home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Best Objectech Shareware Selections
/
UNTITLED.iso
/
boss
/
util
/
viru
/
007
/
htscan.doc
< prev
next >
Wrap
Text File
|
1993-04-21
|
51KB
|
1,441 lines
----------------------------------------------------------------------------
HTScan Version 1.20 Date 22-04-93
(C) 1990-1993 by Harry Thijssen
----------------------------------------------------------------------------
CONTENTS
1. INTRODUCTION.................................................... 1
1.1. Purpose of HTSCAN......................................... 1
1.2. A quick start............................................. 1
1.3. Benefits.................................................. 2
1.3.1. Flexibility....................................... 2
1.3.2. Reliability....................................... 2
1.3.3. Future use and speed.............................. 2
1.3.4. DOS 5.x and Upper-Memory-Blocks................... 2
1.3.5. Security.......................................... 2
2. USAGE........................................................... 3
2.1. Syntax.................................................... 3
2.1.1. Drive and path.................................... 3
2.1.2. Options........................................... 3
2.1.3. Advanced options.................................. 4
2.1.4. Explanation of some options....................... 5
2.2. Exit Codes................................................ 5
2.3. Configuration file........................................ 6
2.4. Message file.............................................. 6
2.5. Residence of HTSCAN.EXE................................... 6
2.6. Residence of the signature lists.......................... 6
- ii -
3. SIGNATURE FILES................................................. 7
3.1. VIRSCAN.DAT file.......................................... 7
3.1.1. Signature format.................................. 7
3.1.2. Recommended usage................................. 7
3.1.3. Checksum.......................................... 7
3.1.4. Where to find VIRSCAN.DAT......................... 7
3.2. ADDNSIGS.DAT file......................................... 8
3.2.1. Signature format.................................. 8
3.2.2. Recommended usage................................. 8
3.2.3. Where to find ADDNSIGS.DAT........................ 8
3.3. AVR modules............................................... 9
3.3.1. AVR format........................................ 9
3.3.2. Recommended usage................................. 9
3.3.3. Where to find AVR modules......................... 9
3.4. COMPRSCA.DAT.............................................. 9
3.4.1. Signature format.................................. 9
3.4.2. Recommended usage................................. 9
3.4.3. Where to find COMPRSCA.DAT........................ 9
3.5. HTSCAN.DAT file............................................ 10
3.5.1. Signature format................................... 10
3.5.2. Recommended usage.................................. 10
3.6. HTTROJAN.DAT file.......................................... 10
3.6.1. Signature format................................... 10
3.6.2. Recommended usage.................................. 10
3.6.3. Where to find HTTROJAN.DAT......................... 10
3.7. VIRUSBUL.DAT file.......................................... 11
3.7.1. Signature format................................... 11
3.7.2. Recommended usage.................................. 11
3.8. MCAFEE.DAT file............................................ 11
3.8.1. Signature format................................... 11
3.8.2. Recommended usage.................................. 11
4. MESSAGES........................................................ 12
4.1. Virus in memory........................................... 12
4.2. Compressed files.......................................... 12
4.3. Invalid date/time......................................... 13
4.4. EXE/COM extension exchanged............................... 13
4.5. Unusual values in boot-sector............................. 13
- iii -
5. TIPS............................................................ 14
5.1. Running HTSCAN............................................ 14
5.2. Routine scanning and /A................................... 14
5.3. Scanning when probably infected........................... 14
5.4. Compressed files and scanning from a .BAT file............ 14
5.5. Backups................................................... 14
6. WHAT TO DO IF YOU FIND A VIRUS?................................. 15
6.1. Recommended approach...................................... 15
6.2. If you don't have a backup and it is a known virus........ 15
6.3. If you don't have a backup and it is an unknown virus..... 16
7. HOW TO PREVENT A VIRUS INFECTION?............................... 17
8. LICENSES........................................................ 17
9. DISCLAIMER...................................................... 17
10. MISCELLANEOUS INFORMATION....................................... 18
10.1. Requirements............................................. 18
10.2. Copyrights and trademarks................................ 18
10.3. New versions............................................. 18
10.4. Questions, suggestions or problems....................... 18
10.5. Translations............................................. 19
10.6. Thanks................................................... 19
APPENDICES
I. APPENDIX A. Signature file formats............................. 20
A.1. VIRSCAN format........................................... 20
A.2. HTSCAN format............................................ 21
A.3. VIRUSBUL format.......................................... 24
A.4. MCAFEE format............................................ 25
A.5. Switches in the signature files.......................... 25
II. APPENDIX B. Examples of HTSCAN style signatures................ 26
III. APPENDIX C. Examples of invoking HTSCAN........................ 27
IV. APPENDIX D. Addresses for experienced help..................... 28
D.1. If you have access to a modem............................ 28
D.2. If you don't have access to a modem...................... 28
V. APPENDIX E. Example batch file................................. 29
- 1 -
1. INTRODUCTION
1.1. Purpose of HTSCAN
HTSCAN is a user programmable virus-scanner. It is designed to
detect and identify known viruses within files, boot-sectors,
main-boot-record(s) (partition-tables) and memory. You can use HTSCAN for
scanning all your floppy-disks, hard-disks and network-drives.
1.2. A quick start
First of all, the master rules when dealing with viruses:
- Cold-boot the machine to be scanned from a clean write-protected
floppy-disk. Control-Alt-Del is not enough!
- Run HTSCAN from a write-protected floppy-disk after cold-booting
your PC, before starting any other program!
For a quick start, place HTSCAN.EXE, HTSCAN.OVR, HTSCAN.LNG, *.AVR,
VIRSC