User Guide
Index
358 Dr Solomon’sAnti-Virus
F
false detections, understanding, 74
file information, viewing
, 84 to86
File menu
View Activity Log
, 200, 241
file name extensions
use of to identify vulnerable files
, 314
File Transfer Protocol (FTP)
use of to obtain VirusScan upgrades
, 271
file-infecting viruses
definition and behavior of
, xvi
setting heuristic scanning options
for
, 114 to 116, 131, 144 to 145,
194 to 196, 232, 282, 297
files
choosing as scan targets
, 184, 191 to 194,
229 to 232, 282 to 284, 295 to 297
infected
cleaning
, 117 to 120, 134 to 135, 146,
148, 186to 187, 196to 198, 235 to 236,
285 to 287
cleaning by yourself when VirusScan
cannot
, 71
deleting
, 117 to 120, 134 to 135, 146,
148, 186to 187, 196to 198, 235 to 236,
285 to 287
moving
, 117 to 120, 134 to 135, 146,
148, 186to 187, 196to 198, 235 to 236,
285 to 287
MAILSCAN.TXT, as E-Mail program
component log
, 291
SCREENSCAN ACTIVITY LOG.TXT, as
ScreenScan log
, 300
VSCLOG.TXT, as VirusScan
log
, 187 to 188, 200 to 201, 239 to 292
VSHLOG.TXT, asVShield log
, 122 to 123
WEBEMAIL.TXT, as VShield log
, 139
WEBFLTR.TXT, as VShield
log
, 160 to 161
WEBINET.TXT, as VirusScan log
, 150
floppy disks
role in spreading viruses
, xv to xvi
folders
choosing as scan targets
, 184, 191to 194,
229 to 282, 295 to 297
Force Update, use of to replace corrupted
.DAT files
, 262
FTP (File Transfer Protocol)
use of toobtain VirusScan upgrades
, 271
H
Help
opening from the Console
, 214
opening from VirusScan Classic and
VirusScan Advanced
, 179
Help Topics
in Help menu
, 179, 214
heuristic scanning
definition of
, 32, 114 to 116, 131,
144 to 145, 194 to 196, 232, 282, 297
history of viruses
, xiii to xx
hostile objects
distinction between viruses and
, xix
Java classes and ActiveX controls
as
, xix to xx
I
incremental .DAT (iDAT) files
.UPD files as downloads
, 346
understanding and using
, 345 to 351
use of DELTA.INI file for
, 346
usingtheAutoUpdateutilitytodownload
and install
, 345
what they are
, 249, 345