- Product Watch
- Channel Surfing
- International Distributors Conference
The following 51 viruses are now identified, but cannot be removed as they overwrite or corrupt infected files.
Country.611 (damages files)
Fack.180 (damages files)
HLLO (3836, 4019, 7680, 8096 and 21603)
IOE (155, 239.A and 239.B)
Leprosy (371, 622, 625.A, 625.B and 2013)
Markiz.1972 (damages files)
SillyC.201 (damages files)
Trivial (28.D, 42.L, 45.J, 45.K, 53.B, 53.C, 53.D, 53.E, 67, 72, 80, 87, 111, 112, 117.B 284 and 963)
VCL (O.372, O.454, O.464, O.466.C, O.538, O.612, O.584 and O.858)
Command Software Systems applauds the many software resellers and systems integrators who provide educational and technical services to information professionals like you. F-PROT Professional products continue to surpass sales records and garner ever more impressive technical reviews and awards. Resellers and integrators can carry this message.
Do you know a software reseller or systems integrator who has impressed you with his or her technical knowledge, "service attitude" and interpersonal skills? Command Software Systems is enrolling highly qualified software resellers and integrators into its reseller program. Because quality, not quantity, is our aim, your recommendation is important to us. Please recommend to us, or refer your candidates to the Reseller Program at (800) 423-9147.
November 25 - 27
The annual Command Software International Distributor�s Conference is being held November 25-27, 1996 near the Command Software headquarters in Jupiter, FL.
Attendees can look forward to three days of product training, demonstrations, marketing strategy sessions, seminars, and of course, fun and entertainment. Visitors from last year and their families will remember the exciting evening entertainment- this year�s festivities promise to be even more memorable.
Interested distributors can contact: Lance McKay or Bob Pedraza
at (561) 575-3200.
Special Feature for Businesses:
Managing and Planning to Avoid Virus Attacks
Planning to avoid a virus attack is more complicated than simply purchasing and installing a basic anti-virus software package. Aside from vast differences in software solutions, the policies and procedures your company follows have much to do with the success or failure of your chosen anti-virus software product. Read through the policy, procedure and product checklists below to make sure that your company is well-protected from the virus threat. Following each section is a brief list of procedures and policies "Command Recommends" to keep your company healthy.
Policies and Procedures:
- Does your company have an anti-virus policy?
- Is your policy designed to work with the specific software solution you are implementing?
- Does your policy provide exact instructions for what to do if a user�s system reports a virus?
- Are your users afraid of reporting virus incidents to the virus response team?
- Do you have a virus response team? Does your policy provide clear instructions to this team for what to do if an emergency hits?
- Does your policy take into account the common sources of virus infection, including:
- possibility of infection via disks brought from home by employees
- possibility of infection by employees downloading files from unknown sources, including the Internet or BBSs
- possibility of files transmitted or received through e-mail being infected
- possibility of document and spreadsheet infections by Microsoft Word or Excel macro viruses
- possibility of infection by remote or dial-up system users
- Does your policy provide for education about new viruses?
When the Word macro viruses first hit, many corporations were unaware of what to do to protect their systems from this new threat until it was too late!
- Does your anti-virus software have the resources it needs to run properly on each user�s workstation (memory, processor power)?
If so, what is the system impact of the solution? If not, are PCs fully protected at all times anyhow?
Do you update and maintain your software regularly?
Block holes and potential threats before they open your system to virus infections. Design your company policy with clear anti-virus goals in mind. Include a commitment to continuing virus education. Use our FTP site or BBS to keep your version of F-PROT Professional current. Subscribe to the F-PROT mailing lists to know when a new version or new update is available for downloading. Read the list of F-PROT Professional system requirements carefully so your system is able to run the software properly.
- Centralization - If you are responsible for a network (or several), can the product successfully centralize detection and alerting functions, or does each network solution run separately?
- Remote Users - You know that a common infection route is from home or remote users. Does your product�s license cover home PCs, or is coverage available for an additional charge?
- Automation - You know that a strategy which relies on user action to work is unlikely to succeed, no matter how well-intentioned the users are. How automated is your product?
- Support - When a virus is spreading rapidly across our LAN, you�ll need help fast! Does your software vendor offer extensive and rapid technical support?
- High-Security needs - For high-security environments, integrity checkers and hardware solutions are also worth considering.
- Tried and True - You know that it is difficult to test anti-virus software on your own. The NCSA (National Computer Security Association) and Virus Bulletin are two good sources of anti-virus product information.
- Does your anti-virus product have an impressive detection rate for viruses spreading "in the wild" as well as for viruses contained "in the zoo"?
Check the NCSA and Virus Bulletin web sites for certification schemes and product comparisons: http://www.ncsa.com or www.virusbtn.com. F-PROT Professional is available in DOS/Windows, Windows 95, Windows NT, NetWare and OS/2 formats. (See feature article, page 1.)
Next Page (5 of 5) | Exit Newsletter