home *** CD-ROM | disk | FTP | other *** search
- VALIDATE Version 2.00
-
- QUICK COMMAND REFERENCE GUIDE
-
-
-
- Copyright 1993, 1994 by McAfee, Inc. All Rights Reserved.
-
-
-
-
- Brought to you by:
-
- Igor Grebert Project Leader
- Jivko Koltchev Lead Programmer
- David Mai TSR Programmer
- Vadim Ivanov Algorithms/Emulation Programmer
- Tatyana Shishkina Virus Librarian, Programmer
- Dmitri Orlov DOS UI Programmer
- Spencer Clark SQA Manager
- Aryeh Goretsky Documentation Review
-
- With special thanks to Bob Chappelear, Rudite Emir, and Bill Larson
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- ╔═══════════════════╗
- ║ LICENSE AGREEMENT ║
- ╚═══════════════════╝
-
- McAfee, Inc. assumes no responsibility for damages or lost data
- caused by the use or misuse of this program, including if used
- in accordance with the program documentation.
-
- Use of this program means compliance with this Agreement.
-
-
- Validate Version 2.00 Page 1
-
-
- VALIDATE is a file-authentication program that may be used to check
- other programs for signs of tampering. VALIDATE uses two discrete
- methods to generate Cyclic Redundancy Checks (CRC's), which are then
- displayed for the user to compare against the known value for the
- program(s) validated. The known validation data can be published by
- the author of the program or be obtained from a trusted information
- database. The dual CRC checking provides a high degree of security.
-
- To confirm that a program is in its original, untampered state,
- run the VALIDATE program on it, record the validation data produced,
- and compare it against the record in the online database. If they
- match, than it is highly improbable that the program has been modified.
-
- To run VALIDATE, type:
-
- VALIDATE <path spec>
-
- where <pathspec> is the name of a file or directory. The wildcard
- characters, "*" and "?", may be used when specifying <pathspec>/
-
- The VALIDATE program will then display the following information:
-
- <name of directory>
-
- name of file (starting at row 1)
- │
- │ extension of file (starting at row 10)
- │ │
- │ │ size of file (starting at row 15)
- │ │ │
- │ │ │ date of file (starting at row 25)
- │ │ │ │
- │ │ │ │ time of file (starting at row 35)
- │ │ │ │ │
- │ │ │ │ │ check method 1 (starting at row 44)
- │ │ │ │ │ │
- │ │ │ │ │ │ check method 2 (starting at row 51)
- │ │ │ │ │ │ └────────────────────────────────────┐
- │ │ │ │ │ └────────────────────────────────┐ │
- │ │ │ │ └─────────────────────────┐ │ │
- │ │ │ └─────────────────┐ │ │ │
- │ │ └─────────┐ │ │ │ │
- │ └──────┐ │ │ │ │ │
- │ │ │ │ │ │ │
- V V V V V V V
- SAMPLE TXT 12345678 01-01-80 12:01a 1A2B 3C4D
-
- <number> file(s) have been validated.
-
-