Category : Recently Uploaded Files
Archive   : TBAV650.ZIP
Filename : TBAV.DOC

 
Output of file : TBAV.DOC contained in archive : TBAV650.ZIP










ThunderBYTE

Anti-Virus Utilities








USER MANUAL





































The ThunderBYTE Anti-Virus Utilities are a product of:

ESaSS B.V.
P.O. Box 1380
6501 BJ NIJMEGEN
The Netherlands



































COPYRIGHT (c) 1995 by: ThunderBYTE B.V.,
Wijchen, The Netherlands.

All rights reserved. No part of this manual may be reproduced, stored in
a retrieval system, or transmitted in any form, by print, microfilm, or
by any other means without written permission from ThunderBYTE B.V.







TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page i





Table of Contents



Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
A Word (or Two) of Thanks . . . . . . . . . . . . . . . . . . . 1
What Are the TBAV Utilities? . . . . . . . . . . . . . . . . . . 1
The TBAV Utilities User Interface . . . . . . . . . . . . . . . 5
Conventions Used in This Manual . . . . . . . . . . . . . . . . 6
How To Use This Manual . . . . . . . . . . . . . . . . . . . . . 6

1 TBAV QuickStart . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1 Installing the TBAV Utilities . . . . . . . . . . . . . . . 8
1.1.1 Understanding System requirements . . . . . . . . . . 8
1.1.2 Running INSTALL . . . . . . . . . . . . . . . . . . . 8
1.1.3 Installation on a network . . . . . . . . . . . . . 11
1.1.4 Starting And Ending TBAV . . . . . . . . . . . . . 11
1.1.5 Using TBAV Commands . . . . . . . . . . . . . . . . 14
1.1.6 Getting Help . . . . . . . . . . . . . . . . . . . 15
1.1.7 Configuring TBAV . . . . . . . . . . . . . . . . . 16
1.2 Understanding TbSetup . . . . . . . . . . . . . . . . . . 18
1.3 Understanding TbDriver . . . . . . . . . . . . . . . . . . 19
1.4 Maintaining the System . . . . . . . . . . . . . . . . . . 20
1.4.1 Maintaining ANTI-VIR.DAT Files . . . . . . . . . . 20
1.4.2 Creating a New Recovery Diskette . . . . . . . . . 20
1.4.3 Getting Updates . . . . . . . . . . . . . . . . . . 20
1.4.4 Maintaining a Network . . . . . . . . . . . . . . . 21
1.4.5 Using the PKUNZIP Utility . . . . . . . . . . . . . 22

2 Defining Your Anti-Virus Strategy . . . . . . . . . . . . . . . . 24
2.1 Protecting Yourself Against Virus Infection . . . . . . . 24
2.2 Recovering from Virus Infection . . . . . . . . . . . . . 29

3 Using the TBAV utilities . . . . . . . . . . . . . . . . . . . . 33
3.1 Using TbSetup . . . . . . . . . . . . . . . . . . . . . . 33
3.1.1 Understanding TbSetup . . . . . . . . . . . . . . . 33
3.1.2 Working with the TbSetup Menu . . . . . . . . . . . 34
3.1.3 Maximizing TbSetup . . . . . . . . . . . . . . . . 40
3.1.4 Understanding TbSetup's Operation . . . . . . . . . 44
3.1.5 Understanding TBSETUP.DAT Files . . . . . . . . . . 45
3.2 Using TbScan . . . . . . . . . . . . . . . . . . . . . . . 47
3.2.1 Understanding TbScan . . . . . . . . . . . . . . . 47
3.2.2 Working with the TbScan Menus . . . . . . . . . . . 48
3.2.3 Maximizing TbScan . . . . . . . . . . . . . . . . . 62





TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page ii



3.2.4 Understanding the Scanning Process . . . . . . . . 72
3.2.5 Understanding Heuristic Flags . . . . . . . . . . . 76
3.3 Using TbDriver . . . . . . . . . . . . . . . . . . . . . . 78
3.3.1 Understanding TbDriver . . . . . . . . . . . . . . 78
3.3.2 Working with TbDriver . . . . . . . . . . . . . . . 78
3.3.3 Maximizing TbDriver . . . . . . . . . . . . . . . . 79
3.4 Using TbScanX . . . . . . . . . . . . . . . . . . . . . . 84
3.4.1 Understanding TbScanX . . . . . . . . . . . . . . . 84
3.4.2 Working with TbScanX . . . . . . . . . . . . . . . 84
3.4.3 Maximizing TbScanX . . . . . . . . . . . . . . . . 86
3.4.4 Understanding the Scanning Process . . . . . . . . 90
3.5 Using TbCheck . . . . . . . . . . . . . . . . . . . . . . 92
3.5.1 Understanding TbCheck . . . . . . . . . . . . . . . 92
3.5.2 Working with TbCheck . . . . . . . . . . . . . . . 92
3.5.3 Maximizing TbCheck . . . . . . . . . . . . . . . . 94
3.5.4 Understanding the Scanning Process . . . . . . . . 96
3.5.5 Testing TbCheck . . . . . . . . . . . . . . . . . . 96
3.6 Using TbClean . . . . . . . . . . . . . . . . . . . . . . 98
3.6.1 Understanding TbClean . . . . . . . . . . . . . . . 98
3.6.2 Working with the TbClean Menus . . . . . . . . . . 99
3.6.3 Using TbClean Command Line Options . . . . . . . . 101
3.6.4 Understanding the Cleaning Process . . . . . . . . 104
3.6.5 Understanding Cleaning Limitations . . . . . . . . 106
3.7 Using TbMem . . . . . . . . . . . . . . . . . . . . . . . 108
3.7.1 Introducing the TbMem, TbFile & TbDisk Utilities . 108
3.7.2 Loading TbMem, TbFile and TbDisk . . . . . . . . . 108
3.7.3 Using Command Line Options . . . . . . . . . . . . 110
3.7.4 Understanding TbMem . . . . . . . . . . . . . . . . 110
3.7.5 Working with TbMem . . . . . . . . . . . . . . . . 111
3.7.6 Maximizing TbMem . . . . . . . . . . . . . . . . . 112
3.7.7 Understanding TbMem's Operation . . . . . . . . . . 114
3.8 Using TbFile . . . . . . . . . . . . . . . . . . . . . . . 116
3.8.1 Understanding TbFile . . . . . . . . . . . . . . . 116
3.8.2 Working with TbFile . . . . . . . . . . . . . . . . 117
3.8.3 Maximizing TbFile . . . . . . . . . . . . . . . . . 117
3.9 Using TbDisk . . . . . . . . . . . . . . . . . . . . . . . 120
3.9.1 Understanding TbDisk . . . . . . . . . . . . . . . 120
3.9.2 Working with TbDisk . . . . . . . . . . . . . . . . 121
3.9.3 Maximizing TbDisk . . . . . . . . . . . . . . . . . 122
3.9.4 Understanding TbDisk's Operation . . . . . . . . . 125

3.10 Using TbUtil . . . . . . . . . . . . . . . . . . . . . . 126
3.10.1 Understanding and using TbUtil . . . . . . . . . . 126
3.10.2 Working with the TbUtil Menu . . . . . . . . . . . 127
3.10.3 Maximizing TbUtil . . . . . . . . . . . . . . . . 131
3.10.4 Using the Anti-Virus Partition . . . . . . . . . . 137
3.10.5 Using the TbUtil diskette . . . . . . . . . . . . 137





TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page iii



3.11 Using TbLog . . . . . . . . . . . . . . . . . . . . . . . 139
3.11.1 Understanding and using TbLog . . . . . . . . . . 139
3.11.2 Working with TbLog . . . . . . . . . . . . . . . . 139
3.11.3 Maximizing TbLog . . . . . . . . . . . . . . . . . 141
3.12 Using TbNet . . . . . . . . . . . . . . . . . . . . . . . 143
3.12.1 Understanding TbNet . . . . . . . . . . . . . . . 143
3.12.2 Working with TbNet . . . . . . . . . . . . . . . . 143
3.12.3 Maximizing TbNet . . . . . . . . . . . . . . . . . 144

4 Understanding Advanced User Information . . . . . . . . . . . . . 147
4.1 Understanding Memory Considerations . . . . . . . . . . . 147
4.1.1 Understanding Memory Requirements . . . . . . . . . 147
4.1.2 Reducing Memory Requirements . . . . . . . . . . . 148
4.2 Understanding TbSetup . . . . . . . . . . . . . . . . . . 150
4.2.1 Understanding ANTI-VIR.DAT File Design . . . . . . 150
4.2.2 Editing the TBSETUP.DAT File . . . . . . . . . . . 150
4.2.3 Simplifying Installation on Several Machines . . . 152
4.3 Understanding TbScan . . . . . . . . . . . . . . . . . . . 153
4.3.1 Understanding Heuristic Scanning . . . . . . . . . 153
4.3.2 Understanding How Heuristic Scanning Works . . . . 155
4.3.3 Understanding Integrity Checking . . . . . . . . . 156
4.3.4 Understanding the Scan Algorithms . . . . . . . . . 157
4.3.5 Understanding the TBSCAN.LNG File . . . . . . . . . 159
4.3.6 Understanding the TBAV.MSG File . . . . . . . . . . 160
4.4 Understanding TbClean . . . . . . . . . . . . . . . . . . 161
4.4.1 Understanding how a Virus infects a file . . . . . 161
4.4.2 Understanding Conventional Cleaners . . . . . . . . 161
4.4.3 Understanding Generic Cleaners . . . . . . . . . . 163
4.5 Using TbGenSig . . . . . . . . . . . . . . . . . . . . . . 165
4.5.1 Understanding and using TbGenSig . . . . . . . . . 165
4.5.2 Working with TbGenSig . . . . . . . . . . . . . . . 165
4.5.3 Defining a Signature with TbScan . . . . . . . . . 166
4.5.4 Understanding Keywords . . . . . . . . . . . . . . 168
4.5.5 Understanding a Sample Signature: Haifa.Mozkin . . 173

Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Appendix A: TBAV messages . . . . . . . . . . . . . . . . . . 175
A.1 TbClean . . . . . . . . . . . . . . . . . . . . . . . 175
A.2 TbDriver . . . . . . . . . . . . . . . . . . . . . . 177
A.3 TbScan . . . . . . . . . . . . . . . . . . . . . . . 178
A.4 TbScanX . . . . . . . . . . . . . . . . . . . . . . . 179
Appendix B: TbScan Heuristic Flag Descriptions . . . . . . . . 180
Appendix C: Solving Incompatibility Problems . . . . . . . . . 186
Appendix D: TBAV Exit Codes and Batch Files . . . . . . . . . 189
D.1 TbScan Exit Codes . . . . . . . . . . . . . . . . . . 189
D.2 TbUtil Exit Codes . . . . . . . . . . . . . . . . . . 189





TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page iv



D.3 General Exit Codes . . . . . . . . . . . . . . . . . 189
D.4 Program Installation Check . . . . . . . . . . . . . 189
Appendix E: Virus Detection and Naming . . . . . . . . . . . . 191
E.1 How Many Viruses Does TbScan Detect? . . . . . . . . 191
E.2 The Virus Naming Convention . . . . . . . . . . . . . 191

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i












































TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 1



Introduction

A Word (or Two) of Thanks

Congratulations! By purchasing the ThunderBYTE Anti-Virus utilities you
have taken the basic step in building a massive anti-viral safety wall
around your precious computer system. Setting up the appropriate defense
using the TBAV utilities is a personal matter. Therefore, we recommend
to read this manual thoroughly, so you are well aware of the different
kinds of security measures you can take.


What Are the TBAV Utilities?

ThunderBYTE Anti-Virus (TBAV) is a comprehensive tool kit designed to
protect against, and recover from, computer viruses. While TBAV focuses
heavily on numerous ways to prevent a virus infection, the package would
not be complete without various cleaner programs to purge a system, in
the unlikely event that a virus manages to slip through. The package,
therefore, consists of several programs, each of which helps you to
prevent viruses from accomplishing their destructive purposes. Here is a
quick overview.

TbSetup: Collecting Software Information

TbSetup is a program that collects information from all software it
finds on your system. It places this information in files named
ANTI-VIR.DAT and uses it for integrity checking, program validation,
and cleaning infected files.

TbDriver: Enable Memory Resident TBAV Utilities

While TbDriver provides little protection against viruses by itself,
you must load it in advance to enable the memory resident
ThunderBYTE Anti-Virus utilities to perform properly. These
utilities include: TbScanX, TbCheck, TbMem, TbFile, and TbDisk.
TbDriver also provides basic protection against ANSI bombs and
stealth viruses.

TbScan: Scanning for Viruses

TbScan is both a fast signature scanner and a so-called heuristic
scanner. Besides its blazing speed, it has many configuration
options. It can detect mutants of viruses, bypass stealth type
viruses, etc. The signature file TbScan uses is a coded TBSCAN.SIG
file, which you can update yourself in case of emergency.





TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 2



TbScan will disassemble files. This makes it possible to detect
suspicious instruction sequences and detect yet unknown viruses. As
pointed out earlier, this generic detection, named heuristic
analysis, is a technique that makes it possible to detect about 90%
of all viruses by searching for suspicious instruction sequences
rather than relying on any signature. For that purpose TbScan has a
built-in disassembler and code analyzer.

Another feature of TbScan is the integrity checking it performs when
it finds the ANTI-VIR.DAT files generated by TbSetup. Integrity
checking means that TbScan verifies that every file it scans
matches the information which was captured when the file was first
analyzed by TbSetup and is maintained in the ANTI-VIR.DAT files. If
a virus infects a file, the information in the ANTI-VIR.DAT file
will indicate that the file has been changed, and TbScan will inform
you of this. TbScan performs an integrity check automatically, and
it does not have the false alarm rate other integrity checkers have.
The goal is to detect viruses and NOT to detect configuration
changes!

TbScanX: Automatic Scanning

TbScanX is the memory resident version of TbScan. This signature
scanner remains resident in memory and automatically scans those
files that are being executed, copied, de-archived, downloaded, etc.
TbScanX does not require much memory. It can swap itself into
expanded, XMS, or high memory, using only one kilobyte of
conventional memory.

TbCheck: Check While Loading

TbCheck is a memory resident integrity checker that remains resident
in memory and automatically checks every file just before it
executes. TbCheck uses a fast integrity checking method, which
consumes only 400 bytes of memory. You can configure it to reject
files with incorrect checksums, and/or reject files that do not have
a corresponding ANTI-VIR.DAT record.

TbUtil: Restoring Infected Boot-Sector, CMOS and Partition Tables

Some viruses copy themselves into the hard disk's partition table,
which makes them far more difficult to remove than boot sector
viruses. Performing a low-level format is an effective, but rather
drastic measure.







TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 3



TbUtil offers a more convenient alternative by making a
precautionary backup of uninfected partition tables and the boot
sector. If an infection occurs, you can use the TbUtil backup as a
verifying tool and as a means to restore the original (uninfected)
partition table and boot sector, without the need for a destructive
disk format. TbUtil can also restore the CMOS configuration for you.
If a backup of your partition table is not available, TbUtil tries
to create a new partition table anyway, again avoiding the need for
a low-level format.

Another important feature of TbUtil is the option to replace the
partition table code with new code offering greater resistance to
viruses. TbUtil executes the partition code BEFORE the boot sector
gains control, enabling it to check this sector in a clean
environment. The TbUtil partition code performs a CRC calculation on
the master boot sector just before the boot sector code activates
and issues a warning if the boot sector has been modified. The
TbUtil partition code also checks and reports changes in the RAM
layout. It performs these checks whenever the computer boots from
the hard disk.

We should point out that boot sector verification is imperative
before allowing the boot sector code to execute. A virus could
easily become resident in memory during boot-up and hide its
presence. TbUtil offers total security at this stage by being active
before the boot sector executes. TbUtil is far more convenient than
the traditional strategy of booting from a clean DOS diskette for an
undisturbed inspection of the boot sector.

TbClean: Reconstructing Infected Files

TbClean is a generic file cleaning utility. It uses the ANTI-VIR.DAT
files generated by TbSetup to enhance file cleaning and/or to verify
the results. TbClean can also work without these files. It
disassembles and emulates the infected file and uses this analysis
to reconstruct the original file.

TbMem, TbFile and TbDisk: Resident Safeguards

The TBAV utilities include a set of memory resident anti-virus
utilities, consisting of TbMem, TbFile and TbDisk. Most other
resident anti-virus products offer you the choice to either invoke
them before the network loads (thereby losing the protection after
the logon procedure), or to load the anti-viral software after
logging onto the network, resulting in a partially unprotected
system. The TBAV utilities, on the other hand, recognize the network





TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 4



software and utilize their auto-configuration capabilities to ensure
their continued functionality.

TbMem: Safeguarding Memory

TbMem detects attempts from programs to remain resident in memory
and ensures that no program can remain resident in memory without
permission. Since most viruses remain resident in memory, this is a
powerful weapon against all such viruses, known or unknown. TbMem
also protects your CMOS memory against unwanted modifications. The
ANTI-VIR.DAT files maintain a database of the permission
information.

TbFile: Executable File Protection

TbFile detects attempts from programs to infect other programs. It
also guards read-only attributes, detects illegal time-stamps, etc.
It ensures that no virus succeeds in infecting programs.

TbDisk: Protecting The Disk

TbDisk is a disk guard program that detects attempts from programs
to write directly to disk (that is, without using DOS), attempts to
format, etc., and makes sure that no malicious program succeeds in
destroying your data. This utility also traps tunneling and direct
calls into the BIOS code. The ANTI-VIR.DAT files maintain permission
information about those rare programs that write directly to and/or
format the disk.

TbGenSig: Define Your Own Signatures

Since TBAV includes an up-to-date, ready-to-use signature file, you
do not really need to maintain a signature file yourself. If,
however during a crisis, you need to define your own virus
signatures, then the TbGenSig utility enables you to do this. You
can use either published signatures or define your own if you are
familiar with the structure of computer code.


TbDel: Remove Infected Files

The DOS DEL or ERASE command does not actually erase a file. It
simply deletes the first filename character in the directory listing
and frees up the space by changing the disk's internal location
tables (File Allocation Tables). TbDel is a small program with a
single, yet all-important purpose: it overwrites every single byte





TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 5



in a file with the zero character (0) before deleting it, thereby
obliterating all the data and making it totally unrecoverable.

TbMon: Installed Device Checker

To check for the presence of the resident TBAV utilities (TbScanX,
TbCheck, TbMem, TbFile, TbDisk or TbLog) in batch files or login
scripts, you can use the TbMon utility. TbMon returns a DOS error
level, depending on the installed ThunderBYTE resident programs.

The following list specifies the ThunderBYTE resident utilities and
their respective error levels:

+------------+-----------+
|Utility Name|Error level|
+------------+-----------+
| TbScanX | 1 |
| TbCheck | 2 |
| TbMem | 4 |
| TbFile | 8 |
| TbDisk | 16 |
| TbLog | 32 |
+------------+-----------+

The error level returned by TbMon is the cumulative sum of the error
levels of the installed devices. For example, if you have TbScanX
and TbMem installed, TbMon will return error level 5 (1+ 4 = 5).
Another example: if you have all utilities loaded, TbMon will return
error level 63 (1+2+4+8+16+32=63). If none of the resident
ThunderBYTE utilities are installed, TbMon will return error level 0
(zero).


The TBAV Utilities User Interface

The DOS version of TBAV utilizes a menu-driven interface that enables you
to execute the utilities easily. You can also execute many of the
utilities directly from the DOS prompt. One advantage to this is that you
can use the utilities in batch files.

The Microsoft Windows version of TBAV utilizes the standard Windows
interface, providing you a way to protect yourself from viruses while
still working in the user-friendly Windows environment. TBAV-for-Windows
is not described in this document. Please refer to the TBAV-for-Windows
documentation for more information.






TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 6




Conventions Used in This Manual

This manual uses several special conventions:

References to the keyboard are as they appear on the 101-key
enhanced keyboard. File names, DOS commands, emphasized words, and
information that you are to type appears in UPPERCASE letters. The
context should clearly dictate which of these is true in each case.

References to individual TBAV utilities use a combination of
uppercase and lowercase letters. For example, while TBSCAN.SIG
refers to a signature file, TbScan refers to the utility itself.


How To Use This Manual

This manual consists of six chapters.

Chapter 1 provides you with the fastest way to get started with the
TBAV utilities. It presents the major features of the program in a
step-by- step format. We recommend that you start with this chapter.

Chapter 2 contains instruction on how to prevent viruses from
infecting your computer system and directions on how to handle
viruses when they do strike. We recommend that you also read this
chapter because it contains several useful tips.

Chapter 3 contains a detailed description of both the purpose and
functionality of all the TBAV for DOS utilities.

Chapter 4 contains advanced user information for those users who
are more technically oriented.

This manual also contains five appendices. Appendix A describes TBAV
messages, Appendix B describes heuristic flags, Appendix C addresses some
incompatibility problems, Appendix D lists various exit codes for use in
batch files, and Appendix E contains information on naming viruses.
Finally, the Index provides you with the means of quickly finding any
major topic.

NOTE:
A complete reading of this manual is indispensable in order to
become familiar with the many facets of the ThunderBYTE AntiVirus
utilities; to know what steps you can, and must, take to ensure






TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 7



adequate protection and be fully prepared for a complete recovery,
if and when disaster strikes.

















































TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 8




1 TBAV QuickStart

One of the problems with software manuals is they sometimes beat around
the bush and don't get to the point, namely, how to use the software
right now. This chapter presents the major features of TBAV and will get
you up and running in the minimum amount of time.


1.1 Installing the TBAV Utilities

This section provides the initial installation instructions of the TBAV
utilities for DOS. See the TBAV for Windows documentation for installing
TBAV for Windows or the TBAV for Networks documentation for installing
TBAV for Networks.


1.1.1 Understanding System requirements

The ThunderBYTE Anti-Virus utilities will run on any IBM or compatible PC
that meets the following requirements:

At least 1 megabyte of disk space
256 kilobytes of free internal memory

DOS version 3.0 (DOS 5.0 or later recommended)

A mouse is optional

NOTE:
The TBAV utilities are compatible with networks, MS-Windows,
Novell-DOS, etc.


1.1.2 Running INSTALL

You can install the TBAV utilities either by using the following instal-
lation procedure or by a fully customized procedure that you ll find in
Chapter 2. To use the fast approach, follow these steps:

1. Insert the TBAV installation diskette in the diskette drive, type
A: or B:, and press the ENTER key.

2. Type INSTALL and press ENTER. After a few seconds, the following
window appears:






TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 9



+-------------------------+
| Quit Installation |
| View TBAV.DOC file > |
| License TBAV > |
| Upgrade TBAV > |
| Custom Installation > |
| Express Installation > |
+-------------------------+

3. Since this is your first time to install the TBAV package you
choose the first option, which is already highlighted, so just press
ENTER. Notice also that you can always select a menu option by
pressing its first letter. Install now displays the Licensing
Agreement.

4. Press the cursor movement keys (up and down arrows and Page Up
and Page Down) to view the Agreement. When you finish reading the
agreement, press ESC. Install now asks you to acknowledge the
Agreement.

NOTE:
You can exit Install at anytime by pressing the ESC key until you
get to the Main Menu or even to the DOS prompt.

5. Select the Your Name field, type in your name, and press ENTER.

6. Select the company field and repeat the procedure to enter your
company name.

7. Press I to select the Terms field, type in YES to accept the
agreement, and press ENTER. The Install Menu now appears.

8. While you will probably accept the defaults, if you need to
change the source path (the path where the installation program
itself resides, usually drive A:) or the default Destination path
(where Install places the TBAV program files, usually C:\TBAV),
select the field, make your changes, and press ENTER.

9. Press B (or highlight Begin Installation and press ENTER) to
begin the installation. Install now scans your system to ensure that
it is clean (that is, no files are infected by a virus) and
informs you when it is done.

10. Press any key to continue. Install now copies the TBAV files to
the destination directory and makes a backup of your AUTOEXEC.BAT
file before making a few modifications to it. The installation





TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 10



program adds the TBAV directory to your PATH and adds a statement
that will automatically run the TBSTART.BAT file.

NOTE:
The TBSTART.BAT file, which resides in the TBAV directory, contains
the following commands:

C:\TBAV\TBDRIVER
C:\TBAV\TBSCANX
C:\TBAV\TBCHECK
C:\TBAV\TBMEM
C:\TBAV\TBFILE
C:\TBAV\TBSCAN ONCE ALLDRIVES

You can configure these commands to suit your own personal needs.

Notice:
Install now displays a message that Recommends that you create a
Recovery Diskette, which you can use in the future, for example, to
restore your destroyed CMOS data, or restore your hard disk's
partition table after it has been tampered with.

11. Press any key to continue to the Final Menu. To create a
Recovery Diskette, press M, insert a clean formatted diskette into
Drive A, and press any key to continue. TBAV now copies the system
files to the diskette. See the Prepare a Recovery Diskette section
in Chapter 2 for more information. If you do not want to create a
Recovery Diskette, press Q to Quit Install.

12. When TBAV finishes, press any key to continue. TBAV invokes
TbSetup to generate an ANTI-VIR.DAT file for drive A and returns you
to the Final Menu.

13. Press Q to Quit Install. Install now invokes TbSetup again to
generate the ANTI-VIR.DAT reference files for your hard disk and
then returns you to the DOS prompt.

CAUTION:
It is extremely likely that some of the TBAV utilities are going to
display messages if you now reboot and continue using the computer
as you normally would. This is because some programs perform
operations that the TBAV utilities monitor. TBAV, therefore, needs
to learn which programs need proper permission. Before rebooting,
execute some of the programs you use regularly and respond
appropriately when TBAV requests permission to authorize or deny






TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 11



their use. TBAV remembers the settings and will not bother you
again. Reboot the computer at the end of this test run.

14. After running some of the programs you use regularly (see
Caution box above), reboot your system.

The TBAV utilities are now ready to monitor your system and will issue a
warning if something suspicious (or worse!) is about to happen. The TBAV
utilities also warn you if any new file contains a possible virus, well
before it can do any harm.


1.1.3 Installation on a network

If a workstation does not have a hard disk, you can invoke the TBAV
utilities from a login script. You create a TbStart.Bat file containing
the following:

@echo off
x:\apps\tbav\tbdriver.exe
x:\apps\tbav\tbscanx.exe
x:\apps\tbav\tbcheck.exe
x:\apps\tbav\tbfile.exe
x:\apps\tbav\tbmem.exe
x:\apps\tbav\tbscan.exe alldrives
exit

In the login script add the following line:

#x:command.com /c /x:\apps\tbav\tbstart.bat

NOTE:
You need to enter the correct drive ID for 'X:'!


1.1.4 Starting And Ending TBAV

You can run TBAV in two ways: run the menu interface or run individual
utilities from the DOS prompt.


Starting TBAV With the Menu Interface

You can access most of the TBAV utilities from within the TBAV menu. To
start TBAV with the menu, follow these steps:






TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 12



1. At the DOS prompt, type CD \TBAV and press ENTER. This places you
in the TBAV directory.

NOTE:
This first step is actually optional since the TBAV directory was
added to the PATH during installation. You would need this step,
however, if you ever decided to remove that directory from the PATH.

2. Type TBAV and press ENTER. This starts TBAV and displays the menu
interface.

3. A common task is to scan your hard disk for viruses. To do this,
press S on the "Main Menu" to select the TbScan command. Press S
again to select the "Start Scanning" command on the TbScan Menu.
Press D on the "Path Menu" and press ENTER.

4. If TbScan finds a virus, it presents an action menu. "D)elete"
deletes the infected file. "K)ill" also deletes the infected file,
but in such a way that it can't be undeleted by an undelete utility
(such as DOS's UNDELETE command). "R)ename" renames an EXE extension
to VXE and a COM extension to VOM, preventing the execution of
infected programs and thereby precluding the spread of an infection,
and also enabling you to keep the file for later examination and
repair. "C)ontinue scanning" continues the scan without taking
action on the virus. "N)onstop continue" instructs TbScan not to
stop when it detects a virus.

NOTE:
If you use C or N, we recommend that you select L on the "TbScan
Menu" and then O on the "TbScan Log Menu" so that TbScan will log
detected viruses. To view this log, select V from the "TbScan Menu."


5. Another common task is to scan a diskette. To scan a diskette in
drive A, press A, or to scan a diskette in drive B, press B.

6. You can use one of three methods to end TBAV:

Press X to exit and save any configuration settings
you have set
Press Q to exit without saving any configuration
settings

Press ESC, which is the same as pressing Q







TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 13



Starting TBAV Utilities from the DOS Prompt

You can also start each of the individual TBAV utilities directly from
the DOS prompt by typing the command name followed by one or more options
(or switches) to control special features. You can use either the full
name of the option or its one- or two-letter mnemonic to shorten the
command line.

For example, if you want to use TbScan to scan for viruses on your hard
disk, you could execute either one of the following commands:

TBSCAN ALLDRIVES
TBSCAN AD

The advantage of being able to execute individual utilities is that you
can use the utilities in batch files to create your own custom routines.
A simple example of this is putting TbScan in your AUTOEXEC.BAT file so
that it will scan for viruses when you boot up. To accomplish this, do
the following:

1. If you are using DOS 5 or later, type CD\ and press ENTER to go
to the root directory. Now type EDIT AUTOEXEC.BAT and press ENTER to
load this file into the MS-DOS text editor Edit.

NOTE:
If you are using a version of DOS prior to version 5.0, consult your
DOS manual on how to edit AUTOEXEC.BAT. You might have your own text
editor that you can use, or you could even use a word processor to
edit the file and then save it as an ASCII text file. Consult your
word processor's documentation for instructions.

2. Add the following line to the beginning of the file, making sure
you separate the options from the command and from each other using
a space:

C:\TBAV\TBSCAN AllDrives Once

3. Press ALT, F, S to save the file again, and then press ALT, F, X
to exit the editor (that is, if you are using the MS-DOS text editor
EDIT; otherwise, use the commands of your favourite editor to save
the file, and to exit the editor).

4. Reboot your computer so the changes will take effect.

CAUTION:






TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 14



This line already exists in the TBSTART.BAT file, which runs
automatically from AUTOEXEC.BAT. If you don't want to load all the
TSR utilities that TBSTART.BAT loads, you could replace TBSTART.BAT
with the above TBSCAN command. While this is still good protection,
be aware that it doesn't fully protect your system. Refer to the
Configuring TBAV section later in this chapter for more information
on configuring TBAV.

Now the first time you boot your computer on a given day, TbScan
will check for viruses on all fixed drives. Because of the OO
option, however, if you boot again, you'll receive the Option once
already used today message, meaning that since TbScan has already
run once that day, it will not run again.

Another useful TBAV utility, not just for deleting infected files but any
files you want destroyed, is TbDel. This utility overwrites every byte of
a file with a nul character, thereby completely obliterating the file.
If, for security reasons, you have files you want to destroy and prevent
someone from undeleting using a file recovery program, enter the
following command:

TBDEL [filename]

WARNING:
Be absolutely sure you want to destroy a file before using TbDel.
Once you execute the command, the file is gone forever, and no file
recovery utility can bring it back.


1.1.5 Using TBAV Commands

There are many commands in The TBAV Utilities, but most of them are
available from the menu. You can select commands using either the
keyboard or the mouse. To select a command, do one of the following:

Highlight an option using the arrow keys and press Enter

Press the highlighted letter of a command

Move the mouse pointer to a command and click the left button

As mentioned earlier, you can use all TBAV commands directly from the DOS
prompt. You must separate the command from the first option and options
from each other using a space. You can use the standard slash (/)
character or hyphen (-) before an option, but it is not necessary.






TBAV User Manual. Copyright (C) 1989-1995 ThunderBYTE B.V. Page 15



The standard command line syntax for all ThunderBYTE Anti-Virus commands
is:

COMMAND [][] [

  3 Responses to “Category : Recently Uploaded Files
Archive   : TBAV650.ZIP
Filename : TBAV.DOC

  1. Very nice! Thank you for this wonderful archive. I wonder why I found it only now. Long live the BBS file archives!

  2. This is so awesome! 😀 I’d be cool if you could download an entire archive of this at once, though.

  3. But one thing that puzzles me is the “mtswslnkmcjklsdlsbdmMICROSOFT” string. There is an article about it here. It is definitely worth a read: http://www.os2museum.com/wp/mtswslnk/