What's New in VirusScan for Windows 3.1x v3.1.2a (3009a)
         Copyright 1994-1997 by McAfee Associates, Inc.
                All Rights Reserved.


Thank you for using McAfee's VirusScan for Windows 3.1x. 
This What's New file contains important information 
regarding the current version of this product. It is 
highly recommended that you read the entire document.

McAfee welcomes your comments and suggestions. Please 
use the information provided in this file to contact us.

___________________
WHAT'S IN THIS FILE

- New Features
- Known Issues
- Installation
- Documentation
- Frequently Asked Questions
- Contact McAfee

____________
NEW FEATURES 

1. VirusScan detects unknown macro viruses by using 
   heuristic scanning technology. Unknown macro viruses 
   are reported as "PROBABLE MACRO VIRUSES."

2. VirusScan is able to detect and clean macro virus 
   infections in password-protected Microsoft Excel 95 
   files without disturbing passwords.

3. VirusScan now has the ability to detect macro virus 
   infections in password-protected German, French, 
   Dutch, Italian, and Japanese Microsoft Word 95 
   (Word 7.0) files. 

4. VirusScan is designed to respect users' passwords 
   and leave them intact as often as possible. Viruses 
   that infect Word files, however, sometimes plant 
   their own passwords. When VirusScan is instructed to 
   clean a password-protected file, it will take one 
   of two actions:

     A. If the macro virus cannot plant its own password: 
     VirusScan notes the infection but will not clean it. 

     B. If the macro virus can plant its own password: 
     VirusScan cleans the file, removing the password 
     along with the virus.


* NEW VIRUSES DETECTED *

This DAT file, 3009a, is compatible with VirusScan's
v3.x engines only. This DAT file is not intended for
use with VirusScan v2.x products.

This DAT file detects the following 293 new viruses.
Locations that have experienced particular problems 
with specific viruses are also identified.

_1600
ABCD
AK.251
ALEX.A:TW(INTENDED)
ALEX.B:TW(INTENDED)
ALEX.C/D:TW(INTENDED)
ALEX.E:TW(INTENDED)
ALIEN.259
ALIEN.298
ALIEN.304
ALIEN.374
ALIEN.G
ANAK.B
ANAK.C
ANDRY.3791 (COM)
ANT.C:TW (*)
ANT.D:TW (*)
APPARITION.1248
APPARITION.700
APPDER.J
ARCHER.A
ARCHER.B
ARME.411
ARME.414
AWARE.1292
BANDUNG.AZ
BANDUNG.BA
BATTYBUG.187
BEDA.883
BEDA.1301
BLIN.1457
BMBB.766
CAP.K
CAP.M
CAP.Z
CAP.AA
CAP.AB
CAP.AC
CAP.AD
CAP.AE
CAP.AF
CAP.AG
CAP.AH
CAP.AI
CAP.AJ
CAP.AK
CAP.AL
CAP.AM
CAP.AN
CEASE.382
CHEAT.A
CHEAT.B
CHOLERA.2415
CLOCK.J:DE
CLOCK.K:DE
CLOCK.L:DE
COLORS.BO
COLORS.BP
COMPANION.5808
CONCEPT.BF
CONCEPT.BI
CONCEPT.BJ
CONCEPT.BK
CONCEPT.BK1
CONCEPT.BL
CONCEPT.BM
CONCEPT.BN
COUNT10.E
CRUZ.CMP.8262
DARK.E
DARK_ELF.2200
DBF.990
DENZUK-NAPOL
DISHONOR.A:DE (*)
DIVINA.I
DMV.F
DMV.G
DREPO.2493
DZT.D
DZT.G
EDDIE.565
EDDIE.1093
ELCON.374
ELCON.424
ELYTHNIA
ENVIRONM.6752
FACADE.B
FATTY.3012
FIRE.A:DE (*)
FLI2MOD (TROJAN)
FLOYD.1546		(Hong Kong)
FLU.1160
FORMATS.A (TROJAN) (*)
FOUR.A
FOUR.A (*)
FRIDAY.E:DE
GENESIS (TROJAN)
GETTO.2000
GLITTER.1462
GLUP.403
GLUP.404
GOODNIGHT.C
GROG.1349
GYRO.OW.512
HACKERZ.709
HAFENSTRASSE.1641
HEADACHE.269B
HEADER.A
HIAN
HIDEOUS.1024.A
HIDEOUS.1024.B
HIDEOUS.1024.C
HIDEOUS.1024.D
HITMAN.A
HLL.7336
HLL.CMP.16052 (*)
HLLO.17690.A
HLLP.5850.E
HLLP.5904
HLLP.FECI.6000
HONGKANG.1904
HYBRID.I
HYBRID.J
ISLAND.3551
IVP.VIVEK.924
JOHNNY.O
JOHNNY.O1
KEYB.298
KEYB.299
KHIZHNJAK.494
KHIZHNJAK.780A
KHIZHNJAK.780B
KOH-INSTALL
KOMPU.E (*)
KONKOOR
LAHYANI.1381
LAPIDARIO.766
LIBERTY.2857.D (EXE)
LICENTIOUS.1024
LILITH
LILO.1573
LOADER.TCS (TROJAN)
LOZ.684
LOZ.724
LPSK.OW.554
LUCY.B
LUNAR.A
MACARONI.B:DE
MALARIA.A:TW (*)
MANZON.1404.DR
MESS.A
MINIMAD.322
MINIMAD.340
MINIMAD.345
MINIMAD.346
MINIMAD.347
MINIMAD.349
MINIMAD.349B
MINIMAD.350
MINIMAD.352
MINIMAD.353
MINIMAD.361
MINIMAD.361B
MINIMAD.385
MINIMAD.386
MINIMAD.388
MINIMAD.407
MINIMAL.S
MKC_BOOT
MORPHINE.3500
MPC.LIATA.337
MUCK.I
MUCK.J
MUCK.K
MUCK.L
MUCK.M
MUCK.N
NAZI.8600
NICEDAY.N
NIKNAT.A
NJ-WMDLK1.G
NOIEMBRIE.610
NOP.M:DE (*)
NOP.N
NPAD.CT
NPAD.CU
NPAD.CV
NPAD.CW
NPAD.CX
NPAD.CY
NPAD.CZ
NPAD.DA
NUMIN.902
NUTCRACKER.AB2 (BOOT)
NUTCRACKER.MP.BOOT
OBAY.A
OBLOM.A
OBLOM.C
OBLOM.E
OMINOUS.1846
ORHEY.A
P0P.2694
PALMA
PAYCHECK.F
PAYCHECK.G
PERCENT.A:TW (*)
PESAN.B			(US)
PH33R.1418
PHILE.204
PIG.F:TW
PITER.529
POW
POWERPUMP.CMP.A
POXVAR.A
POXVAR.B
PREDATOR.1879
PYSK.2464
QBOOTDR76.VCS
RADYU.274
RADYU.278
RADYU.332
RADYU.333
RAZER.A (*)
REPLICATOR
RICKDOGG (TROJAN)
ROSEANNE.INTENDED.241
RSM.A
RUBIX.421
RUBIX.422A
SAILOR.B
SAM.B:TW
SCHUMANN.B (*)
SCHUMANN.C:DE
SCREW.A
SHIFTER.760
SHIN
SHY.1603
SHY.1608
SOCKS.A
SORPREN.1536		(Brasil)
SPY.A
STOOPID.353
SUN.8176
SUNSET (TROJAN)
SUPERSTITION.A
SVS.A
SWAT.A (TROJAN)
SWLABS.G (*)		(US Military)
TANGLE.378
TEAR.B
TEMPLE.A
TEMPLE.H
TMC.5036
TWNO.A:TW (Word97)	(Taiwan)
VAMPIRE.E:TW
VAMPIRE.F:TW
VAMPIRE.I:TW
VANITAS.2048		(Texas)
VD.253
VICISSIT.A
WALLY.1029
WANT.A:TW
WAZZU.CG
WAZZU.CH
WAZZU.CI
WAZZU.CM
WAZZU.CN
WAZZU.CO
WAZZU.CP
WAZZU.CQ
WAZZU.CR
WAZZU.CS
WAZZU.CT
WAZZU.CU
XAVIER.367
XM/DON.A (INTENDED)
XM/HIT.A
XM/HIT.B
XM/HIT.D
XM/LAROUX.H
XM/LAROUX.J
XM/LAROUX.K
XRCE.664
ZAHAK.960
ZANY.225
ZANY.253
ZANY.270
ZANY.292B
ZANY.298
ZANY.300
ZANY.793
ZANY.INTENDED.160
ZUCA.677

(*) Mistakenly included in the 3008a What's New list.


* NEW VIRUSES CLEANED *

This DAT file cleans the following 238 new viruses.
Locations that have experienced particular problems 
with specific viruses are also identified.

ABCD
AK.251
ALEX.A:TW(INTENDED)
ALEX.B:TW(INTENDED)
ALEX.C/D:TW(INTENDED)
ALEX.E:TW(INTENDED)
ALIEN.259
ALIEN.298
ALIEN.304
ALIEN.374
ALIEN.G
ANAK.B
ANAK.C
ANT.C:TW (*)
ANT.D:TW (*)
APPDER.J
ARCHER.A
ARCHER.B
ARME.411
ARME.414
AWARE.1292
BANDUNG.AZ
BANDUNG.BA
BATTYBUG.187
CAP.K
CAP.M
CAP.Z
CAP.AA
CAP.AB
CAP.AC
CAP.AD
CAP.AE
CAP.AF
CAP.AG
CAP.AH
CAP.AI
CAP.AJ
CAP.AK
CAP.AL
CAP.AM
CAP.AN
CHEAT.A
CHEAT.B
CLOCK.J:DE
CLOCK.K:DE
CLOCK.L:DE
COLORS.BO
COLORS.BP
COMPANION.5808
CONCEPT.BI
CONCEPT.BJ
CONCEPT.BK
CONCEPT.BK1
CONCEPT.BL
CONCEPT.BM
CONCEPT.BN
COUNT10.E
CRUZ.CMP.8262
DARK.E
DENZUK-NAPOL
DISHONOR.A:DE (*)
DIVINA.I
DMV.G
DZT.G
EDDIE.1093
EDDIE.565
ELCON.374
ELCON.424
ELYTHNIA
ENVIRONM.6752
FACADE.B
FIRE.A:DE (*)
FLOYD.1546		(Hong Kong)
FORMATS.A (TROJAN) (*)
FOUR.A (*)
FRIDAY.E:DE
GOODNIGHT.C
GLUP.403
GLUP.404
HAFENSTRASSE.1641
HEADACHE.269B
HEADER.A
HIAN
HIDEOUS.1024.A
HIDEOUS.1024.B
HIDEOUS.1024.C
HIDEOUS.1024.D
HITMAN.A
HLL.CMP.16052 (*)
HLLP.5850.E
HLLP.5850.E(PASS2)
HYBRID.I
HYBRID.J
HONGKANG.1904
JOHNNY.O
JOHNNY.O1
KEYB.298
KEYB.299
KHIZHNJAK.494
KHIZHNJAK.780A
KHIZHNJAK.780B
KOH-INSTALL
KOMPU.E (*)
LAHYANI.1381
LIBERTY.2857.D (EXE)
LICENTIOUS.1024
LILITH
LILO.1573
LOZ.684
LOZ.724
LUCY.B
LUNAR.A
MACARONI.B:DE
MALARIA.A:TW (*)
MESS.A
MINIMAD.322
MINIMAD.340
MINIMAD.345
MINIMAD.346
MINIMAD.347
MINIMAD.349
MINIMAD.349B
MINIMAD.350
MINIMAD.352
MINIMAD.353
MINIMAD.361
MINIMAD.361B
MINIMAD.385
MINIMAD.386
MINIMAD.388
MINIMAD.407
MINIMAL.S
MKC_BOOT
MPC.LIATA.337
MUCK.I
MUCK.J
MUCK.K
MUCK.L
MUCK.M
MUCK.N
NICEDAY.N
NIKNAT.A
NJ-WMDLK1.G
NOIEMBRIE.610
NOP.M:DE (*)
NOP.N
NPAD.CT
NPAD.CU
NPAD.CV
NPAD.CW
NPAD.CX
NPAD.CY
NPAD.CZ
NPAD.DA
NUMIN.902
NUTCRACKER.AB2 (BOOT)
OBAY.A
OBLOM.A
OBLOM.C
OBLOM.E
ORHEY.A
PAYCHECK.F
PAYCHECK.G
P0P.2694
PALMA
PERCENT.A:TW (*)
PESAN.B
PHILE.204
PIG.F:TW
POW
POXVAR.A
POXVAR.B
PREDATOR.1879
QBOOTDR76.VCS
RADYU.274
RADYU.278
RADYU.332
RADYU.333
(RAPI.AL2)
RAZER.A (*)
REPLICATOR
RSM.A
RUBIX.421
RUBIX.422A
SAILOR.B
SAM.B:TW
SCHUMANN.B (*)
SCHUMANN.C:DE
SCREW.A
SHIN
SOCKS.A
SORPREN.1536		(Brazil)
SPY.A
STOOPID.353
SUN.8176
SUPERSTITION.A
SVS.A
SWLABS.G (*)		(US Military)
TEAR.B
TMC.5036
TWNO.A:TW (Word97)	(Taiwan)
VAMPIRE.E:TW
VAMPIRE.F:TW
VAMPIRE.I:TW
VANITAS.2048		(Texas)
VD.253
VICISSIT.A
WALLY.1029
WANT.A:TW
WAZZU.CG
WAZZU.CH
WAZZU.CI
WAZZU.CM
WAZZU.CN
WAZZU.CO
WAZZU.CP
WAZZU.CQ
WAZZU.CR
WAZZU.CS
WAZZU.CT
WAZZU.CU
XAVIER.367
XM/DON.A (INTENDED)
XM/HIT.A
XM/HIT.B
XM/HIT.D
XM/LAROUX.H
XM/LAROUX.J
XM/LAROUX.K
XRCE.664
ZANY.225
ZANY.253
ZANY.270
ZANY.292B
ZANY.298
ZANY.300
ZANY.793
ZUCA.677

(*) Mistakenly included in the 3008a What's New list.

____________
KNOWN ISSUES

1.  When creating an Emergency Disk, in some cases,
    additional drivers must be loaded in order to access a 
    driver specific hard drive (i.e. a compressed drive). 
    Before modifying the Emergency Disk, please refer to 
    your hard disk documentation for additional information
    on creating a boot disk.    

2.  If password protection is set for VShield or any
    scan task, when an associated program is launched, you 
    will be prompted to verify the password. You must use 
    the mouse to click in the text field to enter the 
    password or click on cancel to exit. Keyboard strokes
    are not functional. This is a Microsoft issue as stated 
    in Microsoft's Knowledge Base Article ID #Q84133.

3.  If Move Infected File is selected on the Actions page,
    infected files will be moved to the directory specified. 
    If the Windows Copy command fails during this procedure,
    a zero byte file size stamp may be left in the destin-
    ation directory when carrying out the Copy command.

4.  The CTRL+C and CTRL+BREAK option to break out of DOS
    applications in a DOS window is disabled when you 
    install VirusScan. This is to prevent a host of issues
    that would be caused by CTRL+C and CTRL+BREAK interfer-
    ing with VShield activity. Consequently, if a DIR
    command is executed in a DOS window, and then a CTRL+C
    or a CTRL+BREAK is executed, the DIR display will not
    be canceled and an incorrect DIR display may result. 

5.  If VShield detects an infected file that is decompress-
    ing in a DOS session and the DOS session is terminated, 
    VShield as well as Pkunzip and any other program being 
    run from the DOS window will be discontinued. Although 
    the VShield icon will still be displayed in the Taskbar, 
    VShield will be disabled. VShield must be re-enabled by 
    restarting Windows to maintain maximum virus protection.  

6.  If the product is uninstalled while VirusScan 
    (Scan16.exe) or the VirusScan Console (AVConsol.exe)
    are open, some files may not be removed (i.e. 
    Scan16.exe, Mcscan16.dll, Mcgui16.dll, AVConsol.exe). 
    If you try to delete the McAfee\Viruscan directory 
    before restarting Windows, error messages will appear
    stating that the files are being used by Windows. Close
    all VirusScan related programs, excluding VShield, 
    before uninstalling VirusScan.

7.  The conversion utility preserves the scan targets
    but does not preserve the command-line parameters.
    When custom profiles include command-line parameters,
    the resulting task (.VSC file) will have one or more
    invalid scan items that will need to be manually
    updated.
    
    Command-line parameters in scan tasks must be manually 
    added. Pre-existing profiles (.PRF files) will be moved
    to the target installation directory for reference
    purposes.

8.  When scheduling multiple scan tasks through the 
    VirusScan console, ensure that task schedules do not
    overlap. If the schedules overlap, only the first task
    will be implemented and tasks scheduled thereafter will
    be ignored.
 
9.  If the AVCONSOLE.INI file is deleted and then recreated
    upon launching the AV Console, the default Scan16 task
    will change from "Scan Drive C" and "All Drives" to
    "VirusScan."

10. When the DEFAULT.VSC or DEFAULT.VSH files are renamed
    or deleted, VirusScan or VShield creates a new default
    file upon launch. The new default file is set to limit
    the size of the log file to 10KB and the Compressed
    option will be selected.

11. If you experience difficulties cleaning infected files
    with VirusScan for Windows, exit Windows and use 
    SCAN.EXE or SCANPM.EXE, which are included in this 
    product. 

____________
INSTALLATION

* INSTALLING THE PRODUCT *

1.  Take one of the following steps:
   
    - If you are installing from diskette or compact disc, 
      insert the VirusScan for Windows 3.1x installation 
      diskette or the CD-ROM.
    - If you are installing from files downloaded from a BBS 
      or the McAfee website, decompress the zipped files 
      into a directory on your local drive or the network.

2.  Select Run from the File menu.

3.  If you are installing from diskette, type: x:\SETUP.EXE 
    (where x is the drive that contains the diskette). 
    Click OK.
   
    If you are installing from compact disc, type: 
    x:\win3x\SETUP.EXE (where x is the drive that contains 
    the CD-ROM). Click OK.
 
    If you are installing from downloaded files, type:
    x:\path\SETUP.EXE (where x:\path is the location of the 
    files). Click OK.

4.  Follow the on-screen installation instructions to 
    complete VirusScan installation.


* PERFORMING A SILENT INSTALLATION *

To perform a "silent" installation of this product,
with minimal user interaction and with all default or 
"Typical" installation settings, add -s (i.e., SETUP.EXE -s)
to the setup command when you install the product.

Network administrators can customize the silent
installation feature by following these steps: 

1.  Check the Windows directory to ensure that a
    file named SETUP.ISS does not already exist. If 
    one does, rename it, back it up, or delete it.

2.  Run SETUP.EXE with the -r switch, (i.e., 
    SETUP.EXE -r).

3.  Select the components you want to install
    during the silent installation.  Your choices will
    be recorded.

4.  Finish the installation. 

    Result: A SETUP.ISS file is created in the Windows 
    directory that has your installation options recorded.
    Use this file to install all product files to the same 
    installation directory on every client machine.  

    The .ISS file specifies the installation directory under
    the [SdSetupType-0] header, szDir parameter, which was 
    recorded in step 3. This overrides the default
    installation directory on each client machine, which
    might vary according to operating system. Having the
    same directory name on every client helps to ease
    administration in the future; for example, you might
    assign all client machines the directory C:\ANTIVIRUS.

    Note:  If, however, you want to allow SETUP.EXE to 
    determine where to locate the installed files, modify
    the SETUP.ISS file so that the target machine will 
    disregard the szDir, as follows: 

    A.  Locate the section [SdSetupType-0] in the   
        SETUP.ISS file and go to the line:  Result = xxx.
        The actual value will most likely be  301,  302,
        or 303, depending on what options you selected
        durin the ISS file creation process.  

    B.  Add 100 to this number so that, for example, 301  
        becomes 401. This tells each target machine to 
        disregard the szDir and assign a directory according 
        to its own particular operating system. 

5.  Copy the installation files onto a local or mapped
    drive; then rename, back up, or delete the SETUP.ISS
    file.

    Note: You cannot perform a silent install from
    multiple media because the silent operation will be 
    compromised when the install prompts the user for 
    more media.

6.  Copy the new SETUP.ISS from the Windows directory
    to the location of the installation files. 

    Note:  The file used for the silent installation, 
    SETUP.ISS, is product-specific. For example, you 
    cannot use a SETUP.ISS file created by a 
    VirusScan for Windows 95 installation for a 
    VirusScan for Windows NT installation.

7.  Run SETUP.EXE with the -s switch (i.e.,    
    SETUP.EXE -s).

    Note: If you do not specify a "recorded" answer for
    all dialog boxes during the initial installation, the
    silent installation will fail.  

8.  When the silent installation is complete, the machine 
    reboots automatically. 

   
* PRIMARY PROGRAM FILES FOR VIRUSSCAN FOR WINDOWS 3.1x *
      
Files located in the Install directory:
=======================================

1.  Installed for VShield/DOS/VirusScan:

          README.1ST = License and registration
                       information
           CLEAN.DAT = Virus clean definition data
           NAMES.DAT = Virus names definition data
            SCAN.DAT = Virus scan definition data
        VALIDATE.EXE = McAfee file validation program
           WCMDR.EXE = Windows Commander program         
           MCFDU.EXE = McAfee floppy disk utility 
                       (for Zenith machines only)
         PRF2VSC.EXE = Conversion utility program
          CONFIG.EXE = VirusScan configuration
                       program
        SETBROWS.EXE = Set browser program
        INETWH16.DLL = Library files 
        INETWH32.DLL = Library files 
         MCGUI16.DLL = VirusScan Console library file      
           WCMDR.INI = Windows Commander configuration
                       settings
        WCMDRSIL.INI = unInstallShield helper
                       configuration
          DEISL1.ISU = Uninstall file
         PACKING.LST = Packing list
        WHATSNEW.TXT = What's New document
        RESELLER.TXT = McAfee authorized agents


2.  Installed for VShield:

        MCKRNL16.DLL = Tools library
        MCUTIL16.DLL = Run-time support library
          CONFIG.EXE = VShield Configuration Manager
          VSHWIN.EXE = VShield on-access engine
          CHKVXD.EXE = VShield virtual device driver
                       checking utility
        UNVSHVXD.EXE = Virtual device driver
        UNVSHVXD.INI = Initialization file 
         DEFAULT.VSH = Default VSH settings


3.  Installed for DOS:

           EDISK.EXE = Emergency Disk creation utility
           EDISK.SCR = Emergency Disk file
              EDAT.1 = Emergency Disk data file
              EDAT.2 = Emergency Disk data file
              EDAT.3 = Emergency Disk data file
              EDAT.4 = Emergency Disk data file
              EDAT.5 = Emergency Disk data file
              EDAT.6 = Emergency Disk data file
         EMCLEAN.DAT = Emergency Disk virus clean
                       definition data
         EMNAMES.DAT = Emergency Disk virus names
                       definition data
          EMSCAN.DAT = Emergency Disk virus scan
                       definition data
        GETREPLY.EXE = Emergency diskette program component
            SCAN.EXE = MS-DOS scan program
          SCANPM.EXE = Protected mode scanner

4.  Installed for VirusScan:

        AVCONSOL.EXE = VirusScan console program
          SCAN16.EXE = VirusScan for Windows 3.1x 
                       on-demand scanner
       VIRLIST16.EXE = Virus List program         
        MCSCAN16.DLL = Library files
          SCAN16.HLP = VirusScan for Windows 3.1x 
                       online help
        AVCONSOL HLP = VirusScan Console online help
        AVCONSOL.INI = VirusScan console 
                       configuration file   
         DEFAULT.VSC = Default VSC settings        
        INETWH16.DLL = Internet library help file    
        INETWH32.DLL = Internet library help file  

Files located in WINDOWS\SYSTEM directory:
========================================== 

1.  Installed for VShield/VirusScan:

           CTL3D.DLL = 16-bit 3D Windows controls
                       library (*)
         CTL3DV2.DLL = 32-bit 3D Windows controls
                       library (*)

(*) File will be installed upon installation of VirusScan
    if it does not already exist, or if an older version
    is found.


2.  Installed for VShield:

        MCFSHOOK.386 = File system hook
          MCKRNL.386 = Scan engine device driver
        MCSCAN32.386 = Scan engine device driver
          MCUTIL.386 = Utility device driver
         VSHIELD.386 = VShield device driver
       
                  
* TESTING YOUR INSTALLATION *

The Eicar Standard AntiVirus Test File is a combined effort 
by anti-virus vendors throughout the world to come up with
one standard by which customers can verify their anti-virus 
installations. To test your installation, copy the following 
line into its own file and name it EICAR.COM.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

When done, you will have a 69- or 70-byte file.

When VirusScan is applied to this file, it will report
finding the EICAR-STANDARD-AV-TEST-FILE virus.

It is important to know that THIS IS NOT A VIRUS. However,
users often have the need to test that their installations
function correctly. The anti-virus industry, through the
European Institute for Computer Antivirus Research, has
adopted this standard to facilitate this need.

Please delete the file when installation testing is
completed so unsuspecting users are not unnecessarily 
alarmed.


* MANUALLY UNINSTALLING VIRUSSCAN *

McAfee recommends using VirusScan's uninstall program
provided. You can access the McAfee Uninstall icon from
the McAfee VirusScan program group. If, however, the
uninstall program (WCMDR.EXE) is not present on
your system, follow the instructions outlined below to
manually uninstall VirusScan.

1.  Edit the AUTOEXEC.BAT file:

    1. From the File menu, select Run and type SYSEDIT
       in the space provided. Click Okay.
    2. Remove VirusScan from the path statement. The
       default path is C:\MCAFEE\VIRUSCAN.

2.  In the SYSTEM.INI file, remove the following lines:

       device=MCSCAN32.386
       device=MCUTIL.386
       device=MCKRNL.386
       device=MCFSHOOK.386
       device=VSHIELD.386

3.  Remove the following lines from the WIN.INI file:

    1.  After LOAD =, remove all references to VirusScan.
        The default line is C:\MCAFEE\VIRUSCAN\VSHWIN.EXE.
    
    2.  Remove [VIRUSCAN] WSCAN=C:\McAfee\VIRUSCAN\
        SCAN16.EXE.

    3.  Delete VirusScan icons and the McAfee VirusScan
        program group from Windows in the Program Manager.

    4.  Exit Windows and reboot your system.

    5.  When Windows comes back up, open the File Manager 
        and delete the McAfee directory. 

_____________
DOCUMENTATION

For more information, refer to the User's Guide, included 
on the CD-ROM versions of this program or available 
from McAfee's BBS and FTP site. This file is in Adobe
Acrobat Portable Document Format (.PDF) and can be viewed
using Adobe Acrobat Reader. This form of electronic
documentation includes hypertext links and easy navigation
to assist you in finding answers to questions about your
McAfee product.

Adobe Acrobat Reader is available on CD-ROM in the ACROREAD
subdirectory. Adobe Acrobat Reader also can be downloaded 
from the World Wide Web at:

http://www.adobe.com/Acrobat/readstep.html

VirusScan documentation can be downloaded from McAfee's BBS
or the World Wide Web at:

http://www.mcafee.com 

For more information on viruses and virus prevention,
see the McAfee Virus Information Library, included on
the CD-ROM version of this product or available from
McAfee's BBS and FTP site. A ViaGraphix Interactive
Anti-virus Training program also is available on the
CD-ROM version, or can be purchased from the McAfee
website.

__________________________
FREQUENTLY ASKED QUESTIONS 

Regularly updated lists of frequently asked questions 
about McAfee products also are available on McAfee's 
BBS, website, and CompuServe and AOL forums.


Q:  What is the Parameters field of the Task Properties 
    page used for?

A:  The field is provided to take to take advantage of 
    command-line parameters for programs other than 
    VirusScan. For example, a NotePad.exe task could 
    be set to open a file by entering the filename 
    (i.e., Whatsnew.txt) in the parameter field. 


Q:  How can I create an Emergency Disk after VirusScan
    installation?
                                    
A:  You can create an Emergency Disk after installation by 
    double-clicking the Emergency Disk Creation Utility icon 
    in your McAfee VirusScan program group.


Q:  When I have an infected file, why does the infected
    counter increase by increments greater than one?

A:  The file system will typically access a file more than 
    once. On each access, VirusScan scans the file and 
    detects the infection.


Q:  Can I continue to use VirusScan for Windows 3.1x on my 
    system after upgrading to Windows 95?

A:  VirusScan for Windows 3.1x can run on a Windows 95
    system; however, many key components, including VShield, 
    will not be functional. If you upgrade your system to 
    Windows 95, you should also upgrade your VirusScan 
    software to VirusScan for Windows 95. As a licensed 
    VirusScan user, you can upgrade your software for free. 
    See your license agreement or contact your Network 
    Administrator for details.        


Q:  Does VShield detect Word Macro infections?

A:  Yes. VShield detects and cleans Word Macro infections.
                                  

Q:  Can I update VirusScan's data files to detect new 
    viruses?

A:  Yes. If you have Internet access, you can download
    updated VirusScan data files from the McAfee website, 
    BBS, or other online resources. To download 
    from the McAfee Web Site, follow these steps:
 
    1.  Go to the McAfee website (http://www.mcafee.com).
        
    2.  Select Update DAT File in the left hand column
        or frame.

    3.  Scroll down and click Download DAT File - FREE to
        update your virus definition files.

    4.  Data file updates are stored in a compressed form 
        to reduce transmission time. Unzip the files into
        a temporary directory, then copy the files to the
        appropriate directory, replacing your old files.    

    5.  Before performing any scans, shut down your
        computer, wait a few seconds, and turn it on again.

    If you need additional assistance with downloading, 
    contact McAfee Download Support at (408) 988-3832.

______________
CONTACT McAFEE

* FOR QUESTIONS, ORDERS, PROBLEMS, OR COMMENTS *

Contact McAfee's Customer Care department: 

1.  Corporate-licensed customers, call (408) 988-3832
    Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time

    Retail-licensed customers, call (972) 278-6100
    Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time

2.  Fax (408) 970-9727
    24-hour, Group III fax 
		
3.  Fax-back automated response system (408) 988-3034
    24-hour fax

Send correspondence to any of the following McAfee
locations:

    McAfee Corporate Headquarters
    2805 Bowers Avenue		
    Santa Clara, CA 95051-0963		
	
    McAfee East Coast Office					
    Jerral Center West
    766 Shrewsbury Avenue
    Tinton Falls, NJ 07724-3298

    McAfee Central Office			
    4099 McEwen
    Suites 500 and 700
    Dallas, TX 75244		
						
    McAfee Canada
    139 Main Street
    Suite 201
    Unionville, Ontario
    Canada L3R2G6

    McAfee Europe B.V.			
    Gatwickstraat 25	
    1043 GL Amsterdam				
    The Netherlands	 		

    McAfee (UK) Ltd.
    Hayley House, London Road
    Bracknell, Berkshire  RG12 2TH
    United Kingdom 

    McAfee France S.A.			
    50 rue de Londres				
    75008 Paris					
    France					
				
    McAfee Deutschland GmbH
    Industriestrasse 1
    D-82110 Germering
    Germany

    McAfee Japan KK
    Toranomon 33 Mori Bldg.
    3-8-21 Toranomon
    Minato-Ku, Tokyo 105
    Japan
    	
Or, you can receive online assistance through any of the 
following resources:

1.  Bulletin Board System: (408) 988-4004
    24-hour US Robotics HST DS

2.  Internet e-mail: support@mcafee.com

3.  Internet FTP: ftp.mcafee.com

4.  World Wide Web: http://www.mcafee.com

5.  America Online: keyword MCAFEE

6.  CompuServe: GO MCAFEE


Before contacting McAfee, please make note of the
following information. When sending correspondence,
please include the same details.

- Program name and version number
- Type and brand of your computer, hard drive, and any 
  peripherals
- Operating system type and version
- Network name, operating system, and version
- Contents of your AUTOEXEC.BAT, CONFIG.SYS, and 
  system LOGIN script
- Microsoft service pack, where applicable
- Network card installed, where applicable
- Modem manufacturer, model, and baud, where 
  applicable
- Relevant browsers/applications and version number,
  where applicable

- Problem
- Specific scenario where problem occurs
- Conditions required to reproduce problem
- Statement of whether problem is reproducible on demand

- Your contact information: voice, fax, and e-mail

Other general feedback is also appreciated.

Documentation feedback is welcome. Send e-mail to
documentation@cc.mcafee.com.


* FOR ON-SITE TRAINING INFORMATION *
 
Contact McAfee Customer Service at (800) 338-8754.


* FOR PRODUCT UPGRADES *

To make it easier for you to receive and use McAfee's
products, we have established a Reseller program to 
provide service, sales, and support for our products 
worldwide. For a listing of McAfee resellers near you,
click Contact McAfee under the Information section on 
the McAfee website or see tge RESELLER.TXT file included
with this product.




