background image

Internet Security and Privacy

62

Internet Guard Dog

Java contains an internal security system that addresses security risks. ActiveX
uses a different model, based on certificate authentication. Certificates contain
information about who developed the ActiveX code. The idea here is that if
you know who developed the code, it is safe to run it. Both security schemes
offer a level of safety, but no one can yet promise that executable content is
entirely safe.

Nasty applets

One possible security threat is a malign Java or Active X program that attacks
your computer over the Web. A nasty applet might, for example, thwart Java
security by circumventing its security model, and destroy data on your hard
disk, or grab sensitive information from your hard drive. The latest browsers
have done a good job of fixing these issues. As long as you are using the latest
version of your browser, you are protected. To date, there have been no
legitimate reports of hostile Java or ActiveX harming anyone. However, there
is no guarantee that an attack will not happen in the future.

Can I prevent programs from accessing the Internet?

You can use Guard Dog to specify the applications that are allowed to access
the Internet from your computer. Obviously, your default Internet browser is
one of these applications.

If the Guard Dog Gatekeeper is running in the background while you work on
the Internet, each time an application tries to access the Internet a dialog box
appears to ask if you want to allow this access once only, always, or never.

Computer viruses and the Web

A computer virus is a small computer program that automatically replicates
itself and spreads from one computer to another. Viruses may infect
programs, your hard drive, and even some document files that employ
macros. Viruses do not infect data files, but they can create problems that
prevent you from accessing your data. Viruses are not accidents—they are
always created by computer programmers.

PC viruses are similar to biological viruses in that they:

• Are spread from host to host—the “host,” in this instance, is your PC.

• Are very good at reproducing themselves.

• Can wreak havoc on an infected host system.

Summary of Contents for INTERNET GUARD DOG 3.0

Page 1: ...Internet Guard Dog User s Guide Version 3 0...

Page 2: ...n WebShield WebSniffer WebStalker WebWall and ZAC 2000 are registered trademarks of Network Associates and or its affiliates in the US and or other countries All other registered and unregistered trad...

Page 3: ...the limitations or other requirements described herein Upon any termination or expiration of this Agreement you must destroy all copies of the Software and the Documentation You may terminate this Ag...

Page 4: ...at McAfee s option either i return of the purchase price paid for the license if any or ii replacement of the defective media in which the Software is contained You must return the defective media to...

Page 5: ...ation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement 9 Export C...

Page 6: ...us This Agreement is governed by the laws of the United States and the State of California without reference to conflict of laws principles The application of the United Nations Convention of Contract...

Page 7: ...Chapter 2 Installing Internet Guard Dog 11 System requirements 11 Installing Internet Guard Dog 12 Troubleshooting installation problems 12 Step 1 Clean up your hard drive 13 Step 2 Remove temporary...

Page 8: ...ocker alert message 32 Why should I change my Cookie Blocker settings 33 What Identity Protector does 33 Responding to an Identity Protector alert message 34 Why should I change my Identity Protector...

Page 9: ...I do to keep my stuff safe 59 How can I tell if a Web site is secure 59 How does encryption work 60 Security on the Web 61 Nasty applets 62 Can I prevent programs from accessing the Internet 62 Comput...

Page 10: ...Table of Contents x Internet Guard Dog Technical support 70 McAfee training 71...

Page 11: ...thout getting out of your bathrobe However with all these conveniences come a certain element of risk When you use the Internet information is transmitted from your computer to other computers in the...

Page 12: ...Security Features VirusScan Internet Guard Dog now uses the McAfee VirusScan to address virus related problems you may encounter through the Internet This feature allows you to set how to perform a vi...

Page 13: ...ISP acts as a middleman between you and the Internet Your computer connects using your modem to the ISP s equipment which in turn connects to the Internet You may also be connected to the Internet th...

Page 14: ...request at one Web site from being passed along to the next site you visit Without Search Filter your browser can transfer your search request information from one Web site to another without your kno...

Page 15: ...inistrator customizing settings for other users of the same computer Internet Filtering options After an Administrator has added profiles of other users of the computer Internet Filtering options can...

Page 16: ...s such as financial records and credit card numbers so they ll never be sent over the Internet without your OK Encrypt sensitive files Add an extra layer of protection by encoding files to prevent the...

Page 17: ...ew window Table 1 1 To find out Read What this version of Internet Guard Dog does and how to find information about Internet Guard Dog Chapter 1 Welcome to Internet Guard Dog System requirements and h...

Page 18: ...previous browse button if activated or click the Back button Find tab Clicking the Find tab enables you to launch a full text search When you search for topics via the Find tab for the first time a Fi...

Page 19: ...Welcome to Internet Guard Dog To get help for settings in a dialog box Whenever you see the button in the upper right corner of a dialog box click the button then click on the setting for which you wa...

Page 20: ...Welcome to Internet Guard Dog 10 Internet Guard Dog...

Page 21: ...best in a resolution of 800x600 pixels or greater and a color palette of 32 000 color mode 15 bit or higher 256 color palette is supported but may cause some color changes caused by palette swapping...

Page 22: ...setup If D is not the drive letter of your CD ROM drive substitute the correct drive letter 4 After installation is completed Internet Guard Dog s Interview feature is launched Follow through the scr...

Page 23: ...scanning your drive for errors Depending on the size of your hard drive ScanDisk may take several minutes to complete its job 5 When ScanDisk is finished close ScanDisk 6 Click Start on the Windows ta...

Page 24: ...1 Hold down the Ctrl and Alt keys on your keyboard and then press the Delete key once The Close Program dialog box appears 2 Click End Task for every item on the list except Explorer 3 Repeat steps 2...

Page 25: ...ty and privacy settings that are appropriate for most users some features require your input The Interview provides an easy means of customizing your Internet Guard Dog settings Each interview screen...

Page 26: ...e number E mail address Other financial numbers such as bank account brokerage account credit card phone card and so on Any Web site login names and passwords that you want to store in Password Manage...

Page 27: ...e in the Interview feature of Internet Guard Dog And only the designated Administrator can access and change information and protection settings of the computer After this setup is complete the Admini...

Page 28: ...our CheckUp Settings or Protections Settings Also Internet Guard Dog won t let you use the Password Manager information in Browser Buddy or send out information protected by Identity Protector WARNING...

Page 29: ...on the Web Display the McAfee Software Support page in your Web browser Help then select Internet Guard Dog on the Web Access the McAfee Web site McAfee com Display the Support FAQ page in your Web br...

Page 30: ...net filtering options and can even monitor their browsing habits User Profile To customize protection settings for another user click User Setup from the Internet Guard Dog Home page the User Setup sc...

Page 31: ...ocker Select this option if you want Internet Guard Dog to block certain ads that you do not want the user to view Allow Chat Select this option if you want to allow the user to go into online chat ro...

Page 32: ...ways on duty in the background to protect your computer s data and your privacy based on the choices you make Internet Guard Dog displays settings on a series of Protection Settings pages containing c...

Page 33: ...blems you may encounter through the Internet This feature allows you to set how to perform a virus scan operation on your computer what to do if a virus is found and how it should alert you once the v...

Page 34: ...uses and Internet threats when you update its program files and virus patterns over the Internet NOTE If you purchased Internet Guard Dog on CD you should run Update even if you ve just installed Inte...

Page 35: ...ecurity Check more frequently You can also change the Security Check settings to customize how you want this feature to work on your computer To perform a Security Check 1 Click Security Check on the...

Page 36: ...askbar NOTE If you see an Internet Guard Dog alert message see Responding to Internet Guard Dog alert messages later in this chapter Using the Internet Guard Dog shortcut menu Even when you aren t run...

Page 37: ...disruption TIP If you decide you no longer want to see an alert message use the question mark button in the alert message to find out what setting to change All of the settings that control the alert...

Page 38: ...site address in the Username text box type the name by which you identify yourself to this Web site this may correspond to User Name Member ID Member Name Login ID or Login Name and so on 3 In the Pa...

Page 39: ...e unreadable You must decode or decrypt the file before you can use it The file encryption in Internet Guard Dog is designed so that you can easily encrypt or decrypt all of the files that you designa...

Page 40: ...Quick Tour of Internet Guard Dog 30 Internet Guard Dog...

Page 41: ...ookies Accept all cookies Display an alert message each time a cookie is sent to your browser The alert displays the name of the entity trying to set the cookie and provides you the option either to a...

Page 42: ...st time If you want to remove cookies for a site from which you ve previously accepted cookies run a Security Check and remove the cookies for that site TIP You can run Security Check so that it only...

Page 43: ...on over the Internet to an unsecure site Although you don t have to worry about a site when it using a secure connection there are many Web sites that use a secure connection only when dealing with cr...

Page 44: ...nformation go out Block the information from going out Display an alert message when any application tries to send the information over the Internet to an unsecure site This is the response that Inter...

Page 45: ...elect Allow Always Create an Internet Guard Dog password If the Internet Guard Dog password is not entered after you start Windows an unauthorized user of your PC can t view or send out your personal...

Page 46: ...list of favorite sites because it is less likely that you ll return to these sites If you don t return to a site the cached files for the site are never used again they just sit and take up disk space...

Page 47: ...r selected in the Security Settings of Internet Guard Dog it automatically removes search information before you go to another Web site Internet Guard Dog does not display an alert message for this fe...

Page 48: ...Privacy Features 38 Internet Guard Dog...

Page 49: ...esponding to Gatekeeper alert messages Internet Guard Dog can display five different Gatekeeper related alert messages If you are using the default settings suggested by the Interview you will see the...

Page 50: ...you haven t allowed the program to always open the other program Internet Guard Dog displays an alert message Table 5 1 If you choose Internet Guard Dog This time only Allows the program to access th...

Page 51: ...age in the following ways Table 5 2 If you choose Internet Guard Dog does this Allow always Allows the program to start the other program Not this time Prevents the program from starting the other pro...

Page 52: ...ogram is using your modem to dial out My modem dials silently Want to be warned when a program starts up another program Many newer programs will warn you before doing this but older programs may not...

Page 53: ...related alert messages If you are using the default setting suggested by the Interview you will only see guarded file ActiveX scan ActiveX delete and drive format messages Guarded file alert message U...

Page 54: ...legitimate reasons for allowing an ActiveX control to delete files For example if a control installs special software on your PC to let you interact with its Web site the control may need to delete f...

Page 55: ...tarted the format command If you don t know why your disk is being formatted note the name of the program in the alert message and then turn off your computer using its power switch If the program has...

Page 56: ...orary files that it uses If you are concerned check with the site that sent you the control ActiveX deletes files from my drive Want to be warned when any program tries to format any of your drives An...

Page 57: ...r more information see Using Browser Buddy to retrieve or store your Web site passwords in Chapter 3 To add a password record 1 In the Internet Guard Dog Home screen click the Options menu then select...

Page 58: ...Security Features 48 Internet Guard Dog To remove a password record In the Password Manager list click a record to select it then click Remove...

Page 59: ...inimum of configuration options but with the full power of the VirusScan anti virus scanning engine the VirusScan Advanced mode adds flexibility to the program s configuration options including the ab...

Page 60: ...e to display a list of quarantined files The Quarantine feature allows you to isolate an infected file in order to avoid spreading a virus Click Update to check for updated versions of VirusScan and D...

Page 61: ...an To perform a scan operation VirusScan needs to know what you want it to scan what you want it to do if it finds a virus and how it should let you know when it has You can also tell VirusScan to kee...

Page 62: ...by automatically taking an action that you determine ahead of time You can specify which response options you want VirusScan to give you when it finds a virus or which actions you want it to take on...

Page 63: ...appears when VirusScan finds an infected file This alert message can contain any information from a simple warning to instructions about how to report the incident to a network administrator This sam...

Page 64: ...file option By default VirusScan writes log information to the file VSCLOG TXT in the VirusScan program directory You can enter a different name and path in the text box provided or click Browse to l...

Page 65: ...built into the operating system The increased traffic in larger networks requires the services of a special computer called a server Servers help larger networks operate by figuring out how to route...

Page 66: ...cause some of the packets to be delayed so they arrive out of order To compensate TCP examines each packet as it arrives to verify that it s OK Once all the packets are received TCP puts them back in...

Page 67: ...ck and consider the range of sensitive transactions we make every day As an example consider a simple ATM transaction We assume that following conditions prevail whenever we use our ATM cards Privacy...

Page 68: ...nistrators track down networking problems Unfortunately the same tool can also be used to steal information Sniffers are insidious and difficult to detect Sniffing often begins when a hacker breaches...

Page 69: ...ions of Netscape Communicator and Microsoft Internet Explorer use a visual cue to tell you that the site is secure For more information see How can I tell if a Web site is secure NOTE Guard Dog s Chec...

Page 70: ...know your bank account number Authentication usually entails entering a user ID and a password To circumvent intercepted passwords and IDs authentication employs encryption to scramble this informatio...

Page 71: ...some sites in the United States use a higher level of 128 bit encryption The number of bits indicates the length of the key used to encrypt data The longer the key the stronger and more secure the enc...

Page 72: ...g anyone However there is no guarantee that an attack will not happen in the future Can I prevent programs from accessing the Internet You can use Guard Dog to specify the applications that are allowe...

Page 73: ...ed program Boot viruses or Master Boot Record viruses The boot sector of a disk is a physical location on the disk that contains information about the disk and the files it contains All disks and driv...

Page 74: ...nfecting your PC Viruses are spread when infected diskettes are shared between PCs and when you download and run infected files from on line services bulletin boards or the Internet Another potential...

Page 75: ...of magazine subscribers or mail order companies can be sold to others Some companies allow you to specify that you do not want to receive mailings or to have your name and address sold to other compan...

Page 76: ...more information see What Cookie Blocker does on page 31 Sources for Internet privacy and security information Finding out about Internet hoaxes The United States Department of Energy Computer Incide...

Page 77: ...ational Institute of Health s Computer Security Information site Good links to many security information sites http www alw nih gov Security security html Microsoft s Security site White papers and de...

Page 78: ...Internet Security and Privacy 68 Internet Guard Dog...

Page 79: ...ersion of system software Amount of memory RAM Extra cards boards or monitors Name and version of conflicting software EXACT error message as on screen What steps were performed prior to receiving err...

Page 80: ...have continued this tradition by making our site on the World Wide Web http www mcafee com a valuable resource for answers to technical support issues We encourage you to make this your first stop for...

Page 81: ...e support and 24 hours a day 7 days a week for Per Minute or Per Incident support McAfee training For information about scheduling on site training for any McAfee product call 800 338 8754 Disclaimer...

Page 82: ...Product Support 72 Internet Guard Dog...

Page 83: ...tector 34 Web Trail Cleaner 36 audible alert messages sounding 53 B bookmarks 36 boot sector viruses 63 Browser Buddy adding a new password record 28 dragging passwords from 28 opening 28 Password Man...

Page 84: ...ActiveX controls 43 protecting with File Guardian 43 VSCLOG TXT as VirusScan log 53 folders choosing as scan targets 52 G Gatekeeper alert messages 39 any credit card number goes out alert message 41...

Page 85: ...security Guard Dog solutions 3 Interview 15 J Java and viruses 64 L Log 2 23 log file creating with text editor 53 VSCLOG TXT as 53 login names 47 M macro viruses 63 managing Web passwords 27 Master...

Page 86: ...indows password file 43 Protection Settings Cookie Blocker 33 File Guardian 46 Gatekeeper 42 Identity Protector 35 Password Manager 47 Search Protector 37 Web Trail Cleaner 37 Q quarantine folder use...

Page 87: ...h Browser Buddy 28 dragging from Browser Buddy 28 V viruses ActiveX and 64 e mail attachments and 63 e mail messages and 63 file and program 63 hoax 63 how dangerous 63 how spread 62 Java and 64 macro...

Page 88: ...Index 78 Internet Guard Dog Windows protecting password file 43 taskbar 26 using help 7 Windows Start menu using to start VirusScan Classic 49...

Reviews: