home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
BUG 9
/
BUGCD1997_12.ISO
/
util
/
_virscan
/
w31
/
data.z
/
WhatsNew.TXT
< prev
Wrap
Text File
|
1997-11-03
|
30KB
|
1,224 lines
What's New in VirusScan for Windows 3.1x v3.1.2a (3009a)
Copyright 1994-1997 by McAfee Associates, Inc.
All Rights Reserved.
Thank you for using McAfee's VirusScan for Windows 3.1x.
This What's New file contains important information
regarding the current version of this product. It is
highly recommended that you read the entire document.
McAfee welcomes your comments and suggestions. Please
use the information provided in this file to contact us.
___________________
WHAT'S IN THIS FILE
- New Features
- Known Issues
- Installation
- Documentation
- Frequently Asked Questions
- Contact McAfee
____________
NEW FEATURES
1. VirusScan detects unknown macro viruses by using
heuristic scanning technology. Unknown macro viruses
are reported as "PROBABLE MACRO VIRUSES."
2. VirusScan is able to detect and clean macro virus
infections in password-protected Microsoft Excel 95
files without disturbing passwords.
3. VirusScan now has the ability to detect macro virus
infections in password-protected German, French,
Dutch, Italian, and Japanese Microsoft Word 95
(Word 7.0) files.
4. VirusScan is designed to respect users' passwords
and leave them intact as often as possible. Viruses
that infect Word files, however, sometimes plant
their own passwords. When VirusScan is instructed to
clean a password-protected file, it will take one
of two actions:
A. If the macro virus cannot plant its own password:
VirusScan notes the infection but will not clean it.
B. If the macro virus can plant its own password:
VirusScan cleans the file, removing the password
along with the virus.
* NEW VIRUSES DETECTED *
This DAT file, 3009a, is compatible with VirusScan's
v3.x engines only. This DAT file is not intended for
use with VirusScan v2.x products.
This DAT file detects the following 293 new viruses.
Locations that have experienced particular problems
with specific viruses are also identified.
_1600
ABCD
AK.251
ALEX.A:TW(INTENDED)
ALEX.B:TW(INTENDED)
ALEX.C/D:TW(INTENDED)
ALEX.E:TW(INTENDED)
ALIEN.259
ALIEN.298
ALIEN.304
ALIEN.374
ALIEN.G
ANAK.B
ANAK.C
ANDRY.3791 (COM)
ANT.C:TW (*)
ANT.D:TW (*)
APPARITION.1248
APPARITION.700
APPDER.J
ARCHER.A
ARCHER.B
ARME.411
ARME.414
AWARE.1292
BANDUNG.AZ
BANDUNG.BA
BATTYBUG.187
BEDA.883
BEDA.1301
BLIN.1457
BMBB.766
CAP.K
CAP.M
CAP.Z
CAP.AA
CAP.AB
CAP.AC
CAP.AD
CAP.AE
CAP.AF
CAP.AG
CAP.AH
CAP.AI
CAP.AJ
CAP.AK
CAP.AL
CAP.AM
CAP.AN
CEASE.382
CHEAT.A
CHEAT.B
CHOLERA.2415
CLOCK.J:DE
CLOCK.K:DE
CLOCK.L:DE
COLORS.BO
COLORS.BP
COMPANION.5808
CONCEPT.BF
CONCEPT.BI
CONCEPT.BJ
CONCEPT.BK
CONCEPT.BK1
CONCEPT.BL
CONCEPT.BM
CONCEPT.BN
COUNT10.E
CRUZ.CMP.8262
DARK.E
DARK_ELF.2200
DBF.990
DENZUK-NAPOL
DISHONOR.A:DE (*)
DIVINA.I
DMV.F
DMV.G
DREPO.2493
DZT.D
DZT.G
EDDIE.565
EDDIE.1093
ELCON.374
ELCON.424
ELYTHNIA
ENVIRONM.6752
FACADE.B
FATTY.3012
FIRE.A:DE (*)
FLI2MOD (TROJAN)
FLOYD.1546 (Hong Kong)
FLU.1160
FORMATS.A (TROJAN) (*)
FOUR.A
FOUR.A (*)
FRIDAY.E:DE
GENESIS (TROJAN)
GETTO.2000
GLITTER.1462
GLUP.403
GLUP.404
GOODNIGHT.C
GROG.1349
GYRO.OW.512
HACKERZ.709
HAFENSTRASSE.1641
HEADACHE.269B
HEADER.A
HIAN
HIDEOUS.1024.A
HIDEOUS.1024.B
HIDEOUS.1024.C
HIDEOUS.1024.D
HITMAN.A
HLL.7336
HLL.CMP.16052 (*)
HLLO.17690.A
HLLP.5850.E
HLLP.5904
HLLP.FECI.6000
HONGKANG.1904
HYBRID.I
HYBRID.J
ISLAND.3551
IVP.VIVEK.924
JOHNNY.O
JOHNNY.O1
KEYB.298
KEYB.299
KHIZHNJAK.494
KHIZHNJAK.780A
KHIZHNJAK.780B
KOH-INSTALL
KOMPU.E (*)
KONKOOR
LAHYANI.1381
LAPIDARIO.766
LIBERTY.2857.D (EXE)
LICENTIOUS.1024
LILITH
LILO.1573
LOADER.TCS (TROJAN)
LOZ.684
LOZ.724
LPSK.OW.554
LUCY.B
LUNAR.A
MACARONI.B:DE
MALARIA.A:TW (*)
MANZON.1404.DR
MESS.A
MINIMAD.322
MINIMAD.340
MINIMAD.345
MINIMAD.346
MINIMAD.347
MINIMAD.349
MINIMAD.349B
MINIMAD.350
MINIMAD.352
MINIMAD.353
MINIMAD.361
MINIMAD.361B
MINIMAD.385
MINIMAD.386
MINIMAD.388
MINIMAD.407
MINIMAL.S
MKC_BOOT
MORPHINE.3500
MPC.LIATA.337
MUCK.I
MUCK.J
MUCK.K
MUCK.L
MUCK.M
MUCK.N
NAZI.8600
NICEDAY.N
NIKNAT.A
NJ-WMDLK1.G
NOIEMBRIE.610
NOP.M:DE (*)
NOP.N
NPAD.CT
NPAD.CU
NPAD.CV
NPAD.CW
NPAD.CX
NPAD.CY
NPAD.CZ
NPAD.DA
NUMIN.902
NUTCRACKER.AB2 (BOOT)
NUTCRACKER.MP.BOOT
OBAY.A
OBLOM.A
OBLOM.C
OBLOM.E
OMINOUS.1846
ORHEY.A
P0P.2694
PALMA
PAYCHECK.F
PAYCHECK.G
PERCENT.A:TW (*)
PESAN.B (US)
PH33R.1418
PHILE.204
PIG.F:TW
PITER.529
POW
POWERPUMP.CMP.A
POXVAR.A
POXVAR.B
PREDATOR.1879
PYSK.2464
QBOOTDR76.VCS
RADYU.274
RADYU.278
RADYU.332
RADYU.333
RAZER.A (*)
REPLICATOR
RICKDOGG (TROJAN)
ROSEANNE.INTENDED.241
RSM.A
RUBIX.421
RUBIX.422A
SAILOR.B
SAM.B:TW
SCHUMANN.B (*)
SCHUMANN.C:DE
SCREW.A
SHIFTER.760
SHIN
SHY.1603
SHY.1608
SOCKS.A
SORPREN.1536 (Brasil)
SPY.A
STOOPID.353
SUN.8176
SUNSET (TROJAN)
SUPERSTITION.A
SVS.A
SWAT.A (TROJAN)
SWLABS.G (*) (US Military)
TANGLE.378
TEAR.B
TEMPLE.A
TEMPLE.H
TMC.5036
TWNO.A:TW (Word97) (Taiwan)
VAMPIRE.E:TW
VAMPIRE.F:TW
VAMPIRE.I:TW
VANITAS.2048 (Texas)
VD.253
VICISSIT.A
WALLY.1029
WANT.A:TW
WAZZU.CG
WAZZU.CH
WAZZU.CI
WAZZU.CM
WAZZU.CN
WAZZU.CO
WAZZU.CP
WAZZU.CQ
WAZZU.CR
WAZZU.CS
WAZZU.CT
WAZZU.CU
XAVIER.367
XM/DON.A (INTENDED)
XM/HIT.A
XM/HIT.B
XM/HIT.D
XM/LAROUX.H
XM/LAROUX.J
XM/LAROUX.K
XRCE.664
ZAHAK.960
ZANY.225
ZANY.253
ZANY.270
ZANY.292B
ZANY.298
ZANY.300
ZANY.793
ZANY.INTENDED.160
ZUCA.677
(*) Mistakenly included in the 3008a What's New list.
* NEW VIRUSES CLEANED *
This DAT file cleans the following 238 new viruses.
Locations that have experienced particular problems
with specific viruses are also identified.
ABCD
AK.251
ALEX.A:TW(INTENDED)
ALEX.B:TW(INTENDED)
ALEX.C/D:TW(INTENDED)
ALEX.E:TW(INTENDED)
ALIEN.259
ALIEN.298
ALIEN.304
ALIEN.374
ALIEN.G
ANAK.B
ANAK.C
ANT.C:TW (*)
ANT.D:TW (*)
APPDER.J
ARCHER.A
ARCHER.B
ARME.411
ARME.414
AWARE.1292
BANDUNG.AZ
BANDUNG.BA
BATTYBUG.187
CAP.K
CAP.M
CAP.Z
CAP.AA
CAP.AB
CAP.AC
CAP.AD
CAP.AE
CAP.AF
CAP.AG
CAP.AH
CAP.AI
CAP.AJ
CAP.AK
CAP.AL
CAP.AM
CAP.AN
CHEAT.A
CHEAT.B
CLOCK.J:DE
CLOCK.K:DE
CLOCK.L:DE
COLORS.BO
COLORS.BP
COMPANION.5808
CONCEPT.BI
CONCEPT.BJ
CONCEPT.BK
CONCEPT.BK1
CONCEPT.BL
CONCEPT.BM
CONCEPT.BN
COUNT10.E
CRUZ.CMP.8262
DARK.E
DENZUK-NAPOL
DISHONOR.A:DE (*)
DIVINA.I
DMV.G
DZT.G
EDDIE.1093
EDDIE.565
ELCON.374
ELCON.424
ELYTHNIA
ENVIRONM.6752
FACADE.B
FIRE.A:DE (*)
FLOYD.1546 (Hong Kong)
FORMATS.A (TROJAN) (*)
FOUR.A (*)
FRIDAY.E:DE
GOODNIGHT.C
GLUP.403
GLUP.404
HAFENSTRASSE.1641
HEADACHE.269B
HEADER.A
HIAN
HIDEOUS.1024.A
HIDEOUS.1024.B
HIDEOUS.1024.C
HIDEOUS.1024.D
HITMAN.A
HLL.CMP.16052 (*)
HLLP.5850.E
HLLP.5850.E(PASS2)
HYBRID.I
HYBRID.J
HONGKANG.1904
JOHNNY.O
JOHNNY.O1
KEYB.298
KEYB.299
KHIZHNJAK.494
KHIZHNJAK.780A
KHIZHNJAK.780B
KOH-INSTALL
KOMPU.E (*)
LAHYANI.1381
LIBERTY.2857.D (EXE)
LICENTIOUS.1024
LILITH
LILO.1573
LOZ.684
LOZ.724
LUCY.B
LUNAR.A
MACARONI.B:DE
MALARIA.A:TW (*)
MESS.A
MINIMAD.322
MINIMAD.340
MINIMAD.345
MINIMAD.346
MINIMAD.347
MINIMAD.349
MINIMAD.349B
MINIMAD.350
MINIMAD.352
MINIMAD.353
MINIMAD.361
MINIMAD.361B
MINIMAD.385
MINIMAD.386
MINIMAD.388
MINIMAD.407
MINIMAL.S
MKC_BOOT
MPC.LIATA.337
MUCK.I
MUCK.J
MUCK.K
MUCK.L
MUCK.M
MUCK.N
NICEDAY.N
NIKNAT.A
NJ-WMDLK1.G
NOIEMBRIE.610
NOP.M:DE (*)
NOP.N
NPAD.CT
NPAD.CU
NPAD.CV
NPAD.CW
NPAD.CX
NPAD.CY
NPAD.CZ
NPAD.DA
NUMIN.902
NUTCRACKER.AB2 (BOOT)
OBAY.A
OBLOM.A
OBLOM.C
OBLOM.E
ORHEY.A
PAYCHECK.F
PAYCHECK.G
P0P.2694
PALMA
PERCENT.A:TW (*)
PESAN.B
PHILE.204
PIG.F:TW
POW
POXVAR.A
POXVAR.B
PREDATOR.1879
QBOOTDR76.VCS
RADYU.274
RADYU.278
RADYU.332
RADYU.333
(RAPI.AL2)
RAZER.A (*)
REPLICATOR
RSM.A
RUBIX.421
RUBIX.422A
SAILOR.B
SAM.B:TW
SCHUMANN.B (*)
SCHUMANN.C:DE
SCREW.A
SHIN
SOCKS.A
SORPREN.1536 (Brazil)
SPY.A
STOOPID.353
SUN.8176
SUPERSTITION.A
SVS.A
SWLABS.G (*) (US Military)
TEAR.B
TMC.5036
TWNO.A:TW (Word97) (Taiwan)
VAMPIRE.E:TW
VAMPIRE.F:TW
VAMPIRE.I:TW
VANITAS.2048 (Texas)
VD.253
VICISSIT.A
WALLY.1029
WANT.A:TW
WAZZU.CG
WAZZU.CH
WAZZU.CI
WAZZU.CM
WAZZU.CN
WAZZU.CO
WAZZU.CP
WAZZU.CQ
WAZZU.CR
WAZZU.CS
WAZZU.CT
WAZZU.CU
XAVIER.367
XM/DON.A (INTENDED)
XM/HIT.A
XM/HIT.B
XM/HIT.D
XM/LAROUX.H
XM/LAROUX.J
XM/LAROUX.K
XRCE.664
ZANY.225
ZANY.253
ZANY.270
ZANY.292B
ZANY.298
ZANY.300
ZANY.793
ZUCA.677
(*) Mistakenly included in the 3008a What's New list.
____________
KNOWN ISSUES
1. When creating an Emergency Disk, in some cases,
additional drivers must be loaded in order to access a
driver specific hard drive (i.e. a compressed drive).
Before modifying the Emergency Disk, please refer to
your hard disk documentation for additional information
on creating a boot disk.
2. If password protection is set for VShield or any
scan task, when an associated program is launched, you
will be prompted to verify the password. You must use
the mouse to click in the text field to enter the
password or click on cancel to exit. Keyboard strokes
are not functional. This is a Microsoft issue as stated
in Microsoft's Knowledge Base Article ID #Q84133.
3. If Move Infected File is selected on the Actions page,
infected files will be moved to the directory specified.
If the Windows Copy command fails during this procedure,
a zero byte file size stamp may be left in the destin-
ation directory when carrying out the Copy command.
4. The CTRL+C and CTRL+BREAK option to break out of DOS
applications in a DOS window is disabled when you
install VirusScan. This is to prevent a host of issues
that would be caused by CTRL+C and CTRL+BREAK interfer-
ing with VShield activity. Consequently, if a DIR
command is executed in a DOS window, and then a CTRL+C
or a CTRL+BREAK is executed, the DIR display will not
be canceled and an incorrect DIR display may result.
5. If VShield detects an infected file that is decompress-
ing in a DOS session and the DOS session is terminated,
VShield as well as Pkunzip and any other program being
run from the DOS window will be discontinued. Although
the VShield icon will still be displayed in the Taskbar,
VShield will be disabled. VShield must be re-enabled by
restarting Windows to maintain maximum virus protection.
6. If the product is uninstalled while VirusScan
(Scan16.exe) or the VirusScan Console (AVConsol.exe)
are open, some files may not be removed (i.e.
Scan16.exe, Mcscan16.dll, Mcgui16.dll, AVConsol.exe).
If you try to delete the McAfee\Viruscan directory
before restarting Windows, error messages will appear
stating that the files are being used by Windows. Close
all VirusScan related programs, excluding VShield,
before uninstalling VirusScan.
7. The conversion utility preserves the scan targets
but does not preserve the command-line parameters.
When custom profiles include command-line parameters,
the resulting task (.VSC file) will have one or more
invalid scan items that will need to be manually
updated.
Command-line parameters in scan tasks must be manually
added. Pre-existing profiles (.PRF files) will be moved
to the target installation directory for reference
purposes.
8. When scheduling multiple scan tasks through the
VirusScan console, ensure that task schedules do not
overlap. If the schedules overlap, only the first task
will be implemented and tasks scheduled thereafter will
be ignored.
9. If the AVCONSOLE.INI file is deleted and then recreated
upon launching the AV Console, the default Scan16 task
will change from "Scan Drive C" and "All Drives" to
"VirusScan."
10. When the DEFAULT.VSC or DEFAULT.VSH files are renamed
or deleted, VirusScan or VShield creates a new default
file upon launch. The new default file is set to limit
the size of the log file to 10KB and the Compressed
option will be selected.
11. If you experience difficulties cleaning infected files
with VirusScan for Windows, exit Windows and use
SCAN.EXE or SCANPM.EXE, which are included in this
product.
____________
INSTALLATION
* INSTALLING THE PRODUCT *
1. Take one of the following steps:
- If you are installing from diskette or compact disc,
insert the VirusScan for Windows 3.1x installation
diskette or the CD-ROM.
- If you are installing from files downloaded from a BBS
or the McAfee website, decompress the zipped files
into a directory on your local drive or the network.
2. Select Run from the File menu.
3. If you are installing from diskette, type: x:\SETUP.EXE
(where x is the drive that contains the diskette).
Click OK.
If you are installing from compact disc, type:
x:\win3x\SETUP.EXE (where x is the drive that contains
the CD-ROM). Click OK.
If you are installing from downloaded files, type:
x:\path\SETUP.EXE (where x:\path is the location of the
files). Click OK.
4. Follow the on-screen installation instructions to
complete VirusScan installation.
* PERFORMING A SILENT INSTALLATION *
To perform a "silent" installation of this product,
with minimal user interaction and with all default or
"Typical" installation settings, add -s (i.e., SETUP.EXE -s)
to the setup command when you install the product.
Network administrators can customize the silent
installation feature by following these steps:
1. Check the Windows directory to ensure that a
file named SETUP.ISS does not already exist. If
one does, rename it, back it up, or delete it.
2. Run SETUP.EXE with the -r switch, (i.e.,
SETUP.EXE -r).
3. Select the components you want to install
during the silent installation. Your choices will
be recorded.
4. Finish the installation.
Result: A SETUP.ISS file is created in the Windows
directory that has your installation options recorded.
Use this file to install all product files to the same
installation directory on every client machine.
The .ISS file specifies the installation directory under
the [SdSetupType-0] header, szDir parameter, which was
recorded in step 3. This overrides the default
installation directory on each client machine, which
might vary according to operating system. Having the
same directory name on every client helps to ease
administration in the future; for example, you might
assign all client machines the directory C:\ANTIVIRUS.
Note: If, however, you want to allow SETUP.EXE to
determine where to locate the installed files, modify
the SETUP.ISS file so that the target machine will
disregard the szDir, as follows:
A. Locate the section [SdSetupType-0] in the
SETUP.ISS file and go to the line: Result = xxx.
The actual value will most likely be 301, 302,
or 303, depending on what options you selected
durin the ISS file creation process.
B. Add 100 to this number so that, for example, 301
becomes 401. This tells each target machine to
disregard the szDir and assign a directory according
to its own particular operating system.
5. Copy the installation files onto a local or mapped
drive; then rename, back up, or delete the SETUP.ISS
file.
Note: You cannot perform a silent install from
multiple media because the silent operation will be
compromised when the install prompts the user for
more media.
6. Copy the new SETUP.ISS from the Windows directory
to the location of the installation files.
Note: The file used for the silent installation,
SETUP.ISS, is product-specific. For example, you
cannot use a SETUP.ISS file created by a
VirusScan for Windows 95 installation for a
VirusScan for Windows NT installation.
7. Run SETUP.EXE with the -s switch (i.e.,
SETUP.EXE -s).
Note: If you do not specify a "recorded" answer for
all dialog boxes during the initial installation, the
silent installation will fail.
8. When the silent installation is complete, the machine
reboots automatically.
* PRIMARY PROGRAM FILES FOR VIRUSSCAN FOR WINDOWS 3.1x *
Files located in the Install directory:
=======================================
1. Installed for VShield/DOS/VirusScan:
README.1ST = License and registration
information
CLEAN.DAT = Virus clean definition data
NAMES.DAT = Virus names definition data
SCAN.DAT = Virus scan definition data
VALIDATE.EXE = McAfee file validation program
WCMDR.EXE = Windows Commander program
MCFDU.EXE = McAfee floppy disk utility
(for Zenith machines only)
PRF2VSC.EXE = Conversion utility program
CONFIG.EXE = VirusScan configuration
program
SETBROWS.EXE = Set browser program
INETWH16.DLL = Library files
INETWH32.DLL = Library files
MCGUI16.DLL = VirusScan Console library file
WCMDR.INI = Windows Commander configuration
settings
WCMDRSIL.INI = unInstallShield helper
configuration
DEISL1.ISU = Uninstall file
PACKING.LST = Packing list
WHATSNEW.TXT = What's New document
RESELLER.TXT = McAfee authorized agents
2. Installed for VShield:
MCKRNL16.DLL = Tools library
MCUTIL16.DLL = Run-time support library
CONFIG.EXE = VShield Configuration Manager
VSHWIN.EXE = VShield on-access engine
CHKVXD.EXE = VShield virtual device driver
checking utility
UNVSHVXD.EXE = Virtual device driver
UNVSHVXD.INI = Initialization file
DEFAULT.VSH = Default VSH settings
3. Installed for DOS:
EDISK.EXE = Emergency Disk creation utility
EDISK.SCR = Emergency Disk file
EDAT.1 = Emergency Disk data file
EDAT.2 = Emergency Disk data file
EDAT.3 = Emergency Disk data file
EDAT.4 = Emergency Disk data file
EDAT.5 = Emergency Disk data file
EDAT.6 = Emergency Disk data file
EMCLEAN.DAT = Emergency Disk virus clean
definition data
EMNAMES.DAT = Emergency Disk virus names
definition data
EMSCAN.DAT = Emergency Disk virus scan
definition data
GETREPLY.EXE = Emergency diskette program component
SCAN.EXE = MS-DOS scan program
SCANPM.EXE = Protected mode scanner
4. Installed for VirusScan:
AVCONSOL.EXE = VirusScan console program
SCAN16.EXE = VirusScan for Windows 3.1x
on-demand scanner
VIRLIST16.EXE = Virus List program
MCSCAN16.DLL = Library files
SCAN16.HLP = VirusScan for Windows 3.1x
online help
AVCONSOL HLP = VirusScan Console online help
AVCONSOL.INI = VirusScan console
configuration file
DEFAULT.VSC = Default VSC settings
INETWH16.DLL = Internet library help file
INETWH32.DLL = Internet library help file
Files located in WINDOWS\SYSTEM directory:
==========================================
1. Installed for VShield/VirusScan:
CTL3D.DLL = 16-bit 3D Windows controls
library (*)
CTL3DV2.DLL = 32-bit 3D Windows controls
library (*)
(*) File will be installed upon installation of VirusScan
if it does not already exist, or if an older version
is found.
2. Installed for VShield:
MCFSHOOK.386 = File system hook
MCKRNL.386 = Scan engine device driver
MCSCAN32.386 = Scan engine device driver
MCUTIL.386 = Utility device driver
VSHIELD.386 = VShield device driver
* TESTING YOUR INSTALLATION *
The Eicar Standard AntiVirus Test File is a combined effort
by anti-virus vendors throughout the world to come up with
one standard by which customers can verify their anti-virus
installations. To test your installation, copy the following
line into its own file and name it EICAR.COM.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
When done, you will have a 69- or 70-byte file.
When VirusScan is applied to this file, it will report
finding the EICAR-STANDARD-AV-TEST-FILE virus.
It is important to know that THIS IS NOT A VIRUS. However,
users often have the need to test that their installations
function correctly. The anti-virus industry, through the
European Institute for Computer Antivirus Research, has
adopted this standard to facilitate this need.
Please delete the file when installation testing is
completed so unsuspecting users are not unnecessarily
alarmed.
* MANUALLY UNINSTALLING VIRUSSCAN *
McAfee recommends using VirusScan's uninstall program
provided. You can access the McAfee Uninstall icon from
the McAfee VirusScan program group. If, however, the
uninstall program (WCMDR.EXE) is not present on
your system, follow the instructions outlined below to
manually uninstall VirusScan.
1. Edit the AUTOEXEC.BAT file:
1. From the File menu, select Run and type SYSEDIT
in the space provided. Click Okay.
2. Remove VirusScan from the path statement. The
default path is C:\MCAFEE\VIRUSCAN.
2. In the SYSTEM.INI file, remove the following lines:
device=MCSCAN32.386
device=MCUTIL.386
device=MCKRNL.386
device=MCFSHOOK.386
device=VSHIELD.386
3. Remove the following lines from the WIN.INI file:
1. After LOAD =, remove all references to VirusScan.
The default line is C:\MCAFEE\VIRUSCAN\VSHWIN.EXE.
2. Remove [VIRUSCAN] WSCAN=C:\McAfee\VIRUSCAN\
SCAN16.EXE.
3. Delete VirusScan icons and the McAfee VirusScan
program group from Windows in the Program Manager.
4. Exit Windows and reboot your system.
5. When Windows comes back up, open the File Manager
and delete the McAfee directory.
_____________
DOCUMENTATION
For more information, refer to the User's Guide, included
on the CD-ROM versions of this program or available
from McAfee's BBS and FTP site. This file is in Adobe
Acrobat Portable Document Format (.PDF) and can be viewed
using Adobe Acrobat Reader. This form of electronic
documentation includes hypertext links and easy navigation
to assist you in finding answers to questions about your
McAfee product.
Adobe Acrobat Reader is available on CD-ROM in the ACROREAD
subdirectory. Adobe Acrobat Reader also can be downloaded
from the World Wide Web at:
http://www.adobe.com/Acrobat/readstep.html
VirusScan documentation can be downloaded from McAfee's BBS
or the World Wide Web at:
http://www.mcafee.com
For more information on viruses and virus prevention,
see the McAfee Virus Information Library, included on
the CD-ROM version of this product or available from
McAfee's BBS and FTP site. A ViaGraphix Interactive
Anti-virus Training program also is available on the
CD-ROM version, or can be purchased from the McAfee
website.
__________________________
FREQUENTLY ASKED QUESTIONS
Regularly updated lists of frequently asked questions
about McAfee products also are available on McAfee's
BBS, website, and CompuServe and AOL forums.
Q: What is the Parameters field of the Task Properties
page used for?
A: The field is provided to take to take advantage of
command-line parameters for programs other than
VirusScan. For example, a NotePad.exe task could
be set to open a file by entering the filename
(i.e., Whatsnew.txt) in the parameter field.
Q: How can I create an Emergency Disk after VirusScan
installation?
A: You can create an Emergency Disk after installation by
double-clicking the Emergency Disk Creation Utility icon
in your McAfee VirusScan program group.
Q: When I have an infected file, why does the infected
counter increase by increments greater than one?
A: The file system will typically access a file more than
once. On each access, VirusScan scans the file and
detects the infection.
Q: Can I continue to use VirusScan for Windows 3.1x on my
system after upgrading to Windows 95?
A: VirusScan for Windows 3.1x can run on a Windows 95
system; however, many key components, including VShield,
will not be functional. If you upgrade your system to
Windows 95, you should also upgrade your VirusScan
software to VirusScan for Windows 95. As a licensed
VirusScan user, you can upgrade your software for free.
See your license agreement or contact your Network
Administrator for details.
Q: Does VShield detect Word Macro infections?
A: Yes. VShield detects and cleans Word Macro infections.
Q: Can I update VirusScan's data files to detect new
viruses?
A: Yes. If you have Internet access, you can download
updated VirusScan data files from the McAfee website,
BBS, or other online resources. To download
from the McAfee Web Site, follow these steps:
1. Go to the McAfee website (http://www.mcafee.com).
2. Select Update DAT File in the left hand column
or frame.
3. Scroll down and click Download DAT File - FREE to
update your virus definition files.
4. Data file updates are stored in a compressed form
to reduce transmission time. Unzip the files into
a temporary directory, then copy the files to the
appropriate directory, replacing your old files.
5. Before performing any scans, shut down your
computer, wait a few seconds, and turn it on again.
If you need additional assistance with downloading,
contact McAfee Download Support at (408) 988-3832.
______________
CONTACT McAFEE
* FOR QUESTIONS, ORDERS, PROBLEMS, OR COMMENTS *
Contact McAfee's Customer Care department:
1. Corporate-licensed customers, call (408) 988-3832
Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time
Retail-licensed customers, call (972) 278-6100
Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time
2. Fax (408) 970-9727
24-hour, Group III fax
3. Fax-back automated response system (408) 988-3034
24-hour fax
Send correspondence to any of the following McAfee
locations:
McAfee Corporate Headquarters
2805 Bowers Avenue
Santa Clara, CA 95051-0963
McAfee East Coast Office
Jerral Center West
766 Shrewsbury Avenue
Tinton Falls, NJ 07724-3298
McAfee Central Office
4099 McEwen
Suites 500 and 700
Dallas, TX 75244
McAfee Canada
139 Main Street
Suite 201
Unionville, Ontario
Canada L3R2G6
McAfee Europe B.V.
Gatwickstraat 25
1043 GL Amsterdam
The Netherlands
McAfee (UK) Ltd.
Hayley House, London Road
Bracknell, Berkshire RG12 2TH
United Kingdom
McAfee France S.A.
50 rue de Londres
75008 Paris
France
McAfee Deutschland GmbH
Industriestrasse 1
D-82110 Germering
Germany
McAfee Japan KK
Toranomon 33 Mori Bldg.
3-8-21 Toranomon
Minato-Ku, Tokyo 105
Japan
Or, you can receive online assistance through any of the
following resources:
1. Bulletin Board System: (408) 988-4004
24-hour US Robotics HST DS
2. Internet e-mail: support@mcafee.com
3. Internet FTP: ftp.mcafee.com
4. World Wide Web: http://www.mcafee.com
5. America Online: keyword MCAFEE
6. CompuServe: GO MCAFEE
Before contacting McAfee, please make note of the
following information. When sending correspondence,
please include the same details.
- Program name and version number
- Type and brand of your computer, hard drive, and any
peripherals
- Operating system type and version
- Network name, operating system, and version
- Contents of your AUTOEXEC.BAT, CONFIG.SYS, and
system LOGIN script
- Microsoft service pack, where applicable
- Network card installed, where applicable
- Modem manufacturer, model, and baud, where
applicable
- Relevant browsers/applications and version number,
where applicable
- Problem
- Specific scenario where problem occurs
- Conditions required to reproduce problem
- Statement of whether problem is reproducible on demand
- Your contact information: voice, fax, and e-mail
Other general feedback is also appreciated.
Documentation feedback is welcome. Send e-mail to
documentation@cc.mcafee.com.
* FOR ON-SITE TRAINING INFORMATION *
Contact McAfee Customer Service at (800) 338-8754.
* FOR PRODUCT UPGRADES *
To make it easier for you to receive and use McAfee's
products, we have established a Reseller program to
provide service, sales, and support for our products
worldwide. For a listing of McAfee resellers near you,
click Contact McAfee under the Information section on
the McAfee website or see tge RESELLER.TXT file included
with this product.