
D E F I N I N G S E T T I N G S
To change extensions of infected, suspicious and corrupted
files,
in the sections listed above:
•
Type
Yes
in the
ChangeExt
lines.
•
Define the target extension for the files in the
NewExtension
line.
For example, you may type
vir
for infected files,
susp
for suspi-
cious files and
corr
for
corrupted files.
To change the name of the owner of infected, suspicious and
corrupted files that the program failed to desinfect,
define the target name in the
ChownTo
lines of the above sections. If
you do not want to make the changes, type
None
.
To change access attributes of infected, suspicious and cor-
rupted files that the program failed to desinfect,
define the target attribute mask in the
ChModTo
lines of the above sec-
tions. For example, the value
640
assigns the following attributes to the
file:
Read by owner
,
Write by owner
and
Read by group
. If you do not want
to make the changes, type
No
.
Be careful when handling infected and suspicious objects or their
copies! If some executable file is infected, do not start it.
5.4.4. Defining the reporting
parameters
To review results of the check performed by the program you must define
its reporting parameters located in the
[Report]
section of a profile. This sec-
tion also allows you to enable/disable additional information in the log.
61