ThunderBYTE Anti-Virus Utilities USER MANUAL The ThunderBYTE Anti-Virus Utilities are a product of: ESaSS B.V. P.O. Box 1380 6501 BJ NIJMEGEN The Netherlands COPYRIGHT (c) 1996 by: ThunderBYTE B.V., Wijchen, The Netherlands. All rights reserved. No part of this manual may be reproduced, stored in a retrieval system, or transmitted in any form, by print, microfilm, or by any other means without written permission from ThunderBYTE B.V. TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page i Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A Word (or Two) of Thanks . . . . . . . . . . . . . . . . . . . 1 What Are the TBAV Utilities? . . . . . . . . . . . . . . . . . . 1 The TBAV Utilities User Interface . . . . . . . . . . . . . . . 5 Conventions Used in This Manual . . . . . . . . . . . . . . . . 6 How To Use This Manual . . . . . . . . . . . . . . . . . . . . . 6 1 TBAV QuickStart . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.1 Installing the TBAV Utilities . . . . . . . . . . . . . . . 8 1.1.1 Understanding System requirements . . . . . . . . . . 8 1.1.2 Running INSTALL . . . . . . . . . . . . . . . . . . . 8 1.1.3 Installation on a network . . . . . . . . . . . . . 11 1.1.4 Starting And Ending TBAV . . . . . . . . . . . . . 11 1.1.5 Using TBAV Commands . . . . . . . . . . . . . . . . 14 1.1.6 Getting Help . . . . . . . . . . . . . . . . . . . 15 1.1.7 Configuring TBAV . . . . . . . . . . . . . . . . . 16 1.2 Understanding TbSetup . . . . . . . . . . . . . . . . . . 18 1.3 Understanding TbDriver . . . . . . . . . . . . . . . . . . 19 1.4 Maintaining the System . . . . . . . . . . . . . . . . . . 20 1.4.1 Maintaining ANTI-VIR.DAT Files . . . . . . . . . . 20 1.4.2 Creating a New Recovery Diskette . . . . . . . . . 20 1.4.3 Getting Updates . . . . . . . . . . . . . . . . . . 20 1.4.4 Maintaining a Network . . . . . . . . . . . . . . . 21 1.4.5 Using the PKUNZIP Utility . . . . . . . . . . . . . 22 2 Defining Your Anti-Virus Strategy . . . . . . . . . . . . . . . . 24 2.1 Protecting Yourself Against Virus Infection . . . . . . . 24 2.2 Recovering from Virus Infection . . . . . . . . . . . . . 29 3 Using the TBAV utilities . . . . . . . . . . . . . . . . . . . . 33 3.1 Using TbSetup . . . . . . . . . . . . . . . . . . . . . . 33 3.1.1 Understanding TbSetup . . . . . . . . . . . . . . . 33 3.1.2 Working with the TbSetup Menu . . . . . . . . . . . 34 3.1.3 Maximizing TbSetup . . . . . . . . . . . . . . . . 40 3.1.4 Understanding TbSetup's Operation . . . . . . . . . 44 3.1.5 Understanding TBSETUP.DAT Files . . . . . . . . . . 45 3.2 Using TbScan . . . . . . . . . . . . . . . . . . . . . . . 47 3.2.1 Understanding TbScan . . . . . . . . . . . . . . . 47 3.2.2 Working with the TbScan Menus . . . . . . . . . . . 48 3.2.3 Maximizing TbScan . . . . . . . . . . . . . . . . . 62 TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page ii 3.2.4 Understanding the Scanning Process . . . . . . . . 72 3.2.5 Understanding Heuristic Flags . . . . . . . . . . . 76 3.3 Using TbDriver . . . . . . . . . . . . . . . . . . . . . . 78 3.3.1 Understanding TbDriver . . . . . . . . . . . . . . 78 3.3.2 Working with TbDriver . . . . . . . . . . . . . . . 78 3.3.3 Maximizing TbDriver . . . . . . . . . . . . . . . . 79 3.4 Using TbScanX . . . . . . . . . . . . . . . . . . . . . . 84 3.4.1 Understanding TbScanX . . . . . . . . . . . . . . . 84 3.4.2 Working with TbScanX . . . . . . . . . . . . . . . 84 3.4.3 Maximizing TbScanX . . . . . . . . . . . . . . . . 86 3.4.4 Understanding the Scanning Process . . . . . . . . 90 3.5 Using TbCheck . . . . . . . . . . . . . . . . . . . . . . 92 3.5.1 Understanding TbCheck . . . . . . . . . . . . . . . 92 3.5.2 Working with TbCheck . . . . . . . . . . . . . . . 92 3.5.3 Maximizing TbCheck . . . . . . . . . . . . . . . . 94 3.5.4 Understanding the Scanning Process . . . . . . . . 96 3.5.5 Testing TbCheck . . . . . . . . . . . . . . . . . . 96 3.6 Using TbClean . . . . . . . . . . . . . . . . . . . . . . 98 3.6.1 Understanding TbClean . . . . . . . . . . . . . . . 98 3.6.2 Working with the TbClean Menus . . . . . . . . . . 99 3.6.3 Using TbClean Command Line Options . . . . . . . . 101 3.6.4 Understanding the Cleaning Process . . . . . . . . 104 3.6.5 Understanding Cleaning Limitations . . . . . . . . 106 3.7 Using TbMem . . . . . . . . . . . . . . . . . . . . . . . 108 3.7.1 Introducing the TbMem, TbFile & TbDisk Utilities . 108 3.7.2 Loading TbMem, TbFile and TbDisk . . . . . . . . . 108 3.7.3 Using Command Line Options . . . . . . . . . . . . 110 3.7.4 Understanding TbMem . . . . . . . . . . . . . . . . 110 3.7.5 Working with TbMem . . . . . . . . . . . . . . . . 111 3.7.6 Maximizing TbMem . . . . . . . . . . . . . . . . . 112 3.7.7 Understanding TbMem's Operation . . . . . . . . . . 114 3.8 Using TbFile . . . . . . . . . . . . . . . . . . . . . . . 116 3.8.1 Understanding TbFile . . . . . . . . . . . . . . . 116 3.8.2 Working with TbFile . . . . . . . . . . . . . . . . 117 3.8.3 Maximizing TbFile . . . . . . . . . . . . . . . . . 117 3.9 Using TbDisk . . . . . . . . . . . . . . . . . . . . . . . 120 3.9.1 Understanding TbDisk . . . . . . . . . . . . . . . 120 3.9.2 Working with TbDisk . . . . . . . . . . . . . . . . 121 3.9.3 Maximizing TbDisk . . . . . . . . . . . . . . . . . 122 3.9.4 Understanding TbDisk's Operation . . . . . . . . . 125 3.10 Using TbUtil . . . . . . . . . . . . . . . . . . . . . . 126 3.10.1 Understanding and using TbUtil . . . . . . . . . . 126 3.10.2 Working with the TbUtil Menu . . . . . . . . . . . 127 3.10.3 Maximizing TbUtil . . . . . . . . . . . . . . . . 131 3.10.4 Using the Anti-Virus Partition . . . . . . . . . . 137 3.10.5 Using the TbUtil diskette . . . . . . . . . . . . 137 TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page iii 3.11 Using TbLog . . . . . . . . . . . . . . . . . . . . . . . 139 3.11.1 Understanding and using TbLog . . . . . . . . . . 139 3.11.2 Working with TbLog . . . . . . . . . . . . . . . . 139 3.11.3 Maximizing TbLog . . . . . . . . . . . . . . . . . 141 3.12 Using TbNet . . . . . . . . . . . . . . . . . . . . . . . 143 3.12.1 Understanding TbNet . . . . . . . . . . . . . . . 143 3.12.2 Working with TbNet . . . . . . . . . . . . . . . . 143 3.12.3 Maximizing TbNet . . . . . . . . . . . . . . . . . 144 4 Understanding Advanced User Information . . . . . . . . . . . . . 147 4.1 Understanding Memory Considerations . . . . . . . . . . . 147 4.1.1 Understanding Memory Requirements . . . . . . . . . 147 4.1.2 Reducing Memory Requirements . . . . . . . . . . . 148 4.2 Understanding TbSetup . . . . . . . . . . . . . . . . . . 150 4.2.1 Understanding ANTI-VIR.DAT File Design . . . . . . 150 4.2.2 Editing the TBSETUP.DAT File . . . . . . . . . . . 150 4.2.3 Simplifying Installation on Several Machines . . . 152 4.3 Understanding TbScan . . . . . . . . . . . . . . . . . . . 153 4.3.1 Understanding Heuristic Scanning . . . . . . . . . 153 4.3.2 Understanding How Heuristic Scanning Works . . . . 155 4.3.3 Understanding Integrity Checking . . . . . . . . . 156 4.3.4 Understanding the Scan Algorithms . . . . . . . . . 157 4.3.5 Understanding the TBSCAN.LNG File . . . . . . . . . 159 4.3.6 Understanding the TBAV.MSG File . . . . . . . . . . 160 4.4 Understanding TbClean . . . . . . . . . . . . . . . . . . 161 4.4.1 Understanding how a Virus infects a file . . . . . 161 4.4.2 Understanding Conventional Cleaners . . . . . . . . 161 4.4.3 Understanding Generic Cleaners . . . . . . . . . . 163 4.5 Using TbGenSig . . . . . . . . . . . . . . . . . . . . . . 165 4.5.1 Understanding and using TbGenSig . . . . . . . . . 165 4.5.2 Working with TbGenSig . . . . . . . . . . . . . . . 165 4.5.3 Defining a Signature with TbScan . . . . . . . . . 166 4.5.4 Understanding Keywords . . . . . . . . . . . . . . 168 4.5.5 Understanding a Sample Signature: Haifa.Mozkin . . 173 Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Appendix A: TBAV messages . . . . . . . . . . . . . . . . . . 175 A.1 TbClean . . . . . . . . . . . . . . . . . . . . . . . 175 A.2 TbDriver . . . . . . . . . . . . . . . . . . . . . . 177 A.3 TbScan . . . . . . . . . . . . . . . . . . . . . . . 178 A.4 TbScanX . . . . . . . . . . . . . . . . . . . . . . . 179 Appendix B: TbScan Heuristic Flag Descriptions . . . . . . . . 180 Appendix C: Solving Incompatibility Problems . . . . . . . . . 186 Appendix D: TBAV Exit Codes and Batch Files . . . . . . . . . 189 D.1 TbScan Exit Codes . . . . . . . . . . . . . . . . . . 189 D.2 TbUtil Exit Codes . . . . . . . . . . . . . . . . . . 189 TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page iv D.3 General Exit Codes . . . . . . . . . . . . . . . . . 189 D.4 Program Installation Check . . . . . . . . . . . . . 189 Appendix E: Virus Detection and Naming . . . . . . . . . . . . 191 E.1 How Many Viruses Does TbScan Detect? . . . . . . . . 191 E.2 The Virus Naming Convention . . . . . . . . . . . . . 191 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 1 Introduction A Word (or Two) of Thanks Congratulations! By purchasing the ThunderBYTE Anti-Virus utilities you have taken the basic step in building a massive anti-viral safety wall around your precious computer system. Setting up the appropriate defense using the TBAV utilities is a personal matter. Therefore, we recommend to read this manual thoroughly, so you are well aware of the different kinds of security measures you can take. What Are the TBAV Utilities? ThunderBYTE Anti-Virus (TBAV) is a comprehensive tool kit designed to protect against, and recover from, computer viruses. While TBAV focuses heavily on numerous ways to prevent a virus infection, the package would not be complete without various cleaner programs to purge a system, in the unlikely event that a virus manages to slip through. The package, therefore, consists of several programs, each of which helps you to prevent viruses from accomplishing their destructive purposes. Here is a quick overview. TbSetup: Collecting Software Information TbSetup is a program that collects information from all software it finds on your system. It places this information in files named ANTI-VIR.DAT and uses it for integrity checking, program validation, and cleaning infected files. TbDriver: Enable Memory Resident TBAV Utilities While TbDriver provides little protection against viruses by itself, you must load it in advance to enable the memory resident ThunderBYTE Anti-Virus utilities to perform properly. These utilities include: TbScanX, TbCheck, TbMem, TbFile, and TbDisk. TbDriver also provides basic protection against ANSI bombs and stealth viruses. TbScan: Scanning for Viruses TbScan is both a fast signature scanner and a so-called heuristic scanner. Besides its blazing speed, it has many configuration options. It can detect mutants of viruses, bypass stealth type viruses, etc. The signature file TbScan uses is a coded TBSCAN.SIG file, which you can update yourself in case of emergency. TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 2 TbScan will disassemble files. This makes it possible to detect suspicious instruction sequences and detect yet unknown viruses. As pointed out earlier, this generic detection, named heuristic analysis, is a technique that makes it possible to detect about 90% of all viruses by searching for suspicious instruction sequences rather than relying on any signature. For that purpose TbScan has a built-in disassembler and code analyzer. Another feature of TbScan is the integrity checking it performs when it finds the ANTI-VIR.DAT files generated by TbSetup. Integrity checking means that TbScan verifies that every file it scans matches the information which was captured when the file was first analyzed by TbSetup and is maintained in the ANTI-VIR.DAT files. If a virus infects a file, the information in the ANTI-VIR.DAT file will indicate that the file has been changed, and TbScan will inform you of this. TbScan performs an integrity check automatically, and it does not have the false alarm rate other integrity checkers have. The goal is to detect viruses and NOT to detect configuration changes! TbScanX: Automatic Scanning TbScanX is the memory resident version of TbScan. This signature scanner remains resident in memory and automatically scans those files that are being executed, copied, de-archived, downloaded, etc. TbScanX does not require much memory. It can swap itself into expanded, XMS, or high memory, using only one kilobyte of conventional memory. TbCheck: Check While Loading TbCheck is a memory resident integrity checker that remains resident in memory and automatically checks every file just before it executes. TbCheck uses a fast integrity checking method, which consumes only 400 bytes of memory. You can configure it to reject files with incorrect checksums, and/or reject files that do not have a corresponding ANTI-VIR.DAT record. TbUtil: Restoring Infected Boot-Sector, CMOS and Partition Tables Some viruses copy themselves into the hard disk's partition table, which makes them far more difficult to remove than boot sector viruses. Performing a low-level format is an effective, but rather drastic measure. TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 3 TbUtil offers a more convenient alternative by making a precautionary backup of uninfected partition tables and the boot sector. If an infection occurs, you can use the TbUtil backup as a verifying tool and as a means to restore the original (uninfected) partition table and boot sector, without the need for a destructive disk format. TbUtil can also restore the CMOS configuration for you. If a backup of your partition table is not available, TbUtil tries to create a new partition table anyway, again avoiding the need for a low-level format. Another important feature of TbUtil is the option to replace the partition table code with new code offering greater resistance to viruses. TbUtil executes the partition code BEFORE the boot sector gains control, enabling it to check this sector in a clean environment. The TbUtil partition code performs a CRC calculation on the master boot sector just before the boot sector code activates and issues a warning if the boot sector has been modified. The TbUtil partition code also checks and reports changes in the RAM layout. It performs these checks whenever the computer boots from the hard disk. We should point out that boot sector verification is imperative before allowing the boot sector code to execute. A virus could easily become resident in memory during boot-up and hide its presence. TbUtil offers total security at this stage by being active before the boot sector executes. TbUtil is far more convenient than the traditional strategy of booting from a clean DOS diskette for an undisturbed inspection of the boot sector. TbClean: Reconstructing Infected Files TbClean is a generic file cleaning utility. It uses the ANTI-VIR.DAT files generated by TbSetup to enhance file cleaning and/or to verify the results. TbClean can also work without these files. It disassembles and emulates the infected file and uses this analysis to reconstruct the original file. TbMem, TbFile and TbDisk: Resident Safeguards The TBAV utilities include a set of memory resident anti-virus utilities, consisting of TbMem, TbFile and TbDisk. Most other resident anti-virus products offer you the choice to either invoke them before the network loads (thereby losing the protection after the logon procedure), or to load the anti-viral software after logging onto the network, resulting in a partially unprotected system. The TBAV utilities, on the other hand, recognize the network TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 4 software and utilize their auto-configuration capabilities to ensure their continued functionality. TbMem: Safeguarding Memory TbMem detects attempts from programs to remain resident in memory and ensures that no program can remain resident in memory without permission. Since most viruses remain resident in memory, this is a powerful weapon against all such viruses, known or unknown. TbMem also protects your CMOS memory against unwanted modifications. The ANTI-VIR.DAT files maintain a database of the permission information. TbFile: Executable File Protection TbFile detects attempts from programs to infect other programs. It also guards read-only attributes, detects illegal time-stamps, etc. It ensures that no virus succeeds in infecting programs. TbDisk: Protecting The Disk TbDisk is a disk guard program that detects attempts from programs to write directly to disk (that is, without using DOS), attempts to format, etc., and makes sure that no malicious program succeeds in destroying your data. This utility also traps tunneling and direct calls into the BIOS code. The ANTI-VIR.DAT files maintain permission information about those rare programs that write directly to and/or format the disk. TbGenSig: Define Your Own Signatures Since TBAV includes an up-to-date, ready-to-use signature file, you do not really need to maintain a signature file yourself. If, however during a crisis, you need to define your own virus signatures, then the TbGenSig utility enables you to do this. You can use either published signatures or define your own if you are familiar with the structure of computer code. TbDel: Remove Infected Files The DOS DEL or ERASE command does not actually erase a file. It simply deletes the first filename character in the directory listing and frees up the space by changing the disk's internal location tables (File Allocation Tables). TbDel is a small program with a single, yet all-important purpose: it overwrites every single byte TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 5 in a file with the zero character (0) before deleting it, thereby obliterating all the data and making it totally unrecoverable. TbMon: Installed Device Checker To check for the presence of the resident TBAV utilities (TbScanX, TbCheck, TbMem, TbFile, TbDisk or TbLog) in batch files or login scripts, you can use the TbMon utility. TbMon returns a DOS error level, depending on the installed ThunderBYTE resident programs. The following list specifies the ThunderBYTE resident utilities and their respective error levels: +------------+-----------+ |Utility Name|Error level| +------------+-----------+ | TbScanX | 1 | | TbCheck | 2 | | TbMem | 4 | | TbFile | 8 | | TbDisk | 16 | | TbLog | 32 | +------------+-----------+ The error level returned by TbMon is the cumulative sum of the error levels of the installed devices. For example, if you have TbScanX and TbMem installed, TbMon will return error level 5 (1+ 4 = 5). Another example: if you have all utilities loaded, TbMon will return error level 63 (1+2+4+8+16+32=63). If none of the resident ThunderBYTE utilities are installed, TbMon will return error level 0 (zero). The TBAV Utilities User Interface The DOS version of TBAV utilizes a menu-driven interface that enables you to execute the utilities easily. You can also execute many of the utilities directly from the DOS prompt. One advantage to this is that you can use the utilities in batch files. The Microsoft Windows version of TBAV utilizes the standard Windows interface, providing you a way to protect yourself from viruses while still working in the user-friendly Windows environment. TBAV-for-Windows is not described in this document. Please refer to the TBAV-for-Windows documentation for more information. TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 6 Conventions Used in This Manual This manual uses several special conventions: References to the keyboard are as they appear on the 101-key enhanced keyboard. File names, DOS commands, emphasized words, and information that you are to type appears in UPPERCASE letters. The context should clearly dictate which of these is true in each case. References to individual TBAV utilities use a combination of uppercase and lowercase letters. For example, while TBSCAN.SIG refers to a signature file, TbScan refers to the utility itself. How To Use This Manual This manual consists of six chapters. Chapter 1 provides you with the fastest way to get started with the TBAV utilities. It presents the major features of the program in a step-by- step format. We recommend that you start with this chapter. Chapter 2 contains instruction on how to prevent viruses from infecting your computer system and directions on how to handle viruses when they do strike. We recommend that you also read this chapter because it contains several useful tips. Chapter 3 contains a detailed description of both the purpose and functionality of all the TBAV for DOS utilities. Chapter 4 contains advanced user information for those users who are more technically oriented. This manual also contains five appendices. Appendix A describes TBAV messages, Appendix B describes heuristic flags, Appendix C addresses some incompatibility problems, Appendix D lists various exit codes for use in batch files, and Appendix E contains information on naming viruses. Finally, the Index provides you with the means of quickly finding any major topic. NOTE: A complete reading of this manual is indispensable in order to become familiar with the many facets of the ThunderBYTE AntiVirus utilities; to know what steps you can, and must, take to ensure TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 7 adequate protection and be fully prepared for a complete recovery, if and when disaster strikes. TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 8 1 TBAV QuickStart One of the problems with software manuals is they sometimes beat around the bush and don't get to the point, namely, how to use the software right now. This chapter presents the major features of TBAV and will get you up and running in the minimum amount of time. 1.1 Installing the TBAV Utilities This section provides the initial installation instructions of the TBAV utilities for DOS. See the TBAV for Windows documentation for installing TBAV for Windows or the TBAV for Networks documentation for installing TBAV for Networks. 1.1.1 Understanding System requirements The ThunderBYTE Anti-Virus utilities will run on any IBM or compatible PC that meets the following requirements: At least 1 megabyte of disk space 256 kilobytes of free internal memory DOS version 3.0 (DOS 5.0 or later recommended) A mouse is optional NOTE: The TBAV utilities are compatible with networks, MS-Windows, Novell-DOS, etc. 1.1.2 Running INSTALL You can install the TBAV utilities either by using the following instal- lation procedure or by a fully customized procedure that you ll find in Chapter 2. To use the fast approach, follow these steps: 1. Insert the TBAV installation diskette in the diskette drive, type A: or B:, and press the ENTER key. 2. Type INSTALL and press ENTER. After a few seconds, the following window appears: TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 9 +-------------------------+ | Quit Installation | | View TBAV.DOC file > | | License TBAV > | | Upgrade TBAV > | | Custom Installation > | | Express Installation > | +-------------------------+ 3. Since this is your first time to install the TBAV package you choose the first option, which is already highlighted, so just press ENTER. Notice also that you can always select a menu option by pressing its first letter. Install now displays the Licensing Agreement. 4. Press the cursor movement keys (up and down arrows and Page Up and Page Down) to view the Agreement. When you finish reading the agreement, press ESC. Install now asks you to acknowledge the Agreement. NOTE: You can exit Install at anytime by pressing the ESC key until you get to the Main Menu or even to the DOS prompt. 5. Select the Your Name field, type in your name, and press ENTER. 6. Select the company field and repeat the procedure to enter your company name. 7. Press I to select the Terms field, type in YES to accept the agreement, and press ENTER. The Install Menu now appears. 8. While you will probably accept the defaults, if you need to change the source path (the path where the installation program itself resides, usually drive A:) or the default Destination path (where Install places the TBAV program files, usually C:\TBAV), select the field, make your changes, and press ENTER. 9. Press B (or highlight Begin Installation and press ENTER) to begin the installation. Install now scans your system to ensure that it is clean (that is, no files are infected by a virus) and informs you when it is done. 10. Press any key to continue. Install now copies the TBAV files to the destination directory and makes a backup of your AUTOEXEC.BAT file before making a few modifications to it. The installation TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 10 program adds the TBAV directory to your PATH and adds a statement that will automatically run the TBSTART.BAT file. NOTE: The TBSTART.BAT file, which resides in the TBAV directory, contains the following commands: C:\TBAV\TBDRIVER C:\TBAV\TBSCANX C:\TBAV\TBCHECK C:\TBAV\TBMEM C:\TBAV\TBFILE C:\TBAV\TBSCAN ONCE ALLDRIVES You can configure these commands to suit your own personal needs. Notice: Install now displays a message that Recommends that you create a Recovery Diskette, which you can use in the future, for example, to restore your destroyed CMOS data, or restore your hard disk's partition table after it has been tampered with. 11. Press any key to continue to the Final Menu. To create a Recovery Diskette, press M, insert a clean formatted diskette into Drive A, and press any key to continue. TBAV now copies the system files to the diskette. See the Prepare a Recovery Diskette section in Chapter 2 for more information. If you do not want to create a Recovery Diskette, press Q to Quit Install. 12. When TBAV finishes, press any key to continue. TBAV invokes TbSetup to generate an ANTI-VIR.DAT file for drive A and returns you to the Final Menu. 13. Press Q to Quit Install. Install now invokes TbSetup again to generate the ANTI-VIR.DAT reference files for your hard disk and then returns you to the DOS prompt. CAUTION: It is extremely likely that some of the TBAV utilities are going to display messages if you now reboot and continue using the computer as you normally would. This is because some programs perform operations that the TBAV utilities monitor. TBAV, therefore, needs to learn which programs need proper permission. Before rebooting, execute some of the programs you use regularly and respond appropriately when TBAV requests permission to authorize or deny TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 11 their use. TBAV remembers the settings and will not bother you again. Reboot the computer at the end of this test run. 14. After running some of the programs you use regularly (see Caution box above), reboot your system. The TBAV utilities are now ready to monitor your system and will issue a warning if something suspicious (or worse!) is about to happen. The TBAV utilities also warn you if any new file contains a possible virus, well before it can do any harm. 1.1.3 Installation on a network If a workstation does not have a hard disk, you can invoke the TBAV utilities from a login script. You create a TbStart.Bat file containing the following: @echo off x:\apps\tbav\tbdriver.exe x:\apps\tbav\tbscanx.exe x:\apps\tbav\tbcheck.exe x:\apps\tbav\tbfile.exe x:\apps\tbav\tbmem.exe x:\apps\tbav\tbscan.exe alldrives exit In the login script add the following line: #x:command.com /c /x:\apps\tbav\tbstart.bat NOTE: You need to enter the correct drive ID for 'X:'! 1.1.4 Starting And Ending TBAV You can run TBAV in two ways: run the menu interface or run individual utilities from the DOS prompt. Starting TBAV With the Menu Interface You can access most of the TBAV utilities from within the TBAV menu. To start TBAV with the menu, follow these steps: TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 12 1. At the DOS prompt, type CD \TBAV and press ENTER. This places you in the TBAV directory. NOTE: This first step is actually optional since the TBAV directory was added to the PATH during installation. You would need this step, however, if you ever decided to remove that directory from the PATH. 2. Type TBAV and press ENTER. This starts TBAV and displays the menu interface. 3. A common task is to scan your hard disk for viruses. To do this, press S on the "Main Menu" to select the TbScan command. Press S again to select the "Start Scanning" command on the TbScan Menu. Press D on the "Path Menu" and press ENTER. 4. If TbScan finds a virus, it presents an action menu. "D)elete" deletes the infected file. "K)ill" also deletes the infected file, but in such a way that it can't be undeleted by an undelete utility (such as DOS's UNDELETE command). "R)ename" renames an EXE extension to VXE and a COM extension to VOM, preventing the execution of infected programs and thereby precluding the spread of an infection, and also enabling you to keep the file for later examination and repair. "C)ontinue scanning" continues the scan without taking action on the virus. "N)onstop continue" instructs TbScan not to stop when it detects a virus. NOTE: If you use C or N, we recommend that you select L on the "TbScan Menu" and then O on the "TbScan Log Menu" so that TbScan will log detected viruses. To view this log, select V from the "TbScan Menu." 5. Another common task is to scan a diskette. To scan a diskette in drive A, press A, or to scan a diskette in drive B, press B. 6. You can use one of three methods to end TBAV: Press X to exit and save any configuration settings you have set Press Q to exit without saving any configuration settings Press ESC, which is the same as pressing Q TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 13 Starting TBAV Utilities from the DOS Prompt You can also start each of the individual TBAV utilities directly from the DOS prompt by typing the command name followed by one or more options (or switches) to control special features. You can use either the full name of the option or its one- or two-letter mnemonic to shorten the command line. For example, if you want to use TbScan to scan for viruses on your hard disk, you could execute either one of the following commands: TBSCAN ALLDRIVES TBSCAN AD The advantage of being able to execute individual utilities is that you can use the utilities in batch files to create your own custom routines. A simple example of this is putting TbScan in your AUTOEXEC.BAT file so that it will scan for viruses when you boot up. To accomplish this, do the following: 1. If you are using DOS 5 or later, type CD\ and press ENTER to go to the root directory. Now type EDIT AUTOEXEC.BAT and press ENTER to load this file into the MS-DOS text editor Edit. NOTE: If you are using a version of DOS prior to version 5.0, consult your DOS manual on how to edit AUTOEXEC.BAT. You might have your own text editor that you can use, or you could even use a word processor to edit the file and then save it as an ASCII text file. Consult your word processor's documentation for instructions. 2. Add the following line to the beginning of the file, making sure you separate the options from the command and from each other using a space: C:\TBAV\TBSCAN AllDrives Once 3. Press ALT, F, S to save the file again, and then press ALT, F, X to exit the editor (that is, if you are using the MS-DOS text editor EDIT; otherwise, use the commands of your favourite editor to save the file, and to exit the editor). 4. Reboot your computer so the changes will take effect. CAUTION: TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 14 This line already exists in the TBSTART.BAT file, which runs automatically from AUTOEXEC.BAT. If you don't want to load all the TSR utilities that TBSTART.BAT loads, you could replace TBSTART.BAT with the above TBSCAN command. While this is still good protection, be aware that it doesn't fully protect your system. Refer to the Configuring TBAV section later in this chapter for more information on configuring TBAV. Now the first time you boot your computer on a given day, TbScan will check for viruses on all fixed drives. Because of the OO option, however, if you boot again, you'll receive the Option once already used today message, meaning that since TbScan has already run once that day, it will not run again. Another useful TBAV utility, not just for deleting infected files but any files you want destroyed, is TbDel. This utility overwrites every byte of a file with a nul character, thereby completely obliterating the file. If, for security reasons, you have files you want to destroy and prevent someone from undeleting using a file recovery program, enter the following command: TBDEL [filename] WARNING: Be absolutely sure you want to destroy a file before using TbDel. Once you execute the command, the file is gone forever, and no file recovery utility can bring it back. 1.1.5 Using TBAV Commands There are many commands in The TBAV Utilities, but most of them are available from the menu. You can select commands using either the keyboard or the mouse. To select a command, do one of the following: Highlight an option using the arrow keys and press Enter Press the highlighted letter of a command Move the mouse pointer to a command and click the left button As mentioned earlier, you can use all TBAV commands directly from the DOS prompt. You must separate the command from the first option and options from each other using a space. You can use the standard slash (/) character or hyphen (-) before an option, but it is not necessary. TBAV User Manual. Copyright (C) 1989-1996 ThunderBYTE B.V. Page 15 The standard command line syntax for all ThunderBYTE Anti-Virus commands is: COMMAND [][] [