<
 
 
 
 
×
>
hide
You are viewing a Web site, archived on 04:56:49 Oct 15, 2004. It is now a Federal record managed by the National Archives and Records Administration.
External links, forms, and search boxes may not function within this collection.
JTF-GNO Online NetDefense [DoD-CERT]
spacer
Mission Statement Antivirus Section Vulnerability Management Access DISA Contact Us Webmaster
Virus Advisories
Antivirus Support
Antivirus Training
Antivirus Contracts
Email Subscription
Malicious Code Conference
 
Antivirus Information Virus Definitions McAfee Software Symantec Software Trend Micro Sotware

Home   Antivirus Information   Home Use   Self-Extracting Executables


Using Self-Extractiong Executable Files


Occasionally, the DoD-CERT will re-package the software to incorporate an additional convenience to the customer when possible. Using the WinZip Self-Extractor Program, zipped archives are transformed into self-extracting executables. Self-extracting executables negate customers from having to use a third-party product such as WinZip to unpack the software. Although other products may be re-packaged, this is primarily done for client software that may be utilized on a home PC.

Follow the steps below to properly use the self-extracting executables. The sample images represents a customer using VirusScan Enterprise 7.1 for Windows.

  1. Once the appropriate file has been downloaded, run the file. Upon execution of the file, the screen below should appear.

        

    Click "OK".

  2. Click "Unzip" to extract the files to the destination folder labeled in the text window.

        

  3. Once the files have been unzipped successfully, click "OK" and then click "Close".

        

If the installation does not automatically begin, navigate to the destination folder where the installation files were extracted and run "setup.exe".

Back to Top

stratcom · disa · iase · disa cio · lecic · site access · privacy · mission · contact us