background image

(i.e., the required number of licenses would equal the number of distinct inputs to the
multiplexing or pooling software or hardware "front end"). If the number of Client
Devices or seats that can connect to the Software can exceed the number of licenses you
have obtained, then you must have a reasonable mechanism in place to ensure that your
use of the Software does not exceed the use limits specified for the licenses you have
obtained. This license authorizes you to make or download one copy of the
Documentation for each Client Device or seat that is licensed, provided that each such
copy contains all of the Documentation’s proprietary notices.

c. Volume Licenses. If the Software is licensed with volume license terms specified in the

applicable price list or product packaging for the Software, you may make, use and
install as many additional copies of the Software on the number of Client Devices as the
volume license authorizes. You must have a reasonable mechanism in place to ensure
that the number of Client Devices on which the Software has been installed does not
exceed the number of licenses you have obtained.  This license authorizes you to make
or download one copy of the Documentation for each additional copy authorized by the
volume license, provided that each such copy contains all of the Documentation’s
proprietary notices.

2. Term. This Agreement is effective for an unlimited duration unless and until earlier

terminated as set forth herein.  This Agreement will terminate automatically if you fail to
comply with any of the limitations or other requirements described herein.  Upon any
termination or expiration of this Agreement, you must destroy all copies of the Software
and the Documentation.  You may terminate this Agreement at any point by destroying
all copies of the Software and the Documentation.

3. Updates. For the time period specified in the applicable price list or product packaging for

the Software you are entitled to download revisions or updates to the Software when and
as McAfee publishes them via its electronic bulletin board system, website or through
other online services.  For a period of ninety (90) days from the date of the original
purchase of the Software, you are entitled to download one (1) revision or upgrade to the
Software when and as McAfee publishes it via its electronic bulletin board system, website
or through other online services.  After the specified time period, you have no further
rights to receive any revisions or upgrades without purchase of a new license or annual
upgrade plan to the Software.

4. Ownership Rights. The Software is protected by United States copyright laws and

international treaty provisions. McAfee and its suppliers own and retain all right, title and
interest in and to the Software, including all copyrights, patents, trade secret rights,
trademarks and other intellectual property rights therein.  Your possession, installation,
or use of the Software does not transfer to you any title to the intellectual property in the
Software, and you will not acquire any rights to the Software except as expressly set forth
in this Agreement.  All copies of the Software and Documentation made hereunder must
contain the same proprietary notices that appear on and in the Software and
Documentation.

User’s Guide

iii

Summary of Contents for Guard Dog

Page 1: ...McAfee Guard Dog User s Guide...

Page 2: ...If the Software is licensed as a suite or bundle with more than one specified Software product this license applies to all such specified Software products subject to any restrictions or usage terms s...

Page 3: ...the limitations or other requirements described herein Upon any termination or expiration of this Agreement you must destroy all copies of the Software and the Documentation You may terminate this Ag...

Page 4: ...at McAfee s option either i return of the purchase price paid for the license if any or ii replacement of the defective media in which the Software is contained You must return the defective media to...

Page 5: ...ation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement 9 Export C...

Page 6: ...ous This Agreement is governed by the laws of the United States and the State of California without reference to conflict of laws principles The application of the United Nations Convention of Contrac...

Page 7: ...9 Step 1 Clean up your hard drive 9 Step 2 Remove temporary files 10 Step 3 Close other software 11 Installing other software from the Guard Dog CD 11 Chapter 3 Quick Tour of Guard Dog 13 Viewing the...

Page 8: ...ty Protector does 37 Responding to an Identity Protector alert message 38 Why should I change my Identity Protector settings 39 What Web Trail Cleaner does 39 Responding to the Web Trail Cleaner alert...

Page 9: ...and firewalls 62 What can I do to keep my stuff safe 63 How can I tell if a Web site is secure 63 How does encryption work 64 Security on the Web 65 Nasty applets 66 Can I prevent programs from access...

Page 10: ...Table of Contents x McAfee Guard Dog Technical support 74 McAfee training 74...

Page 11: ...damage the data on your computer s hard drive How Guard Dog works There are two main ways that Guard Dog protects you You can find any potential privacy security and virus threats that exist on your P...

Page 12: ...and Compuserve Interactive 3 0 both include browsers that are compatible with Guard Dog What Internet problems Guard Dog solves This section briefly describes how Guard Dog protects you from the most...

Page 13: ...grams can scan your PC for personal information or delete files without your permission File Guardian also limits access to protected files either to programs you specify or through file encryption It...

Page 14: ...d sensitive files such as financial records and credit card numbers so they ll never be sent over the Internet without your OK Additional Scheduled events Schedule events that automatically Remove vir...

Page 15: ...ystem requirements and how to install Guard Dog Chapter 1 Installing Guard Dog How to use the main features of Guard Dog Chapter 2 Quick Tour of Guard Dog How to change CheckUp and Protection settings...

Page 16: ...help for a screen 1 In the Guard Dog Home screen click Help 2 Click Help for this screen to display a help topic that explains what you can do in or what you may need to know about the current Guard...

Page 17: ...oks and operates best in a resolution of 800x600 pixels or greater and a color palette of 32 000 color mode 15 bit or higher 256 color palette is supported but may cause some color changes caused by p...

Page 18: ...bstitute the correct drive letter 4 Read the text in the Welcome to Guard Dog screen then click Next to display the Software License Agreement 5 After you read the license agreement click Yes to conti...

Page 19: ...ks permission to restart your PC appears Do the following Click the Readme window to read the file Close the window when you are finished Click Yes in the message box to restart your PC Guard Dog can...

Page 20: ...Programs then Accessories then System Tools and click Disk Defragmenter 7 Click OK to start Disk Defragmenter Depending on the speed of your computer and the size of your drive this may take several m...

Page 21: ...y item on the list except Explorer 3 Repeat steps 2 and 3 until you ve closed everything except Explorer 4 When you see only Explorer in the Close Program dialog box click Cancel You are now ready to...

Page 22: ...Installing Guard Dog 12 McAfee Guard Dog...

Page 23: ...Guard Dog s main features If you want to stop the video before it is done playing press the Esc key If you want to view the video again click Help on the Guard Dog Home screen then click How Guard Do...

Page 24: ...uard Dog ask me to enter The Guard Dog interview asks you to enter the personal and financial information that you want to protect All the information you enter into Guard Dog is stored in encrypted f...

Page 25: ...in Protection Settings Click Options on the Guard Dog Home screen then click Protection Settings Why should I create an Emergency Disk As part of the interview Guard Dog asks you to create an Emergen...

Page 26: ...Guard Dog won t let you use the Password Manager information in Browser Buddy or send out information protected by Identity Protector If you ve forgotten your Guard Dog password you can retrieve it fr...

Page 27: ...settings Options then click CheckUp Settings Adjust the Guard Dog general or alert settings Options then click Protection Settings Display a list of Guard Dog actions Log Display the McAfee Software H...

Page 28: ...lick the Guard Dog icon in the Windows taskbar then click Run Guard Dog To close the Guard Dog Home screen Click the button in the upper right corner of the Guard Dog Home screen Part of Guard Dog rem...

Page 29: ...at checks the CheckUp performs For example if you already had virus protection before installing Guard Dog you may want to turn off Guard Dog s Virus Check For more information see Changing CheckUp Se...

Page 30: ...re likely to be available To update the Guard Dog program or virus pattern files 1 If you normally connect to the Internet before you start your browser start your Internet connection now 2 On the Gua...

Page 31: ...message see Responding to Guard Dog alert messages later in this chapter Using the Guard Dog shortcut menu Even when you aren t running the main Guard Dog program you still have quick access to severa...

Page 32: ...tion Mark button Figure 3 6 and then click anywhere inside the alert message Figure 3 6 The Question Mark button displays help information If you find over time that you are being alerted to potential...

Page 33: ...many cookies have been allowed or rejected by Cookie Blocker and how many times search information has been blocked by Search Filter TIP Browser Buddy always remains displayed on top of any programs o...

Page 34: ...h character in your password 5 Click OK To retrieve your username and password 1 In Browser Buddy select the site name if it doesn t appear automatically in the Current Web Site list 2 Drag your usern...

Page 35: ...so that you can easily encrypt or decrypt all of the files that you designate for encryption in File Guardian NOTE Before you can encrypt a file you must add it to the Guarded Files list in File Guar...

Page 36: ...Quick Tour of Guard Dog 26 McAfee Guard Dog...

Page 37: ...e how much security and privacy you want or need how much of a risk you are willing to take with your personal data and how often you want to be alerted to a potential problem and asked to decide what...

Page 38: ...feature in the list so that its option settings appear in the pane on the right Adjust settings for the feature as appropriate To find out what a setting does click the question mark button in the upp...

Page 39: ...ion Settings 2 In the pane on left side of the screen make sure that a checkmark appears in the check box next to Scheduler If necessary click the check box to select it 3 Click the word Scheduler 4 C...

Page 40: ...able media This event is automatically scheduled to occur when Windows starts Schedule a Virus Check on changed files Perform a Virus Check only on files that have been created or modified after the d...

Page 41: ...then hold down the Shift key and click the last event To select non contiguous events click the first event then hold down the Ctrl key and click each desired event 2 Click Remove Remind to create an...

Page 42: ...otection Looks for files containing personal information and lets you protect them Cookie Lists the cookies being stored on your PC and lets you remove them Search Filter Looks to see if information e...

Page 43: ...rn to the Home screen click Apply To abandon these changes and return to the Home screen click Cancel Password Looks to see if you have any shared files folders on your PC and guides you through passw...

Page 44: ...Customizing Guard Dog 34 McAfee Guard Dog...

Page 45: ...kies Accept all cookies Display an alert message each time a cookie is sent to your browser The alert displays the name of the entity trying to set the cookie and advises you whether or not to accept...

Page 46: ...e first time If you want to remove cookies for a site from which you ve previously accepted cookies run a CheckUp and remove the cookies for that site TIP You can run CheckUp so that it only looks for...

Page 47: ...specify out over the Internet to an unsecure site Although you don t have to worry about a site when it using a secure connection there are many Web sites that use a secure connection only when dealin...

Page 48: ...Let the information go out Block the information from going out Display an alert message when any application tries to send the information over the Internet to an unsecure site This is the response...

Page 49: ...ion that you want to prevent from going out and select Allow Always Create a Guard Dog password If the Guard Dog password is not entered after you start Windows an unauthorized user of your PC can t v...

Page 50: ...tes If you don t return to a site the cached files for the site are never used again they just sit and take up disk space until they are ultimately deleted by your browser If you later want to delete...

Page 51: ...earch Filter selected in Security Settings Guard Dog automatically removes search information before you go to another Web site Guard Dog does not display an alert message for this feature but you can...

Page 52: ...Privacy Features 42 McAfee Guard Dog...

Page 53: ...n Responding to a Gatekeeper alert messages Guard Dog can display five different Gatekeeper related alert messages If you are using the default settings suggested by the Interview you will see the mes...

Page 54: ...u haven t allowed the program to always open the other program Guard Dog displays an alert message Table 6 1 If you choose Guard Dog does this This time only Allows the program to access the Internet...

Page 55: ...Guard Dog does this Allow always Lets the program start the other program Not this time Prevents the program from starting the other program just this time This time only Lets the program start the ot...

Page 56: ...he operation or not Want to be warned when a program starts up another program Many newer programs will warn you before doing this but older programs may not do so For example Internet Explorer 4 uses...

Page 57: ...yourself you should immediately investigate the program to determine its source ActiveX scan alert message There are legitimate reasons for allowing an ActiveX control to read through or scan all of y...

Page 58: ...command is started Guard Dog doesn t know whether you told your PC to format a Zip disk or whether a rogue ActiveX control has started to format your hard disk You know that this activity is legitimat...

Page 59: ...following circumstances Table 6 8 If you Use this option Want to be warned when an ActiveX control looks through the files on your PC This may happen legitimately if the control needs to find a file...

Page 60: ...ored login names and passwords Add a record Edit a record Remove a record You can also add a record in Browser Buddy For more information see Using Browser Buddy to retrieve or store your Web site pas...

Page 61: ...or remove records 3 Click Add 4 Type the information that you want to store in the record 5 Click OK To edit a password record 1 In the Password Manager list do one of the following Double click the r...

Page 62: ...Security Features 52 McAfee Guard Dog...

Page 63: ...elete the file If Guard Dog tries to clean a file but the virus has irreparably damaged the file you can only delete the file to get rid of the virus Continuing virus protection If you accepted the re...

Page 64: ...ts Open a document This includes documents sent as e mail attachments Move or rename files Read a file from a floppy disk What files to scan while performing a virus check using CheckUp or Scheduler H...

Page 65: ...d only in DOS DOS Startup Change the scope of what files are checked This setting affects not only file related checks but also the scheduled virus checks What to Check All Files checks every file Thi...

Page 66: ...s Explorer or running a CheckUp to try to clean the file You may want to use this option if your PC runs unattended and you don t want to risk anyone having access to infected files on your PC you wan...

Page 67: ...uses a database of known virus characteristics when it checks your PC for a virus but new viruses are always being created and old viruses are always being modified The McAfee Software virus research...

Page 68: ...Using AntiVirus Features 58 McAfee Guard Dog...

Page 69: ...e computers are equal to one another Windows has peer to peer networking capabilities built into the operating system The increased traffic in larger networks requires the services of a special comput...

Page 70: ...e some of the packets to be delayed so they arrive out of order To compensate TCP examines each packet as it arrives to verify that it s OK Once all the packets are received TCP puts them back in thei...

Page 71: ...ep back and consider the range of sensitive transactions we make every day As an example consider a simple ATM transaction We assume that following conditions prevail whenever we use our ATM cards Pri...

Page 72: ...istrators track down networking problems Unfortunately the same tool can also be used to steal information Sniffers are insidious and difficult to detect Sniffing often begins when a hacker breaches t...

Page 73: ...ions of Netscape Communicator and Microsoft Internet Explorer use a visual cue to tell you that the site is secure For more information see How can I tell if a Web site is secure NOTE Guard Dog s Chec...

Page 74: ...s to know your bank account number Authentication usually entails entering a user ID and a password To circumvent intercepted passwords and IDs authentication employs encryption to scramble this infor...

Page 75: ...some sites in the United States use a higher level of 128 bit encryption The number of bits indicates the length of the key used to encrypt data The longer the key the stronger and more secure the enc...

Page 76: ...harming anyone However there is no guarantee that an attack will not happen in the future Can I prevent programs from accessing the Internet You can use Guard Dog to specify the applications that are...

Page 77: ...ted program Boot viruses or Master Boot Record viruses The boot sector of a disk is a physical location on the disk that contains information about the disk and the files it contains All disks and dri...

Page 78: ...ing your PC Viruses are spread when infected diskettes are shared between PCs and when you download and run infected files from on line services bulletin boards or the Internet Another potential but r...

Page 79: ...of magazine subscribers or mail order companies can be sold to others Some companies allow you to specify that you do not want to receive mailings or to have your name and address sold to other compan...

Page 80: ...more information see What Cookie Blocker does on page 35 Sources for Internet privacy and security information Finding out about Internet hoaxes The United States Department of Energy Computer Inciden...

Page 81: ...ational Institute of Health s Computer Security Information site Good links to many security information sites http www alw nih gov Security security html Microsoft s Security site White papers and de...

Page 82: ...Internet Security and Privacy 72 McAfee Guard Dog...

Page 83: ...ard disk internal or external Version of system software Amount of memory RAM Extra cards boards or monitors Name and version of conflicting software EXACT error message as on screen What steps were p...

Page 84: ...If you do not find what you need or do not have web access try one of our automated services If the automated services do not have the answers you need please contact McAfee at the following numbers M...

Page 85: ...king sounds 29 bookmarks 40 boot sector viruses 67 Browser Buddy adding a new password record 23 dragging passwords from 24 opening 23 Password Manager and 23 Search Filter and 41 browser history 40 C...

Page 86: ...goes out alert message 45 described 43 harmful site alert message 44 Internet access alert message 43 program starts up another program alert message 44 settings 45 Getting Started manual described 5...

Page 87: ...ddy 23 adding record to 51 deleting record 51 described 50 editing record 51 passwords activating and deactivating 39 adding record to Password Manager 51 adding with Browser Buddy 23 Browser Buddy an...

Page 88: ...41 settings 41 search information 41 secure connection 37 security threats 3 settings CheckUp 32 to 33 Cookie Blocker 37 File Guardian 49 Gatekeeper 45 Identity Protector 39 Scheduler 29 Search Filte...

Page 89: ...macro 67 scheduling scans 30 threats 3 types of 67 updating list of 20 updating patterns with Scheduler 31 who creates them 66 W warnings See alert messages Web password management 23 Web sites harmf...

Reviews: