12
返回列表 发新帖
楼主: jasonxu
收起左侧

[求助] VSE8.5i的各个patch的说明哪里有下的呀??我急须要这个呀!

[复制链接]
jasonxu
 楼主| 发表于 2008-6-27 19:54:39 | 显示全部楼层
1.  ISSUE:
    Applications that perform operations with
    temporary files, such as printing, generate a
    "file missing" error.

    RESOLUTION:
    The link driver has been updated to correctly
    handle file operations that use the
    DeleteOnClose flag.

2.  ISSUE:
    When McAfee Policy Enforcer is pushed out to a
    system with VirusScan Enterprise 8.5i, McAfee
    trusted processes might trigger Access
    Protection rules. A reboot is required to
    correct the problem.

    RESOLUTION:
    The link driver has been revised to ensure
    trusted policies are propagated between
    instances of loaded drivers.

3.  ISSUE:
    Some files remain locked indefinitely.
    Third-party tools indicate that McShield.exe was
    leaking handles, thereby locking the file.

    RESOLUTION:
    The link driver has been updated to detect and
    handle the oplock break-in-progress status code
    and ensure file locks are released.

4.  ISSUE:
    Under certain conditions, VirusScan Enterprise
    scanner for Lotus Notes can mistakenly deny
    access to the Lotus Notes internal processes, if
    another Note is being accessed by the user. The
    message "You are not authorized to perform that
    operation" is displayed for the user.

    RESOLUTION:
    The Lotus Notes scanner binaries have been
    updated to resolve the issue.

5.  ISSUE:
    For non-English platforms, a control ID is
    displayed in the Status field of the On-Access
    Messages window, rather than the localized
    strings.

    RESOLUTION:
    The resource binary for the On-Access Scanner
    service has been updated to resolve this issue.

6.  ISSUE:
    When VirusScan Enterprise 8.5i is installed to
    Windows Vista 32-bit platforms, the Buffer
    Overflow Protection feature is not available.

    RESOLUTION:
    This Patch enables Buffer Overflow Protection
    for Windows Vista 32-bit environments.

7.  ISSUE:
    When a scheduled On-Demand Scan task fails to
    authenticate to a specified location, the user
    receives an erroneous error asking that
    VirusScan Enterprise be reinstalled.

    RESOLUTION:
    The localized binaries file has been updated to
    handle the specific event.

8.  ISSUE:
    ePolicy Orchestrator could fail to replicate
    distributed repositories when VirusScan
    Enterprise 8.5i is installed.

    RESOLUTION:
    The Common Shell binary has been updated to
    allow sharing of files with other processes.

9.  ISSUE:
    Users without local administrative rights are
    not able to use the Help file unless it was
    previously downloaded by an administrator.

    RESOLUTION:
    Non-administrative users can now download and
    use the current Help file.

10. ISSUE:
    Not all VirusScan Enterprise events can be
    filtered in ePolicy Orchestrator reporting.

    RESOLUTION:
    The extended reports NAP file has been updated
    to allow filtering of all VirusScan Enterprise
    events.

11. ISSUE:
    In certain circumstances, when a state change
    occurs with Access Protection, the On-Access
    Scanner cannot be disabled/enabled, and some
    Access Protection rules fail to log messages.

    RESOLUTION:
    The McTaskManager Service and Access Protection
    binaries have been updated to resolve this
    issue.

12. ISSUE:
    When resuming from the hibernate state, the
    system tray icon might be in the disabled state,
    reflecting the status of the On-Access Scanner.
    However, the scanner service is functioning
    normally.

    RESOLUTION:
    The system tray icon should always reflect the
    correct state of the On-Access Scanner when
    resuming from hibernation.


KNOWN ISSUES

1.  The 5200 Engine must be installed prior to
    deploying Patch 5 or greater. The Patch updates
    the cached MSI tables to prevent a repair from
    restoring an unusable version of the engine. As
    a consequence, removal of the patch could result
    in restoration of the engine that was included
    in the original installation of VirusScan
    Enterprise 8.5i.

2.  When checking an upgraded version of the
    VirusScan NAP or Extension into ePolicy
    Orchestrator the Unwanted Programs Policy,
    detection categories will all be re-enabled. You
    will need to disable the categories that you had
    set previous to the check-in. This is only an
    issue if the McAfee Anti-Spyware Module NAP or
    Extension was previously checked in.

3.  Some customers have reported seeing VirusScan
    Statistics (VShield) crashing/disappearing from
    the system tray. Refer to McAfee Support
    KnowledgeBase article 613892 for more
    information on this issue.

4.  If Host Intrusion Prevention 6.x or later is
    installed and disabled prior to VirusScan
    Enterprise, it is necessary to re-enable IPS and
    disable it again in order for VirusScan Buffer
    Overflow Protection to be properly enabled.

5.  Sporadic crashes of the McShield Service have
    been seen during the patch install, on systems
    running McAfee AntiSpyware Enterprise Module.
    The service recovers correctly at the end of the
    patch process.

6.  If you install this release interactively and
    cancel the installation on a system where a
    previous Patch was installed, after the rollback
    completes, the previous Patch no longer reports
    to ePolicy Orchestrator or appears in the "About
    VirusScan Enterprise" window.

7.  Installing the Patch and specifying a log file
    path using the Microsoft Installer (MSI) switch
    "/L" does not log to the specified path. A log
    file capturing full data is logged to the folder
    "McAfeeLogs" under the Temp folder.

8.  If the Lotus Notes client is open when this
    release is installed, the installation completes
    successfully, but a reboot is required to
    replace the McAfee Lotus scanner files. The new
    files are not used until after a reboot.

9.  Uninstalling VirusScan Enterprise Patches is now
    possible for computers running Windows Installer
    v3.x or later.  This technology is not fully
    integrated for Windows 2000 operating systems,
    so there is no option to remove the Patch in
    Add/Remove programs.  Please see instructions
    under "Removing the Patch" for removal via
    command-line options.

10. Uninstalling VirusScan Patches is not available
    for Windows NT platforms, because Windows
    Installer v3.x is not supported on this
    platform. The Patch still installs to all
    platforms supported by VirusScan Enterprise
    8.5i.

11. Patches for VirusScan Enterprise 8.5i can only
    be uninstalled via Add/Remove programs, not via
    ePolicy Orchestrator or Protection Pilot.


FILES INCLUDED WITH THIS RELEASE

This release consists of a package called
VSE85P6.ZIP, which contains the following files:

    PKGCATALOG.Z =
       Package catalog file
    PATCH6.TXT =
       This text file
    VSE850DET.MCS =
       VirusScan Enterprise detection script
    SETUP.EXE =
       Installer for this release
    SETUP.INI =
       Initialization file for SETUP.EXE
    PATCH6.MSP =
       Microsoft Installer Patch file
    VSE850.NAP =
       Management NAP for VirusScan Enterprise
    VSE850REPORTS.NAP =
       Reporting NAP file


    The following files are installed to client
    systems:
       STRINGS.BIN               No version
       NCEXTMGR.DLL              8.5.0.830
       CONDL.DLL                 8.5.0.857
       COPTCPL.DLL               8.5.0.857
       MCAVDETECT.DLL            8.5.0.869
       MCAVSCV.DLL               8.5.0.869
       NCDAEMON.EXE              8.5.0.886
       NCINSTALL.DLL             8.5.0.886
       BBCPL.DLL                 8.5.0.895
       CONSL.DLL                 8.5.0.895
       MCCONSOL.EXE              8.5.0.895
       NCSCAN.DLL                8.5.0.895
       SHUTIL.DLL                8.5.0.895
       OASCPL.DLL                8.5.0.909
       SHSTAT.EXE                8.5.0.909
       FTCFG.DLL                 8.5.0.913
       MCUPDATE.EXE              8.5.0.913
       NAIANN.DLL                8.5.0.913
       QUARCPL.DLL               8.5.0.913
       SCAN32.EXE                8.5.0.913
       SCAN64.EXE                8.5.0.913
       SCNCFG32.EXE              8.5.0.913
       VSPLUGIN.DLL              8.5.0.913
       VSODSCPL.DLL              8.5.0.913
       VSTSKMGR.EXE              8.5.0.913
       VSUPDCPL.DLL              8.5.0.913
       ENTSRV.DLL                13.3.0.149
       MFEAPFA.DLL               13.3.0.149
       MFEAPFK.SYS               13.3.0.149
       MFEAVFA.DLL               13.3.0.149
       MFEAVFK.SYS               13.3.0.149
       MFEBOPA.DLL               13.3.0.149
       MFEBOPK.SYS               13.3.0.149
       MFEHIDA.DLL               13.3.0.149
       MFEHIDN.EXE               13.3.0.149
       MFEHIDK.SYS               13.3.0.149
       MFERKDA.DLL               13.3.0.149
       MFERKDK.SYS               13.3.0.149
       MFETDIK.SYS               13.3.0.149
       ADSLOKUU.DLL              13.3.2.128
       CSSCAN.EXE                13.3.2.128
       ENTVUTIL.EXE              13.3.2.128
       FTL.DLL                   13.3.2.128
       LOCKDOWN.DLL              13.3.2.128
       MCSHIELD.DLL              13.3.2.128
       MCSHIELD.EXE              13.3.2.128
       MCSHIELDPERFDATA.DLL      13.3.2.128
       MCVSSNMP.DLL              13.3.2.128
       MYTILUS.DLL               13.3.2.128
       MYTILUS2.DLL              13.3.2.128
       NAEVENT.DLL               13.3.2.128
       NAIEVENT.DLL              13.3.2.128
       SCANOTLK.DLL              13.3.2.128
       SCRIPTCL.DLL              13.3.2.128
       SCRIPTSV.DLL              13.3.2.128
       LOGPARSER.EXE             1.2.0.131

    The following files are checked in to the
    ePolicy Orchestrator or ProtectionPilot
    repository:
       VSE850.NAP                2.0.0.695
       VSE850REPORTS.NAP         3.0.0.781


__________________________________________________________
INSTALLATION AND REMOVAL


INSTALLATION REQUIREMENTS

To use this release, you must have VirusScan
Enterprise 8.5i software installed on the computer
you intend to update with this release.

    NOTES:
   -   This release does not work with earlier
       versions of VirusScan software.
   -   A reboot is needed to fully load the system
       drivers into memory.燭he package installation
       does not force the reboot.


INSTALLATION STEPS

1.  Extract the Patch files from VSE85P6.ZIP to a
    temporary folder on your hard drive.

2.  Double-click the file SETUP.EXE inside the
    temporary folder created in Step 1.

3.  Follow the instructions of the installation
    wizard.


INSTALLATION STEPS VIA ePOLICY ORCHESTRATOR 3.x

1.  On the computer where the ePolicy Orchestrator
    3.x console resides, extract the Patch files and
    folders from VSE85P6.ZIP to a temporary folder
    on your hard drive.

2.  Open the ePolicy Orchestrator 3.x console and
    add the package from the temporary folder
    created in Step 1 to your repository.

    Consult "Checking in Package" in the ePolicy
    Orchestrator 3.0 online Help, or "Checking in
    PKGCATALOG.Z product packages to the master
    repository" in the ePolicy Orchestrator 3.5
    online Help, for instructions on adding a
    package to the repository. The package type for
    this Patch is "Products or Updates."

    The next time an agent update task runs, the
    VirusScan Enterprise client automatically
    downloads and installs the Patch.

3.  In the ePolicy Orchestrator console, add the
    VSE850.NAP file using the "Check in NAP"
    wizard.

    NOTE:
    The VSE850.NAP is the same as the one found in
    VirusScan 8.5i Patch 5 Repost.  There is no
    reason to check it in again if you have already
    done so previously.

4.  In the ePolicy Orchestrator console, add the
    VSE850Reports.NAP file using the "Check in NAP"
    wizard.

    NOTE:
    The VSE850Reports.NAP is the same as the one
    found in Patch 1.  There is no reason to check
    it in again if you have already done so
    previously.


INSTALLATION STEPS VIA ePOLICY ORCHESTRATOR 4.x

1.  On the computer where the ePolicy Orchestrator
    4.x console resides, place the Patch archive
    VSE85P6.ZIP in a temporary folder on your hard
    drive.

2.  Open the ePolicy Orchestrator 4.x console and
    add the VSE85P6.ZIP package from the temporary
    folder created in Step 1 to your repository.

    Consult "Checking in Packages Manually" in the
    ePolicy Orchestrator 4.0 online Help, for
    instructions on adding a package to the
    repository. The package type for this Patch is
    "Products or Updates (.ZIP)".

    The next time an agent update task runs, the
    VirusScan Enterprise client automatically
    downloads and installs the Patch.


HOTFIX/PATCH REPORTING

Patch 4, and later, adds new functionality to the
ePolicy Orchestrator properties for each computer.
On the ePolicy Orchestrator Properties tab for each
computer, the VirusScan 8.5i General branch displays
two new entries:

-   "Patch" displays the current Patch installed.

-   "Fixes" displays any number of HotFixes listed
    in the registry.

A check is involved to verify that the HotFix/Patch
matches the entry in the registry to the private
build description of the HotFix binary. If the two
don抰 match, the Patch or HotFix does not appear.

    NOTE:
    Currently there are no reports or compliance
    checks that use this new information.


MIGRATING POLICIES FROM ePOLICY ORCHESTRATOR 3.5 to 3.6

To migrate your policies correctly from ePolicy
Orchestrator version 3.5 to version 3.6:

1.  While still running ePolicy Orchestrator 3.5,
    install the VirusScan Enterprise 8.5 NAP file
    from Patch 3 or greater.

2.  Upgrade to ePolicy Orchestrator 3.6. VirusScan
    Enterprise 8.5i policies will now appear to be
    missing/default.

3.  Install ePolicy Orchestrator 3.6 Patch 2a or
    later.

    VirusScan Enterprise 8.5i customized policies
    should now be migrated and available.


VERIFYING THE INSTALLATION

Always reboot prior to validating that a Patch has
installed successfully.

    NOTE:
    Patch releases do not display or report that the
    Patch is installed if an error occurred during
    installation, or if a file or files did not
    install correctly.

1.  Open the VirusScan Console and choose "About"
    from the "Help" menu. The "About VirusScan
    Enterprise" window "Installed Patches" displays
    "6."

    After property information has been collected by
    ePolicy Orchestrator and Protection Pilot
    agents, the client systems show that Patch 6 is
    installed as the "Hotfix" version. If the value
    "HotfixVersions" appears, it is a temporary
    value and will be removed after a full property
    collection from the client.

2.  Confirm that the expected files are installed by
    checking the version number of individual files.
    File versions should match the list in "FILES
    INCLUDED WITH THIS RELEASE," above.


REMOVING THE PATCH

Windows Installer 3.x and later now support the
rolling back of Patches.  This can be done one of
two ways.

-   For Windows XP, Windows 2003, and Windows Vista
    operating systems, the Patch can be removed
    manually via Add/Remove Programs if the user has
    administrative rights to the local system.

-   For all operating systems that support Windows
    Installer 3.x, a command-line option can be used
    to remove the Patch silently.
jasonxu
 楼主| 发表于 2008-6-27 19:54:55 | 显示全部楼层
Example:
       Msiexec.exe /I {35C03C04-3F1F-42C2-A989-A757EE691F65}
       MSIPATCHREMOVE={5DB77860-D5D2-4F0F-9118-6816878ACE0C} /q

    NOTES:
   -   The GUID information used here will change
       from one Patch to another, so please use the
       information in the Release Notes for the
       patch that you are removing.
   -   Because the patch is removed via MSIEXEC the
       functions inside setup.exe, that normally
       prevent reboots from occurring during silent
       processes, do not get executed.  In order to
       prevent a possible automatic reboot from
       occurring after patch removal, simply add the
       REBOOT=R parameter to the command-line option
       above.
   -   Patch removal is an MSI reinstall function.
       When a patch is removed, all features
       affected by the patch will get reset to
       installation defaults.  Any features not
       modified by the patch will be left with their
       current settings.
   -   Update VirusScan after removing the patch to
       ensure that the latest versions of the Engine
       and virus definitions are run.


__________________________________________________________
CONTACT INFORMATION


THREAT CENTER:  McAfee Avert(R) Labs
    Homepage
       http://www.mcafee.com/us/threat_center/default.asp

    Avert Labs Threat Library
       http://vil.nai.com/

    Avert Labs WebImmune & Submit a Sample (Logon
    credentials required)
       https://www.webimmune.net/default.asp

    Avert Labs DAT Notification Service
       http://vil.nai.com/vil/signup_DAT_notification.aspx

DOWNLOAD SITE
    Homepage
       http://www.mcafee.com/us/downloads/

   -   Product Upgrades (Valid grant number
       required)
   -   Security Updates (DATs, engine)
   -   HotFix and Patch Releases
       -   For Security Vulnerabilities (Available
           to the public)
       -   For Products (ServicePortal account and
           valid grant number required)
   -   Product Evaluation
   -   McAfee Beta Program

TECHNICAL SUPPORT
    Homepage
       http://www.mcafee.com/us/support

    KnowledgeBase Search
       http://knowledge.mcafee.com/

    McAfee Technical Support ServicePortal (Logon
    credentials required)
       https://mysupport.mcafee.com/eservice_enu/start.swe

CUSTOMER SERVICE
   Web:       http://www.mcafee.com/us/support/index.html
              http://www.mcafee.com/us/about/contact/index.html

   Phone:     +1-888-VIRUS NO or +1-888-847-8766
              Monday-Friday, 8 a.m.-8 p.m., Central
              Time
              US, Canada, and Latin America
              toll-free

PROFESSIONAL SERVICES
   -   Enterprise:
       http://www.mcafee.com/us/enterprise/services/index.html

   -   Small & Medium Business:
       http://www.mcafee.com/us/smb/services/index.html


_____________________________________________________
COPYRIGHT AND TRADEMARK ATTRIBUTIONS

Copyright (C) 2008 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced,
transmitted, transcribed, stored in a retrieval
system, or translated into any language in any form
or燽y燼ny means without the written permission of
McAfee, Inc., or its suppliers or affiliate
companies.


TRADEMARKS

AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX,
FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD,
INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL
PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE),
MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD,
PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY,
PROTECTIONPILOT, SECURE MESSAGING SERVICE,
SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL
PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are
registered trademarks or trademarks of McAfee, Inc.
and/or its affiliates in the US and/or other
countries. McAfee Red in connection with security is
distinctive of McAfee brand products. All other
registered and unregistered trademarks herein are
the sole property of their respective owners.


_____________________________________________________
LICENSE INFORMATION

LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE
LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU
PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND
CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF
YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE
ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED
LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE
RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A
BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE
AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED
THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF
THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL
THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE
PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A
FULL REFUND.


LICENSE ATTRIBUTIONS

This product includes or may include:
*燬oftware developed by the OpenSSL Project for use
in the OpenSSL Toolkit (http://www.openssl.org/).
*燙ryptographic software written by Eric A. Young
and software written by Tim J. Hudson. *燬ome
software programs that are licensed (or sublicensed)
to the user under the GNU General Public License
(GPL) or other similar Free Software licenses which,
among other rights, permit the user to copy, modify
and redistribute certain programs, or portions
thereof, and have access to the source code. The GPL
requires that for any software covered under the
GPL, which is distributed to someone in an
executable binary format, that the source code also
be made available to those users. For any such
software covered under the GPL, the source code is
made available on this CD. If any Free Software
licenses require that McAfee provide rights to use,
copy or modify a software program that are broader
than the rights granted in this agreement, then such
rights shall take precedence over the rights and
restrictions herein. *燬oftware originally written
by Henry Spencer, Copyright 1992, 1993, 1994, 1997
Henry Spencer. *燬oftware originally written by
Robert Nordier, Copyright (C) 1996-7 Robert Nordier.
*燬oftware written by Douglas W. Sauder. *燬oftware
developed by the Apache Software Foundation
(http://www.apache.org/). A copy of the license
agreement for this software can be found at
www.apache.org/licenses/LICENSE-2.0.txt.
*營nternational Components for Unicode ("ICU")
Copyright (C)?995-2002 International Business
Machines Corporation and others. *燬oftware
developed by CrystalClear Software, Inc., Copyright
(C)?000 CrystalClear Software, Inc. *燜EAD(R)
Optimizer(R) technology, Copyright Netopsystems AG,
Berlin, Germany. *燨utside In(R) Viewer Technology
(C)?992-2001 Stellent Chicago, Inc. and/or Outside
In(R) HTML Export, (C) 2001 Stellent Chicago, Inc.
*燬oftware copyrighted by Thai Open Source Software
Center Ltd. and Clark Cooper, (C) 1998, 1999, 2000.
*燬oftware copyrighted by Expat maintainers.
*燬oftware copyrighted by The Regents of the
University of California, (C) 1996, 1989, 1998-2000.
*燬oftware copyrighted by Gunnar Ritter. *燬oftware
copyrighted by Sun Microsystems, Inc., 4150 Network
Circle, Santa Clara, California 95054, U.S.A., (C)
2003. *燬oftware copyrighted by Gisle Aas. (C)
1995-2003. *燬oftware copyrighted by Michael A.
Chase, (C) 1999-2000. *燬oftware copyrighted by Neil
Winton, (C)?995-1996. *燬oftware copyrighted by RSA
Data Security, Inc., (C) 1990-1992. *燬oftware
copyrighted by Sean M. Burke, (C) 1999, 2000.
*燬oftware copyrighted by Martijn Koster, (C) 1995.
*燬oftware copyrighted by Brad Appleton, (C)
1996-1999.  *燬oftware copyrighted by Michael G.
Schwern, (C)?001. *燬oftware copyrighted by Graham
Barr, (C) 1998. *燬oftware copyrighted by Larry Wall
and Clark Cooper, (C) 1998-2000. *燬oftware
copyrighted by Frodo Looijaard, (C) 1997. *燬oftware
copyrighted by the Python Software Foundation,
Copyright (C) 2001, 2002, 2003. A copy of the
license agreement for this software can be found at
www.python.org. *燬oftware copyrighted by Beman
Dawes, (C) 1994-1999, 2002. *燬oftware written by
Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek (C)
1997-2000 University of Notre Dame. *燬oftware
copyrighted by Simone Bordet & Marco Cravero, (C)
2002. *燬oftware copyrighted by Stephen Purcell, (C)
2001. *燬oftware developed by the Indiana University
Extreme! Lab (http://www.extreme.indiana.edu/).
*燬oftware copyrighted by International Business
Machines Corporation and others, (C) 1995-2003.
*燬oftware developed by the University of
California, Berkeley and its contributors.
*燬oftware developed by Ralf S. Engelschall
<rse@engelschall.com> for use in the mod_ssl project
(http:// www.modssl.org/). *燬oftware copyrighted by
Kevlin Henney, (C) 2000-2002. *燬oftware copyrighted
by Peter Dimov and Multi Media Ltd. (C) 2001, 2002.
*燬oftware copyrighted by David Abrahams, (C) 2001,
2002. See http://www.boost.org/libs/bind/bind.html
for documentation. *燬oftware copyrighted by Steve
Cleary, Beman Dawes, Howard Hinnant & John Maddock,
(C) 2000. *燬oftware copyrighted by Boost.org, (C)
1999-2002. *燬oftware copyrighted by Nicolai M.
Josuttis, (C) 1999. *燬oftware copyrighted by Jeremy
Siek, (C) 1999-2001. *燬oftware copyrighted by
Daryle Walker, (C) 2001. *燬oftware copyrighted by
Chuck Allison and Jeremy Siek, (C) 2001, 2002.
*燬oftware copyrighted by Samuel Krempp, (C) 2001.
See http://www.boost.org for updates, documentation,
and revision history. *燬oftware copyrighted by Doug
Gregor (gregod@cs.rpi.edu), (C) 2001, 2002.
*燬oftware copyrighted by Cadenza New Zealand Ltd.,
(C) 2000. *燬oftware copyrighted by Jens Maurer,
(C)?000, 2001. *燬oftware copyrighted by Jaakko
J鋜vi (jaakko.jarvi@cs.utu.fi), (C)?999, 2000.
*燬oftware copyrighted by Ronald Garcia, (C) 2002.
*燬oftware copyrighted by David Abrahams, Jeremy
Siek, and Daryle Walker, (C)?999-2001. *燬oftware
copyrighted by Stephen Cleary (shammah@voyager.net),
(C)?000. *燬oftware copyrighted by Housemarque Oy
<http://www.housemarque.com>, (C) 2001. *燬oftware
copyrighted by Paul Moore, (C) 1999. *燬oftware
copyrighted by Dr. John Maddock, (C) 1998-2002.
*燬oftware copyrighted by Greg Colvin and Beman
Dawes, (C) 1998, 1999. *燬oftware copyrighted by
Peter Dimov, (C) 2001, 2002. *燬oftware copyrighted
by Jeremy Siek and John R. Bandela, (C) 2001.
*燬oftware copyrighted by Joerg Walter and Mathias
Koch, (C) 2000-2002. *燬oftware copyrighted by
Carnegie Mellon University (C) 1989, 1991, 1992.
*燬oftware copyrighted by Cambridge Broadband Ltd.,
(C) 2001-2003. *燬oftware copyrighted by Sparta,
Inc., (C) 2003-2004. *燬oftware copyrighted by
Cisco, Inc and Information Network Center of Beijing
University of Posts and Telecommunications, (C)
2004. *燬oftware copyrighted by Simon Josefsson, (C)
2003. *燬oftware copyrighted by Thomas Jacob, (C)
2003-2004. *燬oftware copyrighted by Advanced
Software Engineering Limited, (C) 2004. *燬oftware
copyrighted by Todd C. Miller, (C) 1998. *燬oftware
copyrighted by The Regents of the University of
California, (C) 1990, 1993, with code derived from
software contributed to Berkeley by Chris Torek.

V3.1.5
jasonxu
 楼主| 发表于 2008-6-27 19:56:32 | 显示全部楼层
我是想找关于这个问题的说明!mcafee粉丝网上有人说,补丁说明里有提到这个扫描出现这怪现象问题的!哎!也不知道是真假!

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
wske
发表于 2008-6-27 22:09:25 | 显示全部楼层
除了Patch 1没有中文翻译,其他的补丁都有,麦粉丝里找吧
jasonxu
 楼主| 发表于 2008-6-28 00:06:56 | 显示全部楼层
谢谢兄弟呀,有p1-5的说明吗?谢谢呀!因为我看这p6里没有说明这扫描怪现象的问题呀!
jasonxu
 楼主| 发表于 2008-6-28 11:34:48 | 显示全部楼层
有p1-5的说明吗?谢谢呀
livv8
发表于 2008-6-28 12:20:45 | 显示全部楼层
那你还不如找官方人员询问这些。。。。。。。
估计不会理你
这个问题N久就存在,也不是你一个人有,没有什么大问题得,你非得弄懂那只有找官方
jasonxu
 楼主| 发表于 2008-6-28 13:42:46 | 显示全部楼层
那官方有没有直接下载8。5i的不带补丁安装包的呀!现在官方都是集成p5的!晕!谢谢楼上的兄弟呀!
jasonxu
 楼主| 发表于 2008-6-28 14:27:19 | 显示全部楼层
看来我真要与咖啡无缘了!升级成6的扫描磁盘时还是这样!真晕了!

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-24 23:44 , Processed in 0.102893 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表