TABLE OF CONTENTS SYSTEM REQUIREMENTS 1 INSTALLATION 1 1. Create a sub-directory. . . . . . . . . . . . . . . . . . . . . 1 a. At the DOS prompt. . . . . . . . . . . . . . . . . . . . . . 1 b. Type CD\(name of subdirectory) . . . . . . . . . . . . . . . 1 2. Put the diskette labeled VIRUSALL . . . . . . . . . . . . . . . 1 3. At the DOS prompt . . . . . . . . . . . . . . . . . . . . . . . 1 4. When you have been returned to the DOS prompt . . . . . . . . . 1 5. If you have not previously installed a CONFIG.SYS . . . . . . . 1 6. Then strike the function key F6 . . . . . . . . . . . . . . . . 2 7. If you have a CGA & snow appears. . . . . . . . . . . . . . . . 2 GETTING STARTED 3 1. At the DOS prompt type in VIRUSALL. . . . . . . . . . . . . . . 3 2. Type in the registered user . . . . . . . . . . . . . . . . . . 3 ABOUT VIRUSALL 6 ABOUT THE GENERATED PROGRAMS 7 MENU DRIVEN 7 WINDOWS INTO DATA FILES 8 MOVING BETWEEN DATA ENTRY ITEMS 9 UTILIZING VALIDATION TABLES 10 1. Enter the data exactly. . . . . . . . . . . . . . . . . . . . . 10 2. If you are not sure . . . . . . . . . . . . . . . . . . . . . . 10 3. If you do not know. . . . . . . . . . . . . . . . . . . . . . . 10 DATA BASE SCREEN MENU OPTION 11 COLOR SELECTION UTILITY 13 Changing The Screen Background Color . . . . . . . . . . . . . . . . 14 1. Position the edit arrow. . . . . . . . . . . . . . . . . . 14 2. Press the arrow keys . . . . . . . . . . . . . . . . . . . 14 Changing The Data Field Colors . . . . . . . . . . . . . . . . . . . 14 1. Position the edit arrow. . . . . . . . . . . . . . . . . . 14 2. Press the arrow keys . . . . . . . . . . . . . . . . . . . 14 3. Press the arrow keys . . . . . . . . . . . . . . . . . . . 14 Changing The Enhanced Data Field Colors. . . . . . . . . . . . . . . 14 1. Position the edit arrow. . . . . . . . . . . . . . . . . . 14 2. Press the arrow keys . . . . . . . . . . . . . . . . . . . 14 3. Press the arrow keys . . . . . . . . . . . . . . . . . . . 14 Changing The Screen Text Color . . . . . . . . . . . . . . . . . . . 15 1. Position the edit arrow. . . . . . . . . . . . . . . . . . 15 2. Press the arrow keys . . . . . . . . . . . . . . . . . . . 15 Switching Between Fixed Windows and Exploding/Imploding Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Exiting the Color Selection Utility. . . . . . . . . . . . . . . . . 15 Running in Black and White . . . . . . . . . . . . . . . . . . . . . 15 *** WARNING ***. . . . . . . . . . . . . . . . . . . . . . . . . . . 15 SORT FILES UTILITY 16 1. From the Main Menu. . . . . . . . . . . . . . . . . . . . . . . 16 PRINTER SETUP UTILITY 17 1. From the Main Menu. . . . . . . . . . . . . . . . . . . . . . . 17 2. To view and/or edit one of the standard printer config. . . . . 18 A. The Configuration ID . . . . . . . . . . . . . . . . . . . 18 B. The Printer Description. . . . . . . . . . . . . . . . . . 18 C. Network Printer Number . . . . . . . . . . . . . . . . . . 18 D. Reset String . . . . . . . . . . . . . . . . . . . . . . . 18 E. Next are three sets of Setup Strings . . . . . . . . . . . 19 3. To edit any of the data fields. . . . . . . . . . . . . . . . . 19 4. Edit the field. . . . . . . . . . . . . . . . . . . . . . . . . 20 5. If changes were made to any of the fields . . . . . . . . . . . 20 DEFINING NEW PRINTER CONFIGURATIONS 21 1. From the Main Menu. . . . . . . . . . . . . . . . . . . . . . . 21 2. Strike the INS key. . . . . . . . . . . . . . . . . . . . . . . 21 3. Enter the configuration ID. . . . . . . . . . . . . . . . . . . 21 4. Enter the Printer Description . . . . . . . . . . . . . . . . . 22 5. Enter the printer number. . . . . . . . . . . . . . . . . . . . 22 6. Enter the string that resets your printer . . . . . . . . . . . 22 7. Enter the Level 1 setup string. . . . . . . . . . . . . . . . . 22 8. Enter the Level 2 setup string. . . . . . . . . . . . . . . . . 22 9. Enter the Level 3 setup string. . . . . . . . . . . . . . . . . 22 10. The A=Accept R=Re-enter C=Cancel prompt . . . . . . . . . . . . 22 11. Repeat steps 1 through 10 . . . . . . . . . . . . . . . . . . . 22 USER-DEFINED REPORTS 22 1. To enter the User-Defined reports . . . . . . . . . . . . . . . 23 2. Option 4 is selected by . . . . . . . . . . . . . . . . . . . . 23 3. USER DEFINED REPORT TITLE CHOICE. . . . . . . . . . . . . . . . . 25 a) The INS key. . . . . . . . . . . . . . . . . . . . . . . . 25 b) At this time, the Report Title . . . . . . . . . . . . . . 26 c) The Printer Configuration ID . . . . . . . . . . . . . . . 27 d) The UP or DOWN ARROW keys. . . . . . . . . . . . . . . . . 28 e) The UP or DOWN ARROW keys. . . . . . . . . . . . . . . . . 29 4. USER DEFINED AVAILABLE FIELD TITLES CHOICE. . . . . . . . . . . 30 a) Pressing ENTER . . . . . . . . . . . . . . . . . . . . . . 31 b) The INS key. . . . . . . . . . . . . . . . . . . . . . . . 32 b) The UP or DOWN ARROW keys. . . . . . . . . . . . . . . . . 33 c) To choose additional Field Titles. . . . . . . . . . . . . 33 4. ASSIGN RANGES TO FIELD TITLES CHOSEN. . . . . . . . . . . . . . . 34 a) To enter a Range . . . . . . . . . . . . . . . . . . . . . 34 b) To enter the Lower Limit . . . . . . . . . . . . . . . . . 34 c) To enter the Upper Limit . . . . . . . . . . . . . . . . . 34 d) At the Total? prompt . . . . . . . . . . . . . . . . . . . 34 e) To enter additional Ranges . . . . . . . . . . . . . . . . 35 f) Once the user has finished . . . . . . . . . . . . . . . . 36 g) The user may SAVE. . . . . . . . . . . . . . . . . . . . . 36 5. PRINT USER DEFINED REPORTS. . . . . . . . . . . . . . . . . . . . 37 a) To SAVE BUT NOT PRINT. . . . . . . . . . . . . . . . . . . 37 b) To SAVE AND PRINT. . . . . . . . . . . . . . . . . . . . . 38 c) The user may now enter . . . . . . . . . . . . . . . . . . 39 d) The UP or DOWN ARROW keys. . . . . . . . . . . . . . . . . 39 e) Once the ENTER key is pressed. . . . . . . . . . . . . . . 40 1) At this time . . . . . . . . . . . . . . . . . . . . . . . 41 2) The UP or DOWN ARROW keys. . . . . . . . . . . . . . . . . 41 3) To abort report. . . . . . . . . . . . . . . . . . . . . . 41 4) To print report. . . . . . . . . . . . . . . . . . . . . . 41 BACK UP UTILITY 42 FINAL TOUCHES 42 ============================================================================= Page 1 UNIQUE VIRUS COLLECTION DATABASE APPLICATION. "VIRUSALL" SYSTEM REQUIREMENTS Operation System..: MS-DOS 3.1 or later. Computer .........: IBM PC - XT, AT, 286, 386 compatible 1 - 360K floppy disk drive 1 - Hard disk 640K RAM 500K Free RAM Compiler .........: Nantucket Clipper Compiler v5.2 for VIRUSALL.EXE TASM v3.0 for assembly virii. Linker ...........: RTLINK(Clipper Version) for Clipper v5.2 app. TLINK (Borland v5.1) for virii INSTALLATION 1. Create a sub-directory in which you would like to install your VIRUSALL application. a. At the DOS prompt, type MKDIR and the name of the directory you want to use and strike ENTER. e.g. MKDIR VIRUSALL b. Type CD\(name of subdirectory) and strike ENTER. e.g. CD\VIRUSALL 2. Put the diskette labeled VIRUSALL into Drive A: 3. At the DOS prompt, type in COPY A:\*.* C:\VIRUSALL 4. When you have been returned to the DOS prompt, remove the diskette from Drive A and place the diskette in a safe place. The installation process is now complete. 5. If you have not previously installed a CONFIG.SYS file on your DOS boot disk or your root directory on your hard disk, please follow the following instructions. If a CONFIG.SYS file does exist, please make sure that it contains the following lines: FILES = 20 BUFFERS = 10 To see if these lines are already in your CONFIG.SYS file, use the DOS TYPE command. e.g. TYPE C:\CONFIG.SYS If the two lines do not exist, use the DOS EDLIN or your favorite word processor to add them. If you do not have a CONFIG.SYS file, please perform the following procedure: a. Please make sure you are in your root directory. b. Type in: COPY CON CONFIG.SYS FILES = 20 BUFFERS = 10 ============================================================================ Page 2 6. Then strike the function key F6 followed by the ENTER key and reboot your system. 7. If you have a CGA & snow appears on the screen as the application executes, you can stop the snow by adding the line "Set Clipper=S1" to your AUTOEXEC.BAT file and reboot. This will stop the snow but it may give a different type of interference. Try it and see which one produces the least discomfort to your eyes on a CGA. ============================================================================ Page 3 GETTING STARTED After the program has been installed, you should be at the DOS prompt in the directory that contains VIRUSALL. 1. At the DOS prompt type in VIRUSALL, then strike the ENTER key. If you have installed only VIRUSALL.EXE, and then typed the command VIRUSALL at the DOS prompt, after a few moments, the following screen will appear. (You actually will not get this screen because I will have put your name into the registration. No big deal to hack this file, but all it will do is change the title that is written on the User Defined Report Output. Also if you select a hopelessly wrong color scheme, then you can erase this file and the application will automatically generate a new one and you will get this screen. Now, on with the show!) _____________________________________________ || Initial Installation || || || || Registered User: || |_____________________________________________| Enter Name to be PERMANENTLY imbedded in all report titles 2. Type in the registered user of this program and strike the ENTER key. The initial logon screen will twinkle. After a about 20 seconds the Bit-Mapped Logo will appear and then the Log-in screen. Don't even think you can hack this application, but if must, so be it, have fun trying! The source code you view and change through this application will be encrypted. At the DOS level it all looks like viewed databases and source code look like garbage. However, through the miracle of Clipper v5.2 and some 3rd Party libraries, it will mysteriously allow on-the-fly encryption/decryption ONLY through the application. ============================================================================= Page 4 Once you have entered the name of the registered user, the following screen will appear. _____________________________________________________________________________ The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center __________________________ inia Computer Virus Research Center | Protected by Easi-Logic |inia Computer Virus Research Center | BIT-MAPPED SECURITY (tm) | |__________________________| Good Morning Version 1.1 b Press spacebar for application or ESC for DOS _____________________________________________________________________________ NEXT SCREEN AS FOLLOWS _____________________________________________________________________________ The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center _________________________________________________________ | | | | | SECURITY LOG-IN SYSTEM | | | | Log-In Name ____________________________________ | | | | Password _______________________________________ | | | | Press in empty blank to Quit | |_________________________________________________________| The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center The Northern Virginia Computer Virus Research Center Good Morning Version 1.1 b Press spacebar for application or ESC for DOS _____________________________________________________________________________ Pressing any key reveals the Main Menu screen that appears as follows. ============================================================================ Page 5 ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =======>NVA-CVRC Application Menu<======= ||[[[[ Unique Virus Collection File. ]]]]|| || Anti-Virus/Security Products. || || Shell to Patty Hoffmans VSUM. || || Virus BBS Telephone Directory. || || Reindex and Pack Files. || || Reports. || || MoRe Cool STuFF. || || Bit-Mapped Security Utilities. || ========================================= -----------------------------[ 7:45:16 am ]----------------------------- Browse database of Unique viruses, trojans, and source code. The screen on the previous page represents the Main Menu. Selection of Option 1. Program List will bring up the VIRUSALL database in a BROWSE/VIEW/EDIT/INSERT/DELETE mode. ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =========================================================================== || Unique Virus Collection. File | ||========================================================================| || Virus Name According to F-PROT | Filename |DateRecv. |Source?| ||---------------------------------------|-------------|----------|-------| ||_10 past 3_____________________________|_10PAST3.COM_|04/01/1993|___N___| ||_10 past 3 - Modified(128 extra bytes)_|_10PAST3M.COM|04/01/1993|___N___| ||_12 Tricks Trojan______________________|_TROJ12TR.COM|04/01/1993|___N___| ||_Ada___________________________________|_ADA.COM_____|04/01/1993|___N___| ||_Adidas Trojan_________________________|_TROJADAS.COM|04/01/1993|___N___| ||_AIDS II_______________________________|_AIDS-II.COM_|04/01/1993|___Y___| ||_AIDS - install Trojan_________________|_TROJAIDS.EXE|04/01/1993|___N___| ||_Aircop(NG-C) imagefile________________|_AIRCNG-C.IMG|04/01/1993|___N___| =========================================================================== "Type in virus, hit ENTER" Search for Virus name according to F-PROT. ___________________________ ______________________________________________________________________ Whenever you wish to exit VIRUSALL and return to DOS, you will do so by striking the ESC key. You will be asked whether you are sure you want to exit. At this point, strike Y and you will be returned to DOS. ============================================================================= Page 6 ABOUT VIRUSALL In designing the VIRUSALL application, I have made a considerable effort to make the user interface as simple as possible. Care has been taken to make your application as "GOOF PROOF" as possible. ie. There is only one way to start the program and only one way to exit the program. Most DOS errors that could end an application during operation have been taken into account. VIRUSALL creates and maintains several files. VIRUSALL.EXE is used to manage several databases (VIRUS.DBF, PRODUCT.DBF, PRINLIST.DBF, FILELIST.DBF, FILESPEC.DBF) VIRUS.DBF:...:Keeps track of the fields in the unique virus collection database. PRODUCT.DBF:.:Keeps track of the vendors in the Anti-Virus/Security Products database. PHONE.DBF:...:KeePS TRaCK oF THe ViRuS BBS DaTa. PHoNe NuMBeRS.. PRNLIST.DBF:.:Keeps track of the printer definitions. FILELIST.DBF::Keeps track of the report types that you have defined. FILESPEC.DBF::Keeps track of file specifications. ie. Fields in reports, lower and upper limits. APIREPS.DBF:.:Keeps track of Title of reports & initialization headings. REPSPEC.DBF:.:Keeps track of report specifications. VIRUS.CNF:...:Keeps track of the COLOR SELECTION that you have made for your application and INITIAL REGISTRATION title of user that goes on report. Index Files with an NTX extension: VIRUS1, VIRUS2, VIRUS3, PRODUCT1, PRODUCT2, PRODUCT3 PHONE1,PHONE2, PHONE3, PHONE4, PHONE5, PHONE6 FILELIST, FILESPEC, APIREPS, REPSPEC, PRNLIST1. ============================================================================= Page 7 ABOUT THE GENERATED PROGRAMS Several user-friendly features exist in the VIRUSALL program. Since these features are built in to the program, it is to your advantage to know about them and how they are used. MENU DRIVEN The VIRUSALL program is menu driven. When a menu is on the screen, menu options are selected by either pressing the first number in the menu option name, or by pressing the UP and DOWN ARROWS until the desired operation is highlighted, then striking the ENTER key. Depending upon your selection, you will either execute the choice immediately, or you will be presented with a sub-menu for further selection. Moving backward through menu levels is accomplished by striking the ESC key. When you initially define menus, you assign a one line help message for each menu option. The message corresponding to the currently highlighted menu option always appears on line 22 of the screen. If you need more explanation of a field, the VIRUSALL program has context-sensitive help. This means that if you need more help as to what to do at a certain point, press the F1 function key for a "HELP SCREEN". ============================================================================= Page 8 WINDOWS INTO DATA FILES Some menu options result in windows into data files opening on the screen. To move through the file, you may press the UP ARROW, DOWN ARROW, PG UP, PG DN keys, or enter a key expression as directed by the message appearing on line 22 of the screen. The user may view fields that are not on the screen by striking the RIGHT or LEFT ARROW keys, which will shift the display over one field either way, or by striking Ctrl RIGHT ARROW or Ctrl LEFT ARROW, which will shift the display between the first and last fields. The HOME key will move you to the first record of the file you accessed, and the END key will move you to the last record. Since more than one key field has been defined, the user may switch between them by pressing the function key F10 and choosing from the available keys. This is true whether or not index files have been specified. You may also perform file updates as follows: Add new information: Strike the "INS" key. Edit existing information or view in detail: Highlight the desired record, then strike the "ENTER" key. Delete Information: Highlight the desired record, then strike the "DEL" key. Whenever you wish to return to the Main Menu or go back to previous screens, press the "ESC" key. Each time ESC is pressed, you are moved back one level until the main menu is reached. When in doubt, escape out. Exiting to DOS: If you strike ESC at the Main Menu, you will be asked whether you wish to exit to DOS. If you respond by pressing Y, the program will be terminated. Striking N will return you to the Main Menu. MOVING BETWEEN DATA ENTRY ITEMS When adding information to the system through the keyboard, you are presented with a window in which to enter data. The current data item to be entered is always highlighted. You may move back and forth between items by striking the UP and DOWN ARROWS. You may return to the first data item (top of the window) by striking the PG UP key. You may exit the window by striking the PG DN key. This will take you into the memo field window, where you can strike ESC to exit. As a general rule, the message: A=Accept R=Retry C=Cancel will appear before any actual update is performed. Striking the ESC key when the first data item is highlighted will cause the operation to be aborted, and data entered will not be saved. All necessary verifications for the validity of entries are made each time you move between data items. When viewing and/or editing existing data, the same window will appear on the screen for the record chosen. All necessary verifications for the validity of edits made are completed each time you move between data entry items. Upon attempting to exit the current record by striking the ESC key, the A=Accept R=Retry C=Cancel message will appear before any actual update is performed. NOTE: Any record that is edited and accepted will have the system date added to the record to the last update field, even though a different date might be typed in during the edit. UTILIZING VALIDATION TABLES The Control number will require verification against existing data files. In other words, the Control number must be unique before it is can be used. When entering data that requires validation, you may perform any of the following: 1. Enter the data exactly as it should exist in the validation table. The appropriate validation table will be checked to see if the information you entered is valid. If it is not on record, you will advance to the next data item. If it is on record, you will be notified by a low tone and a message on line 22 of the screen. 2. If you are not sure of the entire data item (for example, you want to enter the Selection Virus "V2P2", but you are not sure whether it is "V2P6Z" or "V2P2"), you may enter as much as you know. A search will be performed against the appropriate validation table to find a partial match against your entry. A window will then appear with the various matching alternatives (in my example, all viruses beginning with "V2"). You may then strike the UP and DOWN ARROWS until the desired selection is highlighted, then Strike ENTER. 3. If you do not know anything about the data item you wish to enter, (for example, you have NO idea what File Name has been assigned to a specific Virus Name), you may strike the F10 key and a window will open in which you can choose another key to search on. You may then type in the File to search for, or scroll until the desired selection is highlighted. DATA BASE SCREEN MENU OPTION The VIRUSALL menu is designated as a Data Base Screen, the code provides the following functionality: When the menu option is selected, the user will be presented with a window into the data base which will contain the first 8 records in the file. In the order that the fields are defined when creating the Data Base Screen, as many fields as will fit on the screen will appear. Report Headings appear above each field, and pressing the LEFT and RIGHT ARROWS will cause the fields displayed to shift left and right. Pressing Ctrl Left Arrow and Ctrl Right Arrow shifts the display to the first and last fields. The fields that can be displayed are all of the fields that are defined for the file. When the window first opens, the first record is highlighted. If there are no records in the file, the user is automatically placed in the "Insert" mode, and a screen that is defined for adding records comes up. As you move through the file, the record which is highlighted will change, depending on what keys the user uses to move. The highlighted record is always the Current Record. The user can change the records displayed on the screen as follows: UP ARROW: Moves up through the file one record. DOWN ARROW: Move down through the file one record. PAGE UP: Move up through the file 8 records. PAGE DOWN: Moves down through the file 8 records. HOME Key: Moves to the first record in the file. END Key: Moves to the last record in the file. The user may also move through the file by taking advantage of any Key Fields defined (ie. F10 key to choose key field). By typing a key expression (for example, a Control number in a list), the user is moved through the file to the first record matching the key expression the user enters. For example, if a Control number is four positions long and the user enters only the first three characters, the first record matching the two characters will be located. If there is no match, an audible tone is sounded. If a matching record is located, the user is advanced through the file until the first record displayed in the window is the first matching record. Since more than one key field was designated when the program was designed, the user may change the controlling key by striking the function key F10. When the function key F10 is pressed, a window appears on the screen, listing the various keys defined. The user will then strike the UP and DOWN ARROWS until the desired key is highlighted, then strike the ENTER key. The user is provided with the ability to perform edits on this file as follows: INS Key: If the user presses the INS key, it means he wants to add a new record to the file. When the INS key is pressed, a window opens on the screen, and the screen and field definitions that you created when defining the Data Base Screen will appear. The user is automatically placed at the first field position where data can be entered. ENTER Key:If the user presses the ENTER key, it means he wants either to edit the current record, or view all the fields in the record. Again, as with the INS key, a window opens and the screen you drew for the Data Base Screen appears. This time, however, numbers appear to the left of each field in which the user can enter data, so he can select which field(s) to change. DELETE Key: If the user presses the DELETE key, it means he wants to remove the current record from the file. When the DELETE key is pressed, the user is asked if he really wants to delete the record. Whenever the file is updated by the user, whether adding, editing, or deleting a record, any updates are made to the file. This includes the system date being written to an edited file when a change is made to the record and you "Accept" the choice. Once the user is finished viewing the file, adding, editing, and deleting records, the user can exit the window by striking the ESC key. Doing so moves the user back to the menu where the Data Base Screen was defined. COLOR SELECTION UTILITY At the Main Menu highlight "Miscellanous Functions." and press ENTER or press the number 9, then highlight "Select Colors." and press ENTER or press the number 1. The color selection utility will allow system users to change VIRUSALL's color scheme on color or composite monitors, and to select whether windows should explode and implode. Color selection is not supported on monochrome monitors. Color selection consists of four color code groupings: Background color for the screen, foreground and background colors for displayed data, foreground and background colors for enhanced data (reverse video for active gets), and a foreground color for window borders and graphics characters. When this utility is exited, the new color combinations immediately become effective. Upon selecting of the Color Selection utility by positioning the cursor over the Miscellaneous Functions and striking the enter key and then selecting the Color Utility, the following window will appear on the screen: (This is the best I'm going to do, well its close-but you will get the idea.) -------------------------------------------------------------------- || (This is not exactly how it looks, but it takes too much time to || || draw the screen as it actually appears. You'll get over it.)|| || -------- -------- -------- -------- -------- || || | | | | | | | | | | || || | | | | | | | | | | || || -------- -------- -------- -------- -------- || || Black Blue Green Cyan Red || || || || || || -------- -------- -------- -------- -------- || || | | | | | | | | | | || || | | | | | | | | | | || || -------- -------- -------- -------- -------- || || Magenta Brown White Gray Yellow || ||------------------------------------------------------------------|| || ==>Screen Background: Cyan on Blue || || Data Fields......: Yellow on Blue || || Enhanced.........: Yellow on Blue || || Screen Text......: White on Red || || Exploding Windows: Y || ||------------------------------------------------------------------|| Press arrow keys, Home, End to highlight, Enter to select, Esc to exit --------------------------------------------------------------------- If you are using a color monitor, the black boxes will appear in the colors corresponding to the titles beneath them. If you are using a composite monitor, the black boxes will appear in various shades of gray. Changing The Screen Background Color The screen background color is the initial color of the screen when the program is loaded. 1. Position the edit arrow next to Screen Background then strike Enter. A single lined box will appear around the current color for the screen background. 2. Press the arrow keys (up,down,left,right) until the box is around the desired color then Strike the Enter key. Changing The Data Field Colors The data field colors are the foreground and background combination of colors that data will be displayed on the screen when it is not being edited. The background color is also used for the background of the region within any windows that open on the screen. 1. Position the edit arrow next to Data Fields then strike Enter. A single lined box will appear around the current color for the data field foreground. 2. Press the arrow keys (up,down,left,right) until the box is around the desired color then Strike the Enter key. Now the box will move to the current color for the data field background. 3. Press the arrow keys (up,down,left,right) until the box is around the desired color then Strike the Enter key. Changing The Enhanced Data Field Colors The enhanced data field colors are the foreground and background combination of colors that data will be displayed on the screen when it is being edited. 1. Position the edit arrow next to Enhanced then strike Enter. A single lined box will appear around the current color for the enhanced data field foreground. 2. Press the arrow keys (up,down,left,right) until the box is around the desired color then Strike the Enter key. Now the box will move to the current color for the enhanced data field background. 3. Press the arrow keys (up,down,left,right) until the box is around the desired color then Strike the Enter key. Changing The Screen Text Color The screen text color is the color that text other than data fields will display on the screen. The background automatically is set to the color selected for the background of data fields. 1. Position the edit arrow next to Screen Text then strike Enter. A single lined box will appear around the current color for the enhanced data field foreground. 2. Press the arrow keys (up,down,left,right) until the box is around the desired color then Strike the Enter key. Switching Between Fixed Windows and Exploding/Imploding Windows Position the edit arrow next to the Exploding Windows then strike Enter. If you want windows to explode and implode, strike "Y". If you want windows to be fixed, strike "N". Exiting the Color Selection Utility At the "Enter field number to change or Esc to exit" prompt, strike Esc. The new color combinations will be calculated and saved. When the window closes, the screen will be updated with the new color combinations. Running in Black and White At the DOS prompt type "VIRUSALL M", this will turn off the colors in the application. Thus it will show up well on a monochrome monitor. *** WARNING *** It is possible to select color combinations that will make it impossible to see what is on the screen (for example, selecting the same foreground and background colors for data fields will make data invisible). Take care in selecting your colors, as it may be difficult for you to reset them to something more acceptable. Also, Gray and Yellow cannot be selected as background colors. If selected, Gray will appear as Black, and Yellow will appear as Brown. If you really mess up, just exit out and erase VIRUS.CNF. REINDEX AND PACK UTILITY This utility will allow the user to pack and reindex all of the files within VIRUSALL APPLICATION. This option should be selected when: A. You have deleted records from any of the files. B. Data records appear out of sequence. C. Data records that you know are in files do not appear. D. You have made numerous changes to a memo field. 1. From the Main Menu, select option "Reindex and Pack Files.". By highlighting it with the cursor and striking the ENTER key or by striking the key of the highlighted letter on the menu. ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =======>NVA-CVRC Application Menu<======= || Unique Virus Collection File. || || Anti-Virus/Security Products. || || Shell to Patty Hoffmans VSUM. || || Virus BBS Telephone Directory. || ||[[[[ Reindex and Pack Files. ]]]]]]]]]]|| || Reports. || || MoRe Cool STuFF. || || Bit-Mapped Security Utilities. || ========================================= -----------------------------[ 7:45:16 am ]----------------------------- Reindex and pack all database files. A message similar to Sorting Files. Please wait... will appear at the bottom of the screen. This message will periodically change to other sorting messages. Do not interrupt VIRUSALL while files are being sorted. Once the sorting process has been completed, the messages at the bottom of the screen will cease and the screen will look similar to the one illustrated above. PRINTER SETUP UTILITY The Printer Setup utility will allow you to define your own printer configurations for VIRUSALL in addition to the standard configurations that have been included with the system. The printer setups work in conjunction with the User Defined Report Writer, and lets you define any number of configurations for each report. 1. From the Main Menu, select option MoRe CooL STuFF, then choose the last option, Set Printer Configuration by highlighting it with the cursor and strike the ENTER key or strike the P key. The following window will appear on the screen: ======================================== || List of Printer Configurations || ||======================================|| ||Con| Printer Name |N|| ||--------------------------------------|| ||CIT|Citizen MSP-10/20 |0|| ||HP |Hewlett Packard Laser Jet II |0|| ||IBM|IBM Proprinter |0|| ||OTC|Output Technologies |0|| || | | || || | | || || | | || ======================================== Search for Con ___ The List of Printer Configurations window currently contains the 4 standard printer configurations provided with the system. 2. To view and/or edit one of the standard printer configurations,highlight it with the cursor and strike the ENTER key. A window similar to the one below will appear on the screen. ------------------------------------------------------------------- || ==>Configuration ID...: HP || || Printer Description: Hewlett Packard Laser Jet II || || Network Printer No.: 0 || || Reset String.......: \027&l0O\027(0U\027(s0p10h10v0sb0T\012 || || || || Setup String Width Len|| || ---------------------------------------------- ----- --|| ||Level 1 \027&l0O\027(0U\027(s0p10h10v0sb0T 80 55|| ||Level 2 \027&l0O\027(0U\027(s0p16.66h8.5v0s0b0T\027&17.68C 130 55|| ||Level 3 \027&l1O\027(8U\027(s0p16.66h8.5v0s0b0T\027&17.68C 170 40|| ------------------------------------------------------------------- A. The Configuration ID is a unique identifier the user assigns to each configuration. By doing this, the user can select printer configurations for each reports by entering this code. B. The Printer Description is a brief description of the printer. If more than one configuration will set up for the same printer, it is advisable that the Printer Description be made specific in such a way that it will be easy to identify what features the configuration has. C. Network Printer Number is the printer that all reports with this configuration should be routed to. If the program is running on a Novell network, this number would correspond to the network-assigned printer number, where the first network printer is number 1. If the program is running on a stand-alone PC, or if the reports with this configuration are to be routed to a printer connected to the first parallel printer port on the PC, Network Printer Number should be set to zero. D. Reset String is the escape sequence that will be sent to the printer when a report finishes printing. This should be a string that will reset the printer to its default powerup condition. E. Next are three sets of Setup Strings, Widths, and Lengths.The report generator uses this information to determine how to lay out lines of text before printing, when to skip to the next page, and what escape sequence to send to the printer before printing starts. The report generator automatically selects the setup string and page size that best fits the report. If one line of the report is too wide for Width 1 but is less than or equal to Width 2, the second setup string will be used. If it is wider than Width 2, the third setup string will be used. If the report is still too wide, the report generator will utilize more than one line on the page per record printed, printing only as many fields on each line as will fit without breaking, and will wrap to the next line. If a line has to wrap to the next line, the report generator adjust the number of lines per page to compensate for the fact that fewer records will fit on a page. Notice the \027 throughout the setup strings and the reset string. Any place where it is desired to include a character in a string that can not be entered through the keyboard, you can enter a backslash followed by the character's ASCII value. You must use three positions for the ASCII value even if it is less than 100. For the Hewlett Packard laser printers, the Escape key, which has an ASCII value of 27 acts as a control character. This lets the printer know that the text to follow is not to be printed, but is to be interpreted as configuration information. Note that you can force the report generator to use the same setup string, line width, and page length all the time by setting all three sets to the same values. This is good, for example, when you are using 80 column paper in a 130 column printer. In this example, I have selected the standard printer configuration for the Hewlett Packard Laser Jet II printer. The first setup string tells it to set the printer to courier, that 80 characters will not fit on a line, and to use no more than 55 lines of the page. The second setup string tells the report generator to switch to the 16.6 character per inch pica font, which will accommodate 130 characters on one line. The third setup string tells the report generator to remain at 16.6 characters per inch, but to switch to landscape (sideways printing). This reduces the page length, but up to 170 characters will fit on one line of text. 3. To edit any of the data fields, type in its associated number and strike the ENTER key. The cursor will move to the field specified. 4. Edit the field until the data reads the way you would like it to. Strike the ENTER key. You will be returned to the Enter field number to change or Esc to exit prompt at the bottom of the page. At this time, you may edit another field by typing in its field number and striking the ENTER key or strike the ESC key to leave the Printer Setup Option. For this example, strike the ESC key. 5. If changes were made to any of the fields, the A=Accept R=Retry C=Cancel prompt will appear on the screen. If all edits are correct, strike the A key. If you would like to go back in to review or change your edits, strike the R key and if you would like to cancel all edits made, strike the C key. For this example, strike the A key assuming all edits were correct. You will be returned to VIRUSALL's Main Menu. DEFINING NEW PRINTER CONFIGURATIONS Based on the descriptions of the purposes of the various fields in the printer configuration file, you should be able to set up configurations for any printers you choose. It is necessary, however, that you be familiar with the escape sequences that will regulate the internal print controls to set the print output the way you want. 1. From the Main Menu, select option 5 Miscellaneous Functions, then select option 2, Printer Setup by highlighting it with the cursor and striking the ENTER key or strike the 2 key. The following window will appear on the screen: ======================================== || List of Printer Configurations || ||======================================|| ||Con| Printer Name |N|| ||--------------------------------------|| ||CIT|Citizen MSP-10/20 |0|| ||HP |Hewlett Packard Laser Jet II |0|| ||IBM|IBM Proprinter |0|| ||OTC|Output Technologies |0|| || | | || || | | || || | | || ======================================== Search for Con ___ 2. Strike the INS key. The following window will appear: ------------------------------------------------------------------- || ==>Configuration ID...: || || Printer Description: || || Network Printer No.: 0 || || Reset String.......: || || || || Setup String Width Len|| || ---------------------------------------------- ----- --|| ||Level 1 || ||Level 2 || ||Level 3 || ------------------------------------------------------------------- 3. Enter the configuration ID you want to assign to this configuration. If you enter an ID that already exists, you will be notified of this, and will have to enter a different ID or Escape to exit. 4. Enter the Printer Description you want to give this configuration. 5. Enter the printer number. If you are running on a stand-alone PC, enter zero, and any reports with this configuration will be routed to the first parallel printer report. If you are on a Novell network, you can still enter zero to send the reports the local printer, or enter the number corresponding to the network printer you want the reports to go. The first network printer is printer number 1. 6. Enter the string that resets your printer to its powerup state. For this you will have to consult your printer manual. 7. Enter the Level 1 setup string, line width and maximum lines to be used on a page. The number of lines on a page should include any heading information. 8. Enter the Level 2 setup string, line width and maximum lines to be used on a page when a report width does not fit in the width entered in step 7 above. 9. Enter the Level 3 setup string, line width and maximum lines to be used on a page when a report width does not fit in the width entered in step 8 above. 10. The A=Accept R=Re-enter C=Cancel prompt will appear on the screen. If you are satisfied with your entries, strike A. The entries will be written to the printer setup file. If you want to make changes to your entries, strike R, and you will be placed at the Configuration ID prompt. If you want to cancel this entry in its entirety, strike C, and you will be returned to the window into the list of printer configurations. 11. Repeat steps 1 through 10 for each of the printer configurations you want to add. When you have finished, strike ESC when you are in the window into the list of printer configurations, and you will be returned to the Main Menu. USER-DEFINED REPORTS The functionality of user-defined reports has been added to your VIRUSALL application. When user-defined reports is used as an option in the program, VIRUSALL will allow end users to create, save and print their own reports. This option allows the user to define reports by File Name. The File Names vary with each program, depending on the data maintained. Each File Name includes two or more Field Titles. Each Field Title has different data that may be chosen for a user-defined report. Each Field Title may be assigned a Range by entering a Lower and/or Upper Limit. The user may also request that an applicable Title total at the conclusion of the report by pressing the Y key when prompted, "Would you like a total figure on this title (Y/N)?" In this chapter, you will see how the user-defined reports option is used by the end user. As an example, I will describe how to use the user-defined reports generated by VIRUSALL. The Main Menu for the VIRUSALL application appears as follows: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =======>NVA-CVRC Application Menu<======= || Unique Virus Collection File. || || Anti-Virus/Security Products. || || Shell to Patty Hoffmans VSUM. || || Virus BBS Telephone Directory. || || Reindex and Pack Files. || ||[[[[ Reports. ]]]]]]]]]]]]]]]]]]]]]]]]]|| || MoRe Cool STuFF. || || Bit-Mapped Security Utilities. || ========================================= -----------------------------[ 7:45:16 am ]----------------------------- Design and Print any type of report. 1. To enter the User-Defined reports option from the Main Menu select Reports, the UP or DOWN ARROW keys are used to position the highlighted bar over the option - User Defined Reports. 2. Selected the option by pressing the ENTER key. The following screen will appear if this is the first report you are defining: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =======>NVA-CVRC Application Menu<======= || Unique Virus Collection File. || || ===========>Reports<============ || || ||[[[ User Defined Reports. ]]]]|| || || || R&R Report Writer. || || || ================================== || || Reports. || || MoRe Cool STuFF. || || Bit-Mapped Security Utilities. || ========================================= -----------------------------[ 7:45:16 am ]----------------------------- Generate your own User-Defined-Report. By pressing ENTER the next screen will appear. ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= |===========================| || List of Files ||RC Application Menu<======= ||=========================||irus Collection File. || || File Title ||eports<=============== || ||-------------------------||ined Reports. || || || Virus BBS Telephone Dire||rt Writer. || || || Anti-Virus Security Prod||====================== || ||[Unique Virus Collection]|| || || ||l STuFF. || || ||ed Security Utilities. || || ||=========================== |===========================| -----------------------------[ 7:45:16 am ]----------------------------- Highlight desired record, then press the enter key to select, escape to exit. =============================================== ELSE, If you have previously Defined a report and saved it as "My First Report". =============================================== ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= ============================================================================ =============================================== |====|| List of Reports for Unique Virus Collection|| || L||=============================================|| ||===|| Report Title |CFG|| || F||-----------------------------------------|---|| ||---||[ My First Report! ]]]]]]]]]]]]]]]]]]]]]]|CIT|| ||Vir|| | || ||Ant|| | || ||Uni|| | || || || | || || =============================================== || || || || |=========================| -----------------------------[ 7:45:16 am ]----------------------------- Enter Report Title or ESC to cancel ___________________________________ 3. USER DEFINED REPORT TITLE CHOICE If a report has previously been defined the Report Title window will appear. Previously created report titles will appear in the window. The window will be empty if reports have not been created within this File Name. a) The INS key is pressed to create a User-Defined report within the File Name chosen. Once the INS key is pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= ============================================================================ =============================================== |====|| List of Reports for Unique Virus Collection|| || L||=============================================|| ||===|| Report Title |CFG|| || F||-----------------------------------------|---|| ||---|| | || ||Vir|| | || ||Ant|| | || ||Uni|| | || || || | || || =============================================== || || || || |=========================| -----------------------------[ 7:45:16 am ]----------------------------- Enter Report Title or ESC to cancel ___________________________________ The user will be asked for the title of the report they wish to create. b) At this time, the Report Title being created should be typed in. ("My First Report!" has been typed in as an example). Once the ENTER key has been pressed, the screen below will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =============================================== |====|| List of Reports for Unique Virus Collection|| || L||=============================================|| ||===|| Report Title |CFG|| || F||-----------------------------------------|---|| ||---||[ My First Report! ]]]]]]]]]]]]]]]]]]]]]]| || ||Vir|| | || ||Ant|| | || ||Uni|| | || || || | || || =============================================== || || || || |=========================| -----------------------------[ 7:45:16 am ]----------------------------- Enter Printer Configuration ID to use for this report ___ The user will be asked for the Printer Configuration for this report. This will determine on which printer the report will print. c) The Printer Configuration ID to use for this report should betyped in, and the ENTER key pressed. If the user is uncertain about the configuration ID, the ENTER key can be pressed to view the Printer Configuration window. Once the ENTER key is pressed, the following window will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= ======================================== || List of Printer Configurations || ||======================================|| ||Con| Printer Name |N|| ||--------------------------------------|| ||CIT|Citizen MSP-10/20 ]]]]]]]]]]]]]]|0|| ||HP |Hewlett Packard Laser Jet II |0|| ||IBM|IBM Proprinter |0|| ||OTC|Output Technologies |0|| || | | || || | | || || | | || ======================================== Search for Prt ID ___ The Printer Configuration window allows the user to see all available Printer Configurations in order to make a choice for the current report. d) The UP or DOWN ARROW keys are used to position the highlightedbar over the printer configuration desired for this report. Once the ENTER key is pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =============================================== |====|| List of Reports for Unique Virus Collection|| || L||=============================================|| ||===|| Report Title |CFG|| || F||-----------------------------------------|---|| ||---||[ My First Report! ]]]]]]]]]]]]]]]]]]]]]]|CIT|| ||Vir|| | || ||Ant|| | || ||Uni|| | || || || | || || =============================================== || || || || |=========================| ---------------------------------------------------------------------- Hightlight desired record, press the enter key to select, escape to exit. The Report Title will appear in the Report Title window. e) The UP or DOWN ARROW keys are used to position the highlighted bar over the report to be defined in the Report Title window. Once the ENTER key is pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =================================================== || Field Definitions for Report, My First Report!|| ||=================================================|| || Title | Type | Length || ||---------------------------------|------|--------|| ||Virus Name according to F-PROT | C | 60 || ||Filename | C | 12 || ||Date Recv. | D | 10 || ||Source? | C | 1 || ||F-PROT Detect? | C | 1 || ||McAfee Detect? | C | 1 || ||Toolkit Detect? | C | 1 || ||CPAV Detect? | C | 1 || =================================================== ---------------------------------------------------------------------- Highlight field to add, then strike RETURN 4. USER DEFINED AVAILABLE FIELD TITLES CHOICE This window will allow the user to define the report by choosing available Field Titles and determining ranges. a) Pressing ENTER on the field of your choice will enter that field to be in the first column position in your report and will yield the screen below. ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= |===================================================| || Field Definitions for Rep|================================| ||============================|| List of Fields || || Title ||==============================|| ||----------------------------|| Title || ||Filename ||------------------------------|| ||Date Recv. ||Virus name according to F-PROT|| ||Source? || || ||F-PROT Detect? || || ||McAfee Detect? || || ||Toolkit Detect? || || ||CPAV Detect? || || ||NOVI Detect? || || =============================|| || || || ================================ ---------------------------------------------------------------------- Strike INS to add another field or enter to set limits, ESC to process. b) The INS key is pressed to choose the Available Titles for the Report Title. Once the INS key is pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =================================================== || Field Definitions for Report, My First Report!||==========| ||=================================================|| || || Title | Type | Length ||=========|| ||---------------------------------|------|--------|| || ||Filename | C | 12 ||---------|| ||Date Recv. | D | 10 ||to F-PROT|| ||Source? | C | 1 || || ||F-PROT Detect? | C | 1 || || ||McAfee Detect? | C | 1 || || ||Toolkit Detect? | C | 1 || || ||CPAV Detect? | C | 1 || || ||NOVI Detect? | C | 1 || || =================================================== || || || || || =================================== ---------------------------------------------------------------------- Highlight field to add, then strike RETURN This window will allow the user to choose the Field Titles to be included in the report. The order selected, is the order the Field Titles will appear in the report. b) The UP or DOWN ARROW keys are used to position the highlighted bar over the Available Field Title wanted in the report. Once the ENTER key is pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= |===================================================| || Field Definitions for Rep|================================| ||============================|| List of Fields || || Title ||==============================|| ||----------------------------|| Title || ||Date Recv. ||------------------------------|| ||Source? ||Virus name according to F-PROT|| ||F-PROT Detect? ||Filename || ||McAfee Detect? || || ||Toolkit Detect? || || ||CPAV Detect? || || ||NOVI Detect? || || =============================|| || || || ================================ ---------------------------------------------------------------------- Strike INS to add another field or enter to set limits, ESC to process. The Field Title chosen will appear in the window. The user may now choose additional Field Titles if desired for this report. c) To choose additional Field Titles, repeat steps 5a) and 5b). Available Field Titles may be added to any report, any time, in any order selected by the user. 4. ASSIGN RANGES TO FIELD TITLES CHOSEN Each Field Title chosen for user-defined report may be assigned a Range. Entering of a Range will limit the sorting process to data belonging to or falling within the Lower and Upper Limits of the Range specified. Example: If the Field Title, Virus Name, is given a Range using a Lower Limit of "0133" and an Upper Limit of "4096", only Virus Name beginning with 0133 through Virus Name beginning with 4096 will be sorted and entered into that particular report. NOTE: If an Upper Limit value is not entered, the Upper Limit value will be the same as the Lower Limit value. a) To enter a Range for any particular Field Title, the UP or DOWN ARROW keys are used to position the highlighted bar over the Field Title requiring a Range. Once the ENTER key is pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= |===================================================| || Field Definitions for Rep|================================| ||============================|| List of Fields || || Title ||==============================|| ||----------------------------|| Title || ||Date Recv. ||------------------------------|| ||Source? ||Virus name according to F-PROT|| ||F-PROT Detect? ||Filename ]]]]]]]]]]]]]]]]]]]]]|| ||McAfee Detect? || || ||To|========================================| || ||CP|| Lower Limit ________________________ || || ||NO|| Upper Limit ________________________ || || ===|| || || |========================================| || |================================| -----------------------------[ 7:45:16 am ]----------------------------- Enter LOWER Limit to Print b) To Enter a LOWER Limit just enter in the number in the Lower Limit Box. c) To Enter a Upper Limit just enter in the number in the Upper Limit Box. d) At the Total? Prompt... You will only get this if it is a numeric field. Just answer Y for Yes or N for No, if you wish your output to display a total. ---------------------------------------------------------------------- Add Fields in sequence to print, select ranges, Esc when done NOTE: If an Upper Limit value is not entered, the Upper Limit value will be the same as the Lower Limit value. e) To enter additional Ranges to other Field Titles for any report, repeat steps 6(a) through 6(d). NOTE: If Ranges are not specified for Field Titles, all data relating to the chosen Field Titles will be included in the report. f) Once the user has finished adding Titles and defining ranges, the ESC key should be pressed. Once the ESC key has been pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= |===================================================| || Field Definitions for Rep|================================| ||============================|| List of Fields || || Title ||==============================|| ||----------------------------|| Title || ||Date Recv. ||------------------------------|| ||Source? ||Virus name according to F-PROT|| ||F-PROT Detect? ||Filename || ||McAfee Detect? || || ||Toolkit Detect? || || ||CPAV Detect? || || |===>Print Report Now?<===| || || || YES ||=====|| || ||[[[[[[[[ NO ]]]]]]]]]]]|| || || || || ================================ |=========================| -----------------------------[ 7:45:16 am ]----------------------------- Print Report Now? (Y/N) This window now shows all the information which will be included in the report. A prompt similar to Print Report Now? (Y/N) will appear at the bottom of the screen. g) The user may SAVE ONLY, or SAVE AND PRINT the report at this time. 5. PRINT USER DEFINED REPORTS a) To SAVE BUT NOT PRINT the report, the user should respond with No to the prompt by pressing the N key. After the N key is pressed, the user will return to the File Name window as follows: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =============================================== |====|| List of Reports for Unique Virus Collection|| || L||=============================================|| ||===|| Report Title |CFG|| || F||-----------------------------------------|---|| ||---||[ My First Report! ]]]]]]]]]]]]]]]]]]]]]]|CIT|| ||Vir|| | || ||Ant|| | || ||Uni|| | || || || | || || =============================================== || || || || |=========================| ---------------------------------------------------------------------- Highlight Report, then strike RETURN The user may return to the Main Menu by pressing the ESC key. b) To SAVE AND PRINT the report, the user should respond with Yes to the prompt by pressing the Y key. Once the Y key is pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =============================================== || Optional Subheading || ||---------------------------------------------|| ||This is the first line in my report heading. || ||This is the second line. || =============================================== ---------------------------------------------------------------------- Enter up to two line optional subheading c) The user may now enter an optional heading for the report, up to two lines of text, followed by the ENTER key. Once the ENTER key is pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= ==>Select Key Field<== ||1. Virus Name || ||2. File name || ||3. Date Recv. || ======================= ---------------------------------------------------------------------- The Sort by window will appear at the bottom right of the screen. The user may choose the order by which data will be sorted at this time. The sort By window will include all of the sorting options for the File Name the report is saved under. In this case, the sorting options are Control number, Company, Project Title and Date. Other File Names will include other options to sort by in their Sort By windows. d) The UP or DOWN ARROW keys are used to move the highlighted bar over the option by which to sort the report. e) Once the ENTER key is pressed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= ================================ ||1. Detail & Totals Only || ||2. Detail & Subtotals & Totals|| ||3. Totals Only || ================================ ---------------------------------------------------------------------- Prints each record, no subtotals, prints totals at end of report 1) At this time, the user must choose to print Detail & Totals Only; Detail, Subtotals & Totals; or Totals Only. 2) The UP or DOWN ARROW keys are used to highlight a choice. Once the ENTER key is pressed, the user will be prompted "Press any key to abort report" at the bottom of the screen. Any key stroke will cause the report to abort. 3) To abort report, any key may be pressed. The user will be returned to the File Name window. The user may return to the Main Menu by pressing the ESC key. 4) To print report, DO NOT press any key after step 5e2. Once the report has printed, the following screen will appear: ---------------------------------------------------------------------------- The Unique Virus Inventory Copyright (c) 1993 N. VA Computer Virus Research Center.,All Rights Reserved ---------------------------------------------------------------------------- ====== Licensee: John Smith ===================== Serial: 0000000666 ======= =============================================== |====|| List of Reports for Unique Virus Collection|| || L||=============================================|| ||===|| Report Title |CFG|| || F||-----------------------------------------|---|| ||---||[ My First Report! ]]]]]]]]]]]]]]]]]]]]]]|CIT|| ||Vir|| | || ||Ant|| | || ||Uni|| | || || || | || || =============================================== || || || || |=========================| ---------------------------------------------------------------------- Highlight Report, then strike RETURN The user may return to the Main Menu by pressing the ESC key. BACK UP UTILITY I got lazy and did NOT put one in. Besides if you don't already use a good Physical imaging utility or a Logical imaging of your disk drive to some other media you will probabily wipe out your disk in the near future. Besides, if you are not careful you could get a virus or trojan. Daily BACKUP with something, PLEASE! FINAL TOUCHES Your program has some final touches that are not easily noticed. The VIRUSALL program will encrypt any source code file that is viewed, changed and SAVED through the application. All files are encrypted and decrypted on-the-fly. You change a new unencrypted file and save it, bingo, it becomes encrypted. Put a readable copy of source code in the VIRUSALL directory, add it to the unique virus database and view the file through the application. Now, make a change and save it, exit to DOS and type the file. Cool looking garbage. Now you will only be able to compile this code through the application F5 Hotkey. In addition the databases are all encrypted. This way if someone removes your files from the server they will not be able to do anything with them without access through the application. Bit-Mapped security is used to secure entry and auditing of procedures used in the application. You have built into this application some heavy duty security, that is why I have registered each copy to each user. It also insures that you will not share these with other people since the users name is plastered all over the application. Feel free to try and hack this application, if your able to break the password or the encryption and you give me the details; I will send you some free files and a box of milk duds. Also when you start up your VIRUSALL application and have the numlock key turned on and the capslock key turned off, VIRUSALL will turn off numlock and turn on the capslock upon initialization. It will also give you a warning if you do a three finger panic (Ctrl Alt Del), you don't want to do this, just hit esc until you are backed out to the Exit window prompt. If you somehow destroy your DBF and DBT files from your drive, then start up your application as follows. At the DOS prompt: C:> type "VIRUSALL U" without the quote marks. This will update the structure of all the files. If this does not fix your problem then zip your files together and send them to me for repair. Remember, for monochrome monitors at the DOS prompt. C:>VIRUSALL M This will allow you to see your application better. One more thing, I keep tacking stuff on, once inside the application, if you must leave after a couple of minutes the screen saver will blank the screen and move a little message box around. Ohh Ohhh Ohhhh! Have Phun and Good Night. :)