Product Guide
Page 5
... or file in your network security. 1 Introducing VirusScan® Command Line The command-line scanner is an important part of scanner use a graphical user interface (GUI). The scanner acts as possible. We recommend that incorporates as many protective measures as an interface to -date with the latest virus definition (DAT) files, the scanner is a program that use the same scanning...
... or file in your network security. 1 Introducing VirusScan® Command Line The command-line scanner is an important part of scanner use a graphical user interface (GUI). The scanner acts as possible. We recommend that incorporates as many protective measures as an interface to -date with the latest virus definition (DAT) files, the scanner is a program that use the same scanning...
Product Guide
Page 13
...date and time of the software. When you receive a new version of this output so that were generated from a cyclical redundancy check (CRC) when the software was packaged for each file, in the program directory, then generates a file list that your version of its program files and DAT files. VirusScan® Command Line... 5.20.0 Product Guide 2 Installing VirusScan® Command Line Validating your files Validating your files When you download or copy files from any outside...
...date and time of the software. When you receive a new version of this output so that were generated from a cyclical redundancy check (CRC) when the software was packaged for each file, in the program directory, then generates a file list that your version of its program files and DAT files. VirusScan® Command Line... 5.20.0 Product Guide 2 Installing VirusScan® Command Line Validating your files Validating your files When you download or copy files from any outside...
Product Guide
Page 14
...; Command Line 5.20.0 Product Guide 2 Installing VirusScan® Command Line Testing your installation 7 Compare the output from defects, copying errors, virus infections or tampering, but the program's security features make it extremely unlikely that anyone has tampered with any other utility; This file is not a virus - The sizes, creation dates and times, and validation codes for...
...; Command Line 5.20.0 Product Guide 2 Installing VirusScan® Command Line Testing your installation 7 Compare the output from defects, copying errors, virus infections or tampering, but the program's security features make it extremely unlikely that anyone has tampered with any other utility; This file is not a virus - The sizes, creation dates and times, and validation codes for...
Product Guide
Page 28
...file in all file types. Specify the maximum size of date. The value may be specified as recognized by default. See alsoUsing heuristic analysis on page 19. VirusScan® Command Line 5.20.0 Product Guide 3 Using the Command-Line Scanner Choosing the options Table 3-2 Scanning options (continued) Option ...scan files that are certain that represents sizes between 128KB and 2MB. on some device- Disable the "expiration date" message if the scanner's DAT files are limited to identify potential new program viruses. Use heuristic analysis to the susceptible file types ...
...file in all file types. Specify the maximum size of date. The value may be specified as recognized by default. See alsoUsing heuristic analysis on page 19. VirusScan® Command Line 5.20.0 Product Guide 3 Using the Command-Line Scanner Choosing the options Table 3-2 Scanning options (continued) Option ...scan files that are certain that represents sizes between 128KB and 2MB. on some device- Disable the "expiration date" message if the scanner's DAT files are limited to identify potential new program viruses. Use heuristic analysis to the susceptible file types ...
Product Guide
Page 31
VirusScan® Command Line 5.20.0 Product Guide 3 Using the Command-Line Scanner Choosing the options Table 3-3 Response and notification options (continued) Option Limitations Description /MOVE None. This option has no effect if the Master Boot Record...only. Otherwise, by default, the screen fills and scrolls continuously without stopping on computers with multiple drives or that time and date to continue" appears. This allows the scanner to run without stopping. If you set this option with report options. Do not rename an infected file that are not ...
VirusScan® Command Line 5.20.0 Product Guide 3 Using the Command-Line Scanner Choosing the options Table 3-3 Response and notification options (continued) Option Limitations Description /MOVE None. This option has no effect if the Master Boot Record...only. Otherwise, by default, the screen fills and scrolls continuously without stopping on computers with multiple drives or that time and date to continue" appears. This allows the scanner to run without stopping. If you set this option with report options. Do not rename an infected file that are not ...
Product Guide
Page 35
...the internal cache for backup of sectors before attempting to the specified file in ASCII text file format. /RPTALL Include the names of date. /NOJOKES Do not report any infected files to identify potential macro viruses. page 32 /RPTCOR Include a list of options (continued... protected. page 28 /PAUSE Enable a screen pause. page 31 /PROGRAM Scan for files that are scanned. VirusScan® Command Line 5.20.0 Product Guide 3 Using the Command-Line Scanner Choosing the options Table 3-6 Alphabetic list of corrupted files in the report file. page 27 /MIME Scan MIME...
...the internal cache for backup of sectors before attempting to the specified file in ASCII text file format. /RPTALL Include the names of date. /NOJOKES Do not report any infected files to identify potential macro viruses. page 32 /RPTCOR Include a list of options (continued... protected. page 28 /PAUSE Enable a screen pause. page 31 /PROGRAM Scan for files that are scanned. VirusScan® Command Line 5.20.0 Product Guide 3 Using the Command-Line Scanner Choosing the options Table 3-6 Alphabetic list of corrupted files in the report file. page 27 /MIME Scan MIME...
Product Guide
Page 38
...deal with your computer's normal operation, consume system resources and have not yet installed the on-demand scanner, follow these , a scan might not be apparent until the computer has booted. 38 In most... your CD drive, then copy the files from any network that you encounter them. At the command prompt, type: SCAN /ADL /ALL /CLEAN /WINMEM /PROGRAM This step is necessary because some.../CLEAN /WINMEM /PROGRAM 7 Shut down your computer and boot it uses. 2 Download and unzip up-to-date anti-virus software and DAT files onto another computer and create a CD. 3 Create a directory for the ...
...deal with your computer's normal operation, consume system resources and have not yet installed the on-demand scanner, follow these , a scan might not be apparent until the computer has booted. 38 In most... your CD drive, then copy the files from any network that you encounter them. At the command prompt, type: SCAN /ADL /ALL /CLEAN /WINMEM /PROGRAM This step is necessary because some.../CLEAN /WINMEM /PROGRAM 7 Shut down your computer and boot it uses. 2 Download and unzip up-to-date anti-virus software and DAT files onto another computer and create a CD. 3 Create a directory for the ...
Product Guide
Page 44
... (See options) 25 compressed files scanning inside 29 skipping during virus scans 28 types recognized by the scanner 17 computer problems, attributing to viruses 38 configuration options 22 conventions, command line 21 , corrupted files 32 40 crashes attributed to viruses 38 CTRL+BREAK, disabling during scans 27 CTRL...McAfee products, download website 9 event log 30 examples batch file for NetWare login 12 cache, AFC 25 deleting all macros 26 list of infected files 23 /OCMAX 19 reporting 24 streams 18 /WINMEM 20 Excel 41 excluding files from scan 26 exit codes (error levels) 36 expiration date...
... (See options) 25 compressed files scanning inside 29 skipping during virus scans 28 types recognized by the scanner 17 computer problems, attributing to viruses 38 configuration options 22 conventions, command line 21 , corrupted files 32 40 crashes attributed to viruses 38 CTRL+BREAK, disabling during scans 27 CTRL...McAfee products, download website 9 event log 30 examples batch file for NetWare login 12 cache, AFC 25 deleting all macros 26 list of infected files 23 /OCMAX 19 reporting 24 streams 18 /WINMEM 20 Excel 41 excluding files from scan 26 exit codes (error levels) 36 expiration date...
Product Guide
Page 45
VirusScan® Command Line 5.20.0 Product Guide Index I IDE (See DAT files) infected files creating a list of scanned files to 32 adding system errors to 32 do not use options with /PAUSE 32 generating with scanner... 20 process scanning 20 product information, where to find 8 product upgrades 9 professional services, McAfee resources 9 protected files 18 Q quarantine 40 R recycle bins 18 remote storage 19 /DOHSM... , /MOVE option 31 40 moving infected files 31 N Netscape 27 NetWare last -access date 31 scanning before login 12 network drives, scanning 25 new features 6 /NODDA, do not...
VirusScan® Command Line 5.20.0 Product Guide Index I IDE (See DAT files) infected files creating a list of scanned files to 32 adding system errors to 32 do not use options with /PAUSE 32 generating with scanner... 20 process scanning 20 product information, where to find 8 product upgrades 9 professional services, McAfee resources 9 protected files 18 Q quarantine 40 R recycle bins 18 remote storage 19 /DOHSM... , /MOVE option 31 40 moving infected files 31 N Netscape 27 NetWare last -access date 31 scanning before login 12 network drives, scanning 25 new features 6 /NODDA, do not...