Detailed instructions for use are in the User's Guide.
[. . . ] McAfee VirusScan
User's Guide
Version 5. 1
COPYRIGHT Copyright 2000 Network Associates, Inc. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc. TRADEMARK ATTRIBUTIONS * ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon's, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000 are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. [. . . ] Choose one of the module names shown with a check mark beside it to deactivate it. Module names that have a check mark beside them are active. Those without a check mark are inactive. This method disables a module only for the length of a scan session, or until you enable it again. The module will start again when you restart your computer. Depending on which combination of modules you enable, the VShield icon will display a different state. Method 2: Use the System Scan Status dialog box Follow these steps: 1. Double-click the VShield icon in the Windows system tray to open the System Scan Status dialog box (Figure 4-44). in the Windows system tray to display its
Figure 4-44. VShield System Scan Status dialog box 2. For each module that you want to disable, click the corresponding tab, then click Disable. The same button in the property page for inactive modules will read Enable. Depending on which combination of modules you enable, the VShield icon will display a different state.
User's Guide
153
Using the VShield Scanner
Method 3: Use the VShield Properties dialog box Follow these steps: 1. Right-click the VShield icon the VShield shortcut menu. in the Windows system tray to display
2. Point to Properties, then choose a module name to open the VShield Properties dialog box (Figure 4-45).
Figure 4-45. For each module that you want to disable, click the corresponding icon along the left side of the dialog box, then click the Detection tab. Clear the Enable checkbox at the top of each module page. As you do so, the scanner will disable that module and make all of the configuration options in that page unavailable. Depending on which modules you disable, the VShield icon will display a different state. If you disable all of its modules, the scanner will display in the Windows system tray, unless you clear the Show icon in the taskbar checkbox in the System Scan Detection property page. In that case, VShield will not display an icon in the system tray. [. . . ] A: If the AutoUpdate utility downloaded one or more iDAT files before the connection loss, it will install them into your existing . DAT files and record its failure to download the remaining iDAT files in its activity log.
User's Guide
299
Understanding iDAT Technology
Corrupted data
Q: What happens if one of the iDAT files is corrupted during download?A: Before the AutoUpdate utility installs any iDAT file, it checks the file against a verification checksum recorded in the DELTA. INI file. If the checksums do not match, the utility does not install that iDAT file or any subsequent files it downloads in that session. Instead, the utility will display an error message, then will download a full . DAT file set to update your software.
Incremental vs. [. . . ]