Перейти к содержимому


Фото
- - - - -

Drweb Commandline Paramaters


  • Please log in to reply
10 ответов в этой теме

#1 lodore

lodore

    Newbie

  • Posters
  • 5 Сообщений:

Отправлено 24 Март 2010 - 13:52

Hello,

where can i find a list of drweb commandline parameters?

ive downloaded drweb-500-wcl but it doesn't seem to contain any documentation.

thanks in advance

#2 userr

userr

    Newbie

  • Members
  • 16 310 Сообщений:

Отправлено 24 Март 2010 - 14:07

lodore
http://ftp.drweb.com/pub/drweb/windows/drw...pace-pro-en.pdf -- complete documentation
See Appendix A.

#3 Borka

Borka

    Забанен за флуд

  • Members
  • 19 512 Сообщений:

Отправлено 24 Март 2010 - 14:15

lodore
http://ftp.drweb.com/pub/drweb/windows/drw...pace-pro-en.pdf -- complete documentation
See Appendix A.

Or run drwebwcl.exe /?
С уважением,
Борис А. Чертенко aka Borka.

#4 Stefan Dashich

Stefan Dashich

    Downshifter

  • Virus Hunters
  • 992 Сообщений:

Отправлено 24 Март 2010 - 14:19

Hello,

where can i find a list of drweb commandline parameters?

ive downloaded drweb-500-wcl but it doesn't seem to contain any documentation.

thanks in advance

There is en-drwcl.txt with command line options.
...COMMAND LINE OPTIONS

To start Dr.Web, use the following command line:

<program> [disk:][path] [options]

where
program - executable module name (DrWebWCL);
disk: - logical drive of a hard disk, floppy drive, network drive, CD-ROM,
or * (all local logical drives);
path - location of files to be checked; it may contain path to the
directory on local/network drive (or network directory) and,
optionally, filename (or filename mask).

The command line may contain several [disk:][path] parameters delimited with
blanks. In this case, the program will sequentially scan the specified objects.

Command line options (delimited with blanks)

/@[+]<file> - check objects listed in <file>.
Each object must be identified on a separate line containing
a full pathname (to check file) or the "?boot" keyword (to check
boot sectors). The list file can be created with any text editor.
When scan is completed, Dr.Web deletes the list file, unless
"+" is included in the option;
/ADW[I|D|M|R] - determine the actions for detected adware: I - ignore;
D - delete, M - move (by default, to the INFECTED.!!! directory),
R - rename (by default, the extension's first character is changed to
"#");
/AL - scan all files on a given drive or directory;
/AR[D|M|R][N] - check all files inside archives (ARJ, CAB, GZIP, LZH, RAR,
TAR, ZIP...). Use the optional parameters to specify how archives with
infected (or suspicious) objects should be treated as a whole:
D - delete, M - move (by default, to the INFECTED.!!! directory),
R - rename (by default, the extension's first character is changed to
"#"); the N option suppresses the archive type after the name of the
archive file;
/CN[D|M|R][N] - determine how containers (HTML, RTF, PowerPoint,..) with
infected (or suspicious) objects should be treated as a whole:
D - delete, M - move (by default, to the INFECTED.!!! directory),
R - rename (by default, the extension's first character is changed to
"#"); the N option suppresses the container type after the name of the
container file;
/CU[D|M|R] - cure infected objects and delete incurable files. Or use the
optional parameters to specify how infected filed should be treated:
D - delete, M - move (by default, to the INFECTED.!!! directory),
R - rename (by default, the extension's first character is changed to
"#");
/DA - run Dr.Web only once in a day. For this option, the configuration file,
(INI-file) containing the date of the next scanning session must be
present;
/DLS[I|D|M|R] - determine the actions for detected dialers: I - ignore;
D - delete, M - move (by default, to the INFECTED.!!! directory),
R - rename (by default, the extension's first character is changed to
"#");
/EX - scan files that have extensions associated with executable modules
and MS Office documents (COM, EXE, SYS, BAT, CMD, DRV, BIN, DLL, OV?,
BOO, PRG, VXD, 386, SCR, FON, DO?, XL?, WIZ, RTF, CL*, HT*, VBS, JS*,
INF, A??, ZIP, R??, PP?, HLP, OBJ, LIB, MD?, INI, MBR, IMG, CSC, CPL,
MBP, SH, SHB, SHS, SHT*,MSG, CHM, XML, PRC, ASP, LSP, MSO, OBD, THE*,
EML, NWS, TBB);
/GO - run without asking you what to do next (in such situations as not
enough disk space for unpack operation, invalid parameters in the
command line, Dr.Web infected by unknown virus, etc.). This option
might be useful, say, for automatic check of incoming e-mail;
/HA - enable the heuristic analyzer that can detect unknown viruses;
/HCK[I|D|M|R] - determine the actions for detected hack tools: I - ignore;
D - delete, M - move (by default, to the INFECTED.!!! directory),
R - rename (by default, the extension's first character is changed to
"#");
/IC[D|M|R] - determine how to treat incurable files: D - delete, M - move
(by default, to the INFECTED.!!! directory), R - rename (by default,
the extension's first character is changed to "#");
/INI:<path> - use an alternative configuration file (INI-file);
/JOK[I|D|M|R] - determine the actions for detected joke programs: I - ignore;
D - delete, M - move (by default, to the INFECTED.!!! directory),
R - rename (by default, the extension's first character is changed to
"#");
/LNG[:<path>] - use an alternative language file (DWL-file), or built-in
(english) language;
/ML[D|M|R][N] - check files of mail format (UUENCODE, XXENCODE, BINHEX,
MIME,...). Use the optional parameters to specify how mail files with
infected (or suspicious) objects should be treated as a whole:
D - delete, M - move (by default, to the INFECTED.!!! directory),
R - rename (by default, the extension's first character is changed to
"#"); the N option suppresses the mail type after the name of the mail
file;
/MW[I|D|M|R] - determine the actions for all types of malware programs (i.e.
adware, dialers, hack tools, jokes, riskware): I - ignore; D - delete,
M - move (by default, to the INFECTED.!!! directory), R - rename (by
default, the extension's first character is changed to "#");
/NI - ignore the settings in the configuration file (DRWEB32.INI);
/NM - skip memory test;
/NS - run non-stop (no interruption by pressing ESC);
/OK - write a full list of scanned objects and display "OK" next to clean
objects;
/PF - display the "Scan another diskette?" prompt after checking a floppy
disk;
/PR - prompt to confirm an action on an infected or suspicious file;
/RP[+]<file> - write the scan results to a file (by default,
<program>.LOG), <file> is the full pathname of a report file. If the
plus sign is included, the recent report will be appended to the
report file; otherwise the report file will be overwritten;
/RSK[I|D|M|R] - determine the actions for detected riskware: I - ignore;
D - delete, M - move (by default, to the INFECTED.!!! directory),
R - rename (by default, the extension's first character is changed to
"#");
/SCP:<n> - specify the priority of the scanning process over other processes
in the system (n - number from 1 to 50; default value is 25);
/SD - scan subdirectories;
/SL - scan symlinks;
/SO - play sounds;
/SP[D|M|R] - determine how to treat suspicious files: D - delete, M - move
(by default, to the INFECTED.!!! directory), R - rename (by default,
the extension's first character is changed to "#");
/SS - save current settings when the program terminates;
/TB - scan boot sectors and master boot record;
/TM - scan memory for viruses (including Windows system memory);
/TS - scan startup files;
/UPN - disable the output of names of file packers used for packing the
scanned executable files to the log file;
/WA - wait after scan is finished if viruses or suspicious objects were found;
/? - display help.

If DBWEB32.INI is not present or not used, the default options are:
/AL /AR /HA /ML /PR /SD /SL /TB /TM /TS

Some options can be postfixed with the "-" character. This "negation" form
disables the respective function or mode. It might be useful if the mode is
enabled by default or via settings in the INI-file.

The negation form can be applied to the following command-line options:
/ADW /AR /CU /DLS /FN /HCK /JOK /HA /IC /ML /MW /OK /PF /PR /RSK /SD /SL /SO
/SP /TB /TM /TS /UP /WA

Note that the negation form of /CU, /IC and /SP cancels all actions enabled
by these options. It means that information about infected and suspicious
objects will appear in the report file only.

/AL, /EX and /FM cannot be used in the negation form. However, any of these
options disables the other two.

"That's thirty minutes away. I'll be there in ten."

#5 lodore

lodore

    Newbie

  • Posters
  • 5 Сообщений:

Отправлено 24 Март 2010 - 14:38

thanks everyone.
for somereason the /full parameter isnt being accepted.

#6 Borka

Borka

    Забанен за флуд

  • Members
  • 19 512 Сообщений:

Отправлено 24 Март 2010 - 14:47

thanks everyone.
for somereason the /full parameter isnt being accepted.

AFAIR this one is for GUI-scanner only.
С уважением,
Борис А. Чертенко aka Borka.

#7 userr

userr

    Newbie

  • Members
  • 16 310 Сообщений:

Отправлено 24 Март 2010 - 14:53

thanks everyone.
for somereason the /full parameter isnt being accepted.

AFAIR this one is for GUI-scanner only.

and help doesnt mention it - it's a bug. :)

#8 lodore

lodore

    Newbie

  • Posters
  • 5 Сообщений:

Отправлено 24 Март 2010 - 22:04

Can you still run drweb 5 gui scanner and update it from a usb stick just like 4.44?

#9 Borka

Borka

    Забанен за флуд

  • Members
  • 19 512 Сообщений:

Отправлено 24 Март 2010 - 22:16

Can you still run drweb 5 gui scanner and update it from a usb stick just like 4.44?

Sure.
С уважением,
Борис А. Чертенко aka Borka.

#10 lodore

lodore

    Newbie

  • Posters
  • 5 Сообщений:

Отправлено 24 Март 2010 - 23:49

is there anyway to specify during installation where to put the bases?
i selected just scanner and updater and it put the bases in C:\application data\doctorweb
I told it to install to d:\(username\downloads\drweb
it put somes files there.

drweb 4.44 put the bases in the same folder as the install folder.

i did notice the installer for 64bit is separate to the 32bit version. does that mean if i used drweb on a usb stick i would need two separate versions?

#11 Borka

Borka

    Забанен за флуд

  • Members
  • 19 512 Сообщений:

Отправлено 25 Март 2010 - 00:06

is there anyway to specify during installation where to put the bases?

No.

i selected just scanner and updater and it put the bases in C:\application data\doctorweb
I told it to install to d:\(username\downloads\drweb
it put somes files there.

From 5.0+ modules and bases stores separately - %ProgramFiles%\DrWeb and %ALLUSERSPROFILE%\Application Data\Doctor Web\Bases respectively. You may change path to modules but not to bases.

i did notice the installer for 64bit is separate to the 32bit version. does that mean if i used drweb on a usb stick i would need two separate versions?

The Virus Finding Engine and the bases are the same for both 32- and 64-bit versions. The modules are different.
С уважением,
Борис А. Чертенко aka Borka.


Читают тему: 1

0 пользователей, 1 гостей, 0 скрытых