background image

COPYRIGHT

Copyright © 2000 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. No part
of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language in any form or by any means without the written permission of Network Associates,
Inc.

TRADEMARK ATTRIBUTIONS

* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX,
Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr
Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk,
Hunter, ISDN Tel/Scope, LM 1, LANGuru, Leading Help Desk Technology, Magic Solutions, MagicSpy,
MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More
Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield,
NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts,
PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty
Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence, Router
PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer,
SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM,
TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk,
Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum,
ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, 

and 

ZAC 2000

are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All
other registered and unregistered trademarks in this document are the sole property of their respective
owners.

LICENSE AGREEMENT

NOTICE TO ALL USERS:  CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY
NETWORK ASSOCIATES, INC. ("McAfee").  BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT.  IF YOU DO
NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SOFTWARE.  (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)

1.

License Grant.

 Subject to the payment of the applicable license fees, and subject to the terms and

conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right
to use one copy of the specified version of the Software and the accompanying documentation (the
"Documentation").  You may install one copy of the Software on one computer, workstation,
personal digital assistant, pager, "smart phone" or other electronic device for which the Software
was designed (each, a "Client Device").  If the Software is licensed as a suite or bundle with more
than one specified Software product, this license applies to all such specified Software products,
subject to any restrictions or usage terms specified on the applicable price list or product packaging
that apply to any of such Software products individually.

Issued May 2000/ McAfee Student Survival Kit v1.0

Содержание Student Survival Kit 1.0

Страница 1: ...Student Survival Kit Getting Started Version 1 0...

Страница 2: ...WebShield WebSniffer WebStalker WebWall and ZAC 2000 are registered trademarks of Network Associates and or its affiliates in the US and or other countries All other registered and unregistered tradem...

Страница 3: ...the limitations or other requirements described herein Upon any termination or expiration of this Agreement you must destroy all copies of the Software and the Documentation You may terminate this Agr...

Страница 4: ...t McAfee s option either i return of the purchase price paid for the license if any or ii replacement of the defective media in which the Software is contained You must return the defective media to M...

Страница 5: ...ion by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement 9 Export Con...

Страница 6: ...s This Agreement is governed by the laws of the United States and the State of California without reference to conflict of laws principles The application of the United Nations Convention of Contracts...

Страница 7: ...e Disk 13 Ad Blocking 13 Email Encryption 13 Browser Buddy 13 Cool Tools 14 About Student Survival Kit documentation 14 Student Survival Kit online Help 14 Chapter 2 Installing Student Survival Kit 17...

Страница 8: ...ound 26 How Safe Sound Creates Automatic Backups 27 Defining Your Backup Strategy 28 Where Will You Store the Backup Set 28 What Files are Important to You 29 How Often Should You or Safe Sound Make B...

Страница 9: ...Getting Started ix Table of Contents Support forums and telephone contact 36 McAfee training 37 Index 39...

Страница 10: ...Table of Contents x Student Survival Kit...

Страница 11: ...gnosing repairing and protecting your PC and its valuable data Programs and features Central Interface The Student Survival Kit has an integrated central interface for you to easily access the individ...

Страница 12: ...s email attachments Intranets shared files CD ROM and online services even inside the most popular compressed file types QuickClean QuickClean wizard removes unused files in the cache folder of your I...

Страница 13: ...Allows you to automatically schedule updates and tasks you want to perform on your computer at any given time Rescue Disk Creates a custom rescue disk that you can use to boot up your PC and begin rec...

Страница 14: ...owwow com About Student Survival Kit documentation This Getting Started manual provides the basic information you need to install setup and use Student Survival Kit More detailed information and step...

Страница 15: ...first time a Find Setup Wizard is displayed Follow the instructions on screen to setup the full text search option After setup is complete 1 In the text box type the first few letters of the word or...

Страница 16: ...Welcome to Student Survival Kit 16 Student Survival Kit...

Страница 17: ...cluding VirusScan 2 5 MB for WinAmp 10 MB for PowWow Installing Student Survival Kit After closing all open programs you are ready to install Student Survival Kit on your PC To install Student Surviva...

Страница 18: ...Standard and Automatically fix errors NOTE These are the default settings 3 Click Advanced In the Advanced Settings dialog box make sure the following settings are selected Only if errors found Repla...

Страница 19: ...ey on your keyboard to delete the files If Windows asks about deleting files click Yes 6 In the Windows taskbar click Start then click Shut Down 7 Click Restart the computer then click Yes in the Shut...

Страница 20: ...Installing Student Survival Kit 20 Student Survival Kit...

Страница 21: ...t includes configurations such as automatically scheduling tasks that a component of the Student Survival Kit can perform on your computer You can also indicate how often a particular task should be p...

Страница 22: ...gauge measures system resources small critical memory regions in Windows itself When any of these regions fill up your system may crash You can increase your resources by closing some applications Vir...

Страница 23: ...and heuristic technology that detects even new unknown macro viruses before they have a chance to inflict damage SecureCast ensures that your virus signature files are always the latest New updates a...

Страница 24: ...an to run from the dropdown list box Using Backup and Restore The Backup and Restore feature is designed to assist you in handling the Registry component of your computer The Registry is a repository...

Страница 25: ...e window appears 3 Type a comment in the textbox and then click Finish to complete the backup process Restoring Registry Use the following procedure to restore your registry using a backup 1 Launch th...

Страница 26: ...ts you create backup sets in protected volume files which is the safest and preferred type of backup A protected volume file is a sectioned off area of the drive sometimes called a logical drive Safe...

Страница 27: ...h durable can become scratched enough to damage their data Human actions can also cause lost data such as deleting the wrong folder or formatting the wrong drive Even a well designed application can s...

Страница 28: ...though this is the most labor intensive way of storing backups because it requires you to switch disks by hand In today s computer marketplace you may discover that it is as cost effective to acquire...

Страница 29: ...or clients that is stored on your computer such as advertising layouts graphic images books or accounting data How Often Should You or Safe Sound Make Backups The more recent your backup set the happi...

Страница 30: ...d partition tables and FAT information It s a good idea to run McAfee Image daily as well as whenever you ve reorganized a disk s files using a defragmenter This ensures that you can use Image s Resto...

Страница 31: ...e file does not contain your data files those are located in your Safe Sound backup set NOTE For step by step instructions and more information on how to use McAfee Image refer to the McAfee Student S...

Страница 32: ...n how to use Rescue Disk refer to the McAfee Student Survival Kit online Help file Using Internet Options Ad Blocking This screen allows you to configure Student Survival Kit to silently filter advert...

Страница 33: ...and password you can use Browser Buddy to Drag your username or password from Password Manager and drop it on the login form for the Web site Add new password information for a Web site You can also r...

Страница 34: ...Web Site list 2 Drag your username or password from the Password Manager box to appropriate field in your Web site s login form The text appears in the field If the site that you are logging into dis...

Страница 35: ...nal Version of system software Amount of memory RAM Extra cards boards or monitors Name and version of conflicting software EXACT error message as on screen What steps were performed prior to receivin...

Страница 36: ...have continued this tradition by making our site on the World Wide Web http www mcafee com a valuable resource for answers to technical support issues We encourage you to make this your first stop fo...

Страница 37: ...ee support and 24 hours a day 7 days a week for Per Minute or Per Incident support McAfee training For information about scheduling on site training for any McAfee product call 800 338 8754 Disclaimer...

Страница 38: ...Product Support 38 Student Survival Kit...

Страница 39: ...ion 13 33 emergency boot disk 31 F File Allocation Table 31 I Image Properties 31 Internet Options 32 M Map Network Drive 28 McAfee Image 13 30 McAfee Scheduler 13 McAfee VirusScan 12 mirror backup 26...

Страница 40: ...box QuickClean options 24 Student Survival Kit online Help 14 System hard drive 31 System requirements 17 U Using Backup and Restore 24 Using QuickClean 23 Using VirusScan 23 W Windows 95 98 Registry...

Отзывы: