background image

User’s Guide

55

Using AntiVirus Features

You may want to change your settings under the following circumstances:

Table 7-1. 

If you want to

Use this option

Check for virus infection before a program 
starts up.

Program execution.

Check an e-mail attachment before it is 
opened.

E-mail file access.

Check a file before it is opened.

File Open.

Check a file when it is moved or renamed.

Move or Rename.

Check a file if it is stored on a floppy disk or 
removable media.

Floppy drive read

Check for boot sector or partition table viruses 
before Windows starts. These viruses may be 
detected when Windows starts, but they can 
be cleaned only in DOS. 

DOS Startup

Change the scope of what files are checked. 
This setting affects not only file-related checks 
but also the scheduled virus checks.

What to Check:

All Files checks every file. This 
is the most thorough, but most 
time consuming check. Use this 
setting if you use non-standard 
file extensions for your program 
or document files.

Program Files checks all 
program files, such as .Exe, 
.Com, .Dll file types. This will 
miss macro viruses, which are 
found in certain document 
types.

Document Files checks all data 
files recognized on your PC. 
This will miss program-related 
viruses.

Program and Document Files 
checks both program and data 
files. This is the default setting 
and the second most thorough 
check. It will miss only 
virus-infected files that have 
been renamed using a 
nonstandard program or 
document type.

Содержание Guard Dog

Страница 1: ...McAfee Guard Dog User s Guide...

Страница 2: ...If the Software is licensed as a suite or bundle with more than one specified Software product this license applies to all such specified Software products subject to any restrictions or usage terms s...

Страница 3: ...the limitations or other requirements described herein Upon any termination or expiration of this Agreement you must destroy all copies of the Software and the Documentation You may terminate this Ag...

Страница 4: ...at McAfee s option either i return of the purchase price paid for the license if any or ii replacement of the defective media in which the Software is contained You must return the defective media to...

Страница 5: ...ation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement 9 Export C...

Страница 6: ...ous This Agreement is governed by the laws of the United States and the State of California without reference to conflict of laws principles The application of the United Nations Convention of Contrac...

Страница 7: ...9 Step 1 Clean up your hard drive 9 Step 2 Remove temporary files 10 Step 3 Close other software 11 Installing other software from the Guard Dog CD 11 Chapter 3 Quick Tour of Guard Dog 13 Viewing the...

Страница 8: ...ty Protector does 37 Responding to an Identity Protector alert message 38 Why should I change my Identity Protector settings 39 What Web Trail Cleaner does 39 Responding to the Web Trail Cleaner alert...

Страница 9: ...and firewalls 62 What can I do to keep my stuff safe 63 How can I tell if a Web site is secure 63 How does encryption work 64 Security on the Web 65 Nasty applets 66 Can I prevent programs from access...

Страница 10: ...Table of Contents x McAfee Guard Dog Technical support 74 McAfee training 74...

Страница 11: ...damage the data on your computer s hard drive How Guard Dog works There are two main ways that Guard Dog protects you You can find any potential privacy security and virus threats that exist on your P...

Страница 12: ...and Compuserve Interactive 3 0 both include browsers that are compatible with Guard Dog What Internet problems Guard Dog solves This section briefly describes how Guard Dog protects you from the most...

Страница 13: ...grams can scan your PC for personal information or delete files without your permission File Guardian also limits access to protected files either to programs you specify or through file encryption It...

Страница 14: ...d sensitive files such as financial records and credit card numbers so they ll never be sent over the Internet without your OK Additional Scheduled events Schedule events that automatically Remove vir...

Страница 15: ...ystem requirements and how to install Guard Dog Chapter 1 Installing Guard Dog How to use the main features of Guard Dog Chapter 2 Quick Tour of Guard Dog How to change CheckUp and Protection settings...

Страница 16: ...help for a screen 1 In the Guard Dog Home screen click Help 2 Click Help for this screen to display a help topic that explains what you can do in or what you may need to know about the current Guard...

Страница 17: ...oks and operates best in a resolution of 800x600 pixels or greater and a color palette of 32 000 color mode 15 bit or higher 256 color palette is supported but may cause some color changes caused by p...

Страница 18: ...bstitute the correct drive letter 4 Read the text in the Welcome to Guard Dog screen then click Next to display the Software License Agreement 5 After you read the license agreement click Yes to conti...

Страница 19: ...ks permission to restart your PC appears Do the following Click the Readme window to read the file Close the window when you are finished Click Yes in the message box to restart your PC Guard Dog can...

Страница 20: ...Programs then Accessories then System Tools and click Disk Defragmenter 7 Click OK to start Disk Defragmenter Depending on the speed of your computer and the size of your drive this may take several m...

Страница 21: ...y item on the list except Explorer 3 Repeat steps 2 and 3 until you ve closed everything except Explorer 4 When you see only Explorer in the Close Program dialog box click Cancel You are now ready to...

Страница 22: ...Installing Guard Dog 12 McAfee Guard Dog...

Страница 23: ...Guard Dog s main features If you want to stop the video before it is done playing press the Esc key If you want to view the video again click Help on the Guard Dog Home screen then click How Guard Do...

Страница 24: ...uard Dog ask me to enter The Guard Dog interview asks you to enter the personal and financial information that you want to protect All the information you enter into Guard Dog is stored in encrypted f...

Страница 25: ...in Protection Settings Click Options on the Guard Dog Home screen then click Protection Settings Why should I create an Emergency Disk As part of the interview Guard Dog asks you to create an Emergen...

Страница 26: ...Guard Dog won t let you use the Password Manager information in Browser Buddy or send out information protected by Identity Protector If you ve forgotten your Guard Dog password you can retrieve it fr...

Страница 27: ...settings Options then click CheckUp Settings Adjust the Guard Dog general or alert settings Options then click Protection Settings Display a list of Guard Dog actions Log Display the McAfee Software H...

Страница 28: ...lick the Guard Dog icon in the Windows taskbar then click Run Guard Dog To close the Guard Dog Home screen Click the button in the upper right corner of the Guard Dog Home screen Part of Guard Dog rem...

Страница 29: ...at checks the CheckUp performs For example if you already had virus protection before installing Guard Dog you may want to turn off Guard Dog s Virus Check For more information see Changing CheckUp Se...

Страница 30: ...re likely to be available To update the Guard Dog program or virus pattern files 1 If you normally connect to the Internet before you start your browser start your Internet connection now 2 On the Gua...

Страница 31: ...message see Responding to Guard Dog alert messages later in this chapter Using the Guard Dog shortcut menu Even when you aren t running the main Guard Dog program you still have quick access to severa...

Страница 32: ...tion Mark button Figure 3 6 and then click anywhere inside the alert message Figure 3 6 The Question Mark button displays help information If you find over time that you are being alerted to potential...

Страница 33: ...many cookies have been allowed or rejected by Cookie Blocker and how many times search information has been blocked by Search Filter TIP Browser Buddy always remains displayed on top of any programs o...

Страница 34: ...h character in your password 5 Click OK To retrieve your username and password 1 In Browser Buddy select the site name if it doesn t appear automatically in the Current Web Site list 2 Drag your usern...

Страница 35: ...so that you can easily encrypt or decrypt all of the files that you designate for encryption in File Guardian NOTE Before you can encrypt a file you must add it to the Guarded Files list in File Guar...

Страница 36: ...Quick Tour of Guard Dog 26 McAfee Guard Dog...

Страница 37: ...e how much security and privacy you want or need how much of a risk you are willing to take with your personal data and how often you want to be alerted to a potential problem and asked to decide what...

Страница 38: ...feature in the list so that its option settings appear in the pane on the right Adjust settings for the feature as appropriate To find out what a setting does click the question mark button in the upp...

Страница 39: ...ion Settings 2 In the pane on left side of the screen make sure that a checkmark appears in the check box next to Scheduler If necessary click the check box to select it 3 Click the word Scheduler 4 C...

Страница 40: ...able media This event is automatically scheduled to occur when Windows starts Schedule a Virus Check on changed files Perform a Virus Check only on files that have been created or modified after the d...

Страница 41: ...then hold down the Shift key and click the last event To select non contiguous events click the first event then hold down the Ctrl key and click each desired event 2 Click Remove Remind to create an...

Страница 42: ...otection Looks for files containing personal information and lets you protect them Cookie Lists the cookies being stored on your PC and lets you remove them Search Filter Looks to see if information e...

Страница 43: ...rn to the Home screen click Apply To abandon these changes and return to the Home screen click Cancel Password Looks to see if you have any shared files folders on your PC and guides you through passw...

Страница 44: ...Customizing Guard Dog 34 McAfee Guard Dog...

Страница 45: ...kies Accept all cookies Display an alert message each time a cookie is sent to your browser The alert displays the name of the entity trying to set the cookie and advises you whether or not to accept...

Страница 46: ...e first time If you want to remove cookies for a site from which you ve previously accepted cookies run a CheckUp and remove the cookies for that site TIP You can run CheckUp so that it only looks for...

Страница 47: ...specify out over the Internet to an unsecure site Although you don t have to worry about a site when it using a secure connection there are many Web sites that use a secure connection only when dealin...

Страница 48: ...Let the information go out Block the information from going out Display an alert message when any application tries to send the information over the Internet to an unsecure site This is the response...

Страница 49: ...ion that you want to prevent from going out and select Allow Always Create a Guard Dog password If the Guard Dog password is not entered after you start Windows an unauthorized user of your PC can t v...

Страница 50: ...tes If you don t return to a site the cached files for the site are never used again they just sit and take up disk space until they are ultimately deleted by your browser If you later want to delete...

Страница 51: ...earch Filter selected in Security Settings Guard Dog automatically removes search information before you go to another Web site Guard Dog does not display an alert message for this feature but you can...

Страница 52: ...Privacy Features 42 McAfee Guard Dog...

Страница 53: ...n Responding to a Gatekeeper alert messages Guard Dog can display five different Gatekeeper related alert messages If you are using the default settings suggested by the Interview you will see the mes...

Страница 54: ...u haven t allowed the program to always open the other program Guard Dog displays an alert message Table 6 1 If you choose Guard Dog does this This time only Allows the program to access the Internet...

Страница 55: ...Guard Dog does this Allow always Lets the program start the other program Not this time Prevents the program from starting the other program just this time This time only Lets the program start the ot...

Страница 56: ...he operation or not Want to be warned when a program starts up another program Many newer programs will warn you before doing this but older programs may not do so For example Internet Explorer 4 uses...

Страница 57: ...yourself you should immediately investigate the program to determine its source ActiveX scan alert message There are legitimate reasons for allowing an ActiveX control to read through or scan all of y...

Страница 58: ...command is started Guard Dog doesn t know whether you told your PC to format a Zip disk or whether a rogue ActiveX control has started to format your hard disk You know that this activity is legitimat...

Страница 59: ...following circumstances Table 6 8 If you Use this option Want to be warned when an ActiveX control looks through the files on your PC This may happen legitimately if the control needs to find a file...

Страница 60: ...ored login names and passwords Add a record Edit a record Remove a record You can also add a record in Browser Buddy For more information see Using Browser Buddy to retrieve or store your Web site pas...

Страница 61: ...or remove records 3 Click Add 4 Type the information that you want to store in the record 5 Click OK To edit a password record 1 In the Password Manager list do one of the following Double click the r...

Страница 62: ...Security Features 52 McAfee Guard Dog...

Страница 63: ...elete the file If Guard Dog tries to clean a file but the virus has irreparably damaged the file you can only delete the file to get rid of the virus Continuing virus protection If you accepted the re...

Страница 64: ...ts Open a document This includes documents sent as e mail attachments Move or rename files Read a file from a floppy disk What files to scan while performing a virus check using CheckUp or Scheduler H...

Страница 65: ...d only in DOS DOS Startup Change the scope of what files are checked This setting affects not only file related checks but also the scheduled virus checks What to Check All Files checks every file Thi...

Страница 66: ...s Explorer or running a CheckUp to try to clean the file You may want to use this option if your PC runs unattended and you don t want to risk anyone having access to infected files on your PC you wan...

Страница 67: ...uses a database of known virus characteristics when it checks your PC for a virus but new viruses are always being created and old viruses are always being modified The McAfee Software virus research...

Страница 68: ...Using AntiVirus Features 58 McAfee Guard Dog...

Страница 69: ...e computers are equal to one another Windows has peer to peer networking capabilities built into the operating system The increased traffic in larger networks requires the services of a special comput...

Страница 70: ...e some of the packets to be delayed so they arrive out of order To compensate TCP examines each packet as it arrives to verify that it s OK Once all the packets are received TCP puts them back in thei...

Страница 71: ...ep back and consider the range of sensitive transactions we make every day As an example consider a simple ATM transaction We assume that following conditions prevail whenever we use our ATM cards Pri...

Страница 72: ...istrators track down networking problems Unfortunately the same tool can also be used to steal information Sniffers are insidious and difficult to detect Sniffing often begins when a hacker breaches t...

Страница 73: ...ions of Netscape Communicator and Microsoft Internet Explorer use a visual cue to tell you that the site is secure For more information see How can I tell if a Web site is secure NOTE Guard Dog s Chec...

Страница 74: ...s to know your bank account number Authentication usually entails entering a user ID and a password To circumvent intercepted passwords and IDs authentication employs encryption to scramble this infor...

Страница 75: ...some sites in the United States use a higher level of 128 bit encryption The number of bits indicates the length of the key used to encrypt data The longer the key the stronger and more secure the enc...

Страница 76: ...harming anyone However there is no guarantee that an attack will not happen in the future Can I prevent programs from accessing the Internet You can use Guard Dog to specify the applications that are...

Страница 77: ...ted program Boot viruses or Master Boot Record viruses The boot sector of a disk is a physical location on the disk that contains information about the disk and the files it contains All disks and dri...

Страница 78: ...ing your PC Viruses are spread when infected diskettes are shared between PCs and when you download and run infected files from on line services bulletin boards or the Internet Another potential but r...

Страница 79: ...of magazine subscribers or mail order companies can be sold to others Some companies allow you to specify that you do not want to receive mailings or to have your name and address sold to other compan...

Страница 80: ...more information see What Cookie Blocker does on page 35 Sources for Internet privacy and security information Finding out about Internet hoaxes The United States Department of Energy Computer Inciden...

Страница 81: ...ational Institute of Health s Computer Security Information site Good links to many security information sites http www alw nih gov Security security html Microsoft s Security site White papers and de...

Страница 82: ...Internet Security and Privacy 72 McAfee Guard Dog...

Страница 83: ...ard disk internal or external Version of system software Amount of memory RAM Extra cards boards or monitors Name and version of conflicting software EXACT error message as on screen What steps were p...

Страница 84: ...If you do not find what you need or do not have web access try one of our automated services If the automated services do not have the answers you need please contact McAfee at the following numbers M...

Страница 85: ...king sounds 29 bookmarks 40 boot sector viruses 67 Browser Buddy adding a new password record 23 dragging passwords from 24 opening 23 Password Manager and 23 Search Filter and 41 browser history 40 C...

Страница 86: ...goes out alert message 45 described 43 harmful site alert message 44 Internet access alert message 43 program starts up another program alert message 44 settings 45 Getting Started manual described 5...

Страница 87: ...ddy 23 adding record to 51 deleting record 51 described 50 editing record 51 passwords activating and deactivating 39 adding record to Password Manager 51 adding with Browser Buddy 23 Browser Buddy an...

Страница 88: ...41 settings 41 search information 41 secure connection 37 security threats 3 settings CheckUp 32 to 33 Cookie Blocker 37 File Guardian 49 Gatekeeper 45 Identity Protector 39 Scheduler 29 Search Filte...

Страница 89: ...macro 67 scheduling scans 30 threats 3 types of 67 updating list of 20 updating patterns with Scheduler 31 who creates them 66 W warnings See alert messages Web password management 23 Web sites harmf...

Отзывы: