PCjs Machines

Home of the original IBM PC emulator for browsers.

Logo

PC-SIG Diskette Library (Disk #2749)

[PCjs Machine "ibm5170"]

Waiting for machine "ibm5170" to load....

FILE2749.TXT

Disk No: 2749
Disk Title: ShareDebate International #5
PC-SIG Version: S1

Program Title: ShareDebate International #5
Author Version: 4/91
Author Registration: Multiple Registraion plans form $5 and up.
Special Requirements: 384K RAM.

Issue 5's Headlines:

             ShareDebate International's first double-disk issue
          Featuring 11 popular authors including Jerry Pournelle &
                     the League for Programming Freedom!
      Also, ShareDebate has gone Semi-Annual to half subscription costs!
                   Spring/Summer 1991 (Issue #5 & #6)

ShareDebate International, a ShareWare disk magazine, formerly a
quarterly, is now semi-annual starting with this double-disk issue (#5 &
6). It is a debate forum for computer users concerned about the present
& future carried by 544 to 1,444 BBSs or Shareware Dealers.

                 Debates & Articles in This Double Disk Issue

Prior to this issue there were 19 debate topics (named in issue #4).
Five new debate topics have been added. Three are related to the Gulf
War and the Palestinian problem. One is a catch-all topic, which is used
by Sysop-Attorney Paula Goldman in her coverage of recent FCC actions
that impact the computer industry. The other topic covers intellectual
property law and programming freedom. Four position papers of the League
for Programming Freeedom, including one written for ShareDebate
International, kick off this debate.

Benston and Kaufman review the history of S&Ls. Bova writes about
freedom of information over the satellite waves. General Graham writes
on the political limitations imposed on the Patriot. The 28 Americans
killed by the Scud missile didn't need to die. Pournelle discusses how
government hurts progress.  Smith assesses the National Interest Project
level Stock market proposal.  Schulman's Prometheus- winning novel,
Alongside Night, is excerpted (7 chapters). Martin writes on the Gulf
War and viruses. McAfee Associates' latest version of its virus detector
is included, SCAN76-C.

PC-SIG
1030D East Duane Avenue
Sunnyvale  Ca. 94086
(408) 730-9291
(c) Copyright 1991 PC-SIG, Inc.

AGENTS.TXT

                   McAFEE ASSOCIATES AGENT LISTING
 
                           APRIL 8, 1991


McAfee Associates                     (408) 988-3832  office
4423 Cheeney Street                   (408) 970-9727  fax
Santa Clara, California 95054         (408) 988-4004  BBS 2400 bps
U.S.A.                                (408) 988-5138  BBS HST 9600
                                      (408) 988-5190  BBS v32 9600

     In  order  to  provide the global  community  with  anti-virus
coverage  in a timely manner, McAfee Associates has established  an
Agents program in place to  provide service, sales and support  for
McAfee  Associates  products around the world.  If you do  not  see
your country listed, please contact McAfee Associates directly.   A
listing  of North American Agents has been added to the end of this
file.


ASIA
Acer Sertek Inc.
Address:      135 Sec. 2 Chien Kuo N. Road
              Taipei 10479, Taiwan, ROC
Contact:      Jack Hwang
Telephone:    +886 (02) 501-0055
Fax:          +886 (02) 501-2521

AUSTRALIA
Computer Virus Clinic
Address:      P.O. Box 106
              Moorebank, N.S.W. 2170
Contact:      Colin Keeble
Telephone:    +61 (02) 822-4303
Fax:          +61 (02) 822-4304

AUSTRALIA
Computerware for Micros
Address:      23 Magill Road
              Stepney, Adelaide, S.A. 5096
Contact:      Priestly Hillam
Telephone:    +61 (08) 362-8200
Fax:          +61 (08) 363-1974
BBS:          +61 (08) 363-4293

AUSTRALIA
Doctor Disk (Sydney Office)
Address:      64 Kippax Street
              Surrey Hills, NSW 2010
Contact:      Robin Edwards
Telephone:    +61 (09) 328-2011
              +61 (02) 281-2099
Fax:          +61 (09) 328-9661
              +61 (02) 281-9740
Toll-Free:    (008) 999 755 (outside of Perth Metro Area)

AUSTRIA
Terramar Handelsges m.b.H.
Address:      Nikolsdorfergaße 8/8
              A-1050 Wien
Contact:      Ronald Schmutzer
Telephone:    +43 (1) 543-731
Fax:          +43 (1) 543-339

BELGIUM
Impakt nv
Address:      Ham 64
              B-9000 Gent
Contact:      Frank Lateur
Telephone:    +32 (91) 25 35 49
Fax:          +32 (91) 33 00 78

BELGIUM
Software Distributors
Address:      Dynamicalaan 16
              B-2601 Wilrijk
Contact:      Arthur Schrey
Telephone:    +32 (3) 830 59 92
Fax:          +32 (3) 830 25 92

BRAZIL
COMPUSUL Consultoria e Comercio de Informatica Ltda.
Address:      Rua Emboabas, 68-1o andar
              04623-Sao Paulo, SP
Contact:      Andre Pitrowski
Telephone:    +55 (11) 533-7331
Fax:          +55 (11) 530-6114

BRAZIL
Maple Informatica Ltda.
Address:      R. Maranhao, 554 cj. 26
              01240 Sao Paulo, SP
Contact:      David Rotenberg
Telephone:    +55 (11) 825-9390
Fax:          +55 (11) 826-5375

BRAZIL
NUPEC Ltda
Address:      Rua do Hospicio
              981/172 - Boa Vista
              CEP 50,060
              Recife-PE
Contact:      Anatolio de Paula Crespo
Telephone:    +55 (81) 222-0698
Fax:          +55 (81) 222-0698

CANADA
Concise Systems Corp.
Address:      #25 - 1925 Bowen Road
              Nanaimo, BC
              CANADA  V9S 1H1
Contact:      Jeff Martin
Telephone:    (604) 756-1604
Fax:          (604) 756-0123

CANADA
Dolfin Development
Address:      709 Eaglemount Crescent
              Mississauga, Ontario
              CANADA  L5C 1N8
Contact:      Mike Cameron
Telephone:    (416) 896-7731
Fax:          (416) 896-1458

CANADA
Programmers Guild Products
Address:      4652 - 99th Street
              Edmonton, Alberta
              CANADA  T6E 5H5
Contact:      George Woycenko
Telephone:    (403) 438-5897
Fax:          (403) 434-3957

CANADA
Schultz Computers
Address:      1825 Woodward Drive
              Ottawa, Ontario
              CANADA  K2C 0R4
Contact:      John Schultz
Telephone:    (613) 727-0589
Fax:          (613) 727-1264

CHILE
Rigg S.A.
Address:      Avda. Salvador 1068
              P.O. Box 10.295
              Santiago
Contact:      Ricardo Gutierrez
Telephone:    +56 (2) 225-0222
Fax:          +56 (2) 225-0240

FINLAND
Nokia Data Systems
Address:      P.O. Box 458
              SF-00101 Helsinki
Contact:      Kari Ilonen
Telephone:    +358 (0) 567 4168
Fax:          +358 (0) 567 4160

FINLAND
SAFECO OY
Address:      Kirvuntie 22
              02140 Espoo
Contact:      Hannu Ohrling
Telephone:    +358 (0) 512 1100
Fax:          +358 (0) 515 151

FRANCE
VIF Micro
Address       12 Avenue des Andes
              91940 Les Ulis CEDEX
Contact:      Patrick Le Granche
Telephone:    +33 (1) 69-07-8632
Fax:          +33 (1) 64-46-6831

GERMANY
BFK edv-consulting GmbH
Address:      Gerwigstraße 48
              W-7500 Karlsruhe 1
Contact:      Christoph Fischer
Telephone     +49 (7) 2161-1519
Fax:          +49 (7) 2162-1479

GERMANY
Die Deutsche Software Bibliothek
              Alpenstraße 52
              8038 Grobenzell
Contact:      Nane Jurgensen
Telephone:    +49 (8) 1425-3030
Fax:          +49 (8) 1425-4641

GERMANY
Kirschbaum Software, GmbH
Address:      Kronau 15
              W 8091 Emmering b. Wbg.
Contact:      Josef Kirschbaum
Telephone:    +49 (0) 8067-1016
Fax:          +49 (0) 8067-1053

GERMANY
K.H. Kitroschat, Ingenieurbuero für Neue Technik
Address:      Naabstraße 9
              W-4006 Erkrath
Contact:      Karl-Heinz Kitroschat
Telephone:    +49 (02) 1044-8626
Fax:          +49 (02) 1044-8626

GERMANY
R. Bucker EDV
Address       Nordhemmer Straße 94
              W 4955 Hille 1
Contact:      Peter Bucker
Telephone:    +49 (0) 5703-3669
Fax:          +49 (0) 5703-3648

GERMANY
NoVIR
Address:      Schursdorfer Weg 10
              2409 Scharbeutz 2
Contact:      Peter Bohm
Telephone:    +49 (0) 4524-1776
Fax:          +49 (0) 4524-1419

HONG KONG
The Software Tree Limited
Address:      Block E 15/F
              Golden Bear Industrial Centre
              62-84 Chaiwan Kok Street
              Tsuen Wan N.T.
Contact:      Isabel Chan
Telephone:    +852 (0) 414-4241
Fax:          +852 (0) 413-6078

HUNGARY
TOPSOFT Software House
Address:       VEND u.3
               H-1025 Budapest
Contact:       Maria Pistar
Telephone:     +36 (1) 135-52-10
Fax:           +36 (1) 115-65-16

INDIA
LAN ESEDA Computer Training Centres
Address:       2nd Floor Ramanashree Arcade
               18 M.G. Road
               (Opposite Taj Residency)
               Bangalore  560001
Contact:       M.V. Kotappa
Telephone:     +91 812 544306
Fax:           +91 224 925508

INDONESIA
P.T. Yakin Aman
Address:       #15-16, Block FX-1
               Jalan Kelapa Gading Boulevard
               Jakarta 14240
Contact:       M.A. Sunadi
Telephone:     +62 (21) 451-0072
Fax:           +62 (21) 451-2731

IRELAND
Systemhouse Technology Group Ltd
Address:       39-40 Upper Mount Street
               Dublin 2
Contact:       Dermot Williams or Stephen Kearon
Telephone:     +353 (1) 283-1922
Fax:           +353 (1) 288-6224
BBS:           +353 (1) 288-5634
               +353 (1) 283-1908 HST

ITALY
Ultimobyte Editrice, SRL
Address:      Via A. Manuzio, 15
              20124 Milano
Contact:      Adalberto Fontana
Telephone:    +39 (2) 655-5306
Fax:          +39 (2) 659-7693

JAMAICA
W.T.G Systems Ltd.
Address:      "The Towers"
              25 Dominca Drive
              Kingston 5
Contact:      Robert Davies
Telephone:    (809) 929-9250
Fax:          (809) 929-8296

MALAYSIA
MCSB Systems (M) Sdn Bhd
Address:     17th Floor Menara Bousted
             Jalan Raja Chulan
             50200 Kuala Lumpur
Contact:     Mr. M.F. Leong
Telephone:   +60 (3) 241 7400
Fax:         +60 (3) 248 8010

MEXICO
Mundo PC, S.A.
Address:      Rio San Lorenzo No. 507-A OTE
              Garza Garcia
              N.L. 66220
Contact:      Roberto Herrera
Telephone:    +52 (8) 378-34-48
Fax:          +52 (8) 378-34-40

NEW ZEALAND
Computer Software Library of NZ, Ltd.
Address:      R.D. 3
              Timaru
Contact:      Bill Strauss
Telephone:    +63 (3) 615-9333
Fax:          +63 (3) 615-9333

NETHERLAND ANTILLES
Micro Computer Consultants
Address:      Fokkerweg 30
              Muskus Building
              Willemstad Curaco
Contact:      Edison Maduro
Telephone:   +599 (9) 61 31 61
Fax:         +599 (9) 61 61 19

PORTUGAL
Fobis, Informatic e Gestao, Lda.
Address:      Praca de Londres 3-1.Dt
              P-1000 Lisboa
Contact:      Luis Dias
Telephone:    +351 (1) 848 31 84
Fax:          +351 (1) 715 11 11

SAUDI ARABIA
Gulf Stars Computer Systems
Address:      Suite #201/202,
              Al Banafaea Building
              Riyadh 11573
Contact:      Anwah Qahwash
Telephone:    +966 (1) 463-1098
Fax:          +966 (1) 465-3156

SPAIN
DATAMON, SA
Address:      Corcega, 485
              08025 Barcelona
Contact:      Carmen Navarro
Telephone:    +34 (3) 207-2704
Fax:          +34 (3) 257-1370

SWEDEN
Virus Help Center
Address:      Box 1237
              S 801 37 Gävle, Sweden
Contact:      Mikael Larsson
Telephone:    +46 (26) 100518
Fax:          +46 (26) 275720
BBS:          +46 (26) 275710

SWITZERLAND
Computer Concepts AG
Address:      Postfach 104
              CH-8606 Naenikon
Contact:      Marcus Laubli
Telephone:    +41 (1) 941-6229
Fax:          +41 (1) 941-6229

UNITED ARAB EMIRATES
Al Bawardi Computers
Address:      Flat 301, Third Floor, Grandstore Building
              Hamdan Street, P.O. Box 4118
              Abu Dhabi
Contact:      Syed Rehan Aziz
Telephone:    +971 (2) 721777
Fax:          +971 (2) 727357

UNITED KINGDOM
International Data Security
Address:      37/41 Gower Street
              London WC1E 6HH
Contact:      Grace Fodor
Telephone:    +44 (71) 631 0548
Fax:          +44 (71) 580 1466

ZAMBIA
KBM Software Plaza
Address:      P.O. Box 320139
              Woodlands
              Lusaka
Contact:      (Ms.) Kasonde B. Mwila
Telephone:    +260 (1) ?
Fax:          +260 (1) 210400

UNITED STATES
AMI Data Systems
Address:      2778 Shasta Road
              Berkeley, CA  94708
Contact:      John Mace
Telephone:    (415) 843-3204
Fax:          (415) 843-3204

UNITED STATES
Blue Chip Computer Company
Address:       3085 Woodman Drive
               Dayton, OH  45420
Contact:       Larry Song
Telephone:     (513) 299-4594
Fax:           (513) 298-5798

UNITED STATES
CDT, Inc.
Address:      3110 Rhapsody Court
              Colorado Springs, CO  80920
Telephone:    (719) 260-0567
Fax:          (719) 531-5256

UNITED STATES
Computer Security Plus, Inc.
Address:      200 East Robinson St., Suite 890
              Orlando, FL  32801
Contact:      Padgett Peterson
Telephone:    (407) 648-0709
Fax:          (407) 648-0733

UNITED STATES
Jetics Inc.
Address:      8229 Boone Blvd. Suite 860
              Vienna, VA  22182
Contact:      Wayne Carpenter
Telephone:    (703) 893-4404
Fax:          (703) 821-0710

UNITED STATES
Jim's Consulting Services
Address:      24 Frank Lloyd Wright Drive
              Ann Arbor, MI  48106
Contact:      Jim Shaeffer
Telephone:    (313) 930-5838
Fax:          (313) 429-1963

UNITED STATES
Microplus Systems Technologies
Address:      1020 East El Camino Real
              Sunnyvale, CA  94087
Contact:      Ralph Manildi or Bui Han
Telephone:    (408) 737-2525
Fax:          (408) 737-2402

UNITED STATES
MSB Computing Environments
Address:      626 Walnut Street, Suite 207
              San Carlos, CA  94070
Contact:      Fritz Schneider
Telephone:    (415) 637-0119
Fax:          (408) 739-3204
Internet:     msb-ce@cup.portal.com

UNITED STATES
NetLAN
Address:      29 West 38th Street
              New York, NY  10018
Contact:      Al Berg
Telephone:    (212) 768-2273
Fax:          (212) 768-2201

UNITED STATES
OverFlow Corporation
Address:      5200 SW Macadam, Suite 320
              Portland, OR  97201
Contact:      Dean Warren
Telephone:    (503) 228-7838
Fax:          (503) 228-7908


UNITED STATES
Standard Systems Solutions, Inc.
Address:      410 West Commercial Street
              East Rochester, NY  14445
Contact:      Steve Smith
Telephone:    (716) 586-2460
Fax:          (716) 586-0936

UNITED STATES
TIEX Computer/Communications Products
Address:     13748 Neutron Road
             Dallas, TX  75244
Contact:     Bill Geiser
Telephone:   (214) 392-0647
Fax:         (214) 385-072

UNITED STATES
VacciVirus
Address:      84 Hammond Street
              Waltham, MA  02154
Contact:      Roger Aucoin
Telephone:    (617) 893-8282
Fax:          (617) 969-0385

REGISTER.DOC

                    USE OF McAFEE ASSOCIATES PROGRAMS

     The McAfee Associates VIRUSCAN series is distributed as shareware
for home use, but must be licensed for use within a business,
corporation, or organization.  This includes educational institutions
and government agencies.  If you have or suspect computer virus
infection, you are allowed to use the software for five (5) days free of
charge to isolate and remove the computer virus or suspect computer
virus.  We will provide you with assistance if requested.
     If you are a shareware distributor, you may distribute all software
listed below in the registration form as long as you contact McAfee
Associates for permission first.  You must distribute the all the
files intact and in unmodified form (duplicate files may be removed)
and may not charge more than a reasonable disk copying fee.  You must
obtain updates from our BBS at the number below.
     If you are a System Operator and run a publically-accessable BBS
for which their is no fee for use then you may use the software
free of charge--that's our way of saying thanks.

               REGISTRATION FOR McAFEE ASSOCIATES PROGRAMS

     Registration is required for the use of the VIRUSCAN, SHIELD
and CLEAN-UP program series in a home environment.  This form
should be used to register a program.

     Registered users of the VIRUSCAN programs receive free
technical support and assistance with virus infections in the form
of walk-throughs of virus removal.  The nine line McAfee Associates 
Bulletin Board (mail box) is available to access to the latest versions
of the VIRUSCAN series and for downloads of virus-related information.
     Registered users obtain free upgrades for their registered
programs for a period of one year after registration, provided they
are downloaded from the BBS.
     Diskettes are not mailed to registered users unless
specifically requested.  Diskettes are mailed first class in the
U.S. and by airmail for foreign countries.  For such mailings,
please add $9.00US.  Only one mailing will be made to registered
users.

     Corporate, business and organizational users require a site
license for the use of the VIRUSCAN programs.  For site license
information please contact McAfee Associates at the address or
phone number below.


==CUT HERE===============================================CUT HERE==

           REGISTRATION FORM  For Individual Home Users


PROGRAM:                        # COPIES:            AMOUNT:

CLEAN-UP  ($35 per copy)        _________          $______________

VIRUSCAN  ($25 per copy)        _________          $______________

VSHIELD   ($25 per copy)        _________          $______________

SENTRY    ($25 per copy)        _________          $______________

FSHIELD   ($25 per copy)        _________          $______________

VCOPY     ($15 per copy)        _________          $______________

- ADD -   $9 for Diskette (5.25" 360K only)        $______________
          (All programs and documentation fit on one diskette)

TOTAL                                              $______________

PAYMENT BY:

Check/Money Order No.__________ enclosed for $____________________


OR CHARGE:     MasterCard ______ Visa ______

Card Number_______________________________________________________

Name on Card______________________________________________________

Exp. Date_________________________________________________________

     
Signature_________________________________________________________


MAILING ADDRESS:

NAME______________________________________________________________

ADDRESS LINE 1____________________________________________________

ADDRESS LINE 2____________________________________________________

CITY/STATE/PROVINCE_______________________________________________

COUNTRY/POSTAL CODE_______________________________________________

HOME PHONE________________________________________________________

OFFICE PHONE______________________________________________________


SEND TO:                                  +----------------------------+
              McAfee Associates           | OR SEND TO ANY OF THE      |
              4423 Cheeney Street         | THE AUTHORIZED AGENTS      |
              Santa Clara, California     | LISTED IN THE ACCOMPANYING |
              95054-0253  USA             | AGENTS.TXT FILE.           |
                                          +----------------------------+

(408) 988-3832 Voice  -   Use this # for questions/bug reports
(408) 988-4004 BBS    -   Use this # for obtaining program upgrades
(408) 988-5138 BBS US Robotics HST 9600 (HST)
(408) 988-5190 BBS US Robotics HST 9600 Dual Standard (HST/v.32)
(408) 970-9727 FAX

==CUT HERE===============================================CUT HERE==


SCAN76-C.DOC


                       VIRUSCAN Version 7.2C76
         Copyright (C) 1989, 1990, 1991 by McAfee Associates.
                         All rights reserved.
                   Documentation by Aryeh Goretsky.




     McAfee Associates               (408) 988-3832 office
     4423 Cheeney Street             (408) 970-9727 fax
     Santa Clara, CA  95054-0253     (408) 988-4004 BBS 2400 bps
     U.S.A.                          (408) 988-5138 BBS HST 9600
                                     (408) 988-5190 BBS v32 9600



                            TABLE OF CONTENTS:


SYNOPSIS . . . . . . . . . . . . . . . . . . . . . . . . . . .2
  - What VIRUSCAN is, system requirements

AUTHENTICITY . . . . . . . . . . . . . . . . . . . . . . . . .2
  - Verifying the integrity of VIRUSCAN

WHAT'S NEW . . . . . . . . . . . . . . . . . . . . . . . . . .3
  - Features, new viruses added in this release

OVERVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . .4
  - Detailed description of VIRUSCAN

OPERATION. . . . . . . . . . . . . . . . . . . . . . . . . . .5
  - How to use VIRUSCAN

EXAMPLES . . . . . . . . . . . . . . . . . . . . . . . . . . .8
  - Samples of frequently-used options

EXIT CODES . . . . . . . . . . . . . . . . . . . . . . . . . .9
  - For running VIRUSCAN from batch files

VIRUS REMOVAL. . . . . . . . . . . . . . . . . . . . . . . . .9
  - How to manually remove a virus

REGISTRATION . . . . . . . . . . . . . . . . . . . . . . . . .10
  - How to register VIRUSCAN

TECH SUPPORT . . . . . . . . . . . . . . . . . . . . . . . . .10
 - Information you should have ready when calling

APPENDIX A . . . . . . . . . . . . . . . . . . . . . . . . . .11
 - Creating a virus string file with the /EXT option

                                Page 1VIRUSCAN Version 7.2C76                                Page 2


SYNOPSIS

     VIRUSCAN (SCAN) is a virus detection and identification
program for the IBM PC and compatible computers.  VIRUSCAN will
search a PC for known computer viruses in memory, the boot sector,
the partition table, and the files of a PC and its disks.  VIRUSCAN
will also detect the presence of unknown viruses.
     SCAN works by searching the system for instruction sequences
or patterns that are unique to each computer virus, and then
reporting their presence if found.  This method works for viruses
that VIRUSCAN recognizes.  To detect unknown viruses, VIRUSCAN can
append a validation code or "CRC check" to .COM and .EXE files. 
If the file has been modified in any way, SCAN will report that
infection may have occurred.  VIRUSCAN can also look for new
viruses from a user-supplied list of virus search strings.
     VIRUSCAN runs on any PC with 256Kb and DOS version 2.00 or
greater.


AUTHENTICITY

     VIRUSCAN runs a self-test when executed.  If SCAN has been
modified in any way, a warning will be displayed.  The program will
still continue to check for viruses, though.  If SCAN reports that
it has been damaged, it is recommended that a clean copy be
obtained.
     VIRUSCAN versions 46 and above are packaged with the VALIDATE
program to ensure the integrity of the SCAN.EXE file.  The
VALIDATE.DOC  instructions tell how to use the VALIDATE program.
The VALIDATE program distributed with VIRUSCAN may be used to check
all further versions of SCAN.

     The validation results for Version 76-C should be:

              FILE NAME: SCAN.EXE
                   SIZE: 58,467
                   DATE: 04-09-1991
    FILE AUTHENTICATION
         Check Method 1: A9AB
         Check Method 2: 158B

If your copy of SCAN.EXE differs, it may have been modified.
Always obtain your copy of VIRUSCAN from a known source.  The
latest version of VIRUSCAN and validation data for SCAN.EXE can be
obtained off of McAfee Associates' bulletin board system at (408)
988-4004.

     Beginning with Version 72, all McAfee Associates programs for
download are archived with PKWare's PKZIP Authentic File
Verification.  If you do not see the "-AV" message after every file
is unzipped and receive the message "Authentic Files Verified!
# NWN405  Zip Source: McAFEE ASSOCIATES" when you unzip the files
then do not run them.  If your version of PKUNZIP does not have
verification ability, then this message may not be displayed.
Please contact McAfee Associates if your .ZIP file has been
tampered with.
VIRUSCAN Version 7.2C76                                Page 3


WHAT'S NEW
	Version 76-C of SCAN fixes a false alarm with the Friday-13
virus.
     Version 76 of VIRUSCAN adds 18 new viruses, bringing the
total number of known computer viruses to 239, for a total of 501
viruses including strains.  The enclosed VIRLIST.TXT file outlines
the characteristics of the new viruses.  For a comprehensive
discussion of each of the viruses, we recommend that you access the
VSUM document copyrighted by Patricia Hoffman.  It is available on
most bulletin board systems.
     In addition, two new command line options have been added to
improve batch mode operation of SCAN:  The /NOPAUSE option turns
off the screen pause that occurs when SCAN fills up a screen with
messages.  The /NOBREAK option will prevent SCAN from stopping when
a Control-C or Control-Break is issued.
VIRUSCAN Version 7.2C76                                 Page 4


OVERVIEW

     VIRUSCAN scans diskettes or entire systems for pre-existing
computer virus infections.  It will identify the virus infecting
the system, and tell what area of the system (memory, boot sector,
file) the virus occupies.  An infected file can be removed with
the overwrite-and-delete option, /D which will erase the file.
The CLEAN-UP program is also available to automatically disinfect
the system and repair damaged areas whenever possible.
     VIRUSCAN Version 76 identifies all 239 known computer viruses
along with their variants.  Some viruses have been modified so that
more than one "strain" exists.  Counting such modifications, there
are 501 virus variants.  The ten most common viruses which account
for over 95% of all reported PC infections are also identified by
SCAN.  The accompanying VIRLIST.TXT file lists describes all new,
public domain, and extinct computer viruses identified by SCAN.
The number of variants of each virus is listed in parentheses after
the virus name.
      All known computer viruses infect one or more of the
following areas:  the hard or fixed disk partition table [also
known as the master boot record]; the DOS boot sector of hard disks
and floppy disks; or one or more executable files within the
system.  Executable files include operating system files, .COM
files, .EXE files, overlay files, or any other files loaded into
memory and executed.  A virus that infects more than one area, such
as a boot sector and an executable file is called a multipartite
virus.
    VIRUSCAN identifies every area or file that is infected, and
indicates both the name of the virus and CLEAN-UP I.D. code used
to remove it.  SCAN will check the entire system, an individual
diskette, sub-directory, or individual files for existing viruses.
     VIRUSCAN will also check for new, unknown viruses with the Add
Validation and Check Validation options.  This is done by computing
a code for a file, appending it to the file, and then validating
the file against that code.  If the file has been modified, the
check will no longer match, indicating that viral infection may
have occurred.  SCAN uses two independently generated CRC (Cyclic
Redundancy Check) checks that are added to the end of program files
to do this.  Files which are self-checking should not be validated
since this will "set off" the program's self-check.  Files which
are self-modifying may have different values for the same program
depending upon the modifications.  VIRUSCAN adds validation codes
to .COM and .EXE files only.  The validation codes for the
partition table, boot sector, and system files, are kept in a
hidden file called SCANVAL.VAL in the root directory.
     VIRUSCAN can also be updated to search for new viruses via
an External Virus Data File option, which allows the user to
provide the VIRUSCAN program with new search strings for viruses.
     VIRUSCAN can display messages in either English or French.
     VIRUSCAN works on stand-alone and networked PC's, but not on
a file server.  For networks, the NETSCAN file server-scanning
program is required.
VIRUSCAN Version 7.2C76                                Page 5


OPERATION

IMPORTANT NOTE:  WRITE PROTECT YOUR FLOPPY DISK BEFORE SCANNING
YOUR SYSTEM TO PREVENT INFECTION OF THE VIRUSCAN PROGRAM.

     VIRUSCAN will check each area or file on the designated
drive(s) that could be host to a virus.  If a virus is found, a
message is displayed telling the name of the infected file or
system area and the name of the identified virus.  SCAN will
examine files for viruses based on their extensions.  The default
executable extensions supported by SCAN are .BIN, .COM, .EXE, .OV?,
.PGM, .PIF, .PRG, .SYS and .XTP.  Additional extensions can be
added to SCAN or all files on disk can be selected for scanning.

     To run VIRUSCAN type:

SCAN d1: ... d10: /A /AV /CV /D /E .xxx .yyy .zzz /EXT d:filename
                  /FR /MANY /NLZ /NOBREAK /NOMEM /NOPAUSE
                  /REPORT d:filename /RV


Options are:

                  \ - Scan root directory and boot area only
                 /A - Scan all files, including data, for viruses
                /AV - Add validation codes to specified files
                /CV - Check validation codes for files
                 /D - Overwrite and delete infected file
  /E .xxx .yyy .zzz - Scan overlay extensions .xxx .yyy .zzz
    /EXT d:filename - Scan using external virus information file
                /FR - Display messages in French
                 /M - Scan memory for all viruses
                      (see below for specifics)
              /MANY - Scan multiple floppies
               /NLZ - Skip internal scan of LZEXE compressed files
           /NOBREAK - Disable Ctrl-C / Ctrl-Brk during scanning
             /NOMEM - Skip memory checking
           /NOPAUSE - Disable screen pause when scanning
 /REPORT d:filename - Create report of infected files
                /RV - Remove validation codes from specified files

           (d1: ... d10: indicate drives to be scanned)

     The /A option will cause SCAN to check all files on the
referenced drive.  This should only be used if a file-infecting
virus has already been detected.  Otherwise the /A option should
only be used when checking a new program.  The /A option will add
a substantial time to scanning.  This option takes priority over
the /E option.
    The /AV option allows the user to add validation codes to the
files being scanned.  If a full drive is specified, SCAN will
create validation data for the partition table, boot sector, and
system files of the disk as well.  Validation adds ten (10) bytes
to files; the validation data for the partition table, boot sector,
and system files is stored separately in a hidden file in the root
directory of the scanned drive.
VIRUSCAN Version 7.2C76                                Page 6

    The /CV option checks the validation codes inserted by the /AV
option.  If the file has been changed, SCAN will report that the
file has been modified, and that viral infection may have occurred.
Using the /CV option adds about 25% more time to scanning.

NOTE:  Some older Hewlett Packard and Zenith PC's modify the boot
sector or partition table each time the system is booted.  This
will cause SCAN to continually notify the user of boot sector or
partition table modifications if the /CV switch is selected.  Check
your system's manual to determine if your system contains
self-modifying boot code.

     The /D option tells VIRUSCAN to prompt the user to overwrite
and delete an infected file when one is found.  If the user selects
"Y" the infected file will be overwritten with hex code C3 [the
Return-to-DOS instruction] and then deleted.  A file erased by the
/D option can not be recovered.  If the McAfee Associates' CLEAN-
UP program is available, it is recommended that CLEAN be used to
remove the virus instead of SCAN, since in most cases it will
recover the infected file.  Boot sector and partition table
infectors can not be removed by the /D option and require the
CLEAN-UP virus disinfection program.
     The /E option allows the user to specify an extension or set
of extensions to scan.  Extensions should include the period
character "." and be separated by a space after the /E and between
each other.  Up to three extensions may be added with the /E.  For
more extensions, use the /A option.
     The /EXT option allows VIRUSCAN to search for viruses from a
text file containing user-created search strings.  The syntax for
using the external virus data file is /EXT d:filename, where d: is
the drive name and filename is the name of the external virus data
file.  For instructions on how to create an external virus data
file, refer to Appendix A.

NOTE:  The /EXT option is intended for advanced users and computer
anti-virus researchers to add their own strings for detection of
computer viruses on an interim or emergency basis.  When used with
the /D option, it will delete infected files.  This option is not
recommended for general use and should be used with caution.

     The /FR option tells VIRUSCAN to output all messages in French
instead of English.
     The /M option tells VIRUSCAN to check system memory for all
known computer viruses that can inhabit memory.  SCAN by default
only checks memory for critical and "stealth" viruses, which are
viruses which can cause catastrophic damage or spread the infection
during the scanning process.  SCAN will check memory for the
following viruses in any case:

     1554           1971          1253          2100
     3445-Stealth   4096          512           Anthrax
     Brain          Dark Avenger  Disk Killer   Doom-2
     EDV            Fish6         Form          Invader
     Joshi          Microbes      Mirror        Murphy
     Nomenclature   Phantom       Plastique     Polish-2
     P1R (Phoenix)  Taiwan-3      Whale         Zero-Hunt

VIRUSCAN Version 7.2C76                                Page 7


If one of these viruses is found in memory, SCAN will stop and
advise the user to power down, and reboot the system from a
virus-free system disk.  Using the /M option with another
anti-viral software package may result in false alarms if the other
package does not remove its virus search strings from memory.  The
/M option will add 6 to 20 seconds to the scanning time.
     The /MANY option is used to scan multiple diskettes placed in
a given drive.  If the user has more than one floppy disk to
check for viruses, the /MANY option will allows the user to check
them without having to run SCAN multiple times.  If a system has
been disinfected, the /MANY and /NOMEM options can be used to speed
up scanning of disks.
     The /NLZ option tells VIRUSCAN not to look inside files
compressed with the LZEXE file compression program.  SCAN will
still check the programs for external infections.
     The /NOBREAK option disables Control-C or Control-Break from
stopping VIRUSCAN while running. 
     The /NOMEM option is used to turn off all memory checking for
viruses.  It should only be used when a system is known to be free
of viruses.
     The /NOPAUSE option disables the "More..." prompt that appears
when SCAN fills up a screen with data.  This allows VIRUSCAN to run
on a machine with multiple infections without requiring operator
intervention when the screen fills up with messages from the SCAN
program.
     The /REPORT option is used to generate a listing of infected
files.  The resulting list is saved to disk as an ASCII text file.
To use the report option, specify /REPORT on the command line,
followed by the device and filename [See EXAMPLES below for
samples].
     The /RV option is used to remove validation codes from a file
or files.  It can be used to remove the validation code from a
diskette, subdirectory, or file(s).  Using /RV on a disk will
remove the partition table, boot sector, and system file
validation.  This option can not be used with the /AV option.
VIRUSCAN Version 7.2C76                                Page 8


EXAMPLES

        The following examples are shown as they would be typed in.

     SCAN C:
          To scan drive C:

     SCAN A:R-HOOPER.EXE
          To scan file "R-HOOPER.EXE" on drive A:

     SCAN A: /A
          To scan all files on drive A:

     SCAN B: /D /A
          To scan all files on drive B:, and prompt for erasure of
          infected files.

     SCAN C: D: E: /AV /NOMEM
          To add validation codes to files on drives C:, D:, and
          E:, and skip memory checking.

     SCAN C: D: /M /A /FR
          To scan memory for all known and extinct viruses, as well
          as all files on drives C: and D:, and output all messages
          in French.

     SCAN C: D: /E .WPM .COD
          To scan drives C: and D:, and include files with the
          extensions .WPM and .COD

     SCAN A: /CV
          To check for known and unknown viruses (via the
          validation codes) on drive A:

     SCAN C: /EXT A:SAMPLE.ASC
          To scan drive C: for known computer viruses and also for
          viruses added by the user via the external virus data
          file option.

     SCAN C: /M /REPORT A:INFECTN.RPT
          To scan for all viruses in memory and drive C:, and
          create a log on drive A: called INFECTN.RPT

     SCAN C: D: /NOPAUSE /REPORT B:VIRUS.RPT
          To scan drives C: and D: for viruses without stopping,
and
          create a log on drive B: called VIRUS.RPT
VIRUSCAN Version 7.2C76                                Page 9


EXIT CODES

     VIRUSCAN will set the DOS ERRORLEVEL upon program termination
to:

     ERRORLEVEL | DESCRIPTION
     -----------+--------------------------
         0      | No viruses found
         1      | One or more viruses found
         2      | Abnormal termination (program error)

If a user stops the scanning process, SCAN will set the ERRORLEVEL
to 0 or 1 depending on whether or not a virus was discovered prior
to termination of the SCAN.  The /NOBREAK option can be used to
prevent scanning from being stopped.


VIRUS REMOVAL

    What do you do if a virus is found?  You can contact McAfee
Associates for assistance with manually removing the virus, for
disinfection utilities, and for more information about the virus.
The CLEAN-UP universal virus disinfection program is available and
will disinfect the majority of reported computer viruses.  It is
updated frequently to remove new viruses.  The CLEAN-UP program can
be downloaded from McAfee Associates BBS.
     It is strongly recommended that you get experienced help in
dealing with viruses, especially critical viruses that can damage
or destroy data [for a listing of critical viruses, see the /M
option under OPTIONS, above] and partition table or boot sector
infecting viruses, as improper removal of these viruses could
result in the loss of all data and use of the disk(s).

IF CLEAN-UP IS NOT AVAILABLE, THEN FOR:

     BOOT SECTOR INFECTORS
     Power down the infected system and boot off of an uninfected,
     write-protected diskette.  Use the DOS SYS command to attempt
     to overwrite the boot sector.  This works in many cases.  Run
     VIRUSCAN to see if the virus has been eradicated.  If this
     does not work, do a file-by-file backup of the system (in
     other words, do not backup the boot sector) and do a low-level
     format of the disk.  For a floppy diskette, copy the files off
     of the infected diskette using the DOS COPY command, not XCOPY
     or DISKCOPY which will transfer the virus.  Reformat or
     discard the infected floppy disk.

     FILE INFECTORS
     Power down the infected system and boot off of an uninfected,
     write-protected diskette.  Run VIRUSCAN with the /D and /A
     options.  Scan all original disks for viruses and replace
     programs from them if clean.
VIRUSCAN Version 7.2C76                                Page 10


     PARTITION TABLE INFECTORS
     Power down the infected system and boot off of an uninfected,
     write-protected diskette.  Proceed to do a file-by-file backup
     of the system (in other words, do not backup the partition
     table).  Then do a low-level format of the disk.

Disinfection utilities are available for the majority of reported
computer viruses, these programs can be downloaded from McAfee
Associates' BBS at (408) 988-4004.


REGISTRATION

     A registration fee of $25.00US is required for the use of
VIRUSCAN by individual home users.  Registration is for one year
and entitles the holder to unlimited free upgrades off of McAfee
Associates BBS.  Diskettes are not mailed unless requested.  Add
$9.00US for diskette mailings.  Only one diskette mailing will be
made.
     Registration is for home users only and does not apply to
businesses, corporations, organizations, government agencies, or
schools, who must obtain a license for use.  Contact McAfee
Associates for more information.
     Outside of America, registration and support may be obtained
from the Agents listed in the accompanying AGENTS.TXT file.

TECH SUPPORT

     For fast and accurate help, please have the following
information
prepared when you contact McAfee Associates:

     -    Program name and version number.

     -    Type and brand of computer, hard disk, plus any
          peripherals.

     -    Version of DOS you are running, plus any TSRs or device
          drivers in use.

     -    Printouts of your AUTOEXEC.BAT and CONFIG.SYS files.

     -    The exact problem you are having.  Please be as specific
          as possible.  Having a printout of the screen and/or
          being at your computer will help also.

McAfee Associates can be contacted by BBS or fax twenty-four hours
a day, or call our business office at (408) 988-3832, Monday
through Friday, 8:30AM to 6:00PM Pacific Standard Time.

     McAfee Associates               (408) 988-3832 office
     4423 Cheeney Street             (408) 970-9727 fax
     Santa Clara, CA  95054-0253     (408) 988-4004 BBS 2400 bps
     U.S.A                           (408) 988-5138 BBS HST 9600
                                     (408) 988-5190 BBS v32 9600

If you are overseas, please refer to the AGENTS.TXT file for
a listing of McAfee Associates Agents for support or sales.
VIRUSCAN Version 7.2C76                                Page 11


APPENDIX A:  Creating a Virus String File with the /EXT Option

     The External Virus Data file should be created with an editor
or a word processor and saved as an ASCII text file.  Be sure each
line ends with a CR/LF pair.

NOTE:  The /EXT option is intended for emergency and research use
only.  It is an temporary method for identifying new viruses prior
to the subsequent release of SCAN.  A sound understanding of
viruses and string-search techniques is advised as a prerequisite
for using this option.

     The virus string file uses the following format:

#Comment about Virus_1
"aabbccddeeff..." Virus_1_Name
#Comment about Virus_2
"gghhiijjkkll..." Virus_2_Name
     .
     .
"uuvvwwxxyyzz..." Virus_n_Name


Where aa, bb, cc, etc. are the hexadecimal bytes that you wish to
scan for.  Each line in the file represents one virus.  The Virus
Name for each virus is mandatory, and may be up to 25 characters
in length.  The double quotes (") are required at the beginning and
end of each hexadecimal string.
     SCAN will use the string file to search memory, the Partition
Table, Boot Sector, System files, all .COM and .EXE files, and
Overlay files with the extension .BIN, .OV?, .PGM, .PIF, .PRG, .SYS
and .XTP.

     Virus strings may contain wild cards.  The two wildcard
options are:

FIXED POSITION WILDCARD
     The question mark "?" may be used to represent a wildcard in
a fixed position within the string.  For example, the string:

               "E9 7C 00 10 ? 37 CB"

would match "E9 7C 00 10 27 37 CB", "E9 7C 00 10 9C 37 CB", or any
other similar string, no matter what byte was in the fifth place.

RANGE WILDCARD
     The asterisk "*", followed by range number in parentheses "("
and ")" is used to represent a variable number of adjoining random
bytes.  For example, the string:

               "E9 7C *(4) 37 CB"

would match "E9 7C 00 37 CB", "E9 7C 00 11 37 CB", and
"E9 7C 00 11 22 37 CB".  The string "E9 7C 00 11 22 33 44 37 CB"
would not match since the distance between 7C and 37 is greater
than four bytes.  You may specify a range of up to 99 bytes.
VIRUSCAN Version 7.2C76                                Page 12


Up to 10 different wildcards of either kind may be used in one
virus string.

COMMENTS
     A pound sign "#" at the begining of a line will denote that
it is a comment.  Use this for adding notes to the external virus
data file.  For example:

               #New .COM virus found in file FRITZ.EXE from
               #Schneiderland on 01-22-91
               "53 48 45 45 50" Fritz-1 [F-1]

Could be used to store a description of the virus, name of the
original infected file, where and when it was received, and so
forth.


VALIDATE.DOC

                             VALIDATE Version 0.3
                            From McAfee Associates
                                (408) 988-3832


     VALIDATE is a file-authentication program that may be used to 
check other programs for signs of tampering.  VALIDATE uses two 
discrete methods to generate Cyclic Redundancy Checks (CRC's),
which are then displayed for the user to compare against the known
value for the program(s) validated.  The known validation data can
be published by the author of the program or be obtained from a
trusted information database.  The dual CRC checking provides a
high degree of security.

     The Computer Virus Industry Association (CVIA) provides an
online database of validation values for shareware authors at no
cost.  You are encouraged to call the CVIA's BBS at (408) 988-4004
to access current validation data for McAfee Associates' VIRUSCAN,
California Software Concepts' SHEZ, Vern Berg's LIST, and other
shareware programs.

     To confirm that a program is in its original, untampered
state, run the VALIDATE program on it, record the validation data
produced, and compare it against the record in the online database. 
If they match, than it is highly improbable (less than one in
sixty-four quadrilion) that the program has been modified.

To run VALIDATE, type:

     VALIDATE d:\path\filename.ext

The VALIDATE program will then display the following information:

                   Size:  (#/bytes)
                   Date:  (file creation date)
    File Authentication
         Check Method 1:  (a four digit CRC)
         Check Method 2:  (a four digit CRC)


The VALIDATE program may be copied and distributed at no charge as
long as it is distributed whole and intact and unmodified in any
way, along with this file.  Please report virus infections and
reports of program tampering to:

                   Computer Virus Industry Association
                   4423 Cheeney Street
                   Santa Clara, CA  95054-0253
                   USA
                   (408) 727-4559 telephone answering machine


The validation data for VALIDATE.COM is:

                   WITH CRC            WITHOUT
                   CHECKING            CHECKING
                   Size:  6495         6485
                   Date:  10-31-1989   10-31-1989
    File Authentication
         Check Method 1:  4637         CB21
         Check Method 2:  1214         13B7

     If you have an older version of VALIDATE, it may be ten (10)
bytes shorter.  This is because it was not processed by VIRUSCAN's
CRC-checking feature, added in Version 66 of VIRUSCAN.  The
validation code can be removed from VALIDATE.COM by running
VIRUSCAN against it with the /RV Remove Validation option. 
However, this is not recommended.


VIRLIST.TXT




                    VIRUS CHARACTERISTICS LIST V76
             Copyright 1989, 1990, 1991 McAfee Associates
                         All Rights Reserved.
                            (408) 988-3832

The  following  list  outlines  the major characteristics  of  the  known 
IBM  PC  and  compatible virus strains identified by  SCAN.   The  number 
of  known  varients of each virus is also listed.  This number is  listed 
in  parenthesis  beside  the name of the  strain.   The total  number  of 
known  viruses is summed at the end of the list.  The Clean-Up virus I.D. 
code is included in brackets.  An asterisk ("*") in front of a virus name
denotes an extinct computer virus.
==========================================================================
A Infects Fixed Disk Partition Table-A-------------------+
9 Infects Fixed Disk Boot Sector-----9-----------------+ |
8 Infects Floppy Diskette Boot-------8---------------+ | |
7 Infects Overlay Files--------------7-------------+ | | |
6 Infects EXE Files------------------6-----------+ | | | |
5 Infects COM files------------------5---------+ | | | | |
4 Infects COMMAND.COM----------------4-------+ | | | | | |
3 Virus Installs Self in Memory------3-----+ | | | | | | |
2 Virus Uses Self-Encryption---------2---+ | | | | | | | |
1 Virus Uses STEALTH Techniques------1-+ | | | | | | | | |
                                       | | | | | | | | | |  Increase in
                                       | | | | | | | | | |   Infected
                                       | | | | | | | | | |   Program's
                                       | | | | | | | | | |     Size
                                       1 2 3 4 5 6 7 8 9 A      |
                                       | | | | | | | | | |      |
Virus                   Disinfector    V V V V V V V V V V      V     Damage
-----------------------------------------------------------------------------
Staf  [Staf]               Clean-Up    . . x x x . . . . .    2083    O,P,L
Mix2  [MX2]                Clean-Up    . . x x x x x . . .    2280    O,P
Brain Slayer  [Slay]       Clean-Up    . . x . x x x . . .    5120    O,P,L,D
Striker  [Str]             Clean-Up    . . x x x . . . . .     461    O,P,F
Guppy  [Guppy]             Clean-Up    . . x x x . . . . .     152    O,P
Arab Virus [Ar]            Clean-Up    . . x . x . . . . .     834    O,P
V-801  [V801]              Clean-Up    . . x x x x x . . .     801    O,P,L
Terror  [Ter]              Clean-Up    . . x x x x x . . .    1085    O,P,F
S-847  [S847]              Clean-Up    . . x . x . . . . .     850    O,P
Frogs  [Frogs]             Clean-Up    . . x x x . . . . .    1500    O,P
Enigma  [Enigma]           Clean-Up    . x x . . x x . . .    1755    O,P
AGI-Plan  [AGI]            Clean-Up    . . . x x . . . . .    1536    O,P,L
Crash  [Crash]             Clean-Up    . . . . . . . . . .    (See footnote)
Hymn-2  [H-2]              Clean-Up    . . x x x x x . . .    1962    O,P,L
Tester  [TV]               Clean-Up    . . x x x . . . . .    1000    O,P
453  [453]                 Clean-up    . . x x x . . . . .     453    O,P
Curse Boot  [Curse]        M-Disk      . . x . . . . x x .     N/A    B,O
Striker  [STR]             Clean-Up    . . . . x . . . . .     461    D,O,B,L
Azusa  [Azusa]             Clean-Up    . . x . . . . x . x     N/A    D,O,B,L 
Lazy  [Lazy]               Clean-Up    . . x x x . . . . .     720    O,P
V-555  [555]               Clean-Up    . . x x x x x . . .     555    O,P,L 
Phantom  [Phant]           Clean-Up    . . x x x . . . . .    2253    O,P 
V-299  [V299]              Clean-Up    . . . . x . . . . .     299    O,P,D 
Cancer  [Cn]               Clean-Up    . . . . x . . . . .    1480    O,P,D
1575/1591  [15xx] (2)      Clean-Up    . . x x x x . . . .    vary    O,P,L 
USSR 492  [U492]           Clean-Up    . . . . x . . . . .     492    O,P 
USSR 1049  [U1049]         Clean-Up    . . x . x x . . . .    1049    O,P,L 
Skism  [Skism]             Clean-Up    . . x . x x x . . .    1815    O,P 
Holocaust (3) [Holo]       Clean-Up    x . x x x . . . . .    3784    O,P,L,D 
Stone-90  [S90]            Clean-Up    . . . x x . . . . .     961    O,P 
903 [903]                  Clean-Up    . . x x x . . . . .     903    O,P 
Dir-Vir [DVir]             Clean-Up    x . x x x . . . . .     691    O,P,D 
Hybrid  [Hybrid]           Clean-Up    . . . x x . . . . .    1306    O,P,L 
IKV528  [I528]             Clean-Up    . . . x x . . . . .     528    O,P 
Iraqi Warrior  [Iwar]      Clean-Up    . . . x x . . . . .     777    O,P,L,D 
Little Pieces [LP]         Clean-Up    . . x . x x . . . .    1374    O,P 
Saddam [Saddam]            Clean-Up    . . x x x . . . . .     919    O,P,D,L 
Monxla-B  [MonB]           Clean-Up    . . . x x . . . . .     535    O,P,L 
Plague [Plague]            Clean-Up    . . . . x x . . . .   Overwriting 
Sentinel  [Sent]           Clean-Up    . . x x x x x . . .    4625    L,O,P,D 
Swiss 143  [S143]          Clean-Up    . . . x x . . . . .     143    O,P,D 
Voronezh   [Voro]          Clean-Up    . x x x x x x . . .    1600    O,P,D 
V-961  [V961]              Clean-Up    . . x x x . . . . .     961    O,P 
USSR311  [U311]            Clean-Up    . . . . x . . . . .     321    O,P 
USSR830  [U830]            Clean-Up    . . x x x . . . . .     830    O,P 
USSR529  [U529]            Clean-Up    . . x x x . . . . .     529    O,P 
USSR516  [U516]            Clean-Up    . . x x x . . . . .     516    O,P 
USSR2144  [U2144]          Clean-Up    . x x x x x x . . .    2144    L,O,P,D 
USSR1049  [U1049]          Clean-Up    . . x x x . . . . .    1049    O,P 
Tiny-133  [T133]           Clean-Up    . . . x x . . . . .     133    O,P 
Sverdlov [Sverd]           Clean-Up    . . x x x x x . . .    1962    O,P 
Label [Label]              Clean-Up    . . x x x . . . . .  Overwrites 
Kukaturbo [Kuka]           Clean-Up    . . x x x . . . . .  Overwrites   
Justice [Just]             Clean-up    . . x x x . . . . .    1242    O,P 
Hymn [Hymn]                Clean-Up    . . x x x x x . . .     642    O,P,D 
Happy New Year [HNew]      Clean-Up    . . x x x x x . . .    1865    O,P 
Destructor [Dest]          Clean-Up    . . x x x x x . . .    1150    O,P 
Leapfrog Virus (3) [Leap]  Clean-Up    . . x x x . . . . .     516    O,P,D 
MGTU Virus (4) [MGTU]      Clean-Up    . . . x x . . . . .     273    O,P,D 
Nina  [Nina]               Clean-Up    . . x x x . . . . .     256    O,P,D 
Lozinsky (4)  [Loz]        Clean-Up    . . . x x . . . . .    1023    O,P,D 
BeBe  [BeBe]               Clean-Up    . . . x x . . . . .    1004    O,P,D 
Best Wish  [BWish]         Clean-Up    . . . x x x x . . .    1024    O,P,D 
Beeper  (2) [Beep]         Clean-Up    . . x . x . . . . .     482    O,P,D 
Parity  [Parity]           Clean-Up    . . . x x . . . . .     441    O,P,D 
F-Word  [FW]               Clean-Up    . . x x x . . . . .     417    O,P,D 
USSR-948  [U948]           Clean-Up    . x . . x x x . . .     948    O,P,D 
USSR-711  [U711]           Clean-Up    . x . . x . . . . .     711    P,D 
USSR-707  [U707]           Clean-Up    . x . x x . . . . .     707    P,D 
USSR-696  [U696]           Clean-Up    . x . . x . . . . .     696    P,D 
USSR-600  [U600]           Clean-Up    . x . x x . . . . .     600    P,D 
USSR-394  [U394]           Clean-Up    . x . x x . . . . .     394    P,D 
USSR-257  [U257]           Clean-Up    . x . x x . . . . .     257    P,D 
USSR-256  (2) [U256]       Clean-Up    . x . x x . . . . .     256    P,D 
Christmas Violater  [CVio] Clean-Up    . . . x x . . . . .    ????    O,P,D 
Off Stealth  [Off]         Clean-Up    x . x x x x x . . .    1689    O,P,D 
Jeff (3) [Jeff]            Clean-Up    . . . x x . . . . .     828    O,P,D,F 
Bloody! [Bloody]           Clean-Up    . x x . . . . x . x     N/A    B,O 
ZeroHunt [Hunt]            Clean-Up    x x x . x . . . . .     N/A    O,P,D 
Music Bug (3) [MBug]       Clean-Up    . . x . . . . x . x     N/A    B,O 
Dot Killer [Dot]           Clean-Up    . . x x x . . . . .     944    O,P 
Father Christmas [FC]      Clean-Up    . . . x x . . . . .    1881    O,P 
3445  [3445]               Clean-Up    x x x . x x . . . .    3445    O,P,D,L 
Mirror (2) [Mirror]        Clean-Up    . . x . . x . . . .     928    O,P 
Polish-2  [P-2]            Clean-Up    . . x x x . . . . .     512    O,P,D 
Polish 217  [P-217]        Clean-Up    . . . x x . . . . .     217    O,P,D 
Happy Day  [Happy]         Clean-Up    . . . x x . . . . .     453    O,P 
Monxla (3) [Monxla]        Clean-Up    . . . x x . . . . .     939    O,P 
USSR (4) [USSR]            Clean-Up    . x . . . x . . . .     575    O,P 
Polimer [Polimer]          Clean-Up    . . . x x . . . . .     512    O,P,D 
DataLock [Data]            Clean-Up    . . x x x x x . . .     920    O,P 
Carioca (6) [Carioca]      Clean-Up    . . x . x . . . . .     951    O,P 
529  [529]                 Clean-Up    . . x x x . . . . .     529    O,P,D 
Spyer (3) [Spyer]          Clean-Up    . . x . x x x . . .    1181    O,P 
Taiwan4  [T4]              Clean-Up    . . x x x x x . . .    2576    O,P,D 
Keypress (3) [Key]         Clean-Up    . . x x x x . . . .    1232    O,P,D 
Casper (2) [Casper]        Clean-Up    . x . x x . . . . .    1200    L,O,P,D 
1605 (2) [1605]            Clean-Up    . . x x x x . . . .    1605    L,O,P,D 
Violator (5) [Vio]         Clean-Up    . . . x x . . . . .    1055    O,P,D 
Blood-2 [B-2]              Clean-Up    . . . . x . . . . .     427    O,P,D 
Wisconsin (3) [Wisc]       Clean-Up    . x . x x . . . . .     825    O,P,D 
Christmas-J [C-J]          Clean-Up    . . x x x x . . . .     600    O,P 
Burger (3)  [Burger]       Clean-Up    . . . x x x . . . .  Overwrites 
Leprosy-B [LepB]           Clean-Up    . . . x x x . . . .  Overwrites 
Whale (3) [Whale]          Clean-Up    x x x x x x x . . .    9216    L,O,P,D 
Invader (4) [Invader]      Clean-Up    . x x . x x x x x .    4096    B,L,O,P,D 
Scott's Valley  [SVal]     Clean-Up    . x x . x x x . . .    2133    L,O,P,D 
Black Monday (2) [BMon]    Clean-Up    . . x x x x x . . .    1055    L,O,P,D 
Nomenclature (4) [Nom]     Clean-Up    . . x x x x x . . .    1024    O,P,D 
Anthrax - Boot (2) [Atx]   M-Disk      . . x . . . . . . x     N/A    O,P,D 
Anthrax - File (4) [Atx]   Clean-Up    . . x x x x . . . .    1206    O,P,D 
651  [651]                 Clean-Up    . . x . x . . . . .     651    O,P,D 
Paris  [Paris]             Clean-Up    . . . x x x x . . .    4909    O,P,D,L 
Leprosy (5) [Lep]          Clean-Up    . . x x x x x . . .  Overwrites 
Mardi Bros. (3) [Mardi]    Clean-Up    . . x . . . . x x .     N/A    B,O 
1253 - Boot  [1253]        M-DISK      . . x . . . . x x x     N/A    O,P,D,L 
1253 - COM  [1253]         Clean-Up    . . x x x . . . . .    1253    O,P,D,L 
AirCop (3) [AirCop]        Clean-Up    . . x . . . . x . .     N/A    B,O 
400  (5)  [400]            Clean-Up    . . x . x . . . . .    Vary    O,P,D 
P1 (7)  [P1r]              Clean-Up    . x x . x . . . . .    Vary    O,P,D,L 
Ontario  [Ont]             Clean-Up    . x x x x x . . . .    Vary    O,P,D 
V2100 (2) [2100]           Clean-Up    . . x . x x . . . .    2100    O,P,D,L 
Plastique (9)  [P1q]       Clean-Up    . . x x x x x . . .    3012    O,P,D 
Wolfman (2) [Wolf]         Clean-Up    . . x x x x . . . .    2064    O,P 
Doom2  [Dm2]               Clean-Up    . . x . x x . . . .    2504    O,P,D,L 
Flip  (4) [Flip]           Clean-Up    . x x x x x x . . .    2343    O,P,D,L 
Fellowship  (3) [Fellow]   Clean-Up    . . x . . x . . . .    1022    O,P,D,L 
Flash  [Flash]             Clean-Up    . . x x x x . . . .     688    O,P,D,L 
1008  [1008]               Clean-Up    . x x x x . . . . .    1008    O,P,D,L 
Taiwan3  [T3]              Clean-Up    . . x x x x x . . .    2905    O,P,D,L 
Armagedon (3) [Arma]       Clean-Up    . . x x x . . . . .    1079    O,P 
1381  [1381]               Clean-Up    . . . . . x x . . .    1381    O,P 
Tiny (13)  [Tiny]          Clean-Up    . . . x x . . . . .     163    O,P 
Subliminal (3) [Sub]       Clean-Up    . . x x x . . . . .    1496    O,P 
Sorry  [Sorry]             Clean-Up    . . x x x . . . . .     731    O,P 
RedX (2) [Redx]            Clean-Up    . . . x x . . . . .     796    O,P 
1024 (2) [1024]            Clean-Up    . . x x x . . . . .    1024    O,P 
Joshi (4) [Joshi]          Clean-Up    x . x . . . . x x x     N/A    B,O,D 
Microbes  [Micro]          M-DISK      . . x . . . . x x .     N/A    B,O,D 
Print Screen (2) [PrtScr]  M-DISK      . . x . . . . x x .     N/A    B,O,D 
Form (2) [Form]            M-DISK      . . x . . . . x x .     N/A    B,O,D 
July 13th  [J13]           Clean-Up    . x . . . x . . . .    1201    O,P,D,L 
5120 (3)  [5120]           Clean-Up    . . . x x x x . . .    5120    O,P,D,L 
Victor (2) [Victor]        Clean-Up    . . x x x x x . . .    2458    P,D,L 
JoJo (3)  [JoJo]           Clean-Up    . . x . x . . . . .    1701    O,P 
W-13 (4)  [W13]            Clean-Up    . . . . x . . . . .     532    O,P 
Slow (5) [Slow]            Clean-Up    . x x . x x x . . .    1721    O,P,L 
Frere Jacques  [Frere]     Clean-Up    . . x . x x x . . .    1811    O,P 
Liberty (2) [Liberty]      Clean-Up    . . x x x x x . . .    2862    O,P 
Fish-6 (2) [Fish]          Clean-Up    x x x x x x x . . .    3584    O,P,L 
Shake  [Shake]             Clean-Up    . . x . x . . . . .     476    O,P 
Murphy  [Murphy]           Clean-Up    . . x x x x x . . .    1277    O,P 
V800 (3)  [V800]           Clean-Up    x x x . x . . . . .    none    O,P,L 
Kennedy (3) [Kennedy]      Clean-Up    . . x . x . . . . .     308    O,P 
8 Tunes/1971 (2) [1971]    Clean-Up    . . x . x x x . . .    1971    O,P 
Yankee - 2  [Doodle2]      Clean-Up    . . . . x x . . . .    1961    O,P 
June 16th  [June16]        Clean-Up    . . . x x . . . . .    1726    F,O,P,L 
XA1  [XA1]                 Clean-Up    . x . . x . . . . .    1539    F,O,P,L 
1392  [1392]               Clean-Up    . . x x x x . . . .    1392    O,P,L 
1210  [1210]               Clean-Up    . . x . x . . . . .    1210    O,P,L 
1720 (3) [1720]            Clean-Up    . . x . x x x . . .    1720    F,O,P,L 
Saturday 14th (3) [Sat14]  Clean-Up    . . x . x x x . . .     685    F,O,P,L 
Korea (4)  [Korea]         Clean-Up    . . . . . . . x x .     N/A    B,O 
Vcomm (5)  [Vcomm]         Clean-Up    . . . . . x . . . .    1074    O,P,L 
ItaVir  [Ita]              Clean-Up    . . . . . x . . . .    3880    O,P,L,B 
Solano (3)  [Solano]       Clean-Up    . . x . x . . . . .    2000    O,P,L 
V2000 (3)  [2000]          Clean-Up    . . x x x x x . . .    2000    O,P,L 
1559  [1559]               Clean-Up    . . x x x x . . . .    1554    O,P,L 
512 (5)  [512]             Clean-Up    x . x x x . . . . .    none    O,P,L 
EDV (2)  [EDV]             Clean-Up    x . x . . . . x x x     N/A    B,O 
Joker  [Joke]              Clean-Up    . . x x x . . . . .            O,P 
Icelandic-3  [Ice-3]       Clean-Up    . . x . . x . . . .     853    O,P 
Virus-101  [101]           Clean-Up    . x x x x x x x . .    2560    P 
1260 (3) [1260]            Clean-Up    . x . . x . . . . .    1260    P 
Perfume (2)  [Fume]        Clean-Up    . . . . x . . . . .     765    P 
Taiwan (3)  [Taiwan]       Clean-Up    . . . . x . . . . .     708    P 
Chaos  [Chaos]             MDISK       . . x . . . . x x .     N/A    B,O,D,F 
Virus-90  [90]             Clean-Up    . . x . x . . . . .     857    P 
Oropax (5)  [Oro]          Clean-Up    . . x . x . . . . .    2773    P,O 
4096 (4)  [4096]           Clean-Up    x . x x x x x . . .    4096    D,O,P,L 
Devil's Dance (2) [Dance]  Clean-Up    . . x . x . . . . .     941    D,O,P,L 
Amstrad (5)  [Amst]        Clean-Up    . . . . x . . . . .     847    P 
Payday (2) [Payday]        Clean-Up    . . x . x x x . . .    1808    P 
Datacrime II-B [Crime-2]   Clean-Up    . x . x x x . . . .    1917    P,F 
Sylvia/Holland  [Holland]  Clean-Up    . . . . x . . . . .    1332    P 
Do-Nothing  [Nothing]      Clean-Up    . . x . x . . . . .     608    P 
Sunday (4)  [Sunday]       Clean-Up    . . x . x x x . . .    1636    O,P 
Lisbon (2)  [Lisb]         Clean-Up    . . . . x . . . . .     648    P 
Typo/Fumble  [Typo]        Clean-Up    . . x . x . . . . .     867    O,P 
Dbase  [Dbase]             Clean-Up    . . x . x . . . . .    1864    D,O,P 
Ghost Boot  [Ghost]        Clean-Up    . . x . . . . x x .     N/A    B,O 
Ghost COM   [Ghost]        Clean-Up    . . . . x . . . . .    2351    B,P 
Alabama (3)  [Alabama]     Clean-Up    . . x . . x . . . .    1560    O,P,L 
Yankee Doodle (6) [Doodle] Clean-Up    . . x . x x . . . .    2885    O,P 
2930  [2930]               Clean-Up    . . x . x x . . . .    2930    P 
AIDS (4)  [Aids]           Clean-Up    . . . . x . . . . . Overwrites 
Disk Killer (4)  [Killer]  Clean-Up    . . x . . . . x x .     N/A    B,O,P,D,F 
1536/Zero Bug  [Zero]      Clean-Up    . . x . x . . . . .    1536    O,P 
MIX1  [Ice]                Clean-Up    . . x . . x . . . .    1618    O,P 
Dark Avenger (4) [Dav]     Clean-Up    . . x x x x x . . .    1800    O,P,L 
3551/Syslock  [Syslock]    Clean-Up    . x . . x x . . . .    3551    P,D 
VACSINA (5)  [Vacs]        Clean-Up    . . x . x x x . . .    1206    O,P 
Typo Boot  [TBoot]         Clean-Up   . . x . . . . x x .      N/A    O,B 
Swap Boot  [Swap]          M-DISK      . . x . . . . x . .     N/A    B 
Datacrime II  [Crime-2]    Clean-Up    . x . . x x . . . .    1514    P,F 
Icelandic II  [Ice-2]      Clean-Up    . . x . . x . . . .     661    O,P 
Pentagon  [Pentagon]       M-DISK      . . . . . . . x . .     N/A    B 
Traceback (3)  [3066]      Clean-Up    . . x . x x . . . .    3066    P 
Datacrime-B  [Crime-B]     Clean-Up    . x . . x . . . . .    1168    P,F 
Icelandic (3)  [Ice]       Clean-Up    . . x . . x . . . .     642    O,P 
405  [405]                 Clean-Up    . . . . x . . . . . Overwrites 
Fu Manchu (4)  [Fu]        Clean-Up    . . x . x x x . . .    2086    O,P 
Datacrime (2)  [Crime]     Clean-Up    . x . . x . . . . .    1280    P,F 
1701/Cascade (12)  [170x]  Clean-Up    . x x . x . . . . .    1701    O,P 
Stoned (8)  [Stoned]       Clean-Up    . . x . . . . x . x     N/A    O,B,L 
Ping Pong-B (7)  [Ping]    Clean-Up    . . x . . . . x x .     N/A    O,B 
Den Zuk (4)  [DenZuk]      Clean-Up    . . x . . . . x . .     N/A    O,B 
Lehigh  [Lehigh]           Clean-Up    . . x x . . . . . . Overwrites P,F 
Vienna/648 (19) [Vienna]   Clean-Up    . . . . x . . . . .     648    P 
Alameda (2)  [Alameda]     Clean-Up    . . x . . . . x . .     N/A    B 
Friday 13th COM  [Fri13]   Clean-Up    . . . . x . . . . .     512    P 
Jerusalem (24)  [Jeru]     Clean-Up    . . x . x x x . . .    1808    O,P 
SURIV02  [SurivA]          Clean-Up    . . x . . x . . . .    1488    O,P 
SURIV01  [SurivA]          Clean-Up    . . x . x . . . . .     897    O,P 
Brain (4)  [Brain]         Clean-Up    . . x . . . . x . .     N/A    B 

Total Known Viruses - 501


LEGEND:

Size Increase:
     N/A        - Virus does not attach to files.
     None       - Virus does not change file size (attaches to tag end of file)
     Overwrites - Virus overwrites beginning of file, no file size change
     All Others - The length in bytes by which a file will increase when infected.

Damage Fields:
     B - Corrupts or overwrites the boot sector
     D - Corrupts data files
     F - Formats or overwrites all/part of disk
     L - Directly or indirectly corrupts file linkage
     O - Affects system run-time operation
     P - Corrupts program or overlay files

Characteristics:
     x - Yes
     . - No

Disinfectors:
     CLEAN-UP   - CLEAN-UP universal virus disinfector
     SCAN /D    - VIRUSCAN with /D option
     SCAN /D /A - VIRUSCAN with /D and /A options
     MDISK /P   - MDISK with "P" option
     All Others - The name of disinfecting program

     NOTE:     The  SCAN  /D options will overwrite and then delete  the
               entire  infected  program.   The  program  must  then  be
               replaced from the original program diskette.  If you wish
               to  try  and  recover an infected program, then  use  the
               above-named disinfector if available.

               If a virus infects Overlay Files (Item 7) Clean-Up should
               be used with the /A option when removing the virus.

     Footnote:  The 'crash' virus (in all implementations we have encountered)
               crashes when run.  It is included since it is possible that
               under other architectures than those tested, it might flourish.

Directory of PC-SIG Library Disk #2749

 Volume in drive A has no label
 Directory of A:\

READ     ME       1458   4-19-91  10:46p
DBATE005 BAT       868   4-22-91  12:07a
DBATE005 BW        452   4-22-91  12:07a
DBATE005 CFG       486   4-22-91  12:07a
DBATE005 COL       486   4-22-91  12:07a
DBATE005 HDR     12914   4-22-91  12:08a
DBATE005 MRK     11914   4-22-91  12:07a
DBATE005 NEW        64   4-28-91   3:04p
DBATE005 OLD        70   4-22-91  12:07a
DBATE005 PGE    129142   4-22-91  12:07a
DEZIP    EXE     13246   4-19-91  10:32p
DEZIPDOC EXE      3963   4-19-91  10:32p
INQUIRY  COM       208   4-19-91  10:32p
IRIS     EXE     65606   4-19-91  10:32p
IRIS     MSG      7472   4-19-91  10:32p
SCAN76-C ZIP     67170   4-16-91  10:04p
SI005FLS BW        452   4-22-91  12:19a
SI005FLS CFG       486   4-22-91  12:19a
SI005FLS COL       486   4-22-91  12:19a
SI005FLS MRK      3074   4-22-91  12:19a
SI005FLS PGE      9035   4-22-91  12:19a
FILE2749 TXT      2172   8-01-91   2:31a
GO       BAT       826   8-08-91   5:22a
       23 file(s)     332050 bytes
                       17408 bytes free