User’s Guide
ix
Table of Contents
Responding to a Virus Sentry alert message . . . . . . . . . . . . . . . . . . . . .54
Why should I change my Virus Sentry settings? . . . . . . . . . . . . . . . . . .54
Keeping virus protection up-to-date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Appendix A. Internet Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . 59
Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
TCP/IP is the subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Why packets? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
The Internet and the Web…what is the difference? . . . . . . . . . . . . . . . .60
Privacy and security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Why does Internet privacy matter to me? . . . . . . . . . . . . . . . . . . . . . . . .61
Privacy on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Who is snooping? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Snooping and sniffing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Web servers and firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
What can I do to keep my stuff safe? . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
How can I tell if a Web site is secure? . . . . . . . . . . . . . . . . . . . . . . . . . . .63
How does encryption work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Nasty applets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
Can I prevent programs from accessing the Internet? . . . . . . . . . . . . . .66
Computer viruses and the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
Are viruses really that dangerous? . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Types of viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
How can my PC become infected with a virus? . . . . . . . . . . . . . . . . . . .68
Frequently asked questions about Internet privacy . . . . . . . . . . . . . . . . . . . .68
Sources for Internet privacy and security information . . . . . . . . . . . . . . . . . .70
Finding out about Internet hoaxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
More information about computer viruses . . . . . . . . . . . . . . . . . . . . . . .70
More information about security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
More information about privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Appendix B. Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
How to Contact McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Customer service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Содержание Guard Dog
Страница 1: ...McAfee Guard Dog User s Guide...
Страница 10: ...Table of Contents x McAfee Guard Dog Technical support 74 McAfee training 74...
Страница 22: ...Installing Guard Dog 12 McAfee Guard Dog...
Страница 36: ...Quick Tour of Guard Dog 26 McAfee Guard Dog...
Страница 44: ...Customizing Guard Dog 34 McAfee Guard Dog...
Страница 52: ...Privacy Features 42 McAfee Guard Dog...
Страница 62: ...Security Features 52 McAfee Guard Dog...
Страница 68: ...Using AntiVirus Features 58 McAfee Guard Dog...
Страница 82: ...Internet Security and Privacy 72 McAfee Guard Dog...