8AleX8
Advanced Member | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору Klirik Цитата: А подскажите кто-нибудь с какими ключами drweb подцепить к flashget-ту, чтоб он файл скачанный проверял и закрывался? | Этого можно добитьця толко с помощью консольного Drwebwcl.exe /ar /ha /SO /PR /tb- /tm- /WA Цитата: /WA - waits after scan is finished if viruses or suspicious objects were found (DrWebWCL and DrWeb386 only); | Цитата: COMMAND LINE OPTIONS FOR DRWEB32 FAMILY PROGRAM To start Doctor Web, use the following command line: <program> [disk:][path] [options] where program - executable module name (DrWeb32W for the graphical Windows-version, DrWebWCL for the command line Windows-version, or DrWeb386 for DOS/386-version); disk: - logical drive of a hard disk, floppy drive, network drive, CD-ROM, or * (row of logical drives - see the "Default scan drives" settings of DrWeb32W; or all local logical drives for DrWeb386); path - location of files to be checked; it may contain path to the directory on local/network drive (or network directory) and, optionally, filename (or filename mask). The command line may contain several [disk:][path] parameters delimited with blanks. In this case, the program will sequentially scan the specified objects. When scan is finished, DrWebWCL and DrWeb386 terminate. DrWeb32W (if started without /QU) opens its main window where the user can specify new objects to scan, view the scan results, customize the settings, update or terminate the program. If started without the [disk:][path] parameter, DrWeb32W immediately opens its main window. Command line options (delimited with blanks) /@[+]<file> - check objects listed in <file>. Each object must be identified on a separate line containing a full pathname (to check file) or the "?boot" keyword (to check boot sectors). The list file can be created with any text editor. When scan is completed, Doctor Web deletes the list file, unless "+" is included in the option. A list file can also be generated by ADinf. In this case, the integrity checker will include in the file modified objects only. Then, this list can be used by Doctor Web to limit the scan scope, which can substantially reduce overall scan time. If ADinf32 is configured to launch Doctor Web, the integrity checker inserts the /@ option in the command line and starts the scanner automatically (see ADinf32 Manual for details); /AL - scans all files on a given drive or directory; /AR[N] - scans all files inside archives created by ARJ, PKZIP, RAR, without curing. The "N" option suppresses the name of an archive utility after the name of the archived file; /CU[RDM][P] - cures infected files and disk system areas. Use the optional parameters to specify how infected filed should be treated: R - rename (by default, the extension's first character is changed to "#"), D - delete, M - move (by default, to the INFECTED.!!! directory); P - prompt before action; /SP[RDM][P] - specifies how to treat suspicious files: R - rename, D - delete, M - move; P - prompt before action; /IC[RDM][P] - specifies how to treat incurable files: R - rename, D - delete, M - move; P - prompt before action; /DA - runs Dr.Web only once in a day. For this option, the configuration file, (INI-file) containing the date of the next scanning session must be present. This option is useful for starting DrWeb386 automatically from the AUTOEXEC.BAT file only once in a day on booting the computer; /EX - scans files that have extensions associated with executable modules and MS Office documents (COM, EXE, SYS, BAT, CMD, DRV, BIN, DLL, OV?, BOO, PRG, VXD, 386, SCR, FON, DO?, XL?, WIZ, RTF, CL*, HT*, VBS, JS*, INF, A??, ZIP, R??, PP?, HLP, OBJ, LIB, MD?, INI, MBR, IMG, CSC, CPL, MBP); /FM - scans files (regardless of the extension) whose internal format is that of an executable module or MS Office document with macros (such as MS Word or Excel files); /GO - goes without asking you what to do next (in such situations as not enough disk space for unpack operation, invalid parameters in the command line, DrWeb infected by unknown virus, etc.). This option might be useful, say, for automatic check of incoming e-mail; /HA - enables the heuristic analyzer that can detect unknown viruses; /INI:<path> - uses an alternative configuration file (INI-file); /NI - ignores the settings in the configuration file (DRWEB32.INI); /LNG[:<path>] - uses an alternative language file (DWL-file), or built-in (English) language; /NS - runs non-stop (no interruption by pressing ESC). In this version, the /NS option is not supported by DrWeb32W; /OK - writes a full list of scanned objects and displays "OK" next to clean objects; /PF - displays the "Scan another diskette?" prompt after checking a floppy disk; /PR - prompts to confirm an action on an infected or suspicious file; /QU - quits the program when scan is finished (DrWeb32W only); /RP[+]<file> - writes the scan results to a file (by default, <program>.LOG), <file> is the full pathname of a report file. If the plus sign is included, the recent report will be appended to the report file; otherwise the report file will be overwritten; /NR - does not create report file; /SD - scans subdirectories; /SO - plays sounds; /SS - saves current settings when the program terminates; /TB - scans boot sectors and master boot record; /TM - scans memory for viruses (including Windows system memory for DrWeb32W and DrWebWCL); /UP[N] - checks executable files packed by ASPACK, COMPACK, DIET, EXEPACK, LZEXE, OPTLINK, PECOMPACT, PEPACK, PGMPAK, PKLITE, WWPACK, WWPACK32, UCEXE, UPX; files converted by BJFNT, COM2EXE, CONVERT, CRYPTCOM, CRYPTEXE, PECRYPT, PESHIELD, PROTECT, TINYPROG; and files immunized by CPAV, F-XLOCK, PGPROT, VACCINE. N - suppresses the compression utility name after the name of the archived file; /WA - waits after scan is finished if viruses or suspicious objects were found (DrWebWCL and DrWeb386 only); /? - displays help. If INI-file is not present or not used, the default options are: /AR /FM /HA /PR /SD /TB /TM /UP. Some options can be postfixed with the "-" character. This "negation" form disables the respective function or mode. It might be useful if the mode is enabled by default or via settings in the INI-file. The negation form can be applied to the following command-line options: /AR /CU /FN /HA /IC /OK /PF /PR /SD /SO /SP /TB /TM /UP /WA Note that the negation form of /CU, /IC and /SP cancels all actions enabled by these options. It means that information about infected and suspicious objects will appear in the report file only. /AL, /EX and /FM cannot be used in the negation form. However, any of these options disables the other two. |
| Всего записей: 1813 | Зарегистр. 11-12-2001 | Отправлено: 19:40 16-09-2002 | Исправлено: 8AleX8, 19:58 16-09-2002 |
|