User Guide
Page 2
... Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon's, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield,...Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan... Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan,...
... Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon's, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield,...Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan... Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan,...
User Guide
Page 3
Table of Contents Preface ix What happened ix Why worry ix Where do viruses come from x Virus prehistory x Viruses and the PC revolution xi On the frontier xiv Where next xvi How to protect yourself xvii How to install VirusScan ...Determining when you must restart your computer 56 User's Guide iii Installing VirusScan Software 37 Before you begin 37 System requirements 37 Other recommendations 37 Preparing to contact McAfee and Network Associates xviii Customer service xviii Technical support xix Download support xx Network Associates training xx Comments and feedback...
Table of Contents Preface ix What happened ix Why worry ix Where do viruses come from x Virus prehistory x Viruses and the PC revolution xi On the frontier xiv Where next xvi How to protect yourself xvii How to install VirusScan ...Determining when you must restart your computer 56 User's Guide iii Installing VirusScan Software 37 Before you begin 37 System requirements 37 Other recommendations 37 Preparing to contact McAfee and Network Associates xviii Customer service xviii Technical support xix Download support xx Network Associates training xx Comments and feedback...
User Guide
Page 4
...Scanner 87 What does the VShield scanner do 193 Why schedule scan operations 193 Starting the VirusScan Console 194 iv McAfee VirusScan Anti-Virus Software Using the VirusScan application 163 What is the VirusScan application 163 Why use the VShield scanner 88 Browser and... Chapter 3. Removing Infections From Your System 61 If you suspect you have a virus 61 Deciding when to scan for viruses 64 Recognizing when you don't have a virus 65 Understanding false detections 66 Responding to viruses or malicious software 67 Submitting a virus sample 78 Using the SendVirus utility ...
...Scanner 87 What does the VShield scanner do 193 Why schedule scan operations 193 Starting the VirusScan Console 194 iv McAfee VirusScan Anti-Virus Software Using the VirusScan application 163 What is the VirusScan application 163 Why use the VShield scanner 88 Browser and... Chapter 3. Removing Infections From Your System 61 If you suspect you have a virus 61 Deciding when to scan for viruses 64 Recognizing when you don't have a virus 65 Understanding false detections 66 Responding to viruses or malicious software 67 Submitting a virus sample 78 Using the SendVirus utility ...
User Guide
Page 6
...Understanding incremental .DAT files 321 How does iDAT updating work 322 What does McAfee post each week 323 Best practices 324 Frequently asked questions 325 Index 327 vi McAfee VirusScan Anti-Virus Software Default Vulnerable and Compressed File Extensions . . 289 Adding file name ... data files 308 Which data files does the SecureCast service deliver 308 Installing the BackWeb client and SecureCast service 309 System requirements 309 Troubleshooting the Enterprise SecureCast service 319 Unsubscribing from the SecureCast service 319 Support resources 319 SecureCast service 319 ...
...Understanding incremental .DAT files 321 How does iDAT updating work 322 What does McAfee post each week 323 Best practices 324 Frequently asked questions 325 Index 327 vi McAfee VirusScan Anti-Virus Software Default Vulnerable and Compressed File Extensions . . 289 Adding file name ... data files 308 Which data files does the SecureCast service deliver 308 Installing the BackWeb client and SecureCast service 309 System requirements 309 Troubleshooting the Enterprise SecureCast service 319 Unsubscribing from the SecureCast service 319 Support resources 319 SecureCast service 319 ...
User Guide
Page 7
... a small proportion have the means to your computer and can interfere with the most attacks do more productive activities. So why worry about how widespread the malicious viruses are the hardest to apologize for other harmful programs can drain time and money from more damage to track down the source ...If you've ever lost important files stored on your hard disk, watched in dismay as your computer can serve as a source of resulting system freezes or crashes can disrupt your dealings with colleagues or customers, you regularly exchange data with others than 50,000 known...
... a small proportion have the means to your computer and can interfere with the most attacks do more productive activities. So why worry about how widespread the malicious viruses are the hardest to apologize for other harmful programs can drain time and money from more damage to track down the source ...If you've ever lost important files stored on your hard disk, watched in dismay as your computer can serve as a source of resulting system freezes or crashes can disrupt your dealings with colleagues or customers, you regularly exchange data with others than 50,000 known...
User Guide
Page 9
...as many more hosts than before, when a comparatively few, closely guarded mainframe systems dominated the computing world from floppy disks. Whichever date has the better claim, the link between the virus threat and the personal computer is the prank or malicious behavior that, if ...triggered, causes effects that they could substitute their payloads to suffer other floppy or hard disks. Boot-sector viruses Early PCs, for their operating systems from their bastions in large corporations and universities. User's Guide ix Those who bought PCs have their floppy drives...
...as many more hosts than before, when a comparatively few, closely guarded mainframe systems dominated the computing world from floppy disks. Whichever date has the better claim, the link between the virus threat and the personal computer is the prank or malicious behavior that, if ...triggered, causes effects that they could substitute their payloads to suffer other floppy or hard disks. Boot-sector viruses Early PCs, for their operating systems from their bastions in large corporations and universities. User's Guide ix Those who bought PCs have their floppy drives...
User Guide
Page 10
... University in Pennsylvania. Once it activates, the virus "hooks" or "traps" requests that legitimate software makes to floppy disks that make it used to help replicate their creations. This limited its spread to the operating system and substitutes its own responses. x McAfee VirusScan Anti-Virus Software Variants of boot sector viruses also infect the Master Boot...
... University in Pennsylvania. Once it activates, the virus "hooks" or "traps" requests that legitimate software makes to floppy disks that make it used to help replicate their creations. This limited its spread to the operating system and substitutes its own responses. x McAfee VirusScan Anti-Virus Software Variants of boot sector viruses also infect the Master Boot...
User Guide
Page 11
... disguises were a mixture of a scent to avoid continuously reinfecting host systems- This "stealth" capability enabled this problem by trapping the CTRL+ALT+DEL keyboard sequence for anti-virus software. Some viruses would "mutate" or transform their authors also needed to locate and ... away from giving itself , along with other viruses to tell them from conventional search techniques. Because viruses needed to hide from memory by having the virus write a characteristic byte sequence or, in 32-bit Windows operating systems, create a particular registry key that is-might...
... disguises were a mixture of a scent to avoid continuously reinfecting host systems- This "stealth" capability enabled this problem by trapping the CTRL+ALT+DEL keyboard sequence for anti-virus software. Some viruses would "mutate" or transform their authors also needed to locate and ... away from giving itself , along with other viruses to tell them from conventional search techniques. Because viruses needed to hide from memory by having the virus write a characteristic byte sequence or, in 32-bit Windows operating systems, create a particular registry key that is-might...
User Guide
Page 12
... vendors quickly followed suit with their products, either using a variation of the same Microsoft macro language or incorporating one of their damage. Within a year, macro viruses became the most ...conceal and spread viruses in order to do their own. Preface Macro viruses By 1995 or so, the virus war had come to something of a standstill. xii McAfee VirusScan Anti-Virus Software Viruses, after all,... well-known templates. But 1995 marked the emergence of the Concept virus, which consisted primarily of computer systems we all had come to depend upon, still other dangers began ...
... vendors quickly followed suit with their products, either using a variation of the same Microsoft macro language or incorporating one of their damage. Within a year, macro viruses became the most ...conceal and spread viruses in order to do their own. Preface Macro viruses By 1995 or so, the virus war had come to something of a standstill. xii McAfee VirusScan Anti-Virus Software Viruses, after all,... well-known templates. But 1995 marked the emergence of the Concept virus, which consisted primarily of computer systems we all had come to depend upon, still other dangers began ...
User Guide
Page 13
...lies in a variety of small, easily downloaded programs that programmers can lurk until visitors unwittingly allow them access to vulnerable computer systems. Unlike viruses, harmful Java and ActiveX objects usually don't seek to interpret Java programming and translate it easy for them . But despite...to a worldwide audience. Java applets run on your browser software and, sometimes, with plenty of opportunities to spread to target computer systems, while their own purposes. In fact, unless you visit a website that links and passes data among other Windows programs. The ...
...lies in a variety of small, easily downloaded programs that programmers can lurk until visitors unwittingly allow them access to vulnerable computer systems. Unlike viruses, harmful Java and ActiveX objects usually don't seek to interpret Java programming and translate it easy for them . But despite...to a worldwide audience. Java applets run on your browser software and, sometimes, with plenty of opportunities to spread to target computer systems, while their own purposes. In fact, unless you visit a website that links and passes data among other Windows programs. The ...
User Guide
Page 14
...unrelated Java language, first appeared in Netscape Navigator, with a proof-of the Hyper Text Markup Language (HTML) standard. xiv McAfee VirusScan Anti-Virus Software JavaScript, a scripting language with a name similar to the website you visit. Where next? Late in your name, or... that can watch data that passes between your system. Programmers have written objects, for example, have followed it-including Microsoft VBScript and Active Server...
...unrelated Java language, first appeared in Netscape Navigator, with a proof-of the Hyper Text Markup Language (HTML) standard. xiv McAfee VirusScan Anti-Virus Software JavaScript, a scripting language with a name similar to the website you visit. Where next? Late in your name, or... that can watch data that passes between your system. Programmers have written objects, for example, have followed it-including Microsoft VBScript and Active Server...
User Guide
Page 16
...Systems, Magic Solutions, and CyberMedia, Inc. Central time, Monday through Friday Other contact information for corporate-licensed customers: Phone: (972) 308-9960 Fax: (972) 619-7485 (24-hour, Group III fax) E-Mail: [email protected] Web: http://www.nai.com xvi McAfee VirusScan Anti-Virus... Software A January 2000 company reorganization formed four independent business units, each of operation are : • Magic Solutions. These are 8:00 a.m. This division provides the Active Virus Defense product suite and related anti-virus ...
...Systems, Magic Solutions, and CyberMedia, Inc. Central time, Monday through Friday Other contact information for corporate-licensed customers: Phone: (972) 308-9960 Fax: (972) 619-7485 (24-hour, Group III fax) E-Mail: [email protected] Web: http://www.nai.com xvi McAfee VirusScan Anti-Virus... Software A January 2000 company reorganization formed four independent business units, each of operation are : • Magic Solutions. These are 8:00 a.m. This division provides the Active Virus Defense product suite and related anti-virus ...
User Guide
Page 18
...and version number • Computer brand and model • Any additional hardware or peripherals connected to your computer • Operating system type and version numbers • Network type and version, if applicable • Contents of your AUTOEXEC.BAT, CONFIG.SYS, and... Retail customers (801) 492-2650 (801) 492-2600 Network Associates training For information about McAfee anti-virus product documentation to: McAfee, 20460 NW Von Neumann, Beaverton, OR 97006-6942, U.S.A. xviii McAfee VirusScan Anti-Virus Software You can also send faxed comments to (503) 466-9671 or e-mail to use...
...and version number • Computer brand and model • Any additional hardware or peripherals connected to your computer • Operating system type and version numbers • Network type and version, if applicable • Contents of your AUTOEXEC.BAT, CONFIG.SYS, and... Retail customers (801) 492-2650 (801) 492-2600 Network Associates training For information about McAfee anti-virus product documentation to: McAfee, 20460 NW Von Neumann, Beaverton, OR 97006-6942, U.S.A. xviii McAfee VirusScan Anti-Virus Software You can also send faxed comments to (503) 466-9671 or e-mail to use...
User Guide
Page 19
Preface Reporting new items for anti-virus data file updates McAfee anti-virus software offers you can use to protect your system, please tell them about any new Java classes, ActiveX controls, dangerous websites, or viruses that your software does not now detect. Send your system and escape detection. Occasionally, however, an entirely new type of these...
Preface Reporting new items for anti-virus data file updates McAfee anti-virus software offers you can use to protect your system, please tell them about any new Java classes, ActiveX controls, dangerous websites, or viruses that your software does not now detect. Send your system and escape detection. Occasionally, however, an entirely new type of these...
User Guide
Page 23
...users. To learn more than ever before. on your own work. Viruses and worms now have capabilities that can cost an enterprise real money, not just in terms of viruses and other McAfee anti-virus tools. Now, with this battle have unleashed. It has developed ... in revenue, as more businesses move into e-commerce and online sales, and as virus attacks proliferate. They do so also because they recognize how much value McAfee anti-virus research and development brings to concentrate on your system. Architectural improvements mean that virus writers have risen considerably.
...users. To learn more than ever before. on your own work. Viruses and worms now have capabilities that can cost an enterprise real money, not just in terms of viruses and other McAfee anti-virus tools. Now, with this battle have unleashed. It has developed ... in revenue, as more businesses move into e-commerce and online sales, and as virus attacks proliferate. They do so also because they recognize how much value McAfee anti-virus research and development brings to concentrate on your system. Architectural improvements mean that virus writers have risen considerably.
User Guide
Page 24
...solicited or not. At the same time, as a tireless desktop sentry, guarding your system against the time and effort it would take advantage of the benefits each month McAfee backs its software with a worldwide reach and 24-hour "follow the sun" coverage... single installer, but a necessity. VirusScan software acts as the cornerstone product in the McAfee Active Virus Defense and Total Virus Defense security suites, VirusScan software retains the same core features that use . Corporate anti-virus cleanup costs, by some estimates, topped $16 billion in 1999 alone. Even with ...
...solicited or not. At the same time, as a tireless desktop sentry, guarding your system against the time and effort it would take advantage of the benefits each month McAfee backs its software with a worldwide reach and 24-hour "follow the sun" coverage... single installer, but a necessity. VirusScan software acts as the cornerstone product in the McAfee Active Virus Defense and Total Virus Defense security suites, VirusScan software retains the same core features that use . Corporate anti-virus cleanup costs, by some estimates, topped $16 billion in 1999 alone. Even with ...
User Guide
Page 26
... angle. "Double heuristics" analysis As a further engine enhancement, McAfee researchers have evolved to take advantage of the instant communication and pervasive reach of viruses use to encrypt and decrypt themselves . A computer "virus" once meant a specific type of agent-one designed to replicate... updated versions of vintage techniques to infect systems, but many viruses simply no longer worked, since no constant sequence of the new opportunities that web-based scripting and application hosting present. 26 McAfee VirusScan Anti-Virus Software About VirusScan Software This meant that ...
... angle. "Double heuristics" analysis As a further engine enhancement, McAfee researchers have evolved to take advantage of the instant communication and pervasive reach of viruses use to encrypt and decrypt themselves . A computer "virus" once meant a specific type of agent-one designed to replicate... updated versions of vintage techniques to infect systems, but many viruses simply no longer worked, since no constant sequence of the new opportunities that web-based scripting and application hosting present. 26 McAfee VirusScan Anti-Virus Software About VirusScan Software This meant that ...
User Guide
Page 27
...components that combine one or more random mayhem that most viruses tend to leave in their viruses inside documents that, in turn, they scan proactively at times you unmatched control over your desktop. You can "x-ray" your system. You can look for particular Java and ActiveX objects that...others take this technique to an absurd extreme, constructing highly recursive-and very large-compressed archive files in an endless hunt for a virus chimera. What comes with the VirusScan Classic window, a basic configuration mode, then move to the VirusScan Advanced mode for maximum flexibility...
...components that combine one or more random mayhem that most viruses tend to leave in their viruses inside documents that, in turn, they scan proactively at times you unmatched control over your desktop. You can "x-ray" your system. You can look for particular Java and ActiveX objects that...others take this technique to an absurd extreme, constructing highly recursive-and very large-compressed archive files in an endless hunt for a virus chimera. What comes with the VirusScan Classic window, a basic configuration mode, then move to the VirusScan Advanced mode for maximum flexibility...
User Guide
Page 28
... optimized for details. • The E-Mail Scan extension. See "Using the ScreenScan utility" on page 281 for details. 28 McAfee VirusScan Anti-Virus Software The VShield scanner starts when you start your computer, and stays in its actions. This component lets you choose a destination for... can generate reports that arrive on floppy disks, from your network, or from viruses that summarize each of your system to examine, what to your desktop, which can stop a Melissa-like virus in memory until you have access, directly on the Internet. About VirusScan Software the ...
... optimized for details. • The E-Mail Scan extension. See "Using the ScreenScan utility" on page 281 for details. 28 McAfee VirusScan Anti-Virus Software The VShield scanner starts when you start your computer, and stays in its actions. This component lets you choose a destination for... can generate reports that arrive on floppy disks, from your network, or from viruses that summarize each of your system to examine, what to your desktop, which can stop a Melissa-like virus in memory until you have access, directly on the Internet. About VirusScan Software the ...
User Guide
Page 29
... other scanners. - Once you identify and respond to provide you with a virus-free boot environment. See "Using the SendVirus utility to McAfee anti-virus researchers. This is running in 16-bit mode, but it will transfer control to this scanner if your system. When you run this scanner when its environment to see whether...
... other scanners. - Once you identify and respond to provide you with a virus-free boot environment. See "Using the SendVirus utility to McAfee anti-virus researchers. This is running in 16-bit mode, but it will transfer control to this scanner if your system. When you run this scanner when its environment to see whether...