User’s Guide
ix
Table of Contents
VirusScan Central window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
VirusScan Classic window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
Configuring VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
Appendix A. Internet Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . 55
Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
TCP/IP is the subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
Why packets? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
The Internet and the Web…what is the difference? . . . . . . . . . . . . . . . .56
Privacy and security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Why does Internet privacy matter to me? . . . . . . . . . . . . . . . . . . . . . . . .57
Privacy on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Who is snooping? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Snooping and sniffing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Web servers and firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
What can I do to keep my stuff safe? . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
How can I tell if a Web site is secure? . . . . . . . . . . . . . . . . . . . . . . . . . . .59
How does encryption work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
Security on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Nasty applets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Can I prevent programs from accessing the Internet? . . . . . . . . . . . . . .62
Computer viruses and the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Are viruses really that dangerous? . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Types of viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
How can my PC become infected with a virus? . . . . . . . . . . . . . . . . . . .64
Frequently asked questions about Internet privacy . . . . . . . . . . . . . . . . . . . .64
Sources for Internet privacy and security information . . . . . . . . . . . . . . . . . .66
Finding out about Internet hoaxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
More information about computer viruses . . . . . . . . . . . . . . . . . . . . . . .66
More information about security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
More information about privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Appendix B. Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
How to Contact McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Customer service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Содержание INTERNET GUARD DOG 3.0
Страница 1: ...Internet Guard Dog User s Guide Version 3 0...
Страница 10: ...Table of Contents x Internet Guard Dog Technical support 70 McAfee training 71...
Страница 20: ...Welcome to Internet Guard Dog 10 Internet Guard Dog...
Страница 40: ...Quick Tour of Internet Guard Dog 30 Internet Guard Dog...
Страница 48: ...Privacy Features 38 Internet Guard Dog...
Страница 78: ...Internet Security and Privacy 68 Internet Guard Dog...
Страница 82: ...Product Support 72 Internet Guard Dog...