Scan
Scan
The search strings are stored in a file named SIGN.DEF, which must be
present in the current directory or the same directory as F-PROT.EXE. The
number of search strings contained in this file is not an indication of the
number of viruses F-PROT is able to detect, however - as most new viruses
are created by making small changes to older viruses, the same search
string can often be used to detect many different viruses.
F-PROT can use two different methods when scanning for viruses. The first
method ("Secure Scan") uses two different search strings for each virus.
It will also search in a large block of data - usually (but not always)
located either at the beginning or the end of the file. This improves the
chances of detecting any virus which might have been created by modifying
an older one - any change might cause a search string to be located at a
different position within the virus, or it might even corrupt the string
itself, but the chances of a single change invalidating both of the
strings are very low.
The second method first does a "Secure Scan", and then attempts to analyse
the file, using a set of rules, instead of a database of search strings.
It is still only experimental, but its purpose is to detect suspicious
code. It is not foolproof - it will not detect all viruses and may easily
produce false alarms, so it should be used with care - not recommended for
the casual user. However - unlike the other method, it is not limited
to existing viruses or variants of them - it is equally effective against
new viruses. For further information on this method see ANALYSE.DOC
When you select "Scan" from the initial menu, a new menu will appear,
where you can select what to scan for and where to scan.
To change the setup you simply use the arrow keys to move to the option you
want to change and press Enter. A window will then appear showing the
available possibilities, and you select one of them.
The first option, "Method" is uses to select which search method to use,
with "Secure" as the default.
The fifth option, "Files" is used to select in which files F-PROT should
search for viruses. Most viruses will only infect normal executable
files, (.EXE, .COM and possibly .APP and .PGM files) although some may
infect overlay files (.OV?) and device driver files (.SYS) as well. The
default operation of F-PROT is just to scan those types of files, but it is
also possible to select "All files" - this is advisable if you are cleaning
up after a virus attack - just to make sure the virus is not hiding in some
obscure overlay file. However, as this is quite time-consuming, it is not
recommended, unless you have actually found a virus when scanning just the
regular executable files. It is also possible to specify a set of file
extensions - for example adding .BIN to the default list.
If any of the options are changed from their default values, F-PROT will
ask if the changed values should be saved when you exit from the program.
If so, a file named SETUP.F2 will be created. This does not work if the
program is run from a write-protected diskette, however.
When you have selected the correct options, you may start the scanning by
selecting "Begin Scan" at the top of the menu, either by moving the cursor
there, or just by pressing "B".
The small window at the bottom will display the name of the last file
scanned.
The scanning can be aborted at any time simply by pressing the ESC key.
This report may say that a file has been packed by a program such as
KVETCH, PGMPAK, SHRINK or CRUNCH and can not be scanned. This is
generally not a cause for alarm, although a virus can be hidden in a
program by infecting it, and then running one of those file-packing
programs, which create a program which will unpack itself in memory when
executed. Some virus writers use this method to distribute their viruses,
but generally this only works for the first generation - second (and
later) generation samples of the same virus will not be packed. F-PROT
can scan inside most PKLITE, LZEXE, ICE, DIET and EXEPACK compressed files,
and support for the remaining compression program will be added in the near
future, if necessary. Please keep in mind that if a file is infected after
compression, the virus is always detected normally. Finally, F-PROT will
not scan inside self-unpacking archives, or .ZIP, .ARJ or similar files.
We will add this feature in the future, but currently you have to unpack
those files and scan the individual files.
A note on disinfection
When a file has been disinfected it has usually been restored to its
original state before infection. In many cases the disinfected program
will have 1-16 additional garbage bytes at the end. Those bytes are added
by viruses, in order to make the length of the program a multiple of 16
bytes, before infection. As the number of those extra bytes cannot be
determined, they cannot be removed. Normally they will not have any effect,
unless the program checks its current length. In those cases it will
report an incorrect length after disinfection, and will have to be restored
from a backup.
Normally F-PROT will search the memory for viruses, and refuse to
operate if any search strings are found in memory. However, a false alarm
is possible, for example if an infected file has just been copied, and
portions of it are in an unused disk buffer. A false positive can also
happen if you have run another, incompatible anti-virus program before,
that does not encrypt its search strings. Most anti-virus programs are
well-behaved in this respect, and only MSAV and CPAV cause this problem
regularly.
To skip the memory scan, run the program with the /NOMEM command-line
switch.
We do not include the EICAR test file with the package to avoid alarming
anyone running F-PROT or another scanner on the package, but to create the
EICAR test file, use any text editor to create a file with the following
single line in it:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Save the file to any name with COM extension, for example EICAR.COM.
Make sure you save the file in standard MS-DOS ASCII format. The file
should be 68 bytes long, but might be 70 bytes if the editor puts a
CR/LF at the end. Now you can use this file to test what happens
when F-PROT enconters a "real" virus.