OMI
59

| Posté : 27-12-2007 10:39
AVAST beurk
voici ce que j ai trouve dans l aide
Command Line
ESET Smart Security?s antivirus module can be&n bsp;launched via the command line ? manually  ;(with the ?ecls? command) or with a batch&n bsp;(?bat?) file.
The following parameters and switches can be&nb sp;used when running the on-demand scanner from&n bsp;the command line:
General options:
--help show help and quit
--version show version information and quit
br />--base-dir=FOLDER load modules from FOLDER
--quar-dir=FOLDER quarantine FOLDER
--aind show activity indicator
--auto scans all hard drives in the cleani ng mode
Targets:
--files scan files (default)
--no-files do not scan files
--boots scan boot sectors (default)
--no-boots do not scan boot sectors
--arch scan archives (default)
--no-arch do not scan archives
--max-archive-level=LEVEL maximum archive nesting LEVEL&n bsp;
--scan-timeout=LIMIT scan archives for LIMIT seconds at maximum. If the scanning time reaches&nb sp;this limit, the scanning of the archive i s stopped and the scan will continue to  ;the next file
--max-arch-size=SIZE only scan the first SIZE b ytes in archives (default 0 = unlimited)
br />--mail scan email files
--no-mail do not scan email files
--sfx scan self-extracting archives
--no-sfx do not scan self-extracting archives
--rtp scan runtime packers
--no-rtp do not scan runtime packers
--exclude=FOLDER exclude FOLDER from scanning
--subdir scan subfolders (default)
--no-subdir do not scan subfolders
--max-subdir-level=LEVEL maximum subfolder nesting LEVEL& nbsp;(default 0 =unlimited)
--symlink follow symbolic links (default)
--no-symlink skip symbolic links
--ext-remove=EXTENSIONS exclude EXTENSIONS delimited by&n bsp;colon from scanning
--ext-exclude=EXTENSIONS exclude EXTENSIONS delimited by& nbsp;colon from scanning
Methods:
--adware scan for Adware/Spyware/Riskware
--no-adware do not scan for Adware/Spyware/Riskware& nbsp;
--unsafe scan for potentially unsafe applications&nb sp;
--no-unsafe do not scan for potentially unsafe& nbsp;applications
--unwanted scan for potentially unwanted application s
--no-unwanted do not scan for potentially unwan ted applications
--pattern use signatures
--no-pattern do not use signatures
--heur enable heuristics
--no-heur disable heuristics
--adv-heur enable Advanced heuristics
--no-adv-heur disable Advanced heuristics
Cleaning:
--action=ACTION perform ACTION on infected objects.& nbsp;Available actions: none, clean, prompt
--quarantine copy infected files to Quarantine (supplements ACTION)
--no-quarantine do not copy infected files to&n bsp;Quarantine
Logs:
--log-file=FILE log output to FILE
--log-rewrite overwrite output file (default - append)
--log-all also log clean files
--no-log-all do not log clean files (default)&n bsp;
The possible exit codes of the scan:
Note
Exit codes greater than 100 mean that the& nbsp;file was not scanned and therefore can be infected.
0 - no threat found
1 - threat found but not cleaned
10 - some infected files remain
101 - archive error
102 - access error
103 - internal error
Nan mais sérieux tous le monde devrait tourner sur NOD32 il est vraiment génial comme antivirus
|