Skip to Content

CyberSoft.com | Makers of Linux and UNIX anti-virus Computer Security Products

C / C++

  • makevdl.c
    Demonstrates how one might write a program that creates VDL models from generic scan codes. This program has been compiled and tested on Microsoft Windows NT 4.0.
  • makevdl2.c
    ANSI C version of the previous example.

Python Scripts

  • vfproxy.py
    This Python program demonstrates how one might write a program that uses VFind Turbo to scan web site accesses.

Bourne Shell Scripts

  • vfind_solaris.sh
    Runs VFind alone on a Sun Solaris 2.X system. Output is mailed to root.
  • vstkuad_solaris.sh
    Runs VFind with UAD on a Sun Solaris 2.X system. Output is mailed to root.
  • vstk_solaris.sh
    Runs VFind with CIT, UAD, Loop back Head and Loop back Tail on a Sun Solaris 2.X system. This is the recommended script for full production runs. Output is mailed to root.
  • vtape.sh
    Uses VSTK to scan a multi-file tape for hostile content. For example: if you had a tape that contained more than one tar file, this script would continue scanning until it reached the end of information marker rather than the end of file marker at the end of each tar file.
  • boot.sh
    Uses Bhead and VFind to scan the first few bytes of a disk.
  • cit.sh
    Runs CIT by itself.
  • thd.sh
    Runs THD by itself.
  • uad_vfind.sh
    Runs UAD and VFind (using SmartScan).
  • uad_vfind_ld.sh
    Same as above except it also uses the loop back tools.
  • vstk.sh
    Runs CIT, UAD, and VFind.
  • vstk_lb.sh
    Runs CIT, UAD, VFind, and the loopback tools.
  • wget.sh
    Use wget, UAD, and vfind to download, scan, and save only infected files.

C Shell Scripts

  • runtest.csh
    Determines your VTN (VFind Throughputs Number) and can be used to speed up VFind on your system. WARNING: This script has only been tested on Sun Microsystems Sparc Solaris 2.6. Read the program comments prior to operation.
  • uad.csh
    Makes it easier for users to run UAD for identifying and decomposing complex files.
  • vfchmod.csh
    Isolate infected files by setting their permission bits to zero. WARNING: If the script changes permissions on system critical files, the system can become unstable.
  • vfmv.csh
    Interactively move infected files to a quarantine directory. WARNING: moving system critical files can cause the system to become unstable.
  • vfrm.csh
    Interactively delete infected files. WARNING: Deletion of system critical files can cause the system to become unstable.
  • vfstab.csh
    This script will scan the file system by examining the contents of the /etc/exports table. We are not sure why one would want to do this, but it is a great example of how easily the VSTK can be customized for your specific needs.

Want More Info?

Need more information about how we can help protect your servers and safeguard your desktops no matter what OS they run?

If you see this field, please leave it blank.