A P P E N D I X B
Directories defined by the
InfectedFolder, SuspiciousFolder
and
Corrupt-
edFolder
parameters (see subchapter 5.4.3) will be automatically ig-
nored by the program.
Packed
–
Yes
in this line enables the unpacking engine and checks
packed files.
No
disables the engine.
Archives
–
Yes
in this line enables the extracting engine and checks
archives.
No
disables the engine.
SelfExtArchives
–
Yes
in this line enables the program to check for vi-
ruses in self-extracting archives.
No
disables this feature.
MailBases
–
Yes
in this line enables the program to check for viruses
in mail databases.
No
disables this feature.
MailPlain
–
Yes
in this line enables the program to check for viruses in
plain mail files.
No
disables this feature.
Embedded
–
Yes
in this line enables the program to check for viruses
in OLE objects embedded in the examined files.
No
disables this
feature.
InfectedAction
– here you must define one of the values listed below:
0
– report infected, suspicious and corrupted objects;
1
– ask how to process the infected object;
2
– disinfect the infected object without asking first;
3
– delete the infected object without asking first.
The value
1
(ask how to process the infected object) is the best
choice of action. In this case when some infected object is detected
the program first asks a user how this object should be processed.
BackupInfected
–
Yes
in this line enables the program to
copy infected
files, before they are disinfected, to a separate directory defined
by the
InfectedFolder
parameter
. No
disables this feature.
IfDisinfImpossible
– here you must define one of the values listed be-
low:
0
– reports unrecoverable objects;
1
– deletes unrecoverable objects.
242