VALIDATE Version 2.0.1 QUICK COMMAND REFERENCE GUIDE Copyright 1995 by McAfee, Inc. All Rights Reserved. LICENSE AGREEMENT McAfee, Inc. assumes no responsibility for damages or lost data caused by the use or misuse of this program, including if used in accordance with the program documentation. Use of this program means compliance with this Agreement. VALIDATE is a file-authentication program that you can use to check program files for signs of tampering. VALIDATE uses two methods of generating Cyclic Redundancy Checks (CRC's), and then displays the information so you can compare these statistics against the "known value" for the program files. The known value you use for validation is usually provided by the author of the program, or you may receive it from a trusted information database. The dual CRC checking provides a high degree of security. To confirm that a program file has not been tampered with, run the VALIDATE program and then record the validation data produced. Compare this data against the file statistisc the program author has specified. If the information matches, most likely the program has not been modified by anyone other than the author. To run VALIDATE, enter the following command: VALIDATE where is the name of a directory and file. (The wildcard characters, "*" and "?", may be used when specifying .) The VALIDATE program displays the following information: name of file (starting at row 1) extension of file (starting at row 10) size of file (starting at row 15) date of file (starting at row 25) time of file (starting at row 35) check method 1 (starting at row 44) check method 2 (starting at row 51) SAMPLE TXT 12345678 01-01-80 12:01a 1A2B 3C4D file(s) have been validated.