Solved

CHKLIST.MS

Posted on 1997-07-22
1
674 Views
Last Modified: 2013-12-27
what is the purpose of the chklist.ms files i see in many
directories and how are they generated?  thanx
0
Comment
Question by:DVSMC
1 Comment
 
LVL 3

Accepted Solution

by:
Bogey earned 100 total points
ID: 1600224
CHKLIST.MS is left over from running the MS viruscan program.  These are signature files (checksums) of the files in the directory.  They are harmless, but they are also useless.

The MS Antivurus software is far out of date an offers NO REAL PROTECTION from virus attack.  I strongly recommend using an up to date antivirus program. (Eval of Mcafee AV from www.mcafee.com)

You can delete all of the easily from windows, useing either File manager (Win31) or Explorer (Win95).  Use the search function for all the files names CHKLIST.MS and then mark and delte them.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Ways to verify USB ports are blocked on 30,000 PCs/laptops 12 112
Lifters 4 71
HP Deskjet 2132 12 59
WiFi hub advice for a training workshop 7 13
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now