The Detective v3.1 Soft-Tech REGISTRATION $ 25.00 UTIL MAR90 DETECTIVE SOFT-TECH VIRUS TROJAN PROTECTION FILES: detct31a.sdn detct31b.sdn detct31c.sdn Complete File Tracking System for the IBM Personal Computers and Other Compatibles THE DETECTIVE is a program which allows a user to verify the integrity of files on his or her PC. THE DETECTIVE works on systems which are stand along, file servers for a network, or nodes within a network. Changes made to critical files (whether they are unintentional or intentional) can be detected quickly and accurately. This all in one program not only can detect viral infections, but also can allow the user to quickly review critical files on the system for any updating which may have occurred since the last review. As the PC world grows in size, connectivity and multi-user environments, this becomes more and more important. THE DETECTIVE is a must for Network Administrators who need a quick efficient way of verifying the integrity of their system as the program allows the user to specify exactly what drives, directories, and files that must be reviewed. THE DETECTIVE is available in two formats. The first is as share-ware from many public bulletin board systems. The second is through registration by sending $25.00 for a diskette containing the programs (see Appendix D for order form). Registered versions of THE DETECTIVE are available on 3 1/2" and 5 1/4" diskettes. File Tracking today is more important than ever. Take the case of a new or inexperienced PC user inadvertently deleting or moving a critical file. Or the case of a user getting on the network and changing a batch file needed by other users. Even normal updates to existing files can be important to detect. By invoking THE DETECTIVE on a regular basis, the operator can request that all changes made to any (or those designated) files, in any or all paths which have been changed or updated since the last time THE DETECTIVE ran, be highlighted in a concise report file. This file can be saved for future reference as well as be printed immediately. Another critical use of THE DETECTIVE is the ability to know what software is being used on a specific computer. If you are using THE DETECTIVE in a business environment and have expensive word processors, spreadsheets, or data base managers, and you find that the files created by these products are not changing, you can pretty well assume that the products are not being used very often and may wish to reexamine the need for the software product on a specific machine. THE DETECTIVE essentially takes a snapshot of all specified files in the specified paths of the specified drives. At a later point in time you run THE DETECTIVE again telling it to check for all differences since the last time it was run. A report will then be created detailing all changes that had occurred. These changes are composed of added and deleted directories, and added, deleted, or changed files. Doing this on a weekly basis (for example) would give you a history of all changes made. You also have the ability to run an unlimited number of scenarios since each scenario you define is stored in a user defined control file. All files that are created using this 'control file' retain the control file name but have a different file extension. With this control, you can let specific users track their own files in a number of different ways while the system administrator tracks system wide files. These are just two of many possible variations. (SDA format Copyright 1990 SDN Project for SDNet/Works! (sm))