background image

Product Guide

xi

Contents

1

Welcome to McAfee Internet Security 5.0  . . . . . . . . . . . . . . . . . .   15

Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   15

What’s included with McAfee Internet Security?   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   16

What’s new in this release?  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   17

About this manual   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  18

McAfee Internet Security and your online connection   . . . . . . . . . . . . . . . . . . . . . . . . . . . .   18

McAfee Internet Security features  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   19

2

Installing McAfee Internet Security   . . . . . . . . . . . . . . . . . . . . . . .   21

Before you begin  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  21

System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   21

Installation steps  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  23

Troubleshooting installation problems  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   24

Removing or modifying your McAfee Internet Security installation   . . . . . . . . . . . . . . . . . .   25

Important information about Windows XP migration   . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   26

3

Getting Started with McAfee Internet Security 5.0  . . . . . . . . . . .   27

Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   27

The Title bar and Tool bar  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   28

Status information  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   28

About Tasks   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   29

About the McAfee list   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   33

How to use the McAfee Internet Security Configuration Assistant  . . . . . . . . . . . . . . . . . . .   34

How the McAfee Internet Security Administrator Works   . . . . . . . . . . . . . . . . . . . . . . . . . .   35

Self-Administrating users   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   35

The Administrator's password  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   36

Forgotten passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   36

How User Setup Works  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   36

Using McAfee VirusScan  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   37

Viewing Activity Logs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  37

Summary of Contents for INTERNET SECURITY 5.0

Page 1: ...P R O D U C T G U I D E McAfee Internet Security 5 0 V E R S I O N 5 0...

Page 2: ...E MCAFEE MCAFEE IN KATAKANA MCAFEE AND DESIGN MULTIMEDIA CLOAKING NET TOOLS NET TOOLS IN KATAKANA NETCRYPTO NETOCTUPUS NETSCAN NETSHIELD NETSTALKER NETWORK ASSOCIATES NETXRAY NOTESGUARD NUTS BOLTS OIL...

Page 3: ...ed that the copy you make contains all of the Software s proprietary notices unaltered and unobstructed b Server Mode Use You may use the Software on a Client Device as a server Server within a multi...

Page 4: ...mark tests regarding this Software contact McAfee to verify that You possess the correct Software for the test and the then current version and edition of the Software You agree not to permit any thir...

Page 5: ...IDENTAL OR CONSEQUENTIAL DAMAGES SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law 8 United States G...

Page 6: ...hours and upon prior written notice McAfee may visit you and you will make available to McAfee or its representatives any records pertaining to the Software to McAfee The cost of any requested audit...

Page 7: ...as set forth in this Section 1 The Software is in use on a Client Device when it is loaded into the temporary memory i e random access memory or RAM or installed into the permanent memory e g hard dis...

Page 8: ...lation or use of the Software does not transfer to you any title to the intellectual property in the Software and you will not acquire any rights to the Software except as expressly set forth in this...

Page 9: ...CONDITION THAT THE SOFTWARE WILL BE ERROR FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON I...

Page 10: ...ess or implied warranty or condition of fitness for High Risk Activities 11 Miscellaneous This Agreement is governed by the laws of the Netherlands The application of the United Nations Convention of...

Page 11: ...oting installation problems 24 Removing or modifying your McAfee Internet Security installation 25 Important information about Windows XP migration 26 3 Getting Started with McAfee Internet Security 5...

Page 12: ...il Cleaner Does 53 4 McAfee VirusScan Home Edition 57 What s new in this release 57 What comes with McAfee VirusScan 59 Getting Started 62 The Title bar and Tool bar 62 Status information 63 The Task...

Page 13: ...ernet Security s Shared Features 97 QuickClean Lite 97 McAfee Shredder 99 7 Updating McAfee Internet Security 101 About Instant Updater 101 Instant Updater features 101 A How to contact McAfee 103 www...

Page 14: ...Contents xiv McAfee Internet Security 5 0 Virus Detection and Prevention Tips 120 Use a Firewall 121 Tips to maintaining your computer and its software 122 Index 123...

Page 15: ...vernment entities and universities used almost exclusively to an information treasure house that people of all ages and occupations can now access With an Internet account you can send electronic mail...

Page 16: ...e problem n VirusScan McAfee Internet Security uses McAfee VirusScan to address virus related problems you may encounter through the Internet This feature allows you to set how to perform a virus scan...

Page 17: ...ities and games n Extended Stealth Program Protection Helps keep your PC free of hidden key loggers that try to capture and steal your passwords and a whole host of even more insidious programs that m...

Page 18: ...uct McAfee Internet Security and your online connection You must have an Internet connection through a local network or a modem to use all McAfee Internet Security features Some networks have an Inter...

Page 19: ...ur Web browsing trails such as cached files list of URLs Uniform Resource Locator also known as Web address visited and history files when you close your browser This feature prevents other users of y...

Page 20: ...rag and drop a user name and password from Browser Buddy to the appropriate box in the login form To access Browser Buddy right click the McAfee Guardian icon in the Windows system tray and click Brow...

Page 21: ...n on your computer System requirements To install this product you require the following Desktop and notebook computers n Windows 98 Windows Me Windows 2000 Professional Windows XP Home Edition or Win...

Page 22: ...ny CE device with ActiveSync 3 will function properly Symbian EPOC System requirements McAfee VirusScan for Symbian s EPOC will install and run on any IBM PC or PC compatible computer equipped with Ps...

Page 23: ...g box displays b Type X SETUP EXE in the text box provided then click OK 4 Here X represents the drive letter for your CD ROM drive or the path to the folder that contains your extracted McAfee Firewa...

Page 24: ...allation Step 1 Close other software Disable all software running in the background 1 Hold down the Ctrl and Alt keys on your keyboard and then press the Delete key once The Close Program dialog box a...

Page 25: ...selected M Only if errors found M Replace log M Delete M Free 4 Ignore the other options and click OK Click Start ScanDisk begins scanning your drive for errors Depending on the size of your hard driv...

Page 26: ...t Security Installation Wizard to complete your changes Restart your computer as directed by setup Important information about Windows XP migration Upgrading your computer s operating system from any...

Page 27: ...swering a few questions via the Interview so that McAfee Internet Security can effectively use its feature to protect you from Internet threats Introduction The McAfee Internet Security 5 0 Home page...

Page 28: ...Next to go to any previously viewed screen during your current session n Help Click Help to view its submenu The Help submenu may include any of the following items Status information Depending upon...

Page 29: ...ee Firewall Activation requires that you perform a few preliminary configuration steps the Firewall Configuration Assistant guides you through this process If the Network Traffic monitor does not disp...

Page 30: ...include Temporary Internet Files and historical records such as URLs visited created by your Internet browser The Privacy settings sheet allows you to protect personal information about each user tha...

Page 31: ...s to Internet Newsgroups Perform a Security Check After completing the interview you ll want to find out how your PC may be at risk Security Check examines your PC for privacy and security problems an...

Page 32: ...nection to the Internet In addition to the wizards and features described earlier in this chapter McAfee Internet Security also includes utilities such as QuickClean Lite McAfee Shredder Instant Updat...

Page 33: ...r s operating systems is Windows 98 or Windows Me n Visual Trace You must install McAfee Firewall to see this link About the McAfee list The McAfee list displays links to start the Home page to any ot...

Page 34: ...onal and financial information that you want to protect All the information you enter into McAfee Internet Security is stored in an encrypted form on your hard disk it is never sent to McAfee Software...

Page 35: ...ot want your children to access when browsing the Internet Creating the McAfee Internet Security Administrator account can only be done in the Interview feature of McAfee Internet Security And only th...

Page 36: ...n Forgotten passwords Please do not lose or forget the Administrator s password As described above you must use the Administrator s profile to effectively use and configure McAfee Internet Security Du...

Page 37: ...ivity Logs McAfee Internet Security now provides a list of activities that an Administrator can view via the Activity Logs feature This list is generated based on his preferred security and privacy se...

Page 38: ...Updating McAfee Internet Security on page 101 If you purchased McAfee Internet Security on CD you should run Update even if you ve just installed McAfee Internet Security In the time between when the...

Page 39: ...you are being alerted to potential security risks too often you can adjust the alert message settings in Protection Settings Cookie Blocker and Gatekeeper require a period of adjustment before McAfee...

Page 40: ...assword to save dialog box displays 2 In the Web site text box enter the Web site address in the User name text box type the name by which you identify yourself to this Web site this may correspond to...

Page 41: ...is designed so that you can easily encrypt or decrypt all of the files that you designate for encryption in File Guardian Before you can encrypt a file you must add it to the Guarded Files list in Fi...

Page 42: ...redit card number pattern Responding to Gatekeeper Alert Messages McAfee Internet Security can display five different Gatekeeper related alert messages If you are using the default settings suggested...

Page 43: ...ernet Security displays an alert message You can respond to the alert message in the following ways If you choose Then McAfee Internet Security This time only w allows the program to access the Intern...

Page 44: ...his time If you choose Then McAfee Internet Security Not this time w prevents the program from sending the number this time This time only w allows the program to send the number just this time Use th...

Page 45: ...ferent File Guardian related alert messages If you are using the default setting suggested by the Interview you will only see guarded file ActiveX scan ActiveX delete and drive format messages Guarded...

Page 46: ...veX control to delete files For example if a control installs special software on your PC to let you interact with its Web site the control may need to delete files that it created for temporary use H...

Page 47: ...ou have run a Security CheckUp and removed the suspicious ActiveX control from your PC Click Continue if you want the program to format your disk Why should I change my File Guardian settings You may...

Page 48: ...ng formatted w want to be warned when any program tries to format any of your drives An alert message appears whenever you format a floppy disk other removable media or hard disk You may want to turn...

Page 49: ...f the entity trying to set the cookie and provides you the option either to accept the cookie or not When setting up Cookie Blocker in Protection Settings you can select one option for direct sites an...

Page 50: ...e the cookies for that site TIP You can run Security Check so that it only looks for cookies On the Perform an Internet Security Check of Your Computer window select Change How My Computer is Checked...

Page 51: ...e person using your computer doesn t enter the McAfee Internet Security password it automatically replaces any protected personal information sent to an unsecure site with the text xxxx For example if...

Page 52: ...nly w Allows the information to go out just this time Not this time w Prevents the information from going out this time If you Then use this option Are the only person using your PC and you don t want...

Page 53: ...abled McAfee Internet Security detects a fast user switch and as such requires each respective user to input their password in order to use password required tasks What Web Trail Cleaner Does As you s...

Page 54: ...wser the search information displays in the address box of your Web browser When you go to another site the browser retains the search information and the next site you visit can extract it without yo...

Page 55: ...in the Security Settings of McAfee Internet Security it automatically removes search information before you go to another Web site McAfee Internet Security does not display an alert message for this f...

Page 56: ...Getting Started with McAfee Internet Security 5 0 56 McAfee Internet Security 5 0...

Page 57: ...mailers are present or attachments with double file extensions HAWK has been enhanced to include email clients other than just Microsoft Outlook it now supports Outlook Express Eudora and other email...

Page 58: ...e 2000 documents to provide extra protection to users of Microsoft Word Excel and PowerPoint 2000 in the event that VShield background scanning must be disabled n Usability enhancements McAfee VirusSc...

Page 59: ...i virus protection from viruses that arrive on floppy disks from your network or from various sources on the Internet The VShield scanner starts when you start your computer and stays in memory until...

Page 60: ...Installation CD includes a CD version of the emergency startup disk If your computer is configured to start using its CD drive then you can use the CD to boot your computer in to a virus free environ...

Page 61: ...SCAN EXE will transfer control to this scanner if your computer is running in 16 bit mode but without special memory configurations M BOOTSCAN EXE a smaller specialized scanner for use primarily with...

Page 62: ...nt status and navigation links to all tasks The Title bar and Tool bar Title bar The Home page displays most of your standard Windows elements that which includes n The title bar displays the name of...

Page 63: ...e a message displays describing as such Additionally virus definition files DATs version information displays here as well If there is an update to McAfee VirusScan available Click here to update McAf...

Page 64: ...update This task starts McAfee Instant Updater and checks to see if there is an update to McAfee VirusScan available n Other Tasks Depending upon your McAfee VirusScan configuration this task provide...

Page 65: ...can background scanner VShield property sheet Here you can view real time status information about VirusScan s background scan modules n Disable VirusScan Select this option to stop VirusScan s backgr...

Page 66: ...plications VShield Scanner starts when you start your computer and stays in memory until you shut it or your system down VShield automatic protection settings The VShield scanner consists of related m...

Page 67: ...it from your computer About Script Stopper Script Stopper is a VirusScan protection mechanism associated with the HAWK Script Stopper detects malicious activities script methods or routines perform Fo...

Page 68: ...ar select Start Settings Control Panel The Windows Control Panel displays 2 Double click the VirusScan icon The VirusScan Services dialog box displays 3 Select the Service tab and click Stop VShield S...

Page 69: ...Restore n Delete Select this option to delete the infected file Make sure to note the file location so you have a record of the deleted files You will need to restore deleted files from backup copies...

Page 70: ...lect to have Safe Sound automatically create a backup set for you it creates the first backup set while you are stepping through the Safe Sound Wizard Thereafter while the Enable Automatic Backup opti...

Page 71: ...ese backups The more recent your backup set the happier you ll be if your PC does encounter a problem that compromises the data on your primary drives However you may want to keep the default Write be...

Page 72: ...Disk you create includes BOOTSCAN EXE a specialized small footprint command line scanner that can scan your hard disk boot sectors and Master Boot Record MBR BOOTSCAN EXE works with specialized set o...

Page 73: ...the day week or month How VirusScan protects your wireless device McAfee VirusScan is an application designed to protect your data by scanning the files on your wireless device every time a data exch...

Page 74: ...et PC w Jornada 540 w Jornada 680 w Jornada 720 Hewlett Packard Pocket PC w E125 w EM500 Cassiopeia Windows CE w PenCentra 130 Fujitso Windows CE w HPW 600 ET Hitachi Windows CE w WorkPad z50 IBM EPOC...

Page 75: ...o is connecting to your computer if you allow sharing n Stops floods and other attack packets from being received by the Operating System n Blocks untrusted applications from communicating over the ne...

Page 76: ...ards and modems This means that it can reject inbound traffic before that traffic can reach vital functions in your computer and waste valuable system resources McAfee Firewall the Gatekeeper When McA...

Page 77: ...ated in this manner It is a good practice to scan files received using anti virus programs such as McAfee VirusScan before you open or view files and their attachments When on the Internet others can...

Page 78: ...o filtering is done The Internet uses the IP protocols No others are sent Also IP networks are the most common How can I still be harassed even with McAfee Firewall Many people use McAfee Firewall to...

Page 79: ...you select Cancel on any Configuration Assistant screen the activation and configuration process stops You must complete the Configuration Assistant on first use in order to activate and use McAfee Fi...

Page 80: ...ll to allow access to your computer s network shares as well as allow your computer to access other computer s shares A share is a resource such as a drive directory file or printer available to a wor...

Page 81: ...ansfer protocol clients On this screen you will identify programs that you will allow to access the Internet through McAfee Firewall To allow specific programs to access the Internet do the following...

Page 82: ...r and Tool bar Title bar The Home page displays most of your standard Windows elements that which includes n The title bar displays the name of the program that is currently running n Close and minimi...

Page 83: ...ctivity n Firewall warning information If there are any communication warnings select this task to view the warning log Internet traffic settings The Internet Traffic setting frame displays your curre...

Page 84: ...accessing McAfee Firewall Activity Log If the attacker s IP address is available you can attempt to trace the attacker using McAfee Firewall s Visual Trace component The Task pane The Task pane displa...

Page 85: ...irewall s advanced tasks include n Advanced options and logging Select this task to configure intrusion defense mechanisms set up the automatic configuration of filtering rules and identify the type o...

Page 86: ...y Also helps keep your firewall protections secure by preventing the firewall from being shut down without your password About Visual Trace Visual Trace is a multi purpose Internet tool used for findi...

Page 87: ...ettings On the other hand the programs classification is personalized Whenever you run a new program that attempts to communicate over the Internet McAfee Firewall will prompt and ask you whether you...

Page 88: ...program s first attempt to communicate will cause an alert message to display n Although the Configuration Assistant performs a thorough analysis of your computer s programs that use the Internet to...

Page 89: ...m to the list click Add and browse to select the program you want to add To remove a program from the list select the program you want to remove and click Remove 5 Click Apply How to customize filteri...

Page 90: ...Click Remove to remove a rule from the selected program CAUTION There is no undo feature Edit w Click Edit to refine a filtering rule Restore w Click Restore to restore the default rules for the sele...

Page 91: ...e your changes click OK System configuration Your computer s operating system performs many types of network communication without reporting directly to you McAfee Firewall lets you explicitly allow o...

Page 92: ...ked This protocol is often abused as a method of breaking people s network connections especially on IRC ARP Allowed ARP is a necessary Ethernet protocol and is not known to be a threat DHCP Allowed i...

Page 93: ...etect suspicious or known attack traffic For example if McAfee Firewall sees ICMP packets it analyzes those packets for suspicious traffic patterns by comparing the ICMP traffic against known attack p...

Page 94: ...UNREACHABLE packet This flood of incoming packets results in a denial of service attack against the target machine High IP Spoofing IP spoofing involves sending data with a falsified return IP addres...

Page 95: ...as begun looking at your system for potential weaknesses A port scan consists of checking every TCP and or UDP port to see what services and hence what vulnerabilities might be present Low Saihyousen...

Page 96: ...d Make sure that Load Only When Needed is not checked in the TCP IP control panel Then TCP IP is loaded all the time allowing McAfee Firewall to function while the machine is asleep High Winnuke This...

Page 97: ...shortcuts and system file references for applications that no longer exist on your computer n Delete temporary files n Remove deleted and sent messages from a Microsoft supported e mail client i e Out...

Page 98: ...the QuickClean Lite wizard 1 From any VirusScan Professional screen click the Other tasks Task and select Start QuickClean Lite 2 From the Windows task bar click the Start button point to Programs McA...

Page 99: ...ecially immediately after you delete the file and before you save any new information that might be written over the deleted file s contents For privacy and security reasons you may want to be positiv...

Page 100: ...99 and can now have the option to shred an entire drive TIP If your computer is running on Windows Me some files even if shred may be retained on your PC since these are protected by the Windows Me S...

Page 101: ...fixes are periodically available n New product content is updated periodically n Updates to anti virus signature files are frequently available How Does the Updating Process Work Instant Updater allow...

Page 102: ...duct You can manually update while connected to the Internet To do this select the UPDATE function from within the individual product Manual Updating provides you with explicit control of the updating...

Page 103: ...t please visit http www mcafeehelp com Our support Web site offers 24 hour access to solutions to the most common support requests in our easy to use 3 step Answer Wizard Additionally you may use our...

Page 104: ...sScan includes twelve 12 months of free virus protection updates obtained using Instant Updater Renewal subscriptions are available at a cost of 9 95 per year at the www McAfee at home com Buy page Pl...

Page 105: ...bilities built into the operating system The increased traffic in larger networks requires the services of a special computer called a server Servers help larger networks operate by figuring out how t...

Page 106: ...ch packet as it arrives to verify that it s OK Once all the packets are received TCP puts them back in their original order Of course all of this happens quickly and automatically so you will never se...

Page 107: ...as you don t share your PIN with others and don t leave your card lying around your checking account balance is safe from prying eyes n Integrity Nothing can intervene and change the information durin...

Page 108: ...receives information the ISP must be able to keep the information safe Hackers like to attack the security of Web servers because Web server security is still in its infancy As a consequence Web admin...

Page 109: ...er indicates the security level of sites refer to your browsers online help or the printed documentation If SSL is so great what is the problem SSL is affected by a couple of problems One problem is t...

Page 110: ...recipient knows how you shifted the letters they can easily decrypt the message by reversing the process Of course a brute force approach to breaking this sort of encryption would simply try all poss...

Page 111: ...s safe to run it Both security schemes offer a level of safety but no one can yet promise that executable content is entirely safe Nasty Applets One possible security threat is a malign Java or Active...

Page 112: ...s of contracting a PC virus are slim and even more so your chances of contracting a truly vicious virus The scariest viruses are malicious programs that intentionally corrupt or delete the data on you...

Page 113: ...file in the case of macro viruses A virus cannot travel over your telephone line and infect your PC on its own You must first download or copy an infected application and then run the application in...

Page 114: ...u bought with their quantity and price What information do companies get when I register products online Companies get only the information that you enter in the registration form when you register el...

Page 115: ...store keeps on your computer holding your user name and password so that you do not need to enter this information each time you connect to the site Some stores may use the cookie information to reco...

Page 116: ...Internet Security and Privacy 116 McAfee Internet Security 5 0...

Page 117: ...Internet Service Provider ISP it s practically free Global access to information shopping on line banking and finance management instant messaging file sharing streaming video etc brings about today...

Page 118: ...apture the date and time the Web bug was accessed the browser version used and even the IP address of the computer that received the Web bug To maintain your privacy against Web bugs always block Web...

Page 119: ...nd blocking inappropriate vocabulary in more than one language M Block access to specific Web sites Proxy sites and Newsgroups If there is a specific Web site or proxy site that you do not want a user...

Page 120: ...sage from an unknown suspicious or untrustworthy source Do not open any files attached to an e mail message unless you know what it is even though it appears the e mail message came from someone you k...

Page 121: ...data with other networks servers and computers connected to the Internet Firewalls can hide your computer s identity For example if a hacker tries to invade your computer by scanning for a susceptible...

Page 122: ...d install updates upon their availability Updates include patches fixes updates to DATs virus definition files content and the virus scan engine itself n Configure your Internet security programs to s...

Page 123: ...s 64 Alert Messages 39 46 to 47 88 ActiveX delete 46 ActiveX scan 46 Cookie blocker 49 Credit card number accessed 44 Drive format 47 Guarded file 45 Harmful site 43 Identity Protector 52 Internet acc...

Page 124: ...g protocols 78 Firewall discussed 108 Firewall Communication Alert Messages 88 Flood blocking a TCP connection 78 Flushot 94 Forgotten Administrator password 36 Fraggle 94 Frequently asked questions A...

Page 125: ...mand Scanning 59 Oshare 95 Other Tasks 32 P Palm OS 22 Password Manager 20 48 Passwords 20 Forgotten 36 Lost 122 Password Manager 48 user 30 Using Browser Buddy 39 Web site login 34 PDA Devices suppor...

Page 126: ...Scan for viruses now 64 Set alert preferences 85 Set Startup Options 32 Set startup options 85 Set up Home Networking 85 View Activity Log 31 View network activity 85 TCP IP 105 Teardrop 95 Technical...

Page 127: ...Product Guide 127 Index...

Page 128: ...on products worldwide services and support contact your authorized McAfee sales representative or visit us at Network Associates 13465 Midway Road Dallas TX 75244 972 308 9960 www mcafee at home com N...

Reviews: