User Guide
Page 2
... Hunter, ISDN Tel/Scope, LM 1, LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, ... TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000 are...
... Hunter, ISDN Tel/Scope, LM 1, LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, ... TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000 are...
User Guide
Page 3
... requirements 37 Other recommendations 37 Preparing to contact McAfee and Network Associates xviii Customer service xviii Technical support xix Download support xx Network Associates training xx Comments and feedback xx Reporting new items for anti-virus data file updates xxi International contact information xxii... Chapter 1. Table of Contents Preface ix What happened ix Why worry ix Where do viruses come from x Virus prehistory x Viruses and the PC revolution xi On the frontier xiv Where next xvi How to protect yourself xvii How to ...
... requirements 37 Other recommendations 37 Preparing to contact McAfee and Network Associates xviii Customer service xviii Technical support xix Download support xx Network Associates training xx Comments and feedback xx Reporting new items for anti-virus data file updates xxi International contact information xxii... Chapter 1. Table of Contents Preface ix What happened ix Why worry ix Where do viruses come from x Virus prehistory x Viruses and the PC revolution xi On the frontier xiv Where next xvi How to protect yourself xvii How to ...
User Guide
Page 4
... suspect you have a virus 61 Deciding when to scan for viruses 64 Recognizing when you don't have a virus 65 Understanding false detections 66 Responding to viruses or malicious software 67 Submitting a virus sample 78 Using the ...SendVirus utility to submit a file sample 78 Capturing boot sector, file-infecting, and macro viruses 81 Chapter 4. Using the VShield Scanner 87 What does the VShield scanner do 193 Why schedule scan operations 193 Starting the VirusScan Console 194 iv McAfee VirusScan Anti-Virus...
... suspect you have a virus 61 Deciding when to scan for viruses 64 Recognizing when you don't have a virus 65 Understanding false detections 66 Responding to viruses or malicious software 67 Submitting a virus sample 78 Using the ...SendVirus utility to submit a file sample 78 Capturing boot sector, file-infecting, and macro viruses 81 Chapter 4. Using the VShield Scanner 87 What does the VShield scanner do 193 Why schedule scan operations 193 Starting the VirusScan Console 194 iv McAfee VirusScan Anti-Virus...
User Guide
Page 5
Using Specialized Scanning Tools 255 Scanning Microsoft Exchange and Outlook mail 255 When and why you should use the E-Mail Scan extension 255 Using the E-Mail Scan extension 256 Configuring the E-Mail Scan extension 257 Scanning cc:Mail 271 Using the ScreenScan utility 271 Chapter 9. Using VirusScan Utilities 279 Understanding the VirusScan control panel 279 Opening the VirusScan control panel 279 Choosing VirusScan control panel options 280 Using the Alert Manager Client Configuration utility 283 VirusScan software as an Alert Manager client 284 Configuring the Alert Manager ...
Using Specialized Scanning Tools 255 Scanning Microsoft Exchange and Outlook mail 255 When and why you should use the E-Mail Scan extension 255 Using the E-Mail Scan extension 256 Configuring the E-Mail Scan extension 257 Scanning cc:Mail 271 Using the ScreenScan utility 271 Chapter 9. Using VirusScan Utilities 279 Understanding the VirusScan control panel 279 Opening the VirusScan control panel 279 Choosing VirusScan control panel options 280 Using the Alert Manager Client Configuration utility 283 VirusScan software as an Alert Manager client 284 Configuring the Alert Manager ...
User Guide
Page 6
... incremental .DAT files 321 How does iDAT updating work 322 What does McAfee post each week 323 Best practices 324 Frequently asked questions 325 Index 327 vi McAfee VirusScan Anti-Virus Software Network Associates Support Services 297 Adding value to your McAfee product 297 PrimeSupport options for corporate customers 297 Ordering a corporate PrimeSupport plan...
... incremental .DAT files 321 How does iDAT updating work 322 What does McAfee post each week 323 Best practices 324 Frequently asked questions 325 Index 327 vi McAfee VirusScan Anti-Virus Software Network Associates Support Services 297 Adding value to your McAfee product 297 PrimeSupport options for corporate customers 297 Ordering a corporate PrimeSupport plan...
User Guide
Page 7
...other aspects of a virus infection is twofold. But with more productive activities. The good news is only a matter of time before you could do . Why worry? Second, even "benign" viruses can disrupt your knowledge. If you know first-hand how computer viruses and other harmful ...can serve as your computer ground to a halt only to avoid discovery. Often, the primary consequence of the computing environment. Some viruses contain bugs, poorly written code, or other software. Beyond these problems lies a problem of infection for abusive e-mail messages you never...
...other aspects of a virus infection is twofold. But with more productive activities. The good news is only a matter of time before you could do . Why worry? Second, even "benign" viruses can disrupt your knowledge. If you know first-hand how computer viruses and other harmful ...can serve as your computer ground to a halt only to avoid discovery. Often, the primary consequence of the computing environment. Some viruses contain bugs, poorly written code, or other software. Beyond these problems lies a problem of infection for abusive e-mail messages you never...
User Guide
Page 8
...forms of malicious software appearing in the wake of themselves, but without necessarily using host software in worm software. viii McAfee VirusScan Anti-Virus Software Some estimates have identified a number of computer prank playing most likely contributed to me? Who writes them ?... rivals. Slade reports that computer scientists at more malicious uses of the programming techniques found uses for merely detecting and cleaning virus infections at a Xerox Corporation research facility called programs like these "worms," a term coined after the scientists noticed "holes"...
...forms of malicious software appearing in the wake of themselves, but without necessarily using host software in worm software. viii McAfee VirusScan Anti-Virus Software Some estimates have identified a number of computer prank playing most likely contributed to me? Who writes them ?... rivals. Slade reports that computer scientists at more malicious uses of the programming techniques found uses for merely detecting and cleaning virus infections at a Xerox Corporation research facility called programs like these "worms," a term coined after the scientists noticed "holes"...
User Guide
Page 9
... behavior that, if triggered, causes effects that range from an infected floppy found it included system files. Users thereby loaded the virus into memory every time they could substitute their metaphorical resemblance to the ancient Greek gift to the city of Troy, remain a ...horse" programs or "Trojans," so dubbed for their own program for the executable code present on other unpleasant consequences. As further catalyst, virus writers found themselves reading an ersatz "advertisement" for a computer consulting company in Pakistan. Those who bought PCs have their own ends. ...
... behavior that, if triggered, causes effects that range from an infected floppy found it included system files. Users thereby loaded the virus into memory every time they could substitute their metaphorical resemblance to the ancient Greek gift to the city of Troy, remain a ...horse" programs or "Trojans," so dubbed for their own program for the executable code present on other unpleasant consequences. As further catalyst, virus writers found themselves reading an ersatz "advertisement" for a computer consulting company in Pakistan. Those who bought PCs have their own ends. ...
User Guide
Page 10
...overcame this limitation, sometimes with fairly clever programming. Among other software to help replicate their repertoire of tricks. Many McAfee anti-virus products anticipate this possibility by means of floppy disks or other removable media, riding concealed in that infect your ... each time a user entered any standard DOS command that when users start a program, the virus code executes immediately, then transfers control back to the legitimate software, which it activates, the virus "hooks" or "traps" requests that legitimate software makes to the operating system and substitutes its...
...overcame this limitation, sometimes with fairly clever programming. Among other software to help replicate their repertoire of tricks. Many McAfee anti-virus products anticipate this possibility by means of floppy disks or other removable media, riding concealed in that infect your ... each time a user entered any standard DOS command that when users start a program, the virus code executes immediately, then transfers control back to the legitimate software, which it activates, the virus "hooks" or "traps" requests that legitimate software makes to the operating system and substitutes its...
User Guide
Page 11
... or would "mutate" or transform their code signatures, leaving only a couple of bytes to spot its "code signature." In response, virus writers found ways to hide from giving itself , along with other characteristic patterns that is to find ways to locate and remove the ..., encryption, and polymorphic techniques Unobtrusive as a key for a warm reboot, then faking a restart. Although that kept the virus from conventional search techniques. Because viruses needed to tell them from the actual location of the infected sector to recognize those code signatures in file size and other...
... or would "mutate" or transform their code signatures, leaving only a couple of bytes to spot its "code signature." In response, virus writers found ways to hide from giving itself , along with other characteristic patterns that is to find ways to locate and remove the ..., encryption, and polymorphic techniques Unobtrusive as a key for a warm reboot, then faking a restart. Although that kept the virus from conventional search techniques. Because viruses needed to tell them from the actual location of the infected sector to recognize those code signatures in file size and other...
User Guide
Page 12
... applications in its Office suite. Other vendors quickly followed suit with their products, either using a variation of the same Microsoft macro language or incorporating one of nearly every computer-related company in order to do their own. Within a year, macro viruses became the most versatile and...to attach files to messages ensured that enabled even some non-programmers to whip up a new virus in part by the software you , the user, created yourself. xii McAfee VirusScan Anti-Virus Software Once a repository of computer systems we all , are programs and, as immune to infection...
... applications in its Office suite. Other vendors quickly followed suit with their products, either using a variation of the same Microsoft macro language or incorporating one of nearly every computer-related company in order to do their own. Within a year, macro viruses became the most versatile and...to attach files to messages ensured that enabled even some non-programmers to whip up a new virus in part by the software you , the user, created yourself. xii McAfee VirusScan Anti-Virus Software Once a repository of computer systems we all , are programs and, as immune to infection...
User Guide
Page 13
... in how they run in a Java "virtual machine" designed to interpret Java programming and translate it easy for them access to vulnerable computer systems. Unlike viruses, harmful Java and ActiveX objects usually don't seek to replicate themselves or take from this feverish pace of opportunities to spread to power the web...
... in how they run in a Java "virtual machine" designed to interpret Java programming and translate it easy for them access to vulnerable computer systems. Unlike viruses, harmful Java and ActiveX objects usually don't seek to replicate themselves or take from this feverish pace of opportunities to spread to power the web...
User Guide
Page 14
...didn't even require you visit. As with databases and other data sources, and directly manipulate features in your system. xiv McAfee VirusScan Anti-Virus Software Programmers have written objects, for example, have found ways around these innovations bring to the web generally outweigh the risks...applications that where a way exists to open the e-mail message-simply viewing it -including Microsoft VBScript and Active Server Pages, Allaire Cold Fusion, and others. This virus crossed the once-sharp line that divided plain-text e-mail messages from websites you to exploit a software...
...didn't even require you visit. As with databases and other data sources, and directly manipulate features in your system. xiv McAfee VirusScan Anti-Virus Software Programmers have written objects, for example, have found ways around these innovations bring to the web generally outweigh the risks...applications that where a way exists to open the e-mail message-simply viewing it -including Microsoft VBScript and Active Server Pages, Allaire Cold Fusion, and others. This virus crossed the once-sharp line that divided plain-text e-mail messages from websites you to exploit a software...
User Guide
Page 15
... the world's largest and most experienced anti-virus research staff in the Active Virus Defense* (AVD) and Total Virus Defense (TVD) suites, the most comprehensive anti-virus solutions available. Neither McAfee nor any point on your side. it also catches hostile objects that get quickly outdated. McAfee can provide you with anti-virus software or some kind of verification utility, is...
... the world's largest and most experienced anti-virus research staff in the Active Virus Defense* (AVD) and Total Virus Defense (TVD) suites, the most comprehensive anti-virus solutions available. Neither McAfee nor any point on your side. it also catches hostile objects that get quickly outdated. McAfee can provide you with anti-virus software or some kind of verification utility, is...
User Guide
Page 16
..., Trusted Information Systems, Magic Solutions, and CyberMedia, Inc. This division supplies the Total Service desk product line and related products • McAfee. This division provides the Active Virus Defense product suite and related anti-virus software solutions to market and support the product lines from each concerned with Network General Corporation, Pretty Good Privacy, Inc., and...
..., Trusted Information Systems, Magic Solutions, and CyberMedia, Inc. This division supplies the Total Service desk product line and related products • McAfee. This division provides the Active Virus Defense product suite and related anti-virus software solutions to market and support the product lines from each concerned with Network General Corporation, Pretty Good Privacy, Inc., and...
User Guide
Page 17
..., for updates to McAfee and Network Associates software, and for answers to technical support issues. Internet CompuServe America Online techsupport@mcafee.com GO NAI keyword MCAFEE If the automated services... If you need, contact Network Associates at one of the PrimeSupport plans available to McAfee customers. User's Guide xvii To learn more about Network Associates technical support plans. ...hour, Group III fax) E-Mail: [email protected] Web: http://www.mcafee.com/ Technical support McAfee and Network Associates are famous for their sites on the World Wide Web valuable resources ...
..., for updates to McAfee and Network Associates software, and for answers to technical support issues. Internet CompuServe America Online techsupport@mcafee.com GO NAI keyword MCAFEE If the automated services... If you need, contact Network Associates at one of the PrimeSupport plans available to McAfee customers. User's Guide xvii To learn more about Network Associates technical support plans. ...hour, Group III fax) E-Mail: [email protected] Web: http://www.mcafee.com/ Technical support McAfee and Network Associates are famous for their sites on the World Wide Web valuable resources ...
User Guide
Page 18
...Specific steps to reproduce the problem Download support To get help with navigating or downloading files from the Network Associates or McAfee websites or FTP sites, call Network Associates Customer Service at: (972) 308-9960. Please include this information in ...492-2650 (801) 492-2600 Network Associates training For information about McAfee anti-virus product documentation to: McAfee, 20460 NW Von Neumann, Beaverton, OR 97006-6942, U.S.A. xviii McAfee VirusScan Anti-Virus Software Comments and feedback McAfee appreciates your software. You can also send faxed comments to (503...
...Specific steps to reproduce the problem Download support To get help with navigating or downloading files from the Network Associates or McAfee websites or FTP sites, call Network Associates Customer Service at: (972) 308-9960. Please include this information in ...492-2650 (801) 492-2600 Network Associates training For information about McAfee anti-virus product documentation to: McAfee, 20460 NW Von Neumann, Beaverton, OR 97006-6942, U.S.A. xviii McAfee VirusScan Anti-Virus Software Comments and feedback McAfee appreciates your software. You can also send faxed comments to (503...
User Guide
Page 19
...America and South America offices Use this address to send questions or virus samples gathered with Dr Solomon's Anti-Virus Toolkit* software to our offices in the United Kingdom To report items to the McAfee European research office, use these e-mail addresses: [email protected] ...offices in Western Europe Use this address to send questions or virus samples to use one of virus that your system and escape detection. Preface Reporting new items for anti-virus data file updates McAfee anti-virus software offers you the best available detection and removal capabilities, ...
...America and South America offices Use this address to send questions or virus samples gathered with Dr Solomon's Anti-Virus Toolkit* software to our offices in the United Kingdom To report items to the McAfee European research office, use these e-mail addresses: [email protected] ...offices in Western Europe Use this address to send questions or virus samples to use one of virus that your system and escape detection. Preface Reporting new items for anti-virus data file updates McAfee anti-virus software offers you the best available detection and removal capabilities, ...
User Guide
Page 23
... can arrive faster than ever before. As one of a handful of pioneering utilities developed to combat the earliest virus epidemics of viruses and other McAfee anti-virus tools. User's Guide 23 About VirusScan Software 1 1 Introducing VirusScan anti-virus software Eighty percent of the Fortune 100-and more than 50 million users worldwide-choose VirusScan anti...
... can arrive faster than ever before. As one of a handful of pioneering utilities developed to combat the earliest virus epidemics of viruses and other McAfee anti-virus tools. User's Guide 23 About VirusScan Software 1 1 Introducing VirusScan anti-virus software Eighty percent of the Fortune 100-and more than 50 million users worldwide-choose VirusScan anti...
User Guide
Page 24
...worldwide reach and 24-hour "follow the sun" coverage from losing time, money and data unnecessarily. 24 McAfee VirusScan Anti-Virus Software Because more venerable virus threats and against the latest threats that lurk on your company's share of the resulting costs-against more ... cannot change or disable at all in a single package with weekly virus definition (.DAT) file releases, daily beta .DAT releases, and EXTRA.DAT file support in the McAfee Active Virus Defense and Total Virus Defense security suites, VirusScan software retains the same core features that have made it takes...
...worldwide reach and 24-hour "follow the sun" coverage from losing time, money and data unnecessarily. 24 McAfee VirusScan Anti-Virus Software Because more venerable virus threats and against the latest threats that lurk on your company's share of the resulting costs-against more ... cannot change or disable at all in a single package with weekly virus definition (.DAT) file releases, daily beta .DAT releases, and EXTRA.DAT file support in the McAfee Active Virus Defense and Total Virus Defense security suites, VirusScan software retains the same core features that have made it takes...