

              THE DETECTIVE     and     THE DETECTIVE LOG

                       Release Update Notes

                          March 10, 1990



=====================================================================



                    UPDATE SUMMARY FOR VERSION 3.1


 THE DETECTIVE:

     o  The path name size has been changed from 64 to 128
        characters.  This has been done to accomodate the Novell
        Netware feature that provides for path names up to 128
        characters.

     o  The number of paths that the program can handle has been
        changed from 1024 to roughly 2500.  This number is variable
        depending on the amount of free storage available.  The
        program will allocate all available memory to the table
        that stores path names.  With 512k free memory, this will
        top out around 2500.

     o  The control file format has changed to provide for the
        128 character path name.  See below for information on the
        conversion program.



 THE DETECTIVE LOG:

     o  The B-TREE file index routines have been optimized as
        promised.  The indexing routines will allocate buffers
        (not to be confused with DOS buffers) to store indexes
        based on available memory.  The more memory available,
        the faster the database accesses.

     o  The path name size was fixed at 64 characters based on
        DOS's limit.  This has been increased to a maximum of
        128 characters to support the Novell Netware feature
        that provides for path names up to 128 characters.

     o  The path name size stored in the database is now
        variable.  When the database is first loaded or when
        purging the database is done, you can (or must) specify
        the length of the path.  Most non-network users can get
        by with a path name size of 20 to 30 characters.  Users
        of Novell Netware may need a path size of 64 to 128
        characters depending on how their network is structered.
        The programs will scan the files to determine the
        minimum possible size.  If a path is later encountered
        that is bigger than that defined in the database, you
        can reorganize the database while making the path size
        larger.


 For current users of our products, we have conversion programs
 that will convert your current DETECTIVE LOG files and DETECTIVE
 control file to their new formats.  RELEASE 3.1 PROGRAMS WILL
 NOT FUNCTION PROPERLY UNLESS THE FILES THEY USE AND CREATE ARE
 CONVERTED!!!

 The conversion programs are available free of charge from our
 bulletin board service.  The phone number of our BBS is
 (414) 241-9125.  It operates 24 hours a day, 7 days a week with
 periodic down time for maintenance.  Make sure to set your
 communcations parameters to 9066,N,8,1.



=====================================================================



                    UPDATE SUMMARY FOR VERSION 3.0



 Release 3.0 of "THE DETECTIVE" has had virtually no changes made.
 However, THE DETECTIVE LOG has been added to the product line. The
 Log feature consists of several programs written in Turbo C that
 will maintain a history, for as long as you like, of all file
 changes.  A summary of the features in the LOG is as follows:

      o  Browse and search for files in history based on file name
         and extension (wildcards accepted), path name (wildcards
         accepted), from and to log date, additions, changes, or
         deletions, and displayed in either path or file name
         sequences.

      o  Ability to maintain comments for any file revision in
         history.

      o  Ability to print files and optionally their comments with
         the same selectivity as the browse feature.

      o  Graphically display disk space usage (requires a graphics
         card).

      o  Utilities to delete old records, reorganize, and re-index
         databases.

      o  Color and monochrome display, context sensative help, and
         pop up windows for a very elegant appearance and feel.



 The changes made to THE DETECTIVE were for a more gracefull exit,
 nothing more.  Also, release 3.0 is totaly compatible with
 release 2.0.  THE DETECTIVE LOG will also read files created by
 release 2.0 of THE DETECTIVE.  If you have not yet seen what the
 LOG feature provides, you may call our bulletin board system at
 (414) 241-9125, 9600,N,8,1 to download the shareware version. The
 shareware version of THE DETECTIVE LOG, like THE DETECTIVE, will
 not process any files in root directories.



=====================================================================



                    UPDATE SUMMARY FOR VERSION 2.0



 Release 2.0 of "THE DETECTIVE" has been greatly enhanced to provide:

     - Sub-directory inclusions and exclusions
     - File tracking and CRC checking in the same run
     - Multiple scenario control files
     - User defined file names
     - Increased limits of 1024 directories and 4096 files per
       directory
     - Support for an unlimited number of drives (A through Z)
     - Complete network support to handle locked files
     - 20% to 30% increase in speed

 You should read the documentation prior to using the new version, but
 since help information is displayed throughout the entry process, it
 may not be necessary.

 To upgrade to this release, you should run "THE DETECTIVE" (or "VIRUS
 DETECTER" as it was named earlier) one last time if needed, delete all
 old files, and copy the new version in its place.

