throbber
Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 1 of 38
`Case 4:18-cv-07229—YGR Document 192-3 Filed 04/19/21 Page 1 of 38
`
`EXHIBIT 2
`
`EXHIBIT 2
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 2 of 38
`
`
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 3 of 38
`Case 4:18-cv-Q7229—YGR Document 192-3 Filed 04/19/21 Page 3 of _; 9
`
`Dr Solomon’s
`
`Anti-Virus Toolkit
`
`for Windows and DOS
`
`Alton House, Gatehouse Way, Aylesbury, Buc’kinghamshire. HP19 3XU, UK
`
`S&S International PLC
`
`Tel: +44 (0)1296 318700 Fax: +44 (0)1296 318777
`
`Email: supporl@drsolomon.com
`
`S&S Software International, Inc.
`17 New England Executive Park, Burlington, MA 01803, USA
`Tel: +1 617 273 7400 Fax: +1 617 273 7474
`
`E-mail: support@us.drsolomon.com
`
`S&S International (Deutschland) GmbH
`
`Luisenweg 40, 20537 Hamburg, Deutschland
`
`Telefon: +49 (0)40 2519 54—0 Fax: +49 (0)40 2519 54-50
`
`E-mail: supporl@de.drsolomon.com
`
`CompuServe: GO DRSOLOMON
`
`World Wide Web: htth/wwandrsolomoneormi
`
`351 l lUA-ZD-US-ll)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`QUALY800002806
`
`
`
`
`
`
`
`
`
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 4 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 4 of 38
`
`Copyright
`
`Dr Solomon’s Anti-Virus Toolkit for Windows and DOS is copyright
`
`© 1993,1994, 1995 58:5 International PLC. All rights reserved. Dr
`
`Solomon’s Anti-Virus Toolkit for Windows and D03 is not copy~
`
`protected. This does not mean that you can make unlimited copies of
`
`it. Dr Solomon’s Anti-Virus Toolkit for Windows anerOS is protected
`
`by the copyright laws which pertain to computer software. It is illegal
`to make copies of the program other than as may be licensed or for
`
`purposes of backup without written permission from 58:55
`International PLC. No part of the manual or other documentation
`
`accompanying Dr Solomon’s Anti-Virus Toolkit for Windows and DOS
`
`may be reproduced, transmitted, transcribed, stored in a retrieval
`system or translated into any language, in any form or by any means,
`without the prior written permission of 5&8 International PLC.
`
`Disclaimer
`
`Neither 8&3 International PLC nor anyone else who has been involved
`in the creation, production or delivery of Dr Solomon’s Anti~Vlrus
`
`Toolkit for Windows and D05 or this manual makes any warranties
`
`with respect to the contents of the software or this manual and each
`
`specifically disclaims any implied warranties to the extent allowed by
`
`legislation. 8&8 International PLC reserves the right to revise the
`
`software and the manual and to make changes from time to time in the
`
`contents without obligation to notify any person.
`
`Trademarks
`
`Dr Solomon's is a registered trademark of 38:5 International PLC. All
`
`other product names mentioned are acknowledged to be the marks of
`
`their producing companies.
`
`Software release
`
`This manual describes Version 7.5 of Dr Solomon’s Anti-Virus
`
`Toolkit for Windows and Dr Solomon’s Anti-Virus Toolkit for
`
`DOS.
`
`Manual edition
`
`Edition 3.0
`
`November 1995
`
`
`
`QUALY800002807
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 5 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 5 of 38 ,
`
`Contents
`
`Contents
`
`Contents .....
`
`......
`
`................................... vii
`
`Preface.................... ...........
`
`.............. .............xv
`
`How to use this manual ........ . ............................................... xv
`
`Conventions ................................ '................................ xvii
`
`What you need ............................................................. xviii
`The Windows and DOS versions ........ ' ....................................... xix
`
`Using a mOuSe ......................................................... xix
`Using the keyboard ......................................................xx
`Dialog boxes ........................................................... xxi
`File selection .......................................................... xxii
`
`Windows icons ................. I ...................................... xxiii
`Windows Toolbar ..................................................... xxiv
`
`On-line help ................................................................ xxvi.
`Related documentaticm ..................................................... xxvii
`
`The Virus Encyclopedia ............................................... xxvii
`Othei versions of the I‘oolkit ........................................... xxvii
`
`Registration and upgrades ................................................... xxix
`If you need help ............................................................ xxx
`
`1. Introduction . . ............ .
`
`. . .
`
`.
`
`. ..................................... 1
`
`1.1 What is a virus? ............................................................. 1
`
`1.2 Types of virus ............................................................... 2
`File Viruses .............................................................. 2
`
`Macro Viruses ............................................................ 3
`
`Boot and partition sector viruses ........................................... 3
`Companion viruses ....................................................... 4
`Overwriting viruses ...................................................... 5
`Multipartite viruses ................. ' .....................................- .5
`Droppers ................................................................ 5
`1.3 Characteristics of viruses ..................................................... 5
`
`Stealth .................................................................. 5
`
`Polymorphism ........................................................... 5
`Virus names ............................................................. 6
`Variants ................................................................. 6
`
`How viruses spread ...................................................... 6
`1.4 Other potential problems ..................................................... 7
`Bugs .................................................................... 7
`Low-level software clashes ................................................ 8
`
`Trojans .................................................................. 8
`Time bombs and lo gic bombs .............................................. 9
`
`
`
`vii
`
`QUALY800002811
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 6 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 6 of 38
`
`Contents
`
`Jokes ................................................................... 9
`Human Error ............................................................ 9
`
`1.5 What you can do ......... . .................................................. 10
`Backups ............................................................... 10
`Software sources ........................................................ 11
`
`Diskettes and other media ................................................ 11
`
`Employee co-operation .................................................. 12
`1.6 The Anti-Virus Toolkit ...................................................... 12
`FindVirus .............................................................. 13
`
`VirusGuat‘cl ............................................................ 13
`
`WinGuard ............................................................. 13
`
`ViVerify ............................................................... 14
`The Virus Encyclopedia .................................................. 14
`More advanced features ................................................. 14
`
`2.1nstallingtheToolkit...............................................-.17
`2.1 Before you start ............................................................ 17
`2.2 How to install the Toolkit ................................................... 18
`
`Installing the DOS Toolkit .............................. . ................. 18
`Installing the Windows and DOS Toolkit ................................... 18
`WinGuard ............................................................. 20
`VirusGuard ............................................................ 20
`
`Completion of installation ................................................ 23
`2.3 Installing VirusGuarcl separately ............................................. 24
`How VirusGuard uses memory ........................................... 24
`Copying the VirusGuard files ............................................. 26
`Running VirusGuard .................................................... 26
`Using a RAM drive ...................................................... 27
`2.4 Creating a rescue diskette ................................................... 28
`2.5 README files ............................................................. 30
`
`2.6 Upgrading the Toolkit ...................................................... 31
`To upgrade the DOS T001kit .............................................. 31
`To upgrade the Windows Toolkit ......................................... 32
`
`3. Finding your Way Around ........................................... 33
`3.1 Starting the Toolkit ......................................................... 33
`Starting from DOS ...................................................... 33
`Starting from Windows .................................................. 35
`3.2 The main screen ............................................................ 36
`3.3 Options on the menus ...................................................... 37
`File menu .............................................................. 37
`
`Scan menu ............................................................. 38
`
`Repair menu ........................................................... 38
`Advanced menu ........................................................ 39
`
`viii
`
`
`
`QUALY800002812
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 7 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 7 of 38
`
`Contents
`
`4. Guarding against Viruses ............................................ 41
`4.1 Using WinGuard ...... ...................................................... 42
`Configuring WinGuard .................................................. 43
`Advanced features of WinGuard ................................... _....... 46
`If WinGuard reports a Virus .............................. '. ............... 46
`4.2 Using VirusGuard .......................................................... 47
`How VirusGuard uses memory under DOS ................................. 47
`If VirusGuard reports a virus ............................................. 48
`
`5. Checking for viruses ................................................ 51
`5.1 Finding viruses - FindVirus .................................................. 51
`When to use FindVirus ................................................... 51
`
`Running FindVirus from the main screen ................................... 52
`Running FindVirus from the user interface ................................. 53
`5.2 Checking for changes — ViVerify .............................................. 57
`WhentouseViVerify ...................................57
`Running ViVerify .
`.' .I.................................................... 58
`Creating a file list ........................................................ 59
`Computing the fingerprints ............................................... 60
`Checking the files ....................................................... 61
`If a file has changed ...................................................... 61
`Advanced menu options ...... . ............................... _ ............ 62
`5.3 The Virus Encyclopedia ..................................................... 65
`5.4 Scheduling FindVirus and ViVerify ........................................... 67
`To schedule FindVirus ................................................... 67
`
`T0 schedule ViVerify .................................................... 68
`Checking the schedules .................................................. 69
`
`6. If you Find a Virus .................................................. '71
`6.1 If VirusGuard or WinGuard report a virus ..................................... 71
`What to do if VirusGuard or WinGuard sounds the alarm .................... 72
`
`6.2 If FindVirus reports a virus .................................................. 73
`What to do if FindVirus discovers a virus ................................... 73 .
`
`6.3 If Vchrify reports a changed file ............................................. 74
`What to do if changed files are reported .................................... 74
`6.4 Single button repair ......................................................... 75
`6.5 If you. discover a new virus .................................................. 76
`
`7. Advanced Virus Detection ........................................... 77
`
`7.1 How FindVirus works ...................................................... 77
`
`Heuristic Analysis ....................................................... 78
`Executable files ......................................................... 79
`
`Compressed and archived files ............................................ 79
`Repairing files .......................................................... 80
`7.2 Running FindVirus from the user interface ..................................... 81
`
`
`
`ix
`
`QUALY800002813
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 8 of 38
`Case 4:18-cv-O7229-YGR Document 192-3 Filed 04/19/21 Page 8 of 38
`
`Contents
`
`'
`
`7.3 Running FindVirus from the command line. .I .................................. 8]
`Scanning specific drives .................................................. 81
`Scannin g files and subdirectories .......................................... 83
`Scanning boot and partition sectors ........................................ 85
`- Producing reports ....................................................... 85
`Specifying actiOns ....................................................... 86
`Network options ....................................................... .. 87
`Defining drivers .
`.
`.
`.
`.
`.
`.
`.
`.
`.
`; ............................................. 88
`Repairing files ...... ..................................................... 88
`Heuristic Analysis ...................................................... 89
`Requesting extended errorlevels .......................................... 89
`7.4 Hints and Tips ............................................................. 90
`Errorlevels ................................................-' .............. '90
`
`Hard disk device drivers ................................................. 91
`
`"Speeding up FindVirus ........................ ' ...................- ....... 91
`Scanning backup files .................................................... 91
`False alarms ............................................................ 92
`
`Testing FindVirus ....................................................... 92
`7.5- Error messages ............................................................ 92
`
`. 95
`.
`8. Advanced Virus Prevention .............................. . ........ .
`8.1 How VirusCuard works .................................................... 95
`
`Requirements .......................................................... 95
`Running VirusGuard .................................................. ‘.
`. 96
`Use of memory ......................................................... 96
`Security levels .......................................................... 97
`Executable files ....................... " ........................... '....... 98
`
`Boot sector scans ........................................................ 99
`
`Finding Viruses ................................... -.......... I............ 99
`82 Running VirusGuard ...................................................... 100
`Scanning files when copying or reading ... .
`.
`.
`. .. .
`.
`.
`.
`.
`.
`.
`..- ....... ........... 100
`Scanning files when writing .................................. - ........... 101
`ScanningWindowsfontfiles......................................' ...... 102
`- Protecting diskettes .................................................... 102
`Location of virus driver ................................................. 104
`
`Changing the pop~up message ........................................... 104
`Using VirusGuard on a network ......................................... 105
`8.3 Hints and Tips ............................................................ 106
`Changing the security level .............................................. 106
`Loading high ....................................................... i
`.
`. 107
`8.4 Testing VirusGuard ....................................................... 108
`File virus test .......................................................... 108
`Boot sector virus test ................................................... 110
`
`.' ............................................. 111
`.
`8.5 VirusCuard error messages. .
`8.6 Marking diskettes with an authorization code ................................. 112
`
`X
`
`\.
`
`
`
`QUALY800002814
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 9 of 38
`Case 4:18-cv-O7229-YGR Document 192-3 Filed 04/19/21 Page 9 of 38
`
`Contents
`
`i
`|
`
`How Author works ..................................................... 112
`
`Running'Author ....................................................... 113
`
`9. Advanced Virus Checking .......... ................................. 115
`9.1 How ViVerify works ....................................................... 115
`Executable files ........................................................ 115
`
`Encryption algorithms .................................................. 116
`Checking Speed ........................................................ 116
`Running ViVerify ...................................................... 117
`9.2 Running ViVerify from the user interface ..................................... 117
`9.3 Running ViVerify from the command line .................................... 117
`Checking specific drives ................................................. 118
`Defining files to be checked .............................................. 118
`Specifying a fingerprint file .............................................. 119
`Excluding files ......................................................... 120
`Checking boot and partition sectors ....................................... 120
`Specifying a keyword ................................................... 121
`Varying the checking speed and security .................................. 121
`Specifying an algorithm ................................................. 122
`Defining actions ........................................................ 122
`Producing reports .
`I..................................................... 122
`Extended errorlevels ......................................... . ........... 123
`
`Producing a list of su5pect files ........................................... 123
`Using anti—stealth measures .............................................. 124
`Errorlevels ............................................................ 124
`
`10. Additional Tools ................................................. 125
`
`10.1 Checking memory ~- GuardMem ......................... . ................... 125
`10.2 Examining disks - Inspect Disk ............................................. 126
`Running Inspect disk from the user interface ............................... 126
`Running Inspect Disk from the command line .............................. 129
`10.3 Examining file contents - Inspect File ........................................ 129
`10.4 Examining memory - Inspect Memory ....................................... 131
`10.5 Anti-stealth measures ..................................................... 132
`
`11. Virus Repair and Removal ......................................... 135
`11.1 Introduction ............................................................. 135
`
`11.2 Repairing drives ........................................... -. .............. 136
`Repairing drives from the user interface ................................... 136
`Repairing drives from the command line .................................. 138
`1113 Replacing boot sectors .................................................... 139
`How CIeanBoot works ......................... -......................... 139
`
`Running CleanBoot from the user interface ................................ 140
`Running CleanBoot from the command line ............................... 141
`Cross-formatted diskettes ............................................... 142
`
`xi
`
`QUALY800002815
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 10 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 10 of 38
`
`Contents
`
`11.4 Replacing partition sectors ................................................ 143
`How CleanPart works .................................................. 143
`
`Running Clean Part From the command line ................................ 144
`Backing up partition, boot and CMOS data ................................ 144
`Restoring partition and boot sector data ................................... 14.5
`Restoring CMOS data .................................................. 146
`Replacing the hard disk boot sector ....................................... 147
`Replacing partition sectors .............................................. 148
`11.5 Shredding files ........................................................... 150
`
`12. Using the Toolkit on a Network .................................... 151
`12.1 Running VirusGuard on a network ................................. - ........ 152
`Use of memory ........................................................ 152
`Start—up order ......................................................... 152
`Maintaining VirusGuard centrally ........................................ 153
`Networkalarmmessages................................_ .............. '.154
`Write checks on network drives ........................................ I
`.
`. 155
`
`Testing .......................................................... _..... 155
`12.2 Running FindVirus on a network .................................... _....... 155
`12.3 Anti-Stealth Methodology ................................................. 156
`12.4 Dealing with infected networks ............................................ 156
`
`13. Toolkit Configuration ............................................. 159
`13.1 The TOOLKIT.IN1 file .................................................... 159
`
`FindVirus ..... I ........................................................ 160
`
`FileRepair ............................................................. 1 60
`ViVerify .............................................................. 161
`13.2 The FINDVIRUINI file ................................................... 161
`
`13.3 Configuration File Management ............................................ 162
`13.4 Toolkit security features ................................................... 163
`To set or change a password ............................................. 164
`To change settings ..................................................... 165
`To disable the security features .......................................... 165
`
`14. Toolkit Utilities ................................................... 167
`
`14.1 TKUTIL ................................................................. 167
`
`Reporting the disk drive ................................................ 168
`Reporting the CPU ..................................................... 169
`Reporting memory type ................................................. 169
`Reporting Toolkit TSRs ................................................. 170
`Reporting the latest keystroke ........................................... 170
`Reporting batch file run.................................................. 170
`Make new directory .................................................... 171
`Updating files ......................................................... 171
`Adding text to a file .................................................... 172
`
`xii
`
`—
`
`QUALY800002816
`
`

`

`mmwr‘swmmw
`
`
`F—F
`
`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 11 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 11 of 38_
`
`Contents
`
`Deleting text from a file ................................................. 173
`Searching for text ....................................................... 174.
`CheckingVirusGuard...................................................174
`Checking RingFence .................................................... 175
`Determining the day of the week .......................................... 175
`Determining the day of the month ........................................ 176
`Locking the PC ......................................................... 176
`Sounding an alarm ..................................................... 176
`Playing a tune ......................................................... 176
`Removing other anti-virus packages ...................................... 177
`Send form feed to printer ................................................ 177
`Restarting VirusGuard .................................................. 178
`Restarting TSRs ........................................................ 178
`Reporting technical information .......................................... 178
`14.2 Examples of batch files .................................................... 179
`VIVIBAT ............................................................. 179
`
`VIVZBAT ............................................................. 180
`FRIDAYBAT ................. .......................................... 181
`FVBAT ............................................................... .182
`
`15. Reference Information ............................................ 183
`
`15.1 TOOLKIT command ...................................................... 183
`
`Syntax ................................................................ 183
`Switches .............................................................. 183
`15.2 FINDVIRU command ..................................................... 184
`
`Syntax ................................................................ 184
`Switches .............................................................. 184
`
`15.3 GUARD command ....................................................... 186
`
`Syntax ................................................................ 186
`Switches .............................................................. 186
`
`15.4 VIVERIFY command ..................................................... 187
`
`Syntax ................................................................ 187 '
`Functions ........................... ' .................................. 187
`Switches ............. ' ................................................. 187
`
`15.5 CLEANPAR command. _. .................................................. 189
`
`Syntax ................................................................ 189
`Switches .............................................................. 189
`
`15 6 CLEANBOO command ................................................... 190
`Syntax ................................................................ 190
`Switches .............................................................. 190
`
`15.7 WTKUTIL command ...................................................... 191
`
`Syntax ................................................................ 191
`Switches .............................................................. 191
`
`Commands .........................................I ................... 1 91
`
`xiii
`
`QUALY800002817
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 12 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 12 of 38
`
`Contents
`
`Glossary ............................................................ 193
`
`Index ............................................................... 203
`
`xiv
`
`
`
`QUALY800002818
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 13 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 13 of 38
`
`Preface
`
`Preface
`
`How to use this manual
`
`Dr. Solomon’s Anti-Virus Toolkit contains everything you. need to
`detect viruses on your PC, repair files and help prevent virus.
`infection.
`
`' H
`
`ow to use this manual
`
`This manual includes information for anyone using the Anti~
`
`- Virus Toolkit, from the non-technical user to the PC expert. The
`sections you are interested in will depend on your level of
`knowledge and the information you. need to know.
`
`Chapters fl and 2 are important for all readers. They provide
`
`background information on viruses and explain how to install the
`Toolkit.
`
`Chapters 3 t0 6 cover how to use the user interface and explain in
`
`detail the most straightforward ways to search for viruses and
`
`repair infected files.
`
`Chapters 7 to 15 are aimed at more technical users. Read these if
`
`you want more ill—depth information; for example, if you want to
`
`configure the tools for your particular needs.
`
`If you. do not have time to read the whole manual, particularly if
`
`you think you have a virus, read the QuickStart pages at the front
`of this manual.
`
`Chapter 1 - Introduction explains what computer viruses are and
`
`the damage they can do. It explains the resources available in the
`
`Anti-Virus Toolkit to prevent, detect and remove viruses.
`
`Chapter 2 - Installing the Toolkit gives step~by~step instructions
`for installing the DOS and Windows versions of the Toolkit on
`
`your PC.
`
`XV
`
`QUALY800002819
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 14 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 14 of 38.
`
`How to use this manual
`
`Preface
`
`Chapter 3 ~ Finding Your Way Around showsyou how to run the
`
`Toolkit programs, and explains the Options that are available from
`
`each of the menus.
`
`Chapter 4 ~ Guarding against Viruses describes the two memory-
`
`resident scanning programs that continually monitor disk and file
`accesses.
`
`Chapter 5 - Checking for Viruses explains how to use the Toolkit
`to search for viruses on hard disks and diskettes.
`
`Chapter 6 — If You Find a Virus outlines what happens if the
`
`Toolkit finds a virus. It explains the straightforward steps
`
`necessary to remove the virus and repair infections.
`
`Chapter 7 ~ Advanced Virus Detection provides additional
`
`information on FindVirus, including running the program from
`the command line.
`
`Chapter 8 -« Advanced Virus Prevention gives detailed
`
`information on protecting your PC from virus infection using
`Virus Guard.
`
`Chapter 9 - Advanced Virus Checking provides information on
`
`checking for changes in files using ViVerify.
`
`Chapter 10 ~ Additional Tools includes information on the other
`
`programs in the Toolkit which you can use to protect your PC
`
`against viruses.
`
`Chapter 11 — Virus Repair and Removal details the advanced
`
`options for repairing files, boot sectors and partition sectors. It
`
`also includes advice on removing Viruses and preventing re-
`infection.
`
`Chapter 12 - Using the Toolkit. on a Network gives additional
`information if you are installing and running the Toolkit on a
`network.
`
`Chapter 13 - Toolkit Configuration gives an explanation of the
`
`configuration files and how you can set them up and manage
`them.
`
`xvi
`
`QUALY800002820
`
`

`

`Case 4:18-cv-07229-YGR Document 192-3 Filed 04/19/21 Page 15 of 38
`Case 4:18-cv-O7229—YGR Document 192-3 Filed 04/19/21 Page 15 of 38
`
`Preiace
`
`Conventions
`
`Chapter 14 - Toolkit Utilities explains the various utilities
`
`provided in the Toolkit and how you can use them to create your
`own batch files.
`'
`
`Chapter 15 - Reference Information includes the definition and
`
`syntax of all Toolkit commands.
`
`A glossary is provided at the end of the manual, covering all the
`
`important terms used. There is also a comprehensive subject
`index.
`
`
`
`Conventions
`
`Throughout this manual, a number of conventions are used.
`
`Information that you have to type is shown in the Courier
`
`typeface, for example:
`
`COPY GUARD . COM C : \TOOLKIT
`
`Keys that you have to press are shown in the following form:
`
`{1] cs
`
`is used. to indicate the Return or Enter key.
`
`Throughout the text, symbols appear in the margin to draw your
`
`attention to particular points. These are as follows:
`
`This indicates a section. or paragraph that applies only to the
`Windows version of the software.
`
` version of the software.
`
`This indicates a section or paragraph that applies only to the DOS
`
`This indicates important information or tips to which you should
`
`pay particular attention.
`
`This indicates a warning, and you should read it carefully.
`
`—
`
`QUALY800002821
`
`

`

`Case 4:18-cv-07229-

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket