?_Š’’’’+`Ą·lpĄĄ>@ ¦\€€€€€€€€€€€€ĄĄĄ’’’’’’’’’’’’‚’÷ w‚š’w‚zš ƒw| ˆƒ| ˆƒp ˆ„x€ „ˆu ˆ…r‰˜ „ˆ~ ˆƒpˆ‚‰xˆƒńˆ‚—ˆƒ’š‚łp’‚—‚w’šˆ‚łwˆ‚€w’‚š€ˆ™wp€w’‚š€Žˆ™™—Ž€€w’‚š€至™™xą€w’‚š€އł™™—€€w’‚š€至‰™™p€w’‚š€ށ™ˆ—€w’’š€苳‰™™pww’’š€ށ™‡—yw’’š€肳‰™…Ÿ’’š€ŽŠ™™‰™’’š€艳˜™—’š€މ™™—wp’š€’™„yp’šˆˆł™’™™Ÿ’’†Ÿł™ų ’ƒ™Ÿš ’ƒł’š/&;)z4d text.Inval’’`’’’’bm0bm1’bm2bm35|CTXOMAP¬N|FONT[N|KWBTREEĶO|KWDATAĻN|KWMAP¼O|Phrases |SYSTEM…|TOMAPzM|TOPIC»|TTLBTREEüW %u¾ 'Ę )“Ī +ßÖ -óŽ / ę 1,ī 3Vö 5pž 7‘ 9­ ;Ć =ź ?ż& A. >36 N>  oB ›F £Ś6|TOPIC|TOMAP|FONT|CTXOMAPrr|SYSTEM.’’’’24WBTREEWDATA|KWMAPWBTREEWDATAR:Ā ī6XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX>ų Ūü Ę  ,7’’’’Ņ &7)’’’’ OPTIONSBUILDTAGSMAPALIASFILESBITMAPSLANGUAGEFORMATREPORTBUILDROOTINDEXFORCEFONTMAPFONTSIZEWARNINGCOMPRESSTITLEMULTIKEYCASEINSENSITIVECASESENSITIVEDICTIONARY‚ : Š > ” B ˜ F ž J ¤ N ¬ R µ V ¼ Z Ć ^ É b Ī f Ō j Ž n ź r ņ v ū z  ~ ‚  † ( 87izdÜ:6 OLDKEYPHRASESCANDINAVIANTRUE1FALSE0\TRUE1FALSE0#DEFINE#INCLUDErrbrrb.HPJ‘ˆlpĄĄ  H\€€€€€€€€€€€€ĄĄĄ’’’’’’’’’’’’’“ü’’ĢüĻ’ĢüĢ’ĢüĢĻĢüĢ’ĢüĻ’Ģü’’Ģ’Ģ„œlpĄĄ p\€€€€€€€€€€€€ĄĄĄ’’’’’’’’’’’’’ƒD’üĢ‚ĻD’ƒD’üĢ‚ĻD’ƒD’üĢ‚ĻD’ƒD’üĢ‚ĻD’D’D’Dh_lpĄĄj\ ö\€€€€€€€€€€€€ĄĄĄ’’’’’’’’’’’’’‚š’‚š ’„š ’‚š’”š’’’š’’š’šššš’’š’š’š’’’’’š†’’š’š’’’’’’’’†’’’š’¬š’’’’’’’š’’’’’’’’ˆ’’š’š’™š’’š’š’š’’š’𒁒’’†š’š’š’’’’†š’’’’’’‚š’‚š’‚š’‚š ’w ’‚𠒁p‚‡’‚𠒂𒂇’‚ń ’ˆ’’Ļ’’’‚šˆ ’ƒš’Ļ’ƒĻš‡’‚š’÷w’‚’‚š’’‚š’‚š’†’o’pü’ƒüš‡’‚ö’…’o’’™’’‚š’…ffg’‚łŸ’’‚š’…’o’’™’’‚š’†’o’Ļ’Ÿ’‚Ļ’‚ń’…ffg’Ÿ’’‚š’…’o’’Ÿ’’‚š’…’o’’Ÿ’’‚š’f‚pü’†Ÿ’’üš’‚ń’…’o’p’Ÿ’š’‚š’†’o’o’Ÿ’’‚š’fƒp’Ļ’‚Ļš’‚š’’o’o÷’’Ļ’’’‚š’ˆ’o’o’p’‚’‚š’D‚Gp‚w’‚𒁠’’‚𒁠’’‚𒁠’’‚𒠁’‚š’‚š’‚š’‚š’‚ščßčŅŽęėļū#'.=KS\bgwˆŽ¬ĶŌŚšö  %-2:>GPUY_hpy…ˆ™Ÿ­½ĆĒĖŃŚåōü36:Egjpv}$)07;@CMY^clry~†Š–™£°¶¼æĆÉĢŅŚįęļõś #)15<AHPV\ehpx|ˆ“—¦®øĄÉŠŌŚßäźīōż   &.4<GPSX\bflqv}ƒ‹—š £§­µŗÄĖŅŁąéļó÷ż ",18BHQUX\`eimqx{†‹—¢©±¹ĄÄĢŠŌ×Ū(CHKLIST.MS)(Options(ScanAPP,AUTOEXEC.BATAgainstAlarmAnti-StealthAnti-VirusBackupBootCHKLISTCheck All FilesChecklist fileChecksumChecksumsChooseCleanCleaning VirusesCommandsContinue:CreateCreating Checksums on FloppiesDefending Against Unknown VirusesDefinedDeleteDeleting CHKLIST filesDetectDisable Alarm SoundErrorExecutableExitFileFilesFloppiesFoundGlossaryHelpInfectorsIntegrityKnownListMS-DOSMSDOSDATAMWAV.INIMicrosoftMoves to theNewOptionsProceduresPromptRelated TopicsRemoving VirusesRepairSaveScanSectorSelect thSet OptionsSetting OptionsSettingsSoundStealthStop: Choose this option to halt the scan.TheThisThis optionThis option does not affect VSafe.To TopicsTrojanUnknownUse this option to take advantage of the verify integrity feature, your best defense against unknown viruses. If Create New ChecksumsVSafeVerifyViewing the Virus ListVirusVirusesWarningWhenWhileWip______________________aboutactivadvantageaffectagainstalertallallowalsoandanyappearareattributesautomaticallybackupbeforeboxbox,buttoncanchangechanged.changescheckchecklistcheckschoosclustercodecommandconfigurcontaincontinuecreatedatabasedatedefaultdefendefineddetaileddetectdialogdirectorydisdiscoverdisplaysdoesdouble-clickdriveduringeachenableeradicateexample,executableexecutedextensionfeaturefilefile'sfile.filesfiles.findfloppyfollowingforfromgrouphashavehowever,hundredsincludindicateinfectinfectedinformationintegrityitsknownlistloadedmakememorymenu)menu.messagemodifimonitorsnamenormallynotnumberon,onlyoptionoriginalotheroverwritesperformprogramprotectproviderecognizeremovesavescanscans.sectorselectsettingsize,specifispreadstatisticsstorestrainssubsequentsystemtechniquethatthethemthenthesethistimetypeunknownuseusefulusingvariaverificationverifyvirusvirusesviruses,viruses.warningwhenwheneverwillwithyouyour6-lLYh+¤IMicrosoft Anti-Virus w$x4³-æ9¶9’’’’ ’’’’( (!G’’KIndex@!(@26€€žI˜˜€†€€€‚’ [J߬@ßQt€€žIX¬w~„$€ƒį‰ƒ‚‚ƒį‰ƒ‚‚ƒį‰ƒ‚‚ƒį)‰ƒ‚’&Reference to menu äs.bStep-by-step instructions.Keyboard GuideTable of ±key combinations.HDefinitions of terms.#ß#!/&) #)$€€žI˜˜€‚’&. ).%€€žIˆ¬€‚’oMenukJ.kG`€€žIRˆģNဉ‚ቂቂቂቂ’6"3$™R? 'k'$€€žIPģN€‚’3'3%€€žIˆ¬€‚’Option MenuE(3E26€€žIRˆģNဉ‚ቂ’tmyon >'E'$€€žIPģN€‚’( '(#€€žI¬€‚’¤*(*%€€žIˆ¬€‚’f2*2+(€€žIRˆģNဉ‚’b# 2#!kb) #)$€€†˜˜€‚’bq[)qW€€€žIZ”¬ČJ‚H€†€ƒį‰‚†€ƒį‰‚†€ƒį‰‚’ h – .*q*' €€žIX¬Ų:‚X€‚’( *(#€€žI¬€‚’¤*(*%€€žIˆ¬€‚’f2 *2+(€€žIRˆģNဉ‚’&'2'!ĄKeys/'/$€€žI˜˜€‚’[KeysP/P9D€€žIZˆ¬!ć~„é€!€ƒ€ƒ€€‚’Keys(s)Function”P”Nn€€žIZ¬!ć~„é€!€ƒƒ‚ƒƒ‚ƒƒ‚ƒƒ‚ƒ€ƒ€‚ƒƒ‚ƒƒ‚ƒƒ‚ƒƒ‚’Tab]next åĪ, MĶtext ĶŁĶor 3of kĪs.Shift+Tab]previous MĶtext ĶŁĶåĪ, or 3of kĪs.Arrow keysMoves Źin an Ŗe 3of js or åĪs.Spacebar s ŸŖe åĻor turns Ŗe ŁĖon or off.F1JF10Activates Ÿmenu bar.Alt+F4Closes Ÿt.Enter s ŸŖe åĪ.EscCancels a å»closes Ÿżbox.*”*$€€žI¬€‚‚’¤***%€€žIˆ¬€‚’f2 *2+(€€žIRˆģNဉ‚’&#2#!…6-#<$€€žI˜˜€‚’7TXXXŠ ­Ź<Ź=L€€žI¬€į(‰ą/‰į‰į'‰‚‚‚’7plays Ÿ™F Ćif it (s a Ėa Kŗ. (Detect, unlike ", cÅ}Ÿŗ.) By ņ, 7¹warns Ķ©%7Ņd ĖŸ•: Ā. ¤*Ź*%€€žIˆ¬€‚’f2&*2+(€€žIRˆģNဉ‚’.#2#!×"-#-$€€žI˜˜€‚’#TĻ*-Ļ5<€€žI¬€ą/‰į‰į'‰‚’!#to }K¼ Å1Ļ˜. If Ÿ•N kis gplays a •: if it (s a Ņd #(Since %generally don't Ņ, Zcation could ?@ion by an ­ŗ.).Ļ.+(€€žIZˆ¤±S~‚±€‚’( .(#€€žI¬€‚’¤*(*%€€žIˆ¬€‚’f8*8+(€€žIRˆģNဉ‚’6ing š'8'!•3$1#'1$€€žI˜˜€‚’3%TÕr1Õ-,€€žI¬€‚‚ą2‰‚‚‚’s “!‹UĀ, š, »Üum. »“Æžse ‘to ōd ±­¼.ˆsave k space, ĶŃdelete ŸŪ%by †ing a  »Žing 3' ¹F , 9Éno longer work.¤*Õ*%€€žIˆ¬€‚’f>G*>26€€žIRˆģNį €‰‚ቂ’,.% >%!u™R/%/$€€žI˜˜€‚’™ST¹(/¹%€€žI¬€‚‚‚’ƒåplays a Mof µŸ½zd by . Mshows »^, alias (if ¼), Ŗ, ‹»Ÿeof “nts. ˆget łEon Œc æ Ÿ»_or ‡Ÿ»_»Že Info.¤*¹*%€€žIˆ¬€‚’f>9*>26€€žIRˆģNဉ‚ቂ’$.'>'!ƒ?[/'/$€€žI˜˜€‚’?TŖ/)$€€žI¬€į‰‚’ƒåexits [. If Ķ7†ed ŸmyOn > j, ½×Ķ7made to Ÿt's ęation Į~d. ((%€€žIŒ¬“€‚’( ((#€€žI¬€‚’¤*(*%€€žIˆ¬€‚’f2*2+(€€žIRˆģNဉ‚’v# 2#!żt-#-$€€žI˜˜€‚’uT@=-L$€€ž¹ę–I¬€‚‚’u¶s Ķto ęe 's js:ø¾Løi¤€€žIX¬aƒ£|‚aဉƒį#‰‚į‰ƒį$‰‚į ‰ƒį%‰‚į!‰ƒį&‰‚į"‰ƒ‚’•Ne”Detect+_+on D8¢e 2d B+GAøG&€€žI¬€‚‚‚‚’€se ˆs Į’d in ŸY# ¤*G*%€€žIˆ¬€‚’f8*8+(€€žIRˆģNဉ‚’>ing *8*!°myon >4'*4$€€žI˜˜€‚’myon ?Tö‹4ö14€€žI¬€į‰‚‚‚‚‚‚‚‚‚’…~s Ļˆs to ŸYÅĶquit.Yis ~d in Ÿ’čs ŸMWAV.EXE unlessĶ7Œed an W“ble in Ļ #For if Ļ €€žI¬€‚ą/‰ą2‰‚‚‚€‚’ŻĻ˜'s S/½æ€s Ÿ†ed  (s), |s ½K¼, »plays a summary report. If Ÿ¹F is gžn plays a ĆżĖ©it s an 5Ō¤f<Ó<+(€€žIRˆģNį&€‰‚’¢e 2d Cj#<#!–)#)$€€žI˜˜€‚’–—h)—38€€žI¬€į‰‚‚‚‚‚‚‚€‚’ˆexamine a Mof µŸ½zd by , Že ™R 1ŸoW Ls »by Imost common ^, ĖKaliases indented under Ÿ^. Mplays Ÿ»«(Trojan, , or @or) along ĖŸsize of Ÿ»ć»Ÿeof K”, or “nts, of Ÿŗ. ˆfind E©a ŗ, scroll through ŸMor «Ÿfirst few characters of I^.For łEon Œc æ Ÿ»in ŸMor ‡it »Že Info.¤f2—2+(€€žIRˆģNဉ‚’$#!2#!ö.)$#)$€€žI˜˜€‚’.lc)xId€€žIŗć—¬€ą2‰‚‚į‰į#‰į‰į‰‚‚‚€‚’»“é»īs ·”to identify ;of Œc ¼. ˆprotect ±new ½Įcin Ÿī, [xs a ¹G looks /×in 'ˆmake Æof §vion, Łto see Ÿ+_, e”6, »•N js Įon. If žy Ą, ²s Ķ©Ņd % 6 ƒ If “is N, it ²s ĶĒĶattempt to run a Ņd "¦f2#x2+(€€žIRˆģNį €‰‚’,%2%!»•N+%+$€€žI˜˜€‚’•N9+9E\€€žI¬€ą-‰ą+‰‚‚į‰į'‰‚‚‚‚‚€‚’…s »“to ³Ķto ×in  $, based on ‘’d in Ś ' Changes in %Ń?Ÿpresence of a ŗ. Ÿ•Ois on »Ķsa 6 €, plays a •: Ć©it (s an 5Õ Ÿ•Ois g“plays a ĆÅĶtry to run an 5Ō¦f2&92+(€€žIRˆģNဉ‚’..2.! Creating _-.-$€€žI˜˜€‚’+__²-_7@€€žI¬€ą2‰ą1‰‚‚‚‚‚€‚’Use §kto take ­of Ÿ¹G, Ļbest ōse ±­¼. If +_is gģs a Ū/’it ƒ ƒčs ‘©in Ÿž, ?r>26€€žIRˆģNဉ‚ቂ’4.#>#!^ "8)#)$€€žI˜˜€‚’8Ō')ą+(€€žI¬€‚‚‚‚‚€‚’ris kif Ķdo cwant to hear a sгgound played Åa ĆY¾s or Åa »is located or cleaned. sound is ±/getting Ļattention, but crequired ÅĢ're ³.†¦f2 ą2+(€€žIRˆģNဉ‚’&% 2%!»!#++%+$€€žI˜˜€‚’+9Ü+9+(€€žI¬€‚‚‚‚‚€‚’Ÿ§kis gPs a Ēof ½CĖa »Écleaning Ÿm#Ēis renamed Ėa VIR . Using §kŃbe dangerous, 9because it means a ŗ-infected remains on Ļk. You should iƧkif, /ŸCis Ļicopy of a u»Ķwould rather Æan Cuthan c7it at “.¦f2 92+(€€žIRˆģNဉ‚’&'2'!)"$e”6-'-$€€žI˜˜€‚’e”6£ņ-£;H€€žI¬€į'‰į(‰į‰‚‚‚€‚’Ÿ§kis gplays Ÿ•: »™F Ās  6 ƒ If e”7is off, cy½Ās  Ÿ7€.¦f2£2+(€€žIRˆģNဉ‚’v# 2#!Ą#%)#)$€€žI˜˜€‚’BF)BE\€€žI¬€ą2‰ą1‰‚‚į‰į‰‚‚‚‚‚€‚’'s ¹G vs Ļ™±­¼. }æ9Ńevade §vion by ³a special ›which ¶s ”to A%Źout ¾ing to Ó .ˆdetect ­}æŽe Ÿk»Qsure Ÿ•Oj is ¹†ed. Éžn Æa low-level ·› 6 €s É)»³Ķto |-infected &†¦f2B2+(€€žIRˆģNဉ‚’v#2#!M$&)#)$€€žI˜˜€‚’Ļ)Ļ)$€€žI¬€‚‚‚€‚’Ÿ§kis †ed, µ%ĮŲed /¼. Ÿturned off, i%ĮŲed. =%end ĖŸs EXE, COM, OV*, SYS, BIN, CMD, PGM, PRG, DRV, DLL, 386, FON, ICO, or PIF. ¦f2Ļ2+(€€žIRˆģNဉ‚’v+2+!Š%'¢e 2d B1+1$€€žI˜˜€‚’¢e 2d Bė„1ś/0€€žI¬€į(‰‚‚‚€‚’…Zes Ÿ™F Ɲplays Åit śs a ŗ. Normally, §żĖxs ĶĖa 3Ī. If Ÿ¢e 2d %kis g9§Ļ×to ¢e. If ͇¢e, qįof ŸCso every trace of it is d.¦fXXX' (¶&4ś4+(€€žIRˆģNဉ‚’7ä)4)!-&(•;żŹ-)-$€€žI˜˜€‚’•;œ¢’-¢/0€€žI¬€ą+‰ą1‰‚’ƒżĖ²s Ķa ™or 5Ņd, based on ŸE’d in Ś ' Since ×in ™»%Ń?an ­ŗ, ŸżĖxs Ÿ-js:̰¢ĢJf€€žIZ”¬ČJ‚H€ƒ€‚€ƒ€€€‚€ƒ€‚€ƒ€‚’Update: !§kif žre is a valid reason /ŸŅ. žn updates ŪĖŸ!new ‘to prevent future ³Xs.2 or j: If 3¾s, it means Ÿ!size or Üum 5been altered. !§kif Ļ™¾s to be C»ĶŠ't account /ŸÓto Ÿ# If k¾s, iŸ!ńor ©5been Zed »it is cB. !§kto restore Ÿ!ń»©to Imˆs.Stop: !§kto halt Ÿ€.( !§kto ėŸĖno Ö.ilĢi14€€žI¬€‚į‰į#‰‚‚’NOTE: ƒżĖi¾s if Ÿ•N »e”6 js Įon./i/!F')™GDialog Box-/-$€€žI˜˜€‚’™Gœky-k)$€€žI¬€ą/‰‚’If ĶĮ³Ÿ7»a Kŗ is found in one of Ļ$, Ķ7Ÿ-js:YŽkYPr€€žIZ”¬ČJ‚H€ƒ€‚€ƒ€‚€ƒ€€€į&‰‚€ƒ€‚’": !§kto }Ÿ»1Ÿ"Stop: !§kto halt Ÿ€.2 or ¢e: 3kis Ÿņ. !3to sa Udeletion of Ÿ# ¢e k¾s if Ÿ¢e Deleted B ‰is on. ŸĶwipe a file, qµof Iąs »s every trace of ŸC"Continue: !§kto ėŸĖno Ö.&Y&#€€žI¬€‚’+&+!Ż(*Iof Terms) +)$€€žI˜˜€‚’H?)?38€€žIX°i›~‚ią*€‰€‚’…ŗ,?,)$€€žIPi›~‚i€‚’ļ¤,ļ–ž€€žIX°i›~‚ią+€‰€‚‚ą,‰€‚‚ą-‰€‚‚ą.‰€‚‚ą/‰€‚‚ą0‰€‚‚ą1‰€‚‚ą2‰€‚‚ą3‰€‚‚ą4‰€‚’=A@orsQŗhorseŗ•F˜’/ļ/,*€€žIX°i›~„iQ€‚’'/'!:)+q˜,',#€€žIŒ€‚’q˜Ū ,ē#€€žI·/ć//¬€‚’A »copies Helf to Ÿboot …of a computer's hard or +k. …½replace Ÿk's mboot …Ėžir own ćso Ÿ»is always Ointo Sɼthing else. Once in R, Ÿ»Ńto oks.& ē&!į*,.MS2&2#€€žIŒ€‚’Checklist @‰2‰#€€žI¬€‚’Ū’s ŸÜum, UĀ, ‹»Ÿń»©of »™'If Ÿ•Okis g»“ÆŸŪto watch /×in &#‰#!ć+-( #(#€€žIŒ€‚’˜Ė(˜#€€žI¬€‚’A numerical value derived 1Ÿindividual bytes of Ÿ# Along ĖŸ!š, ‹»UĀ, ŸÜum is ’d in Ū%ģd by .%˜%!ė,.=@*%*#€€žIŒ€‚’=@œ¤*œ#€€žI¬€‚’For Ÿpurposes of »śion, ½ĖŸ-s: EXE, COM, OV*, SYS, BIN, CMD, PGM, PRG, DRV, DLL, 386, FON, ICO, »PIF.'œ'!³-/AMö*'*#€€žIŒ€‚’ALb}*b#€€žI¬€‚’A@ors add žir »ćto 'Once Ÿ»is , it Žs to o&'b'!ć.0Q™ö*'*#€€žIŒ€‚’Q˜’š*’#€€žI¬€‚’»“é»īs ·”to {;of Œc ¼. A "known ŗ" is a »¾s in §ī. ˆsee a Mof ŸK懙S1ŸoV+’+!č/1Horse 0-+-#€€žIŒ€‚’Horse’-#€€žI¬€‚’A «of »is guised as a legitimate t. horses Įmuch more apt to destroy %or damage ks than o¼.''!ź02™ö*'*#€€žIŒ€‚’˜™*™#€€žI¬€‚’»“é»īs ·”to {;of Œc ¼. An "unknown ŗ" is a »cæin §ī. ˆsee a Mof ŸK懙S1ŸoV'™'!÷13•O01'1#€€žIŒ€‚’•OFeatureŸó1Ÿ#€€žI¬€‚’You Ńęe »“to watch /×in %»issue a •;if žy ¼. Since ™»%adon't Ņ, a •;may ?žre is an @ion.% Ÿ4!Ż24™0XXXŲ7 8Ų7(4(#€€žIŒ€‚’˜Ś(#€€žI¬€‚’A udesigned to replicate »on Iown. [zs ;of Œc ½»Ń¹wĻ™±­»•³I•O.% %!ą3’’“0(%(#€€žIŒ€‚’’“Š(“#€€¬€‚’“is a R-resident utility ]Ļ™/K½Ēa uis . Additionally, “]Ļ™/suspicious Ŗities may ?¼.!“!!’’’’’’’’įŲ S‚ķ­2 ž –“C‚—H]gÅ €"©#i%¶&@(m+³-/Ź0«1Ž2y3,45÷5į6Ų7µ8•9QHHELV’’#­ ® ķÆ ³-ķäS‚ķ­­­2 2 2 ž ž ‚–––“““CC‚——HHH]ggÅ Å €"©#©#i%¶&@(m+³-³-/Ź0«1Ž2y3,4÷55į6Ų7µ8/&;)i24|TOPIC|TOMA’’6Œ6’’’’Alarm sound: disablingˆAnti-Stealth option˜Backing up infected filesBoot Sector VirusøCheck all files option Checksum definedĄChecksums: creatingxCHKLIST files: deleting(CHKLIST.MS file|CHKLIST.MS file described¼Clean commandCommandsCreate Backup optionŒCreate Checksums on Floppies option€Create New Checksums optiontDefending against unknown viruseshDelete CHKLIST files command$Detect command Disable Alarm sound option„Executable file definedÄExit command8File Infectors definedČFiles: detecting virusesFiles: removing viruses Glossary°KeysKnown Virus definedĢKnown viruses0MWAV.INI and settingsHOptionsDProceduresPrompt While Detect option”Quitting<Removing virusesXSave Settings on Exit commandPSaving your settingsTSet Options@Stealth virusœTerms“Trojan Horse definedŌUnknown virusesdVerify Integrity definedŲVerify Integrity error foundØVerify Integrity optionlVirus definedÜVirus found warning¬Virus list`Virus List command,Viruses: cleaningViruses: detectingViruses: removing\VSafe optionspVSafe program definedąWipe Deleted Files option¤s as a directory.Output file %s already exists as read only.Path for file %s exceeds limit of 79 characters.Cannot open file %s.Cannot find file %s.Not enough memory to build Help file.File environment error.Build tag %s not defined in [BUILDTAGS] section of project file.Context string(s) in [MAP] section not defined in any topic.Build expression missing from project file.File %s cannot be created, due to previous error(s).Unrecognized table formatting in topic %d of file %s.Jump '%s' unresolved in topic %d of file %s.Hotspot text cannot spread over paragraphs.Maximum number of tab stops reached in topic %d of file %s.File %s not/&;)Lzü Ę  ’’%Õ%’’’’ Help IndexSCommands‚ProceduresķAnti-Virus Keys­Detect2 Clean Delete CHKLIST filesž Virus ListExit Microsoft Anti-Virus–Set Options“Save Settings on ExitCRemoving Viruses‚Viewing the Virus List—Defending Against Unknown VirusesVerify IntegrityHCreating New Checksums]Create Checksums on FloppiesgDisable Alarm SoundÅ Create Backup€"Prompt While Detect©#Anti-Stealthi%Check All Files¶&Wipe Deleted Files@(Verify Error dialog boxm+Virus Found Dialog Box³-Glossary of Terms/Boot Sector VirusŹ0CHKLIST.MS«1ChecksumŽ2Executable Filey3File Infectors defined,4Known Virus defined5Trojan Horse Defined÷5Unknown Virus definedį6Verify Integrity DefinedŲ7Virus Definedµ8VSafe Definedu you you you you have specified an MSDOSDATA variable in your AUTOEXEC.BAT file. For example, if your AUTOEXEC.BAT file includes the following commanample, if your AUTOEXEC.BAT file includes the following commane unknown using verification verify virus viruses viruses, viruses. warning when with you your rive during each executable extension feature file file's file. files files. find following for from have however, hundreds includ indicate infected infect information integrity known list memory menu) modifi name normally not only option original overwrites program protect provide recognize remove save scan scans. sector select setting size, specifi spread statistics store subsequent system that the them this timd, the MWAV.INI you're your your your your your your your your your your your your your your your your your your your your with with with with with with with with with with with with with within without work. would y you you you you you you you you you you you you you you you you you you you you you you you you have specified an MSDOSDATA variable in your AUTOEXEC.BAT file. For example, if your AUTOEXEC.BAT file includes the following commanample, if your AUTOEXEC.BAT file includes the following com