CHAPTER 10
247
All ZIP packages should be named using only English letters or/and
numbers. You can use long file names. If you send multiple archives (for
example because of e-mail server limitations) please either send them in
separate messages or add a counter to the archive parts, for example:
sample_part1.zip
sample_part2.zip
...
sample_part18.zip
10.4.2 What Should Be Sent
Viruses are not all of the same type, so they cannot all be sent in one
specific way. The following lists what to send according to the virus types:
1.
Macro virus
Send an infected copy of the NORMAL.DOT file (the global template)
in addition to the infected DOC files. With Excel viruses, send the
PERSONAL.XLS file, if it exists, in addition to the infected XLS files. If
the macro virus also infected other applications (for example Tristate),
send a sample of every file type.
2.
Virus that infects executable files
Try to get different infected files from your system. Usually 3-5
different samples are enough. If possible, add clean copies of the
same files as well (taken from backups). To do this, use two
directories in your zip file, for example:
ORIGINAL\APPPEND.EXE
ORIGINAL\COMMAND.COM
INFECTED\APPEND.EXE
INFECTED\COMMAND.COM
Your e-mail server or ISP (Internet Service Provider) may have an
e-mail scanner (antivirus program that checks all incoming and
outgoing messages for viruses). Your virus samples might be
deleted before they get to us. Send samples in a
password-protected ZIP archive. You can send the password for
the archive in the same or in a separate e-mail.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...