User Guide

Index
User’s Guide 313
24-hour clock, using to enter schedule
times
, 202
U
uninfected computer, use of to create
Emergency Disk
, 54
.UPD files
description and use of
, 296
user name, recorded in log file
, 107, 124, 135
V
View Activity Log
in File menu
, 216
in Task menu
, 216
View menu
Status Bar
, 190
Title Bar
, 190
Toolbar
, 190
Virus List
, 191
Virus Information Library, connecting to from
VirusScan
, 68 to 70
Virus List
in View menu
, 191
viruses
"Brain" virus
, ix
boot-sector infectors
, ix to x
cleaning, recorded in log file
, 107, 124,
135
code signatures, use of by
, xi
Concept
, xii
costs of
, vii to viii
current numbers of
, vii
deciding when to start scan operations
for
, 56
default response to
when E-Mail Scan program
component detects
, 66
when VirusScan detects
, 64
when VShield detects
, 59 to 64
definition of
, vii
detecting, recorded in log file
, 107, 124,
135
disguising infections of
, xi
distinction between hostile objects
and
, xiii
effects of
, vii, 53
encrypted, definition of
, xi
false detections of, understanding
, 58
file infectors
, x
history of
, vii to xiv
macro
, xii
setting heuristic scanning options
for
, 99 to 100, 115, 128to 129, 207,
228, 242
mutating, definition of
, xi
origins of
, vii to xiv
payload
, ix
polymorphic, definition of
, xi
programs similar to
Trojan horses
, ix
worms
, viii
recognizing when computer problems do
not result from
, 57
removing
before installation, necessity of and
steps for
, 53
from infected files
, 53
role of PCs in spread of
, ix
script language
, xiv
spread of via e-mail and Internet
, xii
stealth, definition of
, xi