I N S P E C T O R
against the database. If it detects new or modified files with a structure that
is identified as suspicious or unknown, the program tries to cure them (to
restore the originals). For details about handling new or modified files see
subchapter 13.2.3.
If Inspector fails to disinfect infected files, they are transferred to the Dae-
mon program.
13.2. Running
Inspector
13.2.1. The Program Command Line
Inspector must be started from the command line. The general format of
the Inspector command line is:
./kavinspector [switch1] […] [switchN] [path1] […] [pathN]
where
:
[switchN]
is the optional command line switch of Inspector;
[pathN]
is the location to be checked.
For a complete list of available command line switches refer to
subchapter 16.8 Appendix B.
Before starting your Inspector copy for the first time, it is advisable that you
load the daemon process and specify the switch
–dc
in the Inspector com-
mand line. This is necessary because when started for the first time your
Inspector copy collects data about the location to be checked that is de-
fined by the command line parameter
[pathN]
and saves this data to the
database. The database is placed in the following four files:
database_name.atom.bin
,
database_name.htg
,
database_name.htx
and
database_name.node.bin
. The data includes information about the file’s
weak points, etc. The data collected the first time is regarded as a master
220