG
- NPAD.FH
- NPAD.FI
- NPAD.FJ
- NPAD.FK
- NPAD.FL
- NPAD.FM
- NPAD.FN
- NPAD.FO
- NPAD.FP
- NPAD.FQ
- NPAD.FR
- NPAD.FS
- NPAD.FT
- NPAD.FU
- NPAD.FV
- NPAD.FW
- NPAD.FX
- NPAD.FY
- PAYCHECK.J
- PAYCHECK.K
- RAZER.B
- SARCOMA.1328
- SCHUMANN.G (Europe)
- SCHUMANN.H (Europe)
- SCHUMANN.J (Europe)
- SCHUMANN.L (Europe)
- SHOWOFF.CN
- SHOWOFF.CO
- SHOWOFF.CP
- SHOWOFF.CQ
- SHOWOFF.CR
- SHOWOFF.CS
- SWISS_BOOT (Switzerland)
- SWISS_BOOT_2 (Switzerland)
- SWLABS.H
- TAGUCHI.A (Brazil)
- TALON.L
- TEDY.4350
- TEMPLE.L
- TRASH.B
- TWNO.AB:TW
- VAMPIRE.K:TW
- VAMPIRE.L/M:TW
- VHDL.B:TW
- VIENNA.BETABOYS DROPPER
- WAZZU.DM
- WAZZU.DN
- WAZZU.DP
- WAZZU.DQ
- WAZZU.DR
- XM/LAROUX.AF
- XM/LAROUX.AP
- XM/LAROUX.BC
- XM/LAROUX.BE
- XM/LAROUX.BG
- XM/LAROUX.BH
- XM/LAROUX.BI
- XM/LAROUX.BJ
- XM/LAROUX.BK
- XM/LAROUX.BL
- XM/LAROUX.BM
- XM/LAROUX.BN
- XM/LMV.A (TROJAN)
- XM/NINJA.D (Japan)
- XM/NOCAL.A (Japan)
-
- ____________
- KNOWN ISSUES
-
- 1. When creating an Emergency Disk, in some cases,
- additional drivers must be loaded in order to access a
- driver specific hard drive (i.e. a compressed drive).
- Before modifying the Emergency Disk, please refer to
- your hard disk documentation for additional information
- on creating a boot disk.
-
- 2. If password protection is set for VShield or any
- scan task, when an associated program is launched, you
- will be prompted to verify the password. You must use
- the mouse to click in the text field to enter the
- password or click Cancel to exit. Keyboard strokes
- are not functional. This is a Microsoft issue as stated
- in Microsoft's Knowledge Base Article ID #Q84133.
-
- 3. If Move Infected File is selected on the Actions page,
- infected files will be moved to the directory specified.
- If the Windows Copy command fails during this procedure,
- a zero byte file size stamp may be left in the destin-
- ation directory when carrying out the Copy command.
-
- 4. The CTRL+C and CTRL+BREAK option to break out of DOS
- applications in a DOS window is disabled when you
- install VirusScan. This is to prevent a host of issues
- that would be caused by CTRL+C and CTRL+BREAK interfer-
- ing with VShield activity. Consequently, if a DIR
- command is executed in a DOS window, and then a CTRL+C
- or a CTRL+BREAK is executed, the DIR display will not
- be canceled and an incorrect DIR display may result.
-
- 5. If VShield detects an infected file that is decompress-
- ing in a DOS session and the DOS session is terminated,
- VShield as well as Pkunzip and any other program being
- run from the DOS window will be discontinued. Although
- the VShield icon will still be displayed in the Taskbar,
- VShield will be disabled. VShield must be re-enabled by
- restarting Windows to maintain maximum virus protection.
-
- 6. If the product is uninstalled while VirusScan
- (Scan16.exe) or the VirusScan Console (AVConsol.exe)
- are open, some files may not be removed (i.e.
- Scan16.exe, Mcscan16.dll, Mcgui16.dll, AVConsol.exe).
- If you try to delete the NETA\Viruscan directory
- before restarting Windows, error messages will appear
- stating that the files are being used by Windows. Close
- all VirusScan related programs, excluding VShield,
- before uninstalling VirusScan.
-
- 7. The conversion utility preserves the scan targets
- but does not preserve the command-line parameters.
- When custom profiles include command-line parameters,
- the resulting task (.VSC file) will have one or more
- invalid scan items that will need to be manually
- updated.
-
- Command-line parameters in scan tasks must be manually
- added. Pre-existing profiles (.PRF files) will be moved
- to the target installation directory for reference
- purposes.
-
- 8. If the AVCONSOLE.INI file is deleted and then recreated
- upon launching the AV Console, the default Scan16 task
- will change from "Scan Drive C" and "All Drives" to
- "VirusScan."
-
- 9. If you experience difficulties cleaning infected files
- with VirusScan for Windows, exit Windows and use
- SCAN.EXE or SCANPM.EXE, which are included in this
- product.
-
- 10. A VirusScan scan task that is scheduled to run while
- another scan task is in progress will not start because
- only one instance of VirusScan can be run at one time.
- Due to variations in system configurations, the time
- required to complete a particular scan task will vary
- between users. Therefore, you should determine the time
- required to complete the various scan tasks you perform
- on your system. Then, when scheduling scan tasks in the
- McAfee AntiVirus Console, allow enough time for one
- scheduled scan task to be completed before another one
- begins.
-
- ____________
- INSTALLATION
-
- * INSTALLING THE PRODUCT *
-
- 1. Take one of the following steps:
-
- - If you are installing from diskette or compact disc,
- insert the VirusScan for Windows 3.1x installation
- diskette or the CD-ROM.
- - If you are installing from files downloaded from a BBS
- or the Network Associates website, decompress the
- zipped files into a directory on your local drive or
- the network.
-
- 2. Select Run from the File menu.
-
- 3. If you are installing from diskette, type: x:\SETUP.EXE
- (where x is the drive that contains the diskette).
- Click OK.
-
- If you are installing from compact disc, type:
- x:\win3x\SETUP.EXE (where x is the drive that contains
- the CD-ROM). Click OK.
-
- If you are installing from downloaded files, type:
- x:\path\SETUP.EXE (where x:\path is the location of the
- files). Click OK.
-
- 4. Follow the on-screen installation instructions to
- complete VirusScan installation.
-
-
- * PERFORMING A SILENT INSTALLATION *
-
- To perform a "silent" installation of this product, with
- minimal user interaction and with all default or "Typical"
- installation settings, add -s (i.e., SETUP.EXE -s) to the
- setup command when you install the product.
-
- Network administrators can customize the silent installation
- feature by following these steps:
-
- 1. Check the Windows directory to ensure that a file named
- SETUP.ISS does not already exist. If one does, rename
- it, back it up, or delete it.
-
- 2. Run SETUP.EXE with the -r switch, (i.e., SETUP.EXE -r).
-
- 3. Select the components you want to install during the
- silent installation. Your choices will be recorded.
-
- 4. Finish the installation.
-
- Result: A SETUP.ISS file is created in the Windows
- directory that has your installation options recorded.
- Use this file to install all product files to the same
- installation directory on every client machine.
-
- The .ISS file specifies the installation directory under
- the [SdSetupType-0] header, szDir parameter, which was
- recorded in step 3. This overrides the default
- installation directory on each client machine, which
- might vary according to operating system. Having the
- same directory name on every client helps to ease
- administration in the future; for example, you might
- assign all client machines the directory C:\MCAFEEAV.
-
- Note: If you want to allow SETUP.EXE to determine
- where to locate the installed files, modify the
- SETUP.ISS file so that the target machine will disregard
- the szDir, as follows:
-
- A. Locate the section [SdSetupType-0] in the SETUP.ISS
- file and go to the line: Result = xxx. The actual
- value will most likely be 301, 302, or 303,
- depending on what options you selected during the
- ISS file creation process.
-
- B. Add 100 to this number so that, for example, 301
- becomes 401. This tells each target machine to
- disregard the szDir and assign a directory according
- to its own particular operating system.
-
- 5. Copy the installation files onto a local or mapped
- drive; then rename, back up, or delete the SETUP.ISS
- file.
-
- Note: You cannot perform a silent install from multiple
- media because the silent operation will be compromised
- when the install prompts the user for more media.
-
- 6. Copy the new SETUP.ISS from the Windows directory to the
- location of the installation files.
-
- Note: The file used for the silent installation,
- SETUP.ISS, is product-specific. For example, you cannot
- use a SETUP.ISS file created by a VirusScan for
- Windows 95 installation for a VirusScan for Windows NT
- installation.
-
- 7. Run SETUP.EXE with the -s switch (i.e., SETUP.EXE -s).
-
- Note: If you do not specify a "recorded" answer for all
- dialog boxes during the initial installation, the silent
- installation will fail.
-
- 8. When the silent installation is complete, the machine
- reboots automatically.
-
-
- * PRIMARY PROGRAM FILES FOR VIRUSSCAN FOR WINDOWS 3.1x *
-
- Files located in the Install directory:
- =======================================
-
- 1. Installed for VShield/DOS/VirusScan:
-
- README.1ST = License and registration
- information
- CLEAN.DAT = Virus clean definition data
- NAMES.DAT = Virus names definition data
- SCAN.DAT = Virus scan definition data
- VALIDATE.EXE = McAfee file validation program
- WCMDR.EXE = Windows Commander program
- MCFDU.EXE = McAfee floppy disk utility
- (for Zenith machines only)
- PRF2VSC.EXE = Conversion utility program
- CONFIG.EXE = VirusScan configuration
- program
- SETBROWS.EXE = Set browser program
- INETWH16.DLL = Library files
- INETWH32.DLL = Library files
- MCGUI16.DLL = VirusScan Console library file
- WCMDR.INI = Windows Commander configuration
- settings
- WCMDRSIL.INI = unInstallShield helper
- configuration
- DEISL1.ISU = Uninstall file
- PACKING.LST = Packing list
- WHATSNEW.TXT = What's New document
- RESELLER.TXT = Network Associates authorized agents
-
-
- 2. Installed for VShield:
-
- MCKRNL16.DLL = Tools library
- MCUTIL16.DLL = Run-time support library
- CONFIG.EXE = VShield Configuration Manager
- VSHWIN.EXE = VShield on-access engine
- CHKVXD.EXE = VShield virtual device driver
- checking utility
- UNVSHVXD.EXE = Virtual device driver
- UNVSHVXD.INI = Initialization file
- DEFAULT.VSH = Default VSH settings
-
-
- 3. Installed for DOS:
-
- EDISK.EXE = Emergency Disk creation utility
- EDISK.SCR = Emergency Disk file
- EDAT.1 = Emergency Disk data file
- EDAT.2 = Emergency Disk data file
- EDAT.3 = Emergency Disk data file
- EDAT.4 = Emergency Disk data file
- EDAT.5 = Emergency Disk data file
- EDAT.6 = Emergency Disk data file
- EMCLEAN.DAT = Emergency Disk virus clean
- definition data
- EMNAMES.DAT = Emergency Disk virus names
- definition data
- EMSCAN.DAT = Emergency Disk virus scan
- definition data
- GETREPLY.EXE = Emergency diskette program component
- SCAN.EXE = MS-DOS scan program
- SCANPM.EXE = Protected mode scanner
-
- 4. Installed for VirusScan:
-
- AVCONSOL.EXE = VirusScan console program
- SCAN16.EXE = VirusScan for Windows 3.1x
- on-demand scanner
- VIRLST16.EXE = Virus List program
- MCSCAN16.DLL = Library files
- SCAN16.HLP = VirusScan for Windows 3.1x
- online help
- AVCONSOL.HLP = VirusScan Console online help
- AVCONSOL.INI = VirusScan console
- configuration file
- DEFAULT.VSC = Default VSC settings
- INETWH16.DLL = Internet library help file
- INETWH32.DLL = Internet library help file
-
- Files located in WINDOWS\SYSTEM directory:
- ==========================================
-
- 1. Installed for VShield/VirusScan:
-
- CTL3D.DLL = 16-bit 3D Windows controls
- library (*)
- CTL3DV2.DLL = 32-bit 3D Windows controls
- library (*)
-
- (*) File will be installed upon installation of VirusScan
- if it does not already exist, or if an older version
- is found.
-
-
- 2. Installed for VShield:
-
- MCFSHOOK.386 = File system hook
- MCKRNL.386 = Scan engine device driver
- MCSCAN32.386 = Scan engine device driver
- MCUTIL.386 = Utility device driver
- VSHIELD.386 = VShield device driver
-
-
- * TESTING YOUR INSTALLATION *
-
- The Eicar Standard AntiVirus Test File is a combined effort
- by anti-virus vendors throughout the world to come up with
- one standard by which customers can verify their anti-virus
- installations. To test your installation, copy the following
- line into its own file and name it EICAR.COM.
-
- X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
-
- When done, you will have a 69- or 70-byte file.
-
- When VirusScan is applied to this file, it will report
- finding the EICAR-STANDARD-AV-TEST-FILE virus.
-
- It is important to know that THIS IS NOT A VIRUS. However,
- users often have the need to test that their installations
- function correctly. The anti-virus industry, through the
- European Institute for Computer Antivirus Research, has
- adopted this standard to facilitate this need.
-
- Please delete the file when installation testing is
- completed so unsuspecting users are not unnecessarily
- alarmed.
-
-
- * MANUALLY UNINSTALLING VIRUSSCAN *
-
- Network Associates recommends using VirusScan's uninstall
- program provided. You can access the McAfee Uninstall icon
- from the McAfee VirusScan program group. If, however, the
- uninstall program (WCMDR.EXE) is not present on your system,
- follow the instructions outlined below to manually uninstall
- VirusScan.
-
- 1. Edit the AUTOEXEC.BAT file:
-
- 1. From the File menu, select Run and type SYSEDIT in
- the space provided. Click Okay.
- 2. Remove VirusScan from the path statement. The default
- path is C:\NETA\VIRUSCAN.
-
- 2. In the SYSTEM.INI file, remove the following lines:
-
- device=MCSCAN32.386
- device=MCUTIL.386
- device=MCKRNL.386
- device=MCFSHOOK.386
- device=VSHIELD.386
-
- 3. Remove the following lines from the WIN.INI file:
-
- 1. After LOAD =, remove all references to VirusScan.
- The default line is C:\NETA\VIRUSCAN\VSHWIN.EXE.
-
- 2. Remove [VIRUSCAN] WSCAN=C:\NETA\VIRUSCAN\
- SCAN16.EXE.
-
- 3. Delete VirusScan icons and the McAfee VirusScan
- program group from Windows in the Program Manager.
-
- 4. Exit Windows and reboot your system.
-
- 5. When Windows comes back up, open the File Manager
- and delete the NETA directory.
-
- _____________
- DOCUMENTATION
-
- For more information, refer to the User's Guide, included
- on the CD-ROM versions of this program or available from the
- Network Associates BBS and FTP sites. This file is in
- Adobe Acrobat Portable Document Format (.PDF) and can be
- viewed using Adobe Acrobat Reader. This form of electronic
- documentation includes hypertext links and easy navigation
- to assist you in finding answers to questions about your
- Network Associates product.
-
- Adobe Acrobat Reader is available on CD-ROM in the ACROREAD
- subdirectory. Adobe Acrobat Reader also can be downloaded
- from the World Wide Web at:
-
- http://www.adobe.com/prodindex/acrobat/readstep.html
-
- VirusScan documentation can be downloaded from the Network
- Associates's BBS or the World Wide Web at:
-
- http://www.nai.com
-
- For more information on viruses and virus prevention, see
- the Network Associates Virus Information Library, included
- on the CD-ROM version of this product or available from the
- Network Associates BBS and FTP sites.
-
- __________________________
- FREQUENTLY ASKED QUESTIONS
-
- Regularly updated lists of frequently asked questions about
- Network Associates products also are available on the
- Network Associates BBS, website, and CompuServe and AOL
- forums.
-
-
- Q: I am installing new software and the instructions say
- that I need to disable my anti-virus software. How do I
- disable VShield without uninstalling it?
-
- A: Right click on the VShield icon, then click disable.
- This will disable VShield until you enable it or restart
- Windows.
-
-
- Q: What is the Parameters field of the Task Properties
- page used for?
-
- A: The field is provided to take advantage of command-line
- parameters for programs other than VirusScan. For
- example, a NotePad.exe task could be set to open a file
- by entering the filename (i.e., Whatsnew.txt) in the
- parameter field.
-
-
- Q: How can I create an Emergency Disk after VirusScan
- installation?
-
- A: You can create an Emergency Disk after installation by
- double-clicking the Emergency Disk Creation Utility icon
- in your McAfee VirusScan program group.
-
-
- Q: When I have an infected file, why does the infected
- counter increase by increments greater than one?
-
- A: The file system will typically access a file more than
- once. On each access, VirusScan scans the file and
- detects the infection.
-
-
- Q: Can I continue to use VirusScan for Windows 3.1x on my
- system after upgrading to Windows 95?
-
- A: VirusScan for Windows 3.1x can run on a Windows 95
- system; however, many key components, including VShield,
- will not be functional. If you upgrade your system to
- Windows 95, you should also upgrade your VirusScan
- software to VirusScan for Windows 95. As a licensed
- VirusScan user, you can upgrade your software for free.
- See your license agreement or contact your Network
- Administrator for details.
-
-
- Q: Can I update VirusScan's data files to detect new
- viruses?
-
- A: Yes. If you have Internet access, you can download
- updated VirusScan data files from the Network Associates
- website, BBS, or other online resources. To download
- from the Network Associates website, follow these steps:
-
- 1. Go to the Network Associates website
- (http://www.nai.com).
-
- 2. Select Update DAT File in the left column or frame.
-
- 3. Scroll down and click Download DAT File - FREE to
- update your virus definition files.
-
- 4. Data file updates are stored in a compressed form
- to reduce transmission time. Unzip the files into
- a temporary directory, then copy the files to the
- appropriate directory, replacing your old files.
-
- 5. Before performing any scans, shut down your
- computer, wait a few seconds, and turn it on again.
-
-
- Q: How do I scan compressed files?
-
- A: To scan compressed files with VirusScan: Prior to
- starting your scan, select Compressed Files from the
- VirusScan Main Window.
-
- To scan compressed files with VShield: Open the VShield
- Configuration Manager, click the Detection tab and click
- Compressed files.
-
- VirusScan and VShield are able to scan LZexe and PKLite.
- Files with *.zip, *.lzh, and other compressed formats
- are not scanned.
-
-
- Q: Is VShield TSR still enabled when I am in Windows?
-
- A: No. If VirusScan for Windows 3.1x is installed, the
- VShield TSR is disabled during Windows sessions.
-
-
- If you need additional assistance with downloading,
- contact Network Associates Download Support at
- (408) 988-3832.
-
-
- _____________________________
- CONTACTING NETWORK ASSOCIATES
-
- * FOR QUESTIONS, ORDERS, PROBLEMS, OR COMMENTS *
-
- Contact the Network Associates Customer Care department:
-
- 1. Corporate-licensed customers, call (408) 988-3832
- Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time
-
- Retail-licensed customers, call (972) 278-6100
- Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time
-
- 2. Fax (408) 970-9727
- 24-hour, Group III fax
-
- 3. Fax-back automated response system (408) 988-3034
- 24-hour fax
-
- Send correspondence to any of the following Network
- Associates locations:
-
- Network Associates Corporate Headquarters
- 2805 Bowers Avenue
- Santa Clara, CA 95051-0963
-
- Network Associates Canada
- 139 Main Street, Suite 201
- Unionville, Ontario
- Canada L3R 2G6
-
- Network Associates Europe B.V.
- Gatwickstraat 25
- 1043 GL Amsterdam
- The Netherlands
-
- Network Associates International Ltd.
- Minton Place, Victoria Street
- Windsor, Berkshire
- SL4 1EG
- United Kingdom
-
- Network Associates France S.A.
- 50 rue de Londres
- 75008 Paris
- France
-
- Network Associates Deutschland GmbH
- Industriestrasse 1
- D-82110 Germering
- Germany
-
- Network Associates Japan Co, Ltd.
- Toranomon 33 Mori Bldg.
- 3-8-21 Toranomon
- Minato-Ku, Tokyo 105
- Japan
-
- Network Associates Korea
- 135-090, 18th Fl., Kyoung Am Bldg.
- 157-27 Samsung-Dong, Kangnam-Ku
- Seoul, Korea
-
- Network Associates South East Asia
- 7 Temasek Boulevard
- The Penthouse
- #44-01, Suntec Tower One
- Singapore 038987
-
- Network Associates Australia
- Level 1, 500 Pacific Highway
- St. Leonards, NSW 2065
- Australia
-
- Network Associates Latin America
- 150 South Pine Island Road, Suite 205
- Plantation, FL 33324
- USA
-
- Or, you can receive online assistance through any of the
- following resources:
-
- 1. Bulletin Board System: (408) 988-4004
- 24-hour US Robotics HST DS
-
- 2. Internet e-mail: support@nai.com
-
- 3. Internet FTP: ftp.nai.com
-
- 4. World Wide Web: http://www.nai.com
-
- 5. America Online: keyword MCAFEE
-
- 6. CompuServe: GO MCAFEE
-
-
- Before contacting Network Associates, please make note of
- the following information. When sending correspondence,
- please include the same details.
-
- - Program name and version number
- - Type and brand of your computer, hard drive, and any
- peripherals
- - Operating system type and version
- - Network name, operating system, and version
- - Contents of your AUTOEXEC.BAT, CONFIG.SYS, and system
- LOGIN script
- - Microsoft service pack, where applicable
- - Network card installed, where applicable
- - Modem manufacturer, model, and baud, where applicable
- - Relevant browsers/applications and version number, where
- applicable
-
- - Problem
- - Specific scenario where problem occurs
- - Conditions required to reproduce problem
- - Statement of whether problem is reproducible on demand
-
- - Your contact information: voice, fax, and e-mail
-
- Other general feedback is also appreciated.
-
- Documentation feedback is welcome. Send e-mail to
- documentation@nai.com.
-
-
- * FOR ON-SITE TRAINING INFORMATION *
-
- Contact Network Associates Customer Service at
- (800) 338-8754.
-
-
- * FOR PRODUCT UPGRADES *
-
- To make it easier for you to receive and use Network
- Associates products, we have established a Reseller program
- to provide service, sales, and support for our products
- worldwide. For a listing of Network Associates resellers
- near you, click Contact on the Network Associates website
- or see the RESELLER.TXT file included with this product.