This new version of USBVirusScan adds a new placeholder %f and provides debugging support.
%f contains the filesystem of the inserted drive, like NTFS, FAT, CDFS, …
Newer versions of DAEMON Tools (a virtual CD-ROM utility to mount CD images) report to Windows as a removable drive, thereby triggering USBVirusScan. You can use %f in your scripts to detect this and execute the appropriate action. For example, if you want to scan each USB drive with Avira but don’t want to scan images mounted with DAEMON Tools, use this script (avira.vbs):
dim WshShell Set WshShell = WScript.CreateObject("WScript.Shell") if Wscript.Arguments.Item(1) <> "CDFS" then WshShell.run """C:\Program Files\Avira\AntiVir PersonalEdition Classic\avscan.exe"" /GUIMODE=2 /PATH= """ & Wscript.Arguments.Item(0) & ":\""", 1, true end if
Start USBVirusScan with these parameters: USBVirusScan wscript avira.vbs %d %f
The balloon info also contains information about the filesystem of the inserted drive:
A new flag, -d, adds debugging support to USBVirusScan. When this flag is present, USBVirusScan will write debug output when drives are inserted. This debug output can be viewed with DebugView.
A word of caution about DAEMON Tools. I use an older version of more DAEMON Tools, but newer versions contain an adware component, that you should be able to skip when installing.