D E F I N I N G S E T T I N G S
55
55
55
55
$"
To copy infected, suspicious and corrupted objects together
with their paths,
type
Yes
in the
CopyWithPaths
lines of the above sections. Otherwise,
type
No
.
#"
It’s recommended to enable the above option since you may have
files with similar names on your computer.
$"
To change extensions of infected, suspicious and corrupted
files,
in the sections listed above:
•
Type
Yes
in the
ChangeExt
lines.
•
Define the target extension for the files in the
NewExtension
line.
For example, you may type
vir
for infected files,
susp
for
suspicious files and
corr
for
corrupted files.
$"
To change the name of the owner of infected, suspicious and
corrupted files that the program failed to desinfect,
define the target name in the
ChownTo
lines of the above sections. If
you do not want to make the changes, type
None
.
$"
To change access attributes of infected, suspicious and
corrupted files that the program failed to desinfect,
define the target attribute mask in the
ChModTo
lines of the above
sections. For example, the value
640
assigns the following attributes to
the file:
Read by owner
,
Write by owner
and
Read by group
. If you do not
want to make the changes, type
No
.
#"
Be careful when handling infected and suspicious objects or their
copies! If some executable file is infected, do not start it.