EICAR Standard Anti-Virus Test File
- Background Information
- Alternative Formats
- Authenticity and Integrity
- Automatic online installation
- Manual offline installation
- an entry MS-DOS Application in the
menu of Windows Explorer to create
standard anti-virus test file;
- a bookmark
in the current user’s
Favorites folder that
anti-virus test file when opened in a current
The anti-virus test file
is a 16-bit
DOS program that
prints the text
upon execution. Its
is a pure
text of 68 bytes length which should be detected by every
anti-virus test file can also be created directly by current
WWW browsers through
URLs in the
following file formats:
Authenticity and Integrity
WEB.DE TrustCenter E-Mail Certification Authority.
- Serial number of the certificate
- Fingerprint of the certificate
- MD5: e5 0b 01 66 ce 2e 7a 03 f4 98 39 37 f6 f9 9f ba
- SHA-1: 79 05 5d 63 2f 03 31 83 04 e2 ff 3b 25 b9 cc b6 70 ad ec 31
Download and install the
X.509 certificates of
to validate and verify the digital signature.
-----BEGIN RSA PUBLIC KEY-----
-----END RSA PUBLIC KEY-----
Note: due to its counter signature alias
the digital signature remains valid past the X.509
The shortcut icon
and the setup script
are packaged in the (compressed and
Installation requires no administrative privileges and access
Automatic online installation
When visited with
Internet Explorer, this web page
will prompt to install (the contents of) the package using
Internet Component Download.
Manual offline installation
Download the package
and verify its digital signature, then open it in
Windows Explorer, extract its
contents, right-click the extracted setup script
to display its context menu and click
Install to run the
Note: on Windows Vista and newer
versions of Windows NT,
the application registered for the
Install verb of
*.inf files, requests administrative privileges.
If you miss anything here, have additions, comments, corrections,
criticism or questions, want to give feedback, hints or tipps,
report broken links, bugs, deficiencies, errors, inaccuracies,
misrepresentations, omissions, shortcomings, vulnerabilities or
weaknesses, …: don’t hesitate to
and feel free to ask, comment, criticise, flame, notify or report!
Use the X.509
Note: email in weird format and without a proper
sender name is likely to be discarded!
HTML (and even
weirder formats too) in email, I prefer to receive plain text.
I also expect to see your full (real) name as sender, not your
I abhor top posts and expect inline quotes in replies.
Terms and Conditions
By using this site, you signify your agreement to these terms and
conditions. If you do not agree to these terms and conditions, do
not use this site!
- The software and the documentation on this site are provided
as is without any warranty, neither express nor implied.
In no event will the author be held liable for any damage(s) arising
from the use of the software or the documentation.
- Permission is granted to use the current version of
the software and the current version of the
documentation solely for personal private and non-commercial
An individuals use of the software or the documentation in his or
her capacity or function as an agent, (independent) contractor,
employee, member or officer of a business, corporation or
organisation (commercial or non-commercial) does not qualify as
personal private and non-commercial purpose.
- Without written approval from the author the software or the
documentation must not be used for a business, for
commercial, corporate, governmental, military or organisational
purposes of any kind, or in a commercial, corporate, governmental,
military or organisational environment of any kind.
- Redistribution of the software and the documentation is allowed only
in unmodified form of its current version and free
Data Protection Declaration
This web page records no (personal) data and stores no
cookies in the web browser.
The web service is operated and provided by
Telekom Deutschland GmbH
+49 800 5252033
The web service provider stores a
session cookie in the web
browser and records every visit of this web site with the following
data in an access log on their server(s):
- the (pseudonymised)
- the date and time of the request;
- the URL of
the requested web page or file;
- the Referer and User-Agent
headers sent by the web browser;
- the result (success or failure) of the request;
- the amount of data received and sent.
Copyright © 1995–2022 • Stefan Kanthak •