home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Liren Large Software Subsidy 16
/
16.iso
/
t
/
t164
/
2.img
/
CPAV.HLP
(
.txt
)
< prev
next >
Encoding:
Amiga
Atari
Commodore
DOS
FM Towns/JPY
Macintosh
Macintosh JP
NeXTSTEP
RISC OS/Acorn
UTF-8
Wrap
Central Point Help
|
1993-06-01
|
54.8 KB
|
2,309 lines
Help for Anti-Virus
Copyright 1993 by Central Point Software Inc.
(Configure
(Express
(Reports
(Scan
aSCII
aUDIT.CPS
about
access
action
activity
after
against
alert
analyze
anti-Virus
appears
attributes
audit
automatically
available
button
cHKLIST.CPS
cannot
central
changed
changes
change
changing
checklist
checksums
checksum
check
choose
choosing
cleaned
cleaning
cleans
clean
click
commands
command
compressed
configuration
configure
confirm
containing
continue
created
creates
create
current
customized
default
deleted
delete
detailed
detected
detection
detects
detect
dialog
different
directories
directory
disable
displayed
displays
display
don't
drive
during
encountered
enter
error
exceptions
exception
executable
express
feature
file's
files
finds
floppy
following
found
getting
glossary
highlighted
highlight
however
hyperlink
immunization
immunized
immunize
infected
infection
information
installation
installed
integrity
local
located
log/Clear
memory-resident
memory
menus
messages
message
modified
mouse
named
network
number
occurred
operation
options
option
original
other
panel
parameter
password
point
pressing
press
printer
print
programs
program
prompted
prompt
protection
provides
recognized
remove
reports
report
return
scanned
scanning
scans
screen
sector
selected
selecting
select
settings
shows
signature
subsequent
support
system
technical
their
there
these
topics
trail
unknown
updates
update
updating
using
vSafe
verification
verify
viruses
virus
warning
whenever
while
windows
window
without
Index
Topics
GoBack
Print
Manuals
FZPSPT
Sorry,
eis not
topic. Please
F4 to view a
Index
You can get
anywhere
in a
F1, or
&the
Index
Keyboard
horizontal
}bar.
The
etext
depends on what you were
doing
e. If you were in a
egives you
If you were in a
box,
etells you
the
Scrolling
If a
epage contains
text
can fit in the
at once, use the PGUP and PGDN
t(or UP and
DOWN arrow
t) to scroll text in the
. If you
, you can use the scroll bar at the
right. The end of the
is indicated by a
horizontal line.
in most
, you can
is. A
iis a
word or phrase
is connected to
etext
o. To
i, use
the Tab or cursor
tto move the
gamong
is. End takes you to the last
Home takes you to the first.
Q. If you
, you can
Ithe
associated
word or phrase on
, you can
F5 to
to the previously viewed
F3 to
Vthe
to the
application.
General
is in the See
vat the bottom of some
provide
eon related
Function
--Line
Index
PZFor assistance beyond what the manual,
e, and README.TXT
provide, please refer to the
Guide card enclosed
package and
contact us
one of the
^methods:
Phone
Our
hours are 6 am to 5 pm PST,
Monday, Tuesday, Thursday, and Friday, and 6 am to 4
pm PST on Wednesday, If possible, call
`a phone
next to the computer you're having problems
PC turned on and ready to go. Our
phone
is (503) 690-8080.
To receive
evia fax, send us a description of
problem along
our
: (503) 690-7133.
CPSOLVER
Use
touch-tone phone to call the
automatic phone
line and get answers to the
most comm
asked questions
our DOS and
products. The CPSOLVER
is (800) 967-
6703.
CPS Bulletin
our 24-hour-a-day bulletin board
, you
Board
can direct questions or
as well as download the
`the
section. To connect to
our BBS, set
modem to N-8-1
aduplex and
dial (503) 690-6650 if you
da 2400-baud modem.
Dial (503) 609-4777 if you
da 9600-baud modem.
CompuServe
CompuServe members can r
Oour forum by typing GO
CPSDOS at the !
. In the
forum,
you can direct questions or comments to
You can write to
at the address
below. Be sure to send us a description of
as well as the problem you are experiencing.
Software, Inc.
15220 NW Greenbrier Pkwy.
Beaverton, OR 97006
Attn:
International
Phone: +44 (0)81 569 3316
FAX:
+44 (0)81 569 1013
BBS:
+44 (0)81 569 3324
Mail: 3 Furzeground Way
Stockley Park
Uxbridge
Middlesex
UB11 1DA
United Kingdom
--Line
--line
s control
Jand
them
" at the DOS
, along
s you are
. For example:
/LE /BF
Gand
)the
Gand
), and
ls the
Gand
Switches the
Ms (including
) except A and B.
Starts
Wmode.
Ms except A and B.
es interface
oand
Itext in
.TXT, if it exists.
Uses
--line interface instead of graphics.
s of
. Valid
/N or /P.
/25 /28 Sets the
Jto 25, 28, 43, 50, or 60 lines.
/43 /50
Runs
in color even if a color monitor is not
Starts the
in black-and-white mode.
improves the
Jif you use a color card
a black-and-white
monitor.
Uses the
's BIOS to manipulate fonts, instead of
writing directly to the
port. Use
if you
dproblems
Jing
characters
correctly.
/MONO
s the
:monochrome color set.
an effect similar to /BW. If you
dan IBM monochrome
monitor and
Knot improve
try /MONO.
"snow" sup
ion on CGA monitors.
Used on computers
I(usually laptops) to set
colors.
the left and right
functions to
accommo
9persons who prefer to use
left-
handed.
Fs the
, but
Knot affect keyboard functions.
Knot affect the
underlying
. Use
if you
dan old Microsoft
Mr or experience problems
application
a hotkey to
resident
Fs the use of alternate fonts.
Fs the graphics
character.
, the
be a solid box instead of an arrow.
You might
to use
is running
too slowly and you
to speed it up.
optimal
performance and corrects problems
can occur
you are
a PS/2. You can
Knot
Index
A - B
Log Cleared
Allow
Anti-Stealth
C - D
$All
Clear
--Line
6Backup
6Smart
$s on
6New Smart
<Smart
<Smart
FAlarm Sound
MLine
E - H
Function
I - R
Last
Pause
Ready
Removing a
S - T
Zand
U - Z
>and
Function
PZ F1
egives
eon the
Immune protects
Bbox.
F2
uyou
Log
vs recent
Line.
?or repair.
F3
Vquits
Wswitches to the
}, a simple
DOS.
summary of the basic
* functions.
F4
Alooks for
in F9
the
* can
F5
F10
gs the
fixes the damage done to a
2a log of
~, the
, and the user's response.
, is an
the
Ewhere you
copies itself to the
computer's hard or
replace the
own code so
is always
loaded into
{before anything else. Once in
{, the
can spread to
Gs and
An algorithm
generates a unique
. See
Smart
[infectors
A common
[infectors add
code to
Z, such as COM, EXE,
and .SYS
Z. Once the
is executed, it
spreads to
Protect
nby adding
a small amount of code to them. Once
[has its own anti-
capabilities allowing
it to notify you of any
may occur. If
>, the
[can
itself,
ing to its
state.
Smart
For
[, a
contains
recovery
oand has the ability to
. Smart
$s can tell the difference
between legitimate
made to
install or upgrade software, and illegitimate
might be made by a
Smart
If the
6New Smart
is on,
5a SMARTCHK.CPS
[for
contains a database of records
[in the
E, including
, and
#. If a SMARTCHK.CPS
already exists for the
E, any
added to the
Eare added to the
SMARTCHK.CPS
Stealth
infects a
the
, Smart
$, or
characteristics.
@and
)most of
Polymorphic
difficult to
conventional
because it mutates
and
)most of
Trojan Horse
is disguised as a legitimate
. Trojan horses are much
apt to
destroy
Zor damage
Variant
A closely related form of a
. Although the
variant is similar, its code and
Cenough
`the
strain to need
a unique
(method.
reproduces itself and may modify
the copies it makes of
itself, or disguise its
s as legitimate
behavior. Some
are merely
irritating. Many
can destroy or damage
data or
zutility
0d by Install
monitors
for known
suspicious
. If it
@such
, giving you the
opportunity to
3the
, restart the
, or cancel the
VWatch
zutility
0d by Install
$s for the presence of known
is executed or a
If a
_, a
the
is halted, allowing
you the opportunity to run the
Anti-
to eliminate the
PSPT
.EXE) protects
in two ways. If
has already become
m, you
can use
Aand
2000
a suspect
[--an
in some way
and which may be
mby an
If you
to add an extra layer of
future
attacks, you can use the
Xto modify
they rid themselves of
(even
ones)
they first become
are several ways of
bnew
vtells how to get
oby modem. If
da modem, you can still get
Please refer to the
manual for
how to subscribe to the Continuous
(CAP)
service.
PZYou can
^procedure:
1.
computer, modem, and telecommunications software,
connect to the CPS Bulletin Board or to CompuServe. If you are a
CompuServe user,
GO CENTRAL at the !
2. Locate the
area of the bulletin board and download
the appropriate
[and accompanying documentation
[(if any).
3. Copy the
[to the
Ewhere
.EXE is
If you use
version of
, download the
archive
contains SMARTSIG.CPS. If you
use versions of
are part of
applications, such as
GFix and the PC Tools for
Manager, you should
download the archive
contains
VIRSIGS.CPS.
?and
capabilities of
.EXE,
and BOOTSAFE. To
VWatch, you
must get a new copy of the VWatch
Zand
Dand de
appear in
Ccolors.
l, or
`the
Dare affected by the
1.
TAB until the
f, or
+in the
2. Use the up and down arrow
Eyou
`, or
3.
TAB to move to the
+in the
4. Use the arrow
ENTER to
or de
it. You can
or de
left
; the right
1.
TAB until the
f, or
+the
2. Use the arrow
ENTER to
or de
it. You can
or de
left
; the right
,are
`the
}bar at
the top of the
. To
fletter of the
-. To close a
Esc or
+outside of the
Ione of the pull-down
<Smart
Set
Save
Send
Schedule
PZThe
Knot
. Instead, it
s you if it
[. If
sis on, it
s you if it
. Because
Zdo not usually
[could indicate
nby an
uyou
*the
<the
[, ignore the
[, or
. If the
, you
*the
If
sis on,
Bbox
Bbox allows you to
<the
[in question, in
addition to
To find and
Jing a
Bbox,
Zand
%the
notifying you. If you
to know whether
Zare
Once the
begins, you are
ed if either an
[or a
_. (Since
Zgenerally
[could indicate
nby an
Zare
Nthe
. If the
is on, the
Bbox
_. You can
, Repair, or
[in question.
Zand
PZUse the
-to self-protect
Zyou
jadds less
1K to a
[, but
Knot occupy
any space in
it is
k, the
[runs an
it is executed and
Ithe
if it
Self
[was
[R] Self Reconstruction
[C]
3execution
[E]
Vto DOS
Note
if a
lit,
s of
.EXE
2overlays or
oat the end
of the
[(usually debugging
.EXE
corrupted headers.
.EXE and .COM
Zsmaller
14 bytes (excluding the .EXE
header)
.COM
Zlarger
Any
[in the
built-in
or OS/2
Zloaded in CONFIG.SYS.
you attempt to
lany of
Bbox
uyou add the
[to the
Very rarely, a
may not function correctly
it has
k. If
should occur, use
jto restore
[and add the
[. You
add the
[to the
Zand
jcode
`the
If you
to recover the less
1K of
Gspace or
[to its
state, use
Zand
PZThe
r in
uses an expert
look for
code inside
Z. Analysis
a defense
. The
-allows you to
Zfor
analysis method.
NOTE: The
is provided for
researchers and
s testing the effectiveness of the
expert
You should not rely on it for ordinary use as
method
Aing
The best way to use the
analysis
Xis in
combination
*, and
Ais enabled in
the Set
Bbox (the
:setting), the
performs a
analysis and
$s for
s and Smart
you do a
Because it combines three
?methods,
the most comprehensive
Zand
<Smart
6New Smart
$s is enabled, a SMARTCHK.CPS
Eas it is
. The SMARTCHK.CPS
contains
store unique
sis on,
compares the
Zto the Smart
s you if
are any
. See the definitions of
and Smart
$in the
Although
?method
a good defense
, it consumes a small amount of
Gspace.
Note
you can re
Smart
can find the
o. Edit
.INI
[and replace the
SMARTCHK.CPS
to use.
any existing SMARTCHK.CPS
Zto match the
You can manually
<the
4by earlier
versions of
Zand
PZThe
uyou show or
vof all the
. The
, alias (if any),
, and
of variants (see
c). You can
oon specific
in the
v/Show
2all the
. The
, alias (if any),
, and
of variants. See the
cfor definitions of
`the
you can search for specific
v, or get
oon specific
For example, the
the Abraxas
is a
, adds 546 bytes to the
of the
[it infects, and has 2
known variants.
uyou
vof all the
. The
, alias (if
any),
, and
of variants (see
c). You can
oon specific
in the
s to the DOS
or whatever
launched
are asked to
`the
Save
to save any
made to the
session.
If a
session, you can
%to Re
To ensure
{is not
MA and
Setting
PZSet
allows you to
6New Smart
6Smart
$s on
]Anti-Stealth
Fast
$All
FAlarm Sound
Allow
6Backup
HotKey
are stored in the
.INI
[. If
requires the
enables
you to
Z, based on statistics stored in Smart
Zcan indicate the presence of a
sis on and you perform a
sis on,
you try to
run an
6Smart
$s on
6New Smart
PZUse
to take advantage of the
best defense
. If
6New Smart
$s is on,
5a Smart
[(SMARTCHK.CPS) for
[contains statistics
[in the
E, including the
9, and DOS
. On
uses
dnot
, and to restore the
[to its
state if it
uses the Smart
[to defend
6Smart
$s on
6Smart
$s on
along
6New Smart
$s, a
SMARTCHK.CPS
4for
Eon a
Gas it
is useful for creating Smart
$(see
ofor
Gs before you write-
protect the
Once the Smart
$s are
4, write-protect the
Gand turn
off.
of the
use the Smart
$s for
comparison and repair, but
them. If
is on
a write-protected
], a
indicating
write to the
Fast
is on,
speeds the
process by examining the Smart
if the
Although almost all
one of
infect a
[, a few do not. If you
the most comprehensive
possible and
Lmind slower
, you can turn
off.
examines the Smart
every
FAlarm Sound
PZIf you do not
a sound played
. The sound is useful for
attention, but
not required
you're
PSPT
6Backup
, a copy is made of any
before the
'. The copy is
extension .VIR.
can be dangerous,
h, because the
[remains on
G. You should
if, for
example, the
copy of a
and you
prefer to use an
rather
dit at all.
PZFor
o, such as the
strain and
, turn on
enabled,
if any
are written to a \REPORTS sub
xin the
You can view
directly
`the
Log by moving the
gbar over the
Log entry (it
Hin a
gcolor if an
) and
is run
M, the
NET: and the user
of the person who ran the
To set up
, the
administrator must assign read and write
rights to the
\REPORTS
Efor all users. In addition, the administrator
must assign read and write
rights to the
\ACTIVITY.CPS
for all users.
is taken in
.RPT, is an
text
xin the root
You can show,
, or clear the
-in the
Bbox is
`the
Bbox you can
repair the
3the
repairing the
[, or
is not
, the
ping to let you
is enabled,
employs an expert
to look for
code in the internal structure of
Z. Since
method is not
-based, it
a good
defense
are some
s placed in
Zto evade
based
?methods. Even
.by the manufacturer might inadvertently contain a
now has the ability to
$for
.by PKLITE (version 1.13
and earlier), LZEXE, and PKZIP (version 1.1 and earlier).
To be safe, you should run
you download
, or install new software
all new
, you can turn
Zuntil you install
or copy
again.
Anti-Stealth
protects
by looking for any
occur in
Z. Stealth
h, can evade
method by
a special
technique which allows them to infect
any outward signs
caused by
Stealth
Anti-Stealth
in addition to the
use a low-level
technique
@the
to Stealth-
PSPT
$All
$All
, all
Zare
$ed for
it is not
Zare
$ed.
the extensions 386, APP, BIN, CMD, COM, DLL, DRV, EXE, FON,
ICO, OV*, PGM, PIF, PRG, and SYS are considered
Note
.archive
the extensions ARJ and ZIP are
unless you turn on
, the
j, and
<Smart
}are
Fd. If you are
}, the
The main use of
Xis for
s managers. If
to make sure you know who has what
before they are
', you can set
users' machines. They
turn off the
unless they know the
Allow
Ms is allowed
r, you are
turn
affects both
.EXE) and the
Ithe
Bbox
allows you to
Smart
<the
3the
taking
. If
h, the
Bbox is
zand it
not match the Smart
Bbox
the execution of the
3the
taking
, or
the Smart
o. To
load
in the
Bbox
PZIf
[, it
Bbox
uyou
h, if
, you can
*the
[, the
resumes.
Fs the
in all
boxes.
Hotkey
PZThe
hotkey, Alt-V, enables you to
and to unload it
{. You can
hotkey by
Hotkey
To use
-, you must provide the
q, if a
was assigned.
PZIf
, the usual methods of
ping a
F3 or
Esc -- are
Save
saves all
in the
.INI
Note
several of the
affect
, which reads the
.INI
it is loaded.
|(the normal
|) to a
simplified
called the
}, which contains
five
,. (You can
F8 to switch to
main functions of
Aand
,both
on the entire
NOTE: If
in the
}, the
Aand
is not
in the
standard interface,
|. You
for the
q, if a
was assigned.
In the box to the right of the
s is
efor
. You can
F1 at any
PZMost, but not all,
Zcan be
k. To prevent the
jof unsuitable
Anti-
MENU02.EXE
Add
$s the
SETUP.EXE
WIN386.EXE
Knot modify any
TCC.EXE
on the
TD286.EXE
HELP!.EXE
Use the Add
to add
SCAN.EXE
should not be
DV.EXE
kto the
WP.EXE
HYPERDSK.EXE
OK
kinclude the
.COM
Zlarger
or OS/2
.EXE
2overlays or
oat the end of
the
.EXE and .COM
Zsmaller
14 bytes (excluding the .EXE
header)
Zloaded
`CONFIG.SYS.
PZTo avoid
s for
often,
v. For example, if
CONFIG.SYS frequently, you could add it to the
v. It would
be ignored
Smart
were verified. (If the
[was
mby a
h, you would still be
You can
Qup to 3,000
uyou
6) an
is issued. You can
Qa string of up
to 39 characters in the
field.
uyou
assigned
or, if none was assigned at
, to
6a new
In the
Bbox
%OK. You
be asked to
Qthe
again to
is required in the
^situations:
1.
`the
2.
`the
3.
the
`the
4.
the Send
5.
`the
6.
the
7.
the
If no
set, you
not be
for one.
Send
PZUse
send an
Novell user or group
. The
is in the form "User [YOUR USER NAME] has
Xis used to
administrator
a machine
on the
PZIf you
da hard
begins by
M. If you
to an
M(to
Gor an
hard
M), use the
-, the
Micon line
above the
[and
. To
gthe
Micon
the arrow
Q, or
Mletter, or
+the
Micon.
Scheduling
uses a separate
Scheduler, to schedule unattended
sessions. Note
the Scheduler
s in conjunction
CPSCHED, a TSR
requires
approximately 4K of
{. Scheduled
if CPSCHED is
loaded.
PZThe
uyou show,
, or clear the
and any
performed in
.RPT, is an
text
xin the root
Eof the
/Show
Ithe
and any
is performed in
Anti-
s the
and any
is performed in
Anti-
/Clear
<s the
and any
is performed in
Anti-
uyou use the
Log, which is a
of recent
?and
PC. You can show the log,
it, or clear it.
j, it
5an entry in the
log. The
log holds a maximum of 200 entries.
limit is
Oed, the oldest entry is
recorded.
Log/Show
Ithe
Log, which is a summary of the
?and
(sessions performed on
PC. You can
or clear
osuch as
strain and
, turn on
is enabled,
if any
are written to a
\REPORTS sub
xin the
.EXE
To view
directly
`the
Log, move the
gbar over the
Log entry, which is
an
s the
Log, a
of recent
?and
PC, if you
connected to
PC. You can
show the log or clear it.
-clears the
Log, a
of recent
?and
PC. All records in the
[are
so the
Log starts recording
in an empty
You can
show or
the log.
2a log of
9they
, and the user's response.
, is an
xin the
E, or the
Ewhere you
be useful for
administrators to keep track of any
s for users on the
uyou show,
clear the
/Show
Ithe
, is an
xin the
E, or the
Ewhere you
s the
, is an
xin the
E, or the
Ewhere you
/Clear
PZClears the
, is an
xin the
E, or the
Ewhere you
>and
the results of the
. The
table
how many
Gs and
Zof various
s were
$ed, how
many were
, and how many were
At the bottom of the table,
how long the
$ing and
(took.
%OK to close the
Bbox and
to the
Bbox asks you to
and if so, whether to save the
$All
, all
Zare
$ed for
it is turned off,
Zare
$ed.
the extensions 386, APP, BIN, CMD, CPM, DLL, DRV, EXE, FON,
ICO, PGM, PIF, PRG, PV*, or SYS.
k/Dis
Bbox
the results of the
Note
@any
l/dis
, the
Zare
<Smart
Bbox asks you to
Smart
Z(SMARTCHK.CPS).
Zstore Smart
o(see
If you
<the Smart
Zto save
Gspace, make sure you
turn off the
6New Smart
$s and
in the
}. If you
L, the Smart
Zare re-
For maximum confidence, you should
<the Smart
periodically and re
6them.
Clear
PZIn
Bbox,
%OK to clear the
Log. The
[, ACTIVITY.CPS, is
%Cancel to leave the
[as it is and close the
Bbox.
. You are
for a
if it was set.
as many as 39 characters to appear in a
Bbox
is shown.
If you
the Show on
the custom
Knot appear
is a
R. It
a known
Qthe
to be given
[ ] Show on
Cancel
%Send
Bbox
. You are
for a
if it is set.
Qthe
for the user who
receive the
Cancel
the user
%OK. If a
broadcasts a
to the user in the form "User
[YOUR USER NAME] has
...".
Log Cleared
Bbox
uyou know
Log has
cleared.
%OK to close the
Bbox and
ing in
PZTo
1. In the
Bbox,
Qthe
if any, and
2.
a new
3.
the new
again to
it and
%OK to accept
the new
1. In the
Bbox,
Qthe
if any, and
2.
for a new
3.
Qagain to
it and
PZTo
1. In the
Bbox,
Qthe
if any, and
2.
a new
3.
the new
again to
it and
%OK to accept
the new
1. In the
Bbox,
Qthe
if any, and
2.
for a new
3.
Qagain to
it and
PZIf you
dset a
s you for it
`the
is set either
qor by
Cancel
two similar
Bboxes
let you
add and
`either the
vor the
Zadded to the
vare skipped
you use
X. A
should not be
kis provided.
Smart
$s are not verified for
Zadded to the
v. The
Zare
$ed for
vis useful if you
to be
ed for
often, such as CONFIG.SYS. You can
Qup to 3,000
Qthe
of the
Bbox) or verified (
Bbox)
%OK. The
is added to the
v. Every
occurrence of
is ignored
Pause
Esc to interrupt
it is
to end
completely, or
3to finish the
Fatal
Bbox
serious
Please refer to the Troubleshooting section of the
ed manual for
Bbox
session.
d the
. To make sure
is eradicated
{as well as
`the
G, you should
Bbox
a new
[has
Bbox
has done so much damage to
be recovered. Because vital
ohas
destroyed,
is unable to restore the
condition.
<the
`the
is completed, restore the
most recent
backup or
`the
G, and run
again to
indicates
We strongly recommend you
and prevent
further
3to ignore the
the remaining
to the
Viral code F was
_in: APPNAME.EXE
Viral code F
means
infector. Viral
code B means
infects the
`the
[and restore it to its
condition, so
not be
3to ignore the
the remaining
to the
<the
If you are
G, make sure
Gis correctly
inserted in the
Mand
it is not write-protected.
If you are
a hard
and run a
analysis and correction
is appropriate for the
G, such
as PC Tools
GFix or DOS CHKDSK.
If the
Guses
ion software, such as Stacker or DOS 6.0
DoubleSpace, refer to the software documentation for
Ready
Ithe
Ready
Bbox to make
sure the
is ready before proceeding. If
's power is
off, or no
is hooked up to
PC, you
get a
you try to
ed on
LPT1
MLine
PZThe
Micon line
icons for the
Ms in the
Micon is
Micon line
}(in
|), or
M, hold down Ctrl
Mletter, or
+the
Micon. The
Myou
PZThe
vs the
on the
, you can
*, or
:, all the
Don the
Mare
first start
vs the
Zin the
To
or de
Zto be
k, or
dis
+the
the space bar
As you
Din the
, the
Zin the
Eare
Hin the
Zand
PZThe
Zon the
and un
entries appear
Ccolors in the
:, which can be
Dand
by setting the
$All
, is for all
Zto be
. As
D, the
to reflect the
Zand
Dremaining to be
PZThe
indicates the last
, if any. For
particular
, open the
Last
PZThe Last
tells you what
was most recently taken
;, re
verified,
k, or dis
k), and the
PSPT
performs an
, a summary of the
is recorded in the
log. The
(ACTIVITY.CPS) holds a maximum of 200 entries.
limit is
Oed, the oldest entry is
recorded.
If a
Nthe
the entry
pto get
(REPORT.XXX) associated
must be turned on for
be generated. If no
Nthe
If you
the log,
PZIf
is turned on and a
9and
of the
strain
and path of
are written to a \REPORTS sub
xin the
.EXE
To view the
, use the
in the
PZIf the
ls, or
You can show,
, or clear the
contains a log of any
, the
, and the user's response.
is an
xin the
E, or the
Ewhere you
PZThe
vof all the
. The
for the
in the first column
s for the
(if any) appear
indented underneath it. The
variants (see
in the far right column.
oon a particular
git in the
vand
To search the
vfor a particular
Qthe
the blank field.
gs the
comes closest to matching
entry. You can
oon the
You can
the entire
vif you wish.
PZThe
Its
in bytes
The kind of
Zit attacks
Whether it is
{resident
Its side effects
100%
the entire
Mfor
progress pane
percentage of
100%
To interrupt the
at any
Esc,
the F3 key, or
+F3 in the function key
vat the bottom of the
If a
sounds an alarm and
suggests a solution.
the entire
Mhas
, the
>and
100%
Mand
s any
\. A progress
pane
the percentage of
100%
Dand
To interrupt the
at any
If a
it and
the Last
Taken
the entire
Mhas
, the
>and
were
_and
-allows you to
-, the
Mline
Micon
the arrow
Mletter, or
+the
Micon. The
oarea at the bottom of the
. In
|, all of the
. You can
individual
Zand
*, or
%the
-in the
}, you
Qthe
, if one was assigned. The
can be set
qor by
}) in
s the
launched it or to the DOS
you are asked to
`the
the Save
to save any
made to
session.
Log Cleared
PZThe
Log Cleared
Bbox indicates
all the entries in the
Log are now
Corrupted
Pa corrupt
You can finish
and run a
Ganalysis and correction
, such as PC Tools
GFix, to
correct the problem.
Wrong DOS Version
PZThe version of DOS you are
is not
ed by
s DOS 3.3 and later.
Not Ready
. Make sure
is turned on, loaded
paper, and connected to
computer.
are sent to the
connected to LPT1.
Not Allowed
PZThe Allow
-to enable
. You are
for the
if one was set.
is not enough
to complete the
Try removing TSR
To save
{, you can load TSRs high, or run a
such as PC
Tools 8.0 RAMBoost or MS DOS 6.0 MemMaker
optimizes
G-related
Rhas
If you are
G, make sure
Gis correctly
inserted in the
M, the
Mdoor is latched, and the
Gis not
write-protected.
If the
Rpersists, or you are
a hard
M, use Central
GFix or DOS CHKDSK to
and repair the
See Also
Immune Impossible
could not
lthe
lthe
s of
.EXE
2overlays or
oat the end
of the
[(usually debugging
.EXE
corrupted headers.
.EXE and .COM
Zsmaller
14 bytes (excluding the .EXE
header)
.COM
Zlarger
2an independent self-
$ing system
or OS/2
Zloaded
`CONFIG.SYS.
To avoid
in future
, you can add the
[to the
in the
>but could not be
`the
Please contact
Software
*the
[: APPNAME.EXE has
s you
Smart
Attribute:
.R..
. Since
23:09:14
09:07:18
Zdo not
03/27/90
02/27/91
usually
139793
139743
might indicate
FF4C
FDF2
nby an
marks the
in the Smart
$database as permanent so
~are not
Nlater
you know why the
[was
s the
3resumes the
the Smart
$data base.
cancels the
the Smart
$database.
_an unidentified
of the
specified
in the
are of one of the
^seven
Start COM
code
at the beginning of a .COM
End COM
code
at the end of a .COM
Swap COM
has written its code at the beginning of a
.COM
[and moved the true beginning bytes to the
end of the .COM
Cut Extra
code
at the beginning of a .COM
and a few bytes of
code
appear at the end
of the
End EXE
code
at the end of the
Swap COM2
has written its code at the beginning of a
.COM
[and moved the true beginning bytes to the
end of the .COM
[. A few bytes of
code are
added to the end of the .COM
Suspicious
do not match any particular
pattern
_in the code of the
%one of
*repairs the
[by removing the
code.
3resumes the
removing the
code.
cancels the
removing the
code.
Control
Control
Version...
Alt+Space or
close box in the upper-
Close Alt+F4
left corner of the
To see copyright
ofor the
Version.
To
to the
+the Version
close box or
To
%Close. Answer Y in the
1ation
Bbox. To
1ation, double-
+the
close box.
find the
[it uses
Aand
*known
uses a
SMARTSIG.CPS. If
[is missing or corrupted, you can copy the
{For
is insufficient
{to add an
Tto the
v. Try
freeing
{by removing TSR
PZThe
log, ACTIVITY.CPS,
Eto see if the
[was
{For log
is insufficient
Jthe
Try freeing
{by removing TSR
To save
{, you can load TSRs high, or run a
such as PC
Tools 8.0 RAMBoost or MS DOS 6.0 MemMaker
optimizes
See Also
Not Enough
is insufficient
Jthe
Try freeing
{by removing TSR
To save
{, you can load TSRs high, or run a
such as PC
Tools 8.0 RAMBoost or MS DOS 6.0 MemMaker
optimizes
PZYou are attempting to
[. Deleting
cause serious problems including not being able to
[Corrupt
PZThe
[may
corrupted.
If you are
G, make sure
Gis correctly
inserted in the
Mand
it is not write-protected.
If you are
a hard
and run a
analysis and correction
is appropriate for the
G, such
as PC Tools
GFix or DOS CHKDSK.
If the
Guses
ion software, such as Stacker or DOS 6.0
DoubleSpace, refer to the software documentation for
[Too Big
PZThe
.INI) is larger
24K. You
it manually.