background image

McAfee Office

Version 3.1

User’s Guide

Содержание OFFICE 3.1

Страница 1: ...McAfee Office Version 3 1 User s Guide...

Страница 2: ...ffiliates in the US and or other countries All other registered and unregistered trademarks in this document are the sole property of their respective owners LICENSE AGREEMENT NOTICE TO ALL USERS CARE...

Страница 3: ...duct packaging for the Software you may make use and install as many additional copies of the Software on the number of Client Devices as the volume license authorizes You must have a reasonable mecha...

Страница 4: ...e at McAfee s option either i return of the purchase price paid for the license if any or ii replacement of the defective media in which the Software is contained You must return the defective media t...

Страница 5: ...ation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement 9 Export C...

Страница 6: ...eous This Agreement is governed by the laws of the United States and the State of California without reference to conflict of laws principles The application of the United Nations Convention of Contra...

Страница 7: ...1 Where to go for more information 21 Chapter 2 Installating McAfee Office 23 System requirements 23 Individual product requirements 23 Installation 24 Chapter 3 McAfee VirusScan 27 How does VirusScan...

Страница 8: ...redder tab 57 Quick Copy tab 57 Zip File Manager tab 58 Repair and Recover 58 Disk Minder 58 Using Disk Minder 58 Customizing Disk Minder Properties 60 Creating and reverting to an Undo file 61 Using...

Страница 9: ...y 83 Cleaning the Registry 84 Repairing the Registry 84 Tuning up the Registry 85 Registry Pro 86 Finding a Registry entry 86 Finding orphans 87 Editing a Registry entry 87 Importing a Registry file 8...

Страница 10: ...backup set 108 Modifying or deleting backup sets 109 Repairing and rebuilding a backup set 110 Secure and Manage 111 EZ Setup 111 System tab 111 Explorer tab 113 Run Add Remove tab 115 Send To tab 11...

Страница 11: ...How McAfee Firewall works 135 About Winsock 2 136 Configuring McAfee Firewall 136 Applications 137 Control applications 137 Default settings for applications 137 Systems 138 Control system 138 Defaul...

Страница 12: ...ack 156 How do I set BackTrack Monitor to run in the background 156 How do I monitor installation of a single application 157 How do I undo an application installation that I monitored 157 Using Resto...

Страница 13: ...178 Internet filtering 178 Viewing Activity Logs 179 Performing a Security Check 180 Responding to Product Name alert messages 180 Using Browser Buddy to retrieve or store your Web site passwords 181...

Страница 14: ...194 From the Windows Explorer 194 Selecting recipients 194 Taking shortcuts 195 From the PGPtools application 195 PGPdisk 195 Creating a new PGPdisk volume 196 Changing a passphrase 197 Add Remove Pub...

Страница 15: ...y tools to help maintain your PC s health and well being Use McAfee Office utilities together or individually to protect your PC from viruses ensure privacy of your PC s data files and improve overall...

Страница 16: ...ble to all customers 24 hours a day McAfee Utilities McAfee Utilities helps you keep your PC working at optimum efficiency and speed You can diagnose and repair your system and application software cr...

Страница 17: ...if the hard drive s directories and data are severely damaged or lost You can also create mirror backups that instantly back up data as you save it make backups after a time delay when the PC is idle...

Страница 18: ...thout worrying that your privacy and computer security will be compromised Internet Guard Dog provides security by Checking your computer for potential security risk and privacy issues allowing you to...

Страница 19: ...ts the privacy of your email messages and files via encryption so that only the intended recipients can read them You can also digitally signed messages and files ensuring its authenticity and verifyi...

Страница 20: ...d diagnose and repair their PCs McAfee com provides e software to seamlessly blend the power of the online computer the ubiquity of the Internet and the richness of the Web to furnish visually appeali...

Страница 21: ...e disk for use in the event that their Windows system will not boot Single update button McAfee Office can automatically update all of the installed components via the info button Improved central inf...

Страница 22: ...sing the hypertext links in the Table of Contents and Index or search for information using the Find feature Print one or all pages of the User s Guide for offline reference View Acrobat Reader Help f...

Страница 23: ...ree disk space for complete installation of all products 4X CD ROM recommended 256 color VGA or higher monitor An Internet connection is needed for some of the components Individual product requiremen...

Страница 24: ...allation of McAfee Office the AutoRun program prompts you to choose a location where you want to install McAfee Office You can accept the default location or type in a new location Use the following p...

Страница 25: ...plete installation NOTE Prior to installing any application from the McAfee Office suite McAfee Office Central will identify any existing copies on your system McAfee Office Central will proceed with...

Страница 26: ...Installating McAfee Office 26 McAfee Office...

Страница 27: ...logies that McAfee and McAfee VirusScan researchers developed independently for more than a decade What comes with VirusScan software VirusScan software consists of several components that combine one...

Страница 28: ...the upper right hand corner of the window To view available options in customizing how you want McAfee VirusScan components to work on your PC click the Options button The VirusScan Console This compo...

Страница 29: ...n options prevents others from making unauthorized changes The same convenient dialog box controls configuration options for all VShield modules Safe Sound This component allows you to create backup s...

Страница 30: ...ners This component consists of a set of full featured scanners you can use to run targeted scan operations from the MS DOS Prompt or Command Prompt windows or from protected MS DOS mode The set inclu...

Страница 31: ...now use the Microsoft Windows Installer MSI which comes with all Windows 2000 Professional systems This Setup utility offers a wealth of custom installation and configuration features that make VirusS...

Страница 32: ...for user action alert appears Changes in product functionality A new Alert Manager Client configuration utility allows you to choose an Alert Manager server installed on your network as an alert mess...

Страница 33: ...or to performing this task Starting the VirusScan application You can start the VirusScan application in its own window or as part of a scheduled scan task The method you choose depends on what sort o...

Страница 34: ...ng immediately Click Scan to have the application scan your system with the last configuration options you set or with default options The following screen Figure 3 2 allows you to select which area o...

Страница 35: ...View the VirusScan application activity log Through this window you are able to view a log of VirusScan activities performed on your your computer You can also select to clear or print any of these ac...

Страница 36: ...click an item with your left mouse button after your mouse cursor changes to Set options From the main window the Options icon allows you to access and customize settings of the other components of Mc...

Страница 37: ...ms The safest course of action you can take is to install VirusScan software then scan your system immediately and thoroughly When you install VirusScan software Setup starts the VirusScan application...

Страница 38: ...hether you cycled the power on your computer 4 Type y to continue then skip to Step 7 If you did not type n then turn your computer completely off and begin again The batch file next tells you that it...

Страница 39: ...your computer off again 7 When BOOTSCAN EXE finishes examining your system you can either Return to working with your computer If BOOTSCAN EXE did not find a virus or if it cleaned any infected files...

Страница 40: ...a specialized function You can configure settings for all of these modules in the VShield Properties dialog box The VShield modules are System Scan This module looks for viruses on your hard disk as...

Страница 41: ...VShield scanner detects viruses in memory and as they attempt to execute from within infected files Malicious object detection and blocking The VShield scanner can block harmful ActiveX and Java objec...

Страница 42: ...nd Netscape Communicator America Online mail v3 0 v4 0 and v5 0 In order to work with the VShield E mail Scan module your corporate e mail system must use Lotus cc Mail Microsoft Exchange or Microsoft...

Страница 43: ...ofessional the VShield scanner loads as a Windows NT service called VShield which you can see in the Windows Services control panel NOTE McAfee recommends that you do not start or stop the VShield ser...

Страница 44: ...mory for use The VShield scanner can start and remain active in memory even with none of its modules enabled Method 1 Use the VShield shortcut menu Follow these steps 1 Right click the VShield icon in...

Страница 45: ...og box Figure 3 7 System Scan Status dialog box 2 For each module that you want to enable click the corresponding tab then click Enable The same button in the property page for active modules will rea...

Страница 46: ...An active module is one that the VShield scanner has enabled or loaded into memory and that is ready to scan inbound and outbound files An inactive module is one that the VShield scanner has disabled...

Страница 47: ...ons right away you can then tailor the program to work better in your environment as you become more familiar with the scanner and your system s susceptibility to harmful software To start the VShield...

Страница 48: ...et e mail clients Select this checkbox if you use a Post Office Protocol POP 3 or Simple Mail Transfer Protocol SMTP e mail client that sends and receives standard Internet mail directly or through a...

Страница 49: ...rify which e mail system your office uses check with your network administrator Be sure to distinguish between Microsoft Outlook and Microsoft Outlook Express Although the two programs share similar n...

Страница 50: ...ile Java and ActiveX objects or dangerous Internet sites that can cause your system harm select Yes enable hostile applet protection and access prevention to unsafe websites then click Next The Intern...

Страница 51: ...con to display these commands Status Choose this to open the VShield Status dialog box Properties Point to this then choose one of the modules listed to open the VShield Properties dialog box to the p...

Страница 52: ...McAfee VirusScan 52 McAfee Office...

Страница 53: ...fee Utilities central window Figure 4 1 McAfee Utilities Central window The McAfee Utilities Central window offers buttons to take you to the four suites of utilities Figure 4 1 If you need help click...

Страница 54: ...how recent folders Select this option if you want to display list of folders you have recently looked into Click folder button to display list History List Use this option to indicate the number of fi...

Страница 55: ...n the drive then select Properties from the drop down menu and the following tabs are displayed General tab displays information on available and used space on your computer Tools tab displays informa...

Страница 56: ...ter making your selection click Apply then click OK Start Menu tab The Start Menu tab displays options you can select to access faster frequently run applications and control panel applets Select Enab...

Страница 57: ...ng additional options Prompt before shredding Show icon on desktop Add to Send To menu Check disk for error before shredding After making your selection click Apply then click OK Quick Copy tab The Qu...

Страница 58: ...rash or whenever you receive a message telling you a file cannot be accessed for any reason you should use Disk Minder to verify the integrity of the disk containing that file The earlier you fix a di...

Страница 59: ...finds an error and letting you interactively decide whether or not you want to fix the problem When Disk Minder finds a problem while checking a drive interactively it displays a message that asks you...

Страница 60: ...checks the compressed volume files or logical disks Check for Valid File Names verifies that file names use acceptable characters Valid characters for file names are numbers 0 9 letters A Z and basic...

Страница 61: ...Write Read Compare Surface Scan available This is a more in depth diagnostic test and can often find damaged sectors or sectors that are likely to fail where the normal surface scan cannot Creating an...

Страница 62: ...age s Restore option to restore the latest states of your files and folders or directories Image stores its information in a file on your hard drive This file is stored using a special patent pending...

Страница 63: ...iles If you have deleted data files that you need you can restore a copy of them from your last backup set protected volume file or directory created with Safe Sound WARNING Do not restore an image ex...

Страница 64: ...e Allocation Tables In most cases you should use the Image default settings If you are an advanced user you may want to only restore one or two of the options Master boot sector Select this option if...

Страница 65: ...e The system hard drive is the hard drive that contains your Windows directory or folder You can use the Rescue disk that is created by default NOTE The rescue disk set boots from a floppy but include...

Страница 66: ...s fixing problems automatically undoing previous configuration settings and accessing a database of information to assist in troubleshooting common computer problems There are three main buttons to se...

Страница 67: ...Issues Suggestions for improving the performance of your PC For example a performance tip might suggest that you install QuickTime if it isn t already installed From the CheckUp Report screen you can...

Страница 68: ...your participation to fix them For example if CheckUp determines that an important software component is missing you ll need to locate the required CD or floppy disk and insert it in the drive NOTE Y...

Страница 69: ...rb your Windows configuration Most First Aid fixes Although all First Aid 2000 fixes are safe there are certain fixes that may not be appropriate for your PC In addition a fix may cause problems if Fi...

Страница 70: ...e and software companies Videos displays presentation about Windows and your PC System Info generates detailed inventory of your computer s configuration which is useful when contacting technical supp...

Страница 71: ...configurations and is designed to help you use analyze and configure your PC It provides all the information you need to make optimum use of all available memory NOTE You should have general knowledg...

Страница 72: ...dules Drives tab gives you a complete summary of any drive installed on your system and of all the directories folders and files on that drive You can immediately see the total size of each drive the...

Страница 73: ...y with scrolling lists and buttons you can click to obtain additional information or perform related tasks such as running or stopping benchmark tests TIP In several of the detail information panels y...

Страница 74: ...sional or Discover Small Size For details about these two display styles Save Window Positions lets you save the locations of your Discover Pro windows so the next time you start Discover Pro they app...

Страница 75: ...you ve deleted even after you ve emptied the Recycle Bin Your best chances of successfully undeleting a file is immediately after you perform the deletion Once you save additional files after deletin...

Страница 76: ...ated and displayed for you to review and decide which files should be deleted moved compressed etc Disk Tune Disk Tune optimizes your hard disk and improves your computer s performance by rearranging...

Страница 77: ...agment defragments your fragmented files and rewrites these to the disk without rearranging other files and without regard to the File Placement criteria Free space remains fragmented Consolidate Free...

Страница 78: ...nctions tab allows you to select the functions safety level and write verification levels Zero Free Space zeros out the free clusters after you finish tuning the disk This wipes out any leftover data...

Страница 79: ...ies your disk into five regions Top High Middle Low and Bottom You can group your files into five categories Windows Components Recently accessed programs Recently modified files User specified files...

Страница 80: ...folders or directories The Directory Sort tab lets you change the order files are placed in the region as well as the order in which they appear in the folder or directory Global Settings tab The Glob...

Страница 81: ...l files on your drive or limit your search for all files in a directory including or excluding subdirectories Clicking the msoffice directory and entering the file name HLP creates a file specificatio...

Страница 82: ...g the Registry Wizard Backup Restore Clean Repair Tune up Your overall objectives are to remove unnecessary items ensure that all items point to actual files sort the Registry so that associated items...

Страница 83: ...king up Restoring the Registry The Registry Wizard Backup Restore dialog box appears after you select the Backup Restore option and click Next in the Regustry Wizard From this dialog box select whethe...

Страница 84: ...that it can Registry Wizard displays the Registry Wizard Repair Report dialog box This Repair Report lists the Registry key entries that Registry Wizard can fix along with a description of the file a...

Страница 85: ...han key entry that Registry Wizard has found in the Orphan tab list Select a column title to change the sort order of the keys Select a key handle or child key and click Repair to manually edit its va...

Страница 86: ...that a new copy of your Registry has been created and you need to restart Windows to apply the new Registry 3 Click Finish 4 Click the Start button and choose the Shut Down command 5 Select the Restar...

Страница 87: ...er into Registry Pro so you can examine it or edit its contents When you export a Registry file you can save it with a unique file name in any location you like This lets you create and use different...

Страница 88: ...Thereafter when you launch that application the system reads a single file rather than multiple files across the hard drive The Launch Rocket Wizard lets you enable the utility and configure its setti...

Страница 89: ...ng to locate the original file Delete orphaned shortcuts If wizard displays orphaned shortcut that points to a file or folder that has been deleted already you can select to delete shortcut since it n...

Страница 90: ...t that should let you save your data This procedure has some inherent risks and you should follow the steps in the procedure below when trying to AutoFix a crashed program Recovering a crashed locked...

Страница 91: ...vate button in the Crash Protector box 3 Attempt to save your work in the application 4 Exit the application immediately and restart Windows Selecting Crash Protector Properties McAfee Crash Protector...

Страница 92: ...shes and errors generated by 16 bit programs and files 32 bit Protection provides protection from crashes and errors generated by 32 bit programs and files Kernel Mode Protection provides protection f...

Страница 93: ...one stop system monitoring and application launch pad The most important gauges The following list summarizes the most important gauges Highest Resources The Highest Resources gauge measures system r...

Страница 94: ...o add update or remove gauges Adding a new gauge If you don t see a particular gauge in the WinGauge window you can add it to the window To add a gauge 1 Point to a gauge or the empty gauge area and p...

Страница 95: ...mmand WinGauge updates the gauge information Removing a gauge To remove a gauge from the WinGauge window 1 Point to a gauge and press the Right mouse button 2 Choose the Remove command WinGauge remove...

Страница 96: ...the WinGauge window 2 Hold down the CTRL key and drag the corner or side of the window to modify the dimensions of the window You can also resize all of the gauges in the Properties sheet s Global ta...

Страница 97: ...cted gauge set the threshold level of your gauges change the global dimensions fonts and Bubble Help options apply a background pattern to your gauge window manage the alarm notification system for yo...

Страница 98: ...part and click the Set Color button A standard Windows Color dialog box appears where you can select basic colors or define your own custom colors Text default black Sets the color for gauge text vis...

Страница 99: ...lighted edges You can also change the color used for the frame in the Color dialog box click the Set Color button Background default black Sets the color for the gauge s data background visible when T...

Страница 100: ...ith an alarm being triggered when your available disk space drops to 5 Properties Global tab The Global tab contains several options which allow you to change the appearance of all gauges Change dimen...

Страница 101: ...t Background Pattern panel of the dialogue box TIP When selecting a bitmap to use as a pattern keep in mind that lighter colors provide for greater gauge readability Bitmaps amenable to tiling also le...

Страница 102: ...the Recycle Bin icon in My Computer or Windows Explorer choose Properties select the McAfee Utilities tab and select the Enable Trash Guard check box Specifying Trash Guard Properties Trash Guard s Pr...

Страница 103: ...ctory tree even if all its parent nodes are erased Safe Sound provides internal redundancy in the protected volume file backups you create It does this by marking each sector of each file that it back...

Страница 104: ...he protected volume file backup type Defining your backup strategy After you decide which backup type you want to use either a protected volume file or a directory backup set the most important questi...

Страница 105: ...time to recover a previous version of a file if you ever need to TIP Save early save often While working in applications you can almost always press CTRL S to save your work as you go The more often...

Страница 106: ...files in or out of the backup location or delete the files The drawback of selecting a directory backup type is that the files are no more protected than if you had created a backup copy yourself 4 Sp...

Страница 107: ...e Backup Drive list so you can select any of the ones you want to add to your backup set Click folders to open and close them Click the check boxes to place a check mark beside the drives or directori...

Страница 108: ...e the HIDE MS DOS FILE EXTENSIONS FOR FILE TYPES THAT ARE REGISTERED check box is deselected Registered file types are also listed in the File Types tab in the Options dialog box The other place where...

Страница 109: ...otable disk created by Rescue to restore files from a backup set located on a damaged drive To restore a backup set 1 Open Windows Explorer or My Computer and open the backup set If the backup set is...

Страница 110: ...blem with the backup set itself you can repair or rebuild it For example if your computer crashes while the backup is being created or updated automatically the backup s contents may be incomplete or...

Страница 111: ...any desktop icon for easy access encrypt or decrypt files for added security and privacy permanently erase files or non file data on your hard drives create zip files and build self expanding executab...

Страница 112: ...k compression method that creates a compressed drive which is actually a compressed volume file or CVF usually named DBLSPACE 001 that is stored on your hard drive Always load DriveSpace drivers Most...

Страница 113: ...wn list box Choose a logo screen name and the screen preview shows the current image for that logo screen Then you can use the Change Edit or Default buttons to change edit or reset the default image...

Страница 114: ...ing Discover to extract the icon to a file Click the Software tab the Advanced button and the App Resources icon Then select EZ Setup in the Modules list select the icon in the Resources list at the l...

Страница 115: ...start Windows the program no longer starts automatically Select a program and click Edit to edit the program s file name or path Select a program and click Properties to view its Properties sheet The...

Страница 116: ...ck Properties to view its Properties sheet Context Menu tab The Context Menu tab lets you disable enable or delete commands in the top section of the Windows Context menu You cannot remove the Open Ed...

Страница 117: ...ed unless you are positive that you will never use them A warning message appears to let you confirm these deletions before they happen You can remove a Context menu command either by clicking the Rem...

Страница 118: ...ng them docking undocking Launch Pad and having Launch Pad hide until you need it Hiding and showing Launch Pad You can hide Launch Pad and restore it to your desktop in two different ways If you want...

Страница 119: ...nd all the icons inside the window by holding down the CTRL key as you drag the corner or edge of the Launch Pad window As you resize the sizes and dimensions of the icons adjust to fit your new Launc...

Страница 120: ...e hard disk of your computer for secure storage and to securely wipe files from your hard disk so that sensitive data can t be retrieved with disk recovery software PGPdisk PGPdisk enables you to crea...

Страница 121: ...r you can begin corresponding with other PGP users You will need a copy of their public key and they will need yours Encrypting emails and files After you have generated your key pair and have exchang...

Страница 122: ...pered with You can decrypt files using PGPtools 1 In the Windows Explorer select the file or files that you want to decrypt 2 Drag the file onto the Decrypt Verify button in the PGPtools window The PG...

Страница 123: ...decimal points You can use the arrows to increase or decrease the number displayed on the field 5 Click the appropriate radio button to select kilobytes megabytes or gigabytes Depending on the amount...

Страница 124: ...formatting is complete 15 Click Close on the format window Your PGPdisk volume appears in an Explorer window and an icon representing your volume also appears in the location you specified Double cli...

Страница 125: ...diately after you delete the file and before you save any new information that might be written over the deleted file s contents For privacy and security reasons you may want to be positive that the i...

Страница 126: ...to the McAfee Shredder icon Click Cancel to return to the desktop without shredding the listed file or any others you dragged onto the McAfee Shredder icon To shred files in the McAfee Shredder 1 Sele...

Страница 127: ...file you shred So if you sometimes delete files you ll want to periodically shred the non file data again IMPORTANT After you shred non file data you will not be able to undelete any deleted files th...

Страница 128: ...ing hard disk space Second zipping is a good way to create manage and store collections of related files as archival back ups Third you can efficiently share zipped files with other people Most of the...

Страница 129: ...ome of these properties if you are working in advanced McAfee Zip Manager Setting Explorer and startup options The General tab in the McAfee Zip Manager Properties sheet offers the following options M...

Страница 130: ...option will not save the sub folders paths When you extract the files they are all put into the folder you select when you extract them You can select any combination of Save Folder Information Save...

Страница 131: ...ntire process helping you identify and select the files you want and the locations where you want to put the final compressed or extracted files Building self extracting archives You can use ZipMan Wi...

Страница 132: ...hive Obtain information about your current zip archive Add files to a zip archive Remove files from an archive Delete files from the archive Switch to ZipMan Wizard McAfee Zip Manager Menus As with al...

Страница 133: ...y location such as from Windows Explorer directly into the McAfee Zip Manager File table an effective and efficient method of selecting and managing files and archives that follows standard Windows fi...

Страница 134: ...McAfee Utilities 134 McAfee Office...

Страница 135: ...re away and your PC is connected 24 hours a day How McAfee Firewall works McAfee Firewall is a simple to operate security tool for the non technical users It dynamically manages your computing securit...

Страница 136: ...figuration of McAfee Firewall is divided into two parts application and system Upon installation a base set of rules for system services such as ICMP DHCP and ARP is installed these are considered def...

Страница 137: ...communicate You are only prompted once Known applications are either allowed or blocked depending on which list they have been put in Default settings for applications When installed the default setti...

Страница 138: ...tem is configured to support NetBIOS over other protocols such as IPX or NetBEUI then filesharing may be allowed if non IP protocols are allowed see Other Protocols below Identification Allowed This s...

Страница 139: ...erating system can provide access control such as is found in Linux and Unix When you use a password to protect your configuration The settings cannot be changed while McAfee Firewall is running unles...

Страница 140: ...he Settings menu item and the Applications option on the popup menu 2 Do not select Trust all applications unless you are very sure this is what you want When selected all applications are freely allo...

Страница 141: ...on each network segment 3 Select the Settings menu item and the System option on the popup menu 4 From the list of network devices determine which device is connected to which network segment you lis...

Страница 142: ...page does not cancel these changes If in doubt review the settings later to confirm 3 Choose OK to close the System Settings dialog box Using Password Protection The following steps will help the Adm...

Страница 143: ...er to use a new password every time you make an important configuration change Every file you create with a password is valid in that McAfee Firewall will see that it matches the password you used for...

Страница 144: ...McAfee Firewall 144 McAfee Office...

Страница 145: ...of all files needed by the operating system For each application the SmartLinks database stores information about all of the files that the application needs to run correctly including icons dynamical...

Страница 146: ...the Options menu in the main UnInstaller screen The UnInstaller Settings dialog box pages is displayed and will allow you to view or change all settings that you specified in the interview see Changi...

Страница 147: ...etes any application you specify and removes all related shortcuts and Registry entries Archive Compresses an application into a backup file that you can restore whenever you need it again You can als...

Страница 148: ...uardian to schedule the QuickClean wizard that keeps your computer free of junk files and to set up Installation Monitor so that it either does or does not run in the background as you work TIP If the...

Страница 149: ...events in the Events window and click Schedule to open the Event Schedule dialog box The default scheduled events are Qclean exe Rebuild the Smartlinks Database Run Installation Monitor in the Backgr...

Страница 150: ...o run automatically as described in the following section To remove more files of different kinds and free a specific amount of disk space use the SpaceMaker wizard How do I set up QuickClean to run a...

Страница 151: ...sed backup copies of the files Then let it free space for you NOTE By default files are backed up before they are deleted The compressed backup uses less disk space than the deleted files and gives yo...

Страница 152: ...emove in the UnInstaller window Choose the Remove wizard to completely remove An application that you no longer use As you buy new programs old programs become obsolete or no longer useful The Remove...

Страница 153: ...t you to use a single copy of the application on more than one computer as long as only one computer is in use at a time Choose the Transport wizard to Create a copy of an application on a different c...

Страница 154: ...removable disk insert the disk that contains the package file If you created the Transport package on a network drive make sure that the computer where you want to build the transported application i...

Страница 155: ...u click a shortcut or Programs list entry for an archived application you can choose whether to restore the application Think you might need an application again If you are not sure that you want to g...

Страница 156: ...lication You can use the UnInstaller Installation Monitor to watch applications as they install making a record of every file that was added deleted or changed during installation Then you can use the...

Страница 157: ...ght click the Guardian icon point to UnInstaller and click Launch Installation Monitor By default the icon is located in the lower right corner of your screen near the clock 2 In the dialog box that a...

Страница 158: ...Track wizard removes the application and returns Registry settings to the values that were in effect before the application was installed The wizard displays a message telling you when it successfully...

Страница 159: ...zard screen you can choose How to replace files in restoration folders You can choose to Only replace older files with newer files Always replace existing files Never replace existing files The defaul...

Страница 160: ...u must click OK for each file in a message box To restore remaining files without confirming them you can click Yes to All at any time 5 Click Restore to begin restoring the files When the wizard rest...

Страница 161: ...ist To add an executable file to the Windows Programs list select the file name in the PowerClean list Then click Connect to Start menu on the Tools menu and specify where you want to add the file in...

Страница 162: ...t file groups Click the next to the group name to expand the group list The right pane displays the names of files in the selected default group Files are color coded to indicate how important they ar...

Страница 163: ...net browser caches for future use including GIF and JPG files The Internet Documents category includes all HTM and HTML files found on your computer If you are developing Web based information these f...

Страница 164: ...te the names with semicolons For example to find graphics files with specific extensions you might enter bmp tif jpg or to find spreadsheet files for January and February you might enter jan xls feb x...

Страница 165: ...bout the menu commands click Help and click What do the PowerClean menu commands do in the What do you want to know about PowerClean section PowerClean menu commands This menu Contains these commands...

Страница 166: ...ean tab panes Click this tab To see Advice Information about the selected default group of files including suggestions about what you should or should not do If you select a custom group that you crea...

Страница 167: ...ications and files that are not old enough to be deleted The original default is set to prevent you from deleting these files We strongly recommend that you keep this default setting Files used by app...

Страница 168: ...browsers such as AOL Internet Explorer or Netscape Navigator UnInstaller automatically finds the folder where the browser caches files that it downloads as you open a page on the Internet If you are u...

Страница 169: ...he pie chart on the right shows the percent of disk space regained by the selected action if you are viewing a specific action report or by all UnInstaller actions if you are viewing Master Log inform...

Страница 170: ...McAfee UnInstaller 170 McAfee Office...

Страница 171: ...with its comprehensive features designed to protect your privacy and security when surfing the Internet With its new features you can now also act as an Administrator and apply customized protection s...

Страница 172: ...n t connect through a network your computer must have a modem installed You can establish an Internet connection through an Internet Service Provider ISP such as Earthlink An ISP acts as a middleman b...

Страница 173: ...along to the next site you visit Without Search Filter your browser can transfer your search request information from one Web site to another without your knowledge Protection from security threats G...

Страница 174: ...feature asks you to enter information or asks you how you want Product Name to respond to certain situations On each interview screen you can click Back to return to a previous screen or click Next to...

Страница 175: ...you type the numbers into separate boxes How Internet Guard Dog Administrator works Since Internet Guard Dog now offers multi user logon capabilities this feature allows one user to act as the admini...

Страница 176: ...you provided when you created your password Without the password you can still open the Guard Dog Home screen but you won t be able to change your CheckUp Settings or Protections Settings Also Intern...

Страница 177: ...McAfee Software on the Web Display the McAfee Software Support page in your Web browser Help then select Product Name on the Web Access the McAfee Web site McAfee com Display the Support FAQ page in...

Страница 178: ...op down menu options Figure 7 17 Content Ratings This option allows you to control what kind of Web contents the user is allowed to view Web Sites This option allows you to control what Web sites the...

Страница 179: ...ity Logs feature This list is generated based on his preferred security and privacy settings for himself and for other profiled users he created Anything from dates and time that a user logged on to P...

Страница 180: ...ems it discovered 2 To view a problem that Product Name has identified highlight the item and click Fix 3 Read the Product Name recommendation and then click the appropriate button If you want more in...

Страница 181: ...r Buddy to retrieve or store your Web site passwords You can depend on Product Name to help you easily navigate through the intricacies of the Web For example when you connect to Web sites that requir...

Страница 182: ...Password Manager drop down list The Enter password to save dialog box is displayed 2 In the Web site text box enter the Web site address in the Username text box type the name by which you identify y...

Страница 183: ...oft Expedia use cookies to store your password and preferences so that you can automatically log on to the site Internet Guard Dog s Cookie Blocker offers three options for controlling the use of cook...

Страница 184: ...re many Web sites that use a secure connection only when dealing with credit card transactions If more than one person is using your computer make sure that you create an Internet Guard Dog password I...

Страница 185: ...n and the next site you visit can extract it without your knowledge Search Filter blocks this information from being passed along to the next site If you have Search Filter selected in the Security Se...

Страница 186: ...tive data from being opened renamed copied moved or deleted For added protection you can even encrypt files protected by File Guardian Product Name can also alert you if a program attempts one of the...

Страница 187: ...to the form displayed in your browser In Protection Settings you can View your list of stored login names and passwords Add a record Edit a record Remove a record You can also add a record in the Brow...

Страница 188: ...ernet Guard Dog 188 McAfee Office 2 Change the information that you want to store in the record 3 Click OK To remove a password record In the Password Manager list click a record to select it then cli...

Страница 189: ...cations supported by the PGP plug ins With these plug ins you can encrypt and sign as well as decrypt and verify your messages while you are composing and reading your mail with a simple click of a bu...

Страница 190: ...so it s quite easy to trade keys with someone You can include your public key in an email message copy it to a file or post it on a public or corporate key server where anyone can get a copy when the...

Страница 191: ...If your email application is not supported by the plug ins you can copy the message to the clipboard and perform the appropriate functions from there If you want to decrypt and verify file attachment...

Страница 192: ...t from your application to the clipboard decrypt and verify the information and then view the contents After you view the decrypted message you can decide whether to save the information or retain it...

Страница 193: ...upported email applications If you have one of these popular email applications supported by the PGP plug ins you can access the necessary PGP functions by clicking the appropriate buttons in your app...

Страница 194: ...supports the PGP MIME standard or an application such as Exchange or Outlook that doesn t require PGP to encrypt or sign files you must use this method to attach files that you want to send along wit...

Страница 195: ...and files directly from the PGPtools window You can open the PGPtools window in two ways Click Start from thedesktop window scroll to Programs then PGP and select PGP tools Double click the PGPtools...

Страница 196: ...o decimal points You can use the arrows to increase or decrease the number displayed on the field 5 Click the appropriate radio button to select kilobytes megabytes or gigabytes Depending on the amoun...

Страница 197: ...rmatting is complete 15 Click Close on the format window Your PGPdisk volume appears in an Explorer window and an icon representing your volume also appears in the location you specified Double click...

Страница 198: ...k file is mounted 2 Choose Add Remove Public Keys from the File menu 3 Select the PGPdisk from the Select PGPdisk toolbar You are prompted to enter the master passphrase After entering appropriate pas...

Страница 199: ...ps were performed prior to receiving error message A complete description of the problem Customer service To order products or obtain product information contact the McAfee Customer Care department at...

Страница 200: ...first stop for answers to frequently asked questions for updates to McAfee software and for access to McAfee news and virus information Take advantage of the McAfee Product KnowledgeCenter your free...

Страница 201: ...g in configuration wizard 47 Backing up Restoring the Registry 83 BackTrack how to use 156 to 158 See also Installation Monitor Backup 103 strategies 104 to 105 Type 106 Backup Set creating 105 to 108...

Страница 202: ...ontrol system 138 Cookie Blocker Browser Buddy and 181 described 183 cookies Browser Buddy 181 corporate e mail systems choosing in configuration wizard 48 credit cards protecting with Gatekeeper 186...

Страница 203: ...in Windows 125 type of REG 87 view and add registered types 108 file groups in PowerClean feature dialog box 162 to 164 File Guardian described 186 files deleting manually 160 infected cleaning by yo...

Страница 204: ...ail clients choosing in configuration wizard 48 Internet connection protecting 185 Internet Explorer as browser supported in VShield 42 Internet Filter module set up using configuration wizard 50 Inte...

Страница 205: ...Mail as browser and e mail client supported in VShield 42 non file data 127 non native drive double buffering 112 Normal Acceleration 88 O online help opening from VirusScan Classic and VirusScan Adv...

Страница 206: ...specify 168 color codes interpreting 166 custom file group changing definition 165 creating 163 file groups described 162 to 164 original default settings listed 168 read only mode turning off 162 ta...

Страница 207: ...described 168 tab pages described 169 viewing event details 169 Rescue Disk Creating 70 responses default when infected by viruses 37 restarting with the Emergency Disk 37 Restore wizard restoring arc...

Страница 208: ...o viruses 37 System Scan module set up using configuration wizard 47 T tab panes in PowerClean feature dialog box 166 Transport wizard described 153 rebuilding transported applications 153 when to use...

Страница 209: ...with VirusScan 27 configuration wizard starting 47 using 42 47 to 51 Properties dialog box Wizard button in 47 reasons to run 41 what it does 40 W warnings See alert messages Web password management 1...

Страница 210: ...Index 210 McAfee Office...

Отзывы: