McAfee VCLCDE-AA-DA - VirusScan Command Line Scanner Standard Скачать руководство пользователя страница 2

COPYRIGHT

Copyright © 2007 McAfee, Inc. All Rights Reserved. 

No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form 
or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. 

TRADEMARK ATTRIBUTIONS

ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN 
(STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), 
INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN, 
MCAFEE.COM, MCAFEE VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE, 
PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN 
KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are registered trademarks or trademarks of McAfee, Inc. and/or its 
affiliates in the US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered 
and unregistered trademarks herein are the sole property of their respective owners.

LICENSE INFORMATION
License Agreement

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE 
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE 
CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU 
HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU 
DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF 
APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 

Attributions

This product includes or may include:

• Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).  • Cryptographic software written by Eric 
A. Young and software written by Tim J. Hudson.  • Some software programs that are licensed (or sublicensed) to the user under the GNU 
General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute 
certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL which 
is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software 
covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee provide rights to use, 
copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the 
rights and restrictions herein.  • Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer.  • Software 
originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier.  • Software written by Douglas W. Sauder.  • Software developed by the 
Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at 
www.apache.org/licenses/LICENSE-2.0.txt.  • International Components for Unicode ("ICU") Copyright ©1995-2002 International Business 
Machines Corporation and others.  • Software developed by CrystalClear Software, Inc., Copyright ©2000 CrystalClear Software, Inc.  • FEAD

®

 

Optimizer

®

 technology, Copyright Netopsystems AG, Berlin, Germany.  • Outside In

®

 Viewer Technology ©1992-2001 Stellent Chicago, Inc. and/or 

Outside In

®

 HTML Export, © 2001 Stellent Chicago, Inc.  • Software copyrighted by Thai Open Source Software Center Ltd. and Clark Cooper, 

© 1998, 1999, 2000.  • Software copyrighted by Expat maintainers. • Software copyrighted by The Regents of the University of California, © 1996, 
1989, 1998-2000.  • Software copyrighted by Gunnar Ritter.  • Software copyrighted by Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, 
California 95054, U.S.A., © 2003. • Software copyrighted by Gisle Aas. © 1995-2003.  • Software copyrighted by Michael A. Chase, © 1999-2000.  
• Software copyrighted by Neil Winton, ©1995-1996.  • Software copyrighted by RSA Data Security, Inc., © 1990-1992.  • Software copyrighted by 
Sean M. Burke, © 1999, 2000.  • Software copyrighted by Martijn Koster, © 1995.  • Software copyrighted by Brad Appleton, © 1996-1999.  
• Software copyrighted by Michael G. Schwern, ©2001.  • Software copyrighted by Graham Barr, © 1998.  • Software copyrighted by Larry Wall 
and Clark Cooper, © 1998-2000.  • Software copyrighted by Frodo Looijaard, © 1997.  • Software copyrighted by the Python Software Foundation, 
Copyright © 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org.  • Software copyrighted by 
Beman Dawes, © 1994-1999, 2002.  • Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek © 1997-2000 University of Notre 
Dame.  • Software copyrighted by Simone Bordet & Marco Cravero, © 2002.  • Software copyrighted by Stephen Purcell, © 2001.  • Software 
developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/).  • Software copyrighted by International Business 
Machines Corporation and others, © 1995-2003.  • Software developed by the University of California, Berkeley and its contributors.  • Software 
developed by Ralf S. Engelschall <[email protected]> for use in the mod_ssl project (http:// www.modssl.org/).  • Software copyrighted by 
Kevlin Henney, © 2000-2002.  • Software copyrighted by Peter Dimov and Multi Media Ltd. © 2001, 2002.  • Software copyrighted by David 
Abrahams, © 2001, 2002. See http://www.boost.org/libs/bind/bind.html for documentation.  • Software copyrighted by Steve Cleary, Beman 
Dawes, Howard Hinnant & John Maddock, © 2000.  • Software copyrighted by Boost.org, © 1999-2002.  • Software copyrighted by Nicolai M. 
Josuttis, © 1999.  • Software copyrighted by Jeremy Siek, © 1999-2001.  • Software copyrighted by Daryle Walker, © 2001.  • Software copyrighted 
by Chuck Allison and Jeremy Siek, © 2001, 2002.  • Software copyrighted by Samuel Krempp, © 2001. See http://www.boost.org for updates, 
documentation, and revision history.  • Software copyrighted by Doug Gregor ([email protected]), © 2001, 2002.  • Software copyrighted by 
Cadenza New Zealand Ltd., © 2000.  • Software copyrighted by Jens Maurer, ©2000, 2001.  • Software copyrighted by Jaakko Järvi 
([email protected]), ©1999, 2000.  • Software copyrighted by Ronald Garcia, © 2002.  • Software copyrighted by David Abrahams, Jeremy 
Siek, and Daryle Walker, ©1999-2001.  • Software copyrighted by Stephen Cleary ([email protected]), ©2000.  • Software copyrighted by 
Housemarque Oy <http://www.housemarque.com>, © 2001.  • Software copyrighted by Paul Moore, © 1999.  • Software copyrighted by Dr. John 
Maddock, © 1998-2002.  • Software copyrighted by Greg Colvin and Beman Dawes, © 1998, 1999.  • Software copyrighted by Peter Dimov, 
© 2001, 2002.  • Software copyrighted by Jeremy Siek and John R. Bandela, © 2001.  • Software copyrighted by Joerg Walter and Mathias Koch, 
© 2000-2002.  • Software copyrighted by Carnegie Mellon University © 1989, 1991, 1992.  • Software copyrighted by Cambridge Broadband Ltd., 
© 2001-2003.  • Software copyrighted by Sparta, Inc., ©  2003-2004.  • Software copyrighted by Cisco, Inc. and Information Network Center of 
Beijing University of Posts and Telecommunications, © 2004.  • Software copyrighted by Simon Josefsson, © 2003.  • Software copyrighted by 
Thomas Jacob, © 2003-2004.  • Software copyrighted by Advanced Software Engineering Limited, © 2004.  • Software copyrighted by Todd C. 
Miller, © 1998.  • Software copyrighted by The Regents of the University of California, ©  1990, 1993, with code derived from software contributed 
to Berkeley by Chris Torek. 

PATENT INFORMATION

Protected by US Patents 

6,029,256; 6,496,875; 6,668,289.

 

Issued July 2007 / VirusScan

®

 Command Line software version 5.20.0 

DBN-004-EN

Содержание VCLCDE-AA-DA - VirusScan Command Line Scanner Standard

Страница 1: ...Product Guide VirusScan Command Line version 5 20 0 McAfee System Protection Industry leading intrusion prevention solutions...

Страница 2: ...t 2001 Stellent Chicago Inc Software copyrighted by Thai Open Source Software Center Ltd and Clark Cooper 1998 1999 2000 Software copyrighted by Expat maintainers Software copyrighted by The Regents o...

Страница 3: ...8 Scanning protected files 18 Using memory caches 19 Scanning processes in memory 20 Running an on demand scan 20 Command line conventions 21 General hints and tips 21 Configuring scans 22 Creating a...

Страница 4: ...4 VirusScan Command Line 5 20 0 Product Guide Contents Updating your DAT files 43 Index 44...

Страница 5: ...horse programs and other types of potentially unwanted software The command line scanner enables you to search for viruses in any directory or file in your computer on demand in other words at any ti...

Страница 6: ...pgrade just replace your existing Engine with the new version and you re protected No worrying about compatibility Using this guide This guide provides information on installing configuring and using...

Страница 7: ...emphasis or when introducing a new term for names of product documentation and topics headings within the material Example Refer to the VirusScan Enterprise Product Guide for more information Blue A...

Страница 8: ...accessed from the software application Release Notes ReadMe Product information resolved issues any known issues and last minute additions or changes to the product or its documentation A text file is...

Страница 9: ...h Releases For Security Vulnerabilities Available to the public For Products ServicePortal account and valid grant number required Product Evaluation McAfee Beta Program Technical Support http www mca...

Страница 10: ...or equivalent processor 10 MB of free hard disk space for a full installation For Microsoft Windows 98 systems a minimum of 64 MB RAM is required 128 MB IS recommended For Microsoft Windows NT and lat...

Страница 11: ...a workstation logs on to a Novell NetWare server To enable the scanner to run on a personal computer before it can logon to a Novell NetWare server use the following steps immediately after installati...

Страница 12: ...LEVEL 20 GOTO ERR20 IF ERRORLEVEL 19 GOTO ERR19 IF ERRORLEVEL 15 GOTO ERR15 IF ERRORLEVEL 13 GOTO ERR13 IF ERRORLEVEL 10 GOTO ERR10 IF ERRORLEVEL 8 GOTO ERR8 IF ERRORLEVEL 6 GOTO ERR6 IF ERRORLEVEL 2...

Страница 13: ...E EXE on all of its program files and DAT files To ensure that you have exactly the same files as the original software you need to compare the validation codes that VALIDATE EXE generates against the...

Страница 14: ...pe the following character string as one line with no spaces or line breaks X5O P AP 4 PZX54 P 7CC 7 EICAR STANDARD ANTIVIRUS TEST FILE H H 2 Save the file with the name EICAR COM The file size will b...

Страница 15: ...ontains the VirusScan Command Line files as set up in Step 1 under Installing the software on page 11 2 Delete all files in the directory Caution Removing the software leaves your computer unprotected...

Страница 16: ...ing features offer optimum protection for your computer and network On demand scanning options let you start a scan immediately or schedule automatic scans Advanced heuristic analysis detects previous...

Страница 17: ...orts these items enabling you to remove them if necessary Scanning diskettes Diskettes pose a threat because many viruses infect computers when a computer boots from an infected disk or when users cop...

Страница 18: ...reams within the file independent executable program modules as well as various service streams such as file access rights encryption data and processing time Unfortunately some streams might contain...

Страница 19: ...ile read instead The size of reads for this cache is determined by a value in the range 0 through 4 as follows OCRS 0 128KB OCRS 1 256KB OCRS 2 512KB OCRS 3 1MB OCRS 4 2MB OCMAX The OCMAX option chang...

Страница 20: ...ile or directory on your file system from the command line by adding options to the basic command When executed without options the program simply displays a brief summary of its options When executed...

Страница 21: ...e assumes that the scanner is available in your search path To have the program examine a specific file or list of files add the target directories or files to the command line after SCAN You can limi...

Страница 22: ...CAN LOAD FILENAME TARGET Here FILENAME is the name of the text file you created in steps Step 2 and Step 3 and TARGET is the file or directory you want to scan If the scanner detects no virus infectio...

Страница 23: ...the directory DIR1 and all its subdirectories and produces information on screen SCAN C DIR1 SUB To produce a simple list of infected files you can add the BADLIST option SCAN C DIR1 SUB BADLIST BAD1...

Страница 24: ...ut the computer does not use all the possible numbers By searching for unexpected numbers inside a program file the scanner can detect an encrypted virus By using these techniques the scanner can dete...

Страница 25: ...not scanned for macros Table 3 2 Scanning options Option Limitations Description AD None Same as ALLDRIVES ADL None Scan all local drives including compressed and PC drives in addition to any other dr...

Страница 26: ...ime See also NORECALL and Scanning files in remote storage on page 18 DRIVER None Specify the location of the DAT files SCAN DAT NAMES DAT and CLEAN DAT If you do not specify this option in the comman...

Страница 27: ...command This option is a subset of ANALYZE See Using heuristic analysis on page 24 for more information MANY None Scan multiple disks consecutively in a single drive The program prompts you for each...

Страница 28: ...ote on page 29 Do not scan document files This includes Microsoft Office documents OLE2 PowerPoint CorelDraw WordPerfect RTF Visio Autodesk Autocad 2000 Adobe PDF 5 and Corel PhotoPaint 9 files NOEXPI...

Страница 29: ...ontains not its subdirectories Use this option to scan all subdirectories within the specified directories This option is not necessary if you specify an entire drive as a target TIMEOUT SECONDS None...

Страница 30: ...essage except a backslash Messages beginning with a slash or a hyphen must be placed in quotation marks DAM None Delete all macros in a file if an infected macro is found If you suspect you have an in...

Страница 31: ...n about renaming see Table 4 1 on page 40 See If the scanner detects a virus on page 40 for more information PAUSE Do not use with report options Enable a screen pause When the screen is full of messa...

Страница 32: ...information to the end of the file instead of overwriting it You can also use RPTALL RPTCOR and RPTERR to add more information to the report You can include the destination drive and directory such a...

Страница 33: ...command line options each with a brief description You can add a list of scanning options to a report file To do this type at the command prompt SCAN REPORT FILENAME The report is appended with the fu...

Страница 34: ...ile instead of overwriting it page 32 APPENDBAD Append names of infected files to an existing file as specified by BADLIST page 26 BADLIST FILENAME Create a list of infected files page 26 BEEP Issue a...

Страница 35: ...Microsoft Office compound documents that are password protected page 28 NODOC Do not scan document files page 28 NOEXPIRE Disable the expiration date message if the scanner s DAT files are out of date...

Страница 36: ...nACE CAB and CHM formats page 29 WINMEM Scan inside running processes page 29 VIRLIST Display the name of each virus that the scanner can detect page 32 Table 3 6 Alphabetic list of options continued...

Страница 37: ...Where an option has a parameter insert only one space between them For example the following commands are intended to scan all directories on the C disk and list any infected files in the file named B...

Страница 38: ...inate one potential cause of your computer problems To clean your computer If your computer has a virus or you suspect it has and you have not yet installed the on demand scanner follow these steps 1...

Страница 39: ...nect to the network and begin the installation procedure described on page 10 To find and remove the possible source of infection scan your diskettes immediately after installation For information see...

Страница 40: ...r BAD V02 and so on For file extensions with more than three letters the name is usually not truncated For example NOTEPAD CLASS becomes NOTEPAD VLASS However an infected file called WATER VAPOR becom...

Страница 41: ...hard disks To clean the Master Boot Record MBR on a hard disk formatted with the Microsoft Windows NT file system NTFS 1 Start the computer that has the NTFS file system partition from a virus free M...

Страница 42: ...ble we continually update the definition DAT files that the VirusScan Command Line software uses to detect potentially unwanted software For maximum protection you should regularly retrieve these file...

Страница 43: ...iles When you are selecting the latest version of DAT file ignore any reference to SuperDAT a self installing DAT file You cannot use this type of file with the command line scanner To use the new DAT...

Страница 44: ...ess disabling with scanner 28 directories scanning 29 diskettes 27 disks scanning 17 scanning multiple 27 DLL scanning 20 DOS 11 download website 9 drives scanning local 25 scanning network 25 E EICAR...

Страница 45: ...ral 25 report 32 response and notification 30 P password protected files 41 pattern files See DAT files PAUSE do not use with report options 31 not with REPORT 32 pausing when displaying scanner messa...

Страница 46: ...ormation Library See Avert Labs Threat Library virus scanning displaying message when virus is found 30 preventing users from halting 27 viruses detected error level for 36 displaying list of detected...

Отзывы: