Internet Guard Dog User’s Guide Version 3.
COPYRIGHT Copyright © 2000 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc.
(i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of licenses you have obtained, then you must have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use limits specified for the licenses you have obtained.
5. Restrictions. You may not rent, lease, loan or resell the Software. You may not permit third parties to benefit from the use or functionality of the Software via a timesharing, service bureau or other arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You may not transfer any of the rights granted to you under this Agreement.
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES.
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT THE IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS CONSISTENT AS TO SPECIFIC COUNTRIES.
Table of Contents Chapter 1. Welcome to Internet Guard Dog™ . . . . . . . . . . . . . . . . . . . . . . 1 Using Internet Guard Dog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 How Internet Guard Dog works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 User Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents How Privacy and Security options work . . . . . . . . . . . . . . . . . . . . . . . . .22 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 Using McAfee VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 Viewing Activity Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 Updating Internet Guard Dog and VirusScan . . . . . . . . . . . . . . . . . . . . .
Table of Contents VirusScan Central window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 VirusScan Classic window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 Configuring VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 Appendix A. Internet Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . 55 Networks and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70 McAfee training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1 1 Welcome to Internet Guard Dog™ Using Internet Guard Dog In the last few years the Internet has changed from a communications network that government entities and universities used almost exclusively, to an information treasure house that people of all ages and occupations can now access. With an Internet account, you can send electronic mail (e-mail) around the world in seconds, do research without leaving home, meet new friends in an online chat room, or shop without getting out of your bathrobe.
Welcome to Internet Guard Dog™ With its new features, you can now also act as an Administrator and apply customized protection settings not only for yourself, but for other users of your computer and easily monitor potential risk they may encounter while browsing the Internet.
Welcome to Internet Guard Dog™ Security Check You can run a complete check of your computer for any privacy or security problems via this feature. After Internet Guard Dog performs the check, it displays any problem found, provides additional information about the problem, and guides you through on how to solve the problem. See “Performing a Security Check” on page 25.
Welcome to Internet Guard Dog™ Protection from privacy threats • Identity Protector monitors your Internet connection and warns you before private information is sent to an unsecure Internet site. It stops programs and other people that use your computer (like your kids) from sending your name and credit card numbers over the Internet without your approval. • Cookie Blocker prevents Web sites from storing cookies on your hard drive. Third-party Web sites use cookies to track your Web browsing habits.
Welcome to Internet Guard Dog™ Protection from virus threats Using the McAfee VirusScan, the following features are available: • Scan to start the default virus scan task immediately, or configure a virus scan task that suits your needs. • Scheduler to launch the McAfee VirusScan Scheduler. This utility enables you to configure and run unattended virus scan operations. • Virus info to display virus information via the McAfee Web site. What’s new in Internet Guard Dog Internet Guard Dog version 3.
Welcome to Internet Guard Dog™ Other features and enhancements • Internet Guard Dog password Protects the information and settings in Internet Guard Dog from being viewed or changed. It also prevents other users of your computer from sending out information that you specify as private. • File Guardian enhancement Protects individual files even when encrypted. • Improved cookie management Indicates whether cookies are direct or indirect and the domain where it is coming from.
Welcome to Internet Guard Dog™ How this book is organized This User’s Guide is designed to get you using Internet Guard Dog quickly. Read chapters 1 and 2 to get Internet Guard Dog installed and running. You only need to read Chapters 3, 4, 5, and 6 if you want further information on customizing Internet Guard Dog or using specific features. Read Chapter 7 for further information on McAfee VirusScan.
Welcome to Internet Guard Dog™ 2. You can search for a help topic via the Contents, Index or Find tabs. • Contents tab 1. Double-click a book icon to display its table of contents of related topics. 2. Locate the topic you want; then point and double-click to open the Help topic. • Index tab 1. In the text box, type the first few letters of the word or phrase you are looking for. 2. Locate what you are looking for; then double-click the topic or click the Display button.
Welcome to Internet Guard Dog™ To get help for settings in a dialog box • Whenever you see the button in the upper-right corner of a dialog box, click the button, then click on the setting for which you want information.
Welcome to Internet Guard Dog™ 10 Internet Guard Dog
2 2 Installing Internet Guard Dog™ Most installation problems are a caused by having programs running while you try to install new software. Even if the installation appears normal, you won’t be able to run the new program. To avoid installation problems, close all open programs before you install Internet Guard Dog, including programs that run in the background, such as screen savers or virus checkers.
Installing Internet Guard Dog™ Installing Internet Guard Dog After closing all open programs, you are ready to install Internet Guard Dog on your PC. Installation should go smoothly, however, if you do have difficulties, see “Troubleshooting installation problems” on page 12. To install Internet Guard Dog 1. Close all open programs. 2. Insert the Internet Guard Dog CD in the CD-ROM drive. 3. In the Internet Guard Dog Setup screen, click Install Internet Guard Dog.
Installing Internet Guard Dog™ Step 1: Clean up your hard drive Run the Windows 95 hard drive utilities, ScanDisk and Disk Defragmenter to identify and fix any errors on your hard drive: 1. Click Start on the Windows taskbar, point to Programs, then Accessories, then System Tools, and click ScanDisk. 2. In the ScanDisk window, select Standard and Automatically fix errors. NOTE: These are the default settings. 3. Click Advanced.
Installing Internet Guard Dog™ 4. In the menu, click Edit, then click Select All. All of the items in your Temp folder are highlighted. 5. Press the Delete key on your keyboard to delete the files. If Windows asks about deleting files, click Yes. 6. In the Windows taskbar, click Start, then click Shut Down. 7. Click Restart the computer, then click Yes in the Shut Down Windows dialog box to restart your PC. Step 3: Close other software Disable all software running in the background: 1.
3 3 Quick Tour of Internet Guard Dog™ Internet Guard Dog is a simple program to use. In fact, this one chapter covers the main things you need to know about using Internet Guard Dog. You begin with answering a few questions via the Interview so that Internet Guard Dog can effectively use its feature to protect you from Internet threats.
Quick Tour of Internet Guard Dog™ What information does Internet Guard Dog ask me to enter? The Internet Guard Dog interview asks you to enter the personal and financial information that you want to protect. All the information you enter into Internet Guard Dog is stored in encrypted form on your hard disk—it is never sent to McAfee Software. You may want to gather your personal information before you start the interview.
Quick Tour of Internet Guard Dog™ NOTE: You can fine-tune the configuration of Internet Guard Dog’s privacy and security features in the Protection Settings. Click Options on the Internet Guard Dog Home screen, then click Protection Settings.
Quick Tour of Internet Guard Dog™ How password protection works in Guard Dog Whenever you start Windows, Internet Guard Dog prompts you to enter the password you set during the Interview. When you enter an incorrect password, it displays the hint that you provided when you created your password. Without the password you can still open the Guard Dog Home screen, but you won’t be able to change your CheckUp Settings or Protections Settings.
Quick Tour of Internet Guard Dog™ Table 3-1. Actions you can perform in the Home screen To do this Click this Add, edit or delete user profile; set Internet filtering and other options. User Setup Perform or schedule a virus scan. VirusScan. This launches the McAfee VirusScan Perform a security check to find any privacy or security problem on your computer. Security Check Display user activity logs Activity Logs Display the McAfee Software Home screen in your Web browser.
Quick Tour of Internet Guard Dog™ How User Setup works The Internet Guard Dog Administrator can add, edit and delete profiles of other users who browse the Internet through the same computer. After profiling users, the Administrator can customize their individual protection settings, including Internet filtering options and can even monitor their browsing habits.
Quick Tour of Internet Guard Dog™ How Internet Filtering works As a new feature of Internet Guard Dog, you can further customize the protection settings of a profiled user via the Internet Filtering options. From the User Setup screen, select a user; click Edit User Options; then click the Internet Filtering button. Content Filter After launching Internet Filtering, the Content Filter screen is displayed. This screen allows you to quickly enable or disable Internet Guard Dog filters.
Quick Tour of Internet Guard Dog™ Figure 3-4. Internet Filtering screen (URL List) How Privacy and Security options work Internet Guard Dog allows you to determine levels of privacy and security using a series of configurable options called Protection Settings. A part of Internet Guard Dog is always on duty in the background to protect your computer’s data and your privacy based on the choices you make.
Quick Tour of Internet Guard Dog™ Internet Guard Dog has a database of URL sites, extensive word list as well as a new rating system to use in protecting users from Internet privacy and security threats. The Administrator can also set the time and day that a user can have access to the Internet. See the Internet Guard Dog online Help for more information and step-by-step instructions on how to set its Internet filtering options.
Quick Tour of Internet Guard Dog™ • Maintenance Displays list of actions that Internet Guard Dog performed including the specific feature used to complete the task. • Activity Displays identity of profiled user who browsed the Internet using the computer. It also displays the day, date and time that the user logon and off on the computer. NOTE: For step-by-step instructions on working with any of the report logs, see Internet Guard Dog online Help.
Quick Tour of Internet Guard Dog™ Performing a Security Check After completing the interview, you’ll want to find out how your PC may be at risk. Security Check examines your PC for privacy and security problems and then guides you through fixing any problem it finds. If you are using the settings suggested by Internet Guard Dog in the interview, you only need to run Security Check right after installation and then every month or so.
Quick Tour of Internet Guard Dog™ 4. Repeat steps 2 and 3 for each problem that you want to fix. 5. When you have finished, click the Back or the Home button to return to the Internet Guard Dog Home screen. What Internet Guard Dog does while your PC is running While you use your PC, Internet Guard Dog is on the lookout for potential privacy and security problems and takes action when it finds a problem.
Quick Tour of Internet Guard Dog™ Responding to Internet Guard Dog alert messages Internet Guard Dog works as you work to protect your privacy and security. When Internet Guard Dog detects a potential problem, it either handles the problem automatically or warns you with an alert message based on your Internet Guard Dog settings. Each alert message tells you what potential problem triggered the message and Internet Guard Dog’s recommendation on how to respond.
Quick Tour of Internet Guard Dog™ To open Browser Buddy 1. Right-click the Internet Guard Dog icon on the Windows taskbar, then click Browser Buddy. The dialog box is displayed. Figure 3-7. Browser Buddy To add a new username and password 1. In Browser Buddy, select Add New Entry from the Password Manager drop-down list. The Enter password to save dialog box is displayed. 2.
Quick Tour of Internet Guard Dog™ The text appears in the field. (If the site that you are logging into displays your password text as a series of asterisks (*), Internet Guard Dog will display one asterisk for each character in your password.) 3. Continue logging in as usual to the Web site. Using file encryption File encryption translates a file into a “secret” code that makes the file unreadable. You must decode or decrypt the file before you can use it.
Quick Tour of Internet Guard Dog™ 30 Internet Guard Dog
4 4 Privacy Features Internet Guard Dog’s Privacy features protect browsing and personal information that you don’t want anybody to access as a result of your surfing through the Internet. What Cookie Blocker does Cookies are small files that your Web browser stores on your PC at the request of a Web server. Each time you view a Web page from the Web server, your browser sends the cookie back to the server.
Privacy Features Responding to a Cookie Blocker alert message If during the Interview, you set Internet Guard Dog to prompt you for action then it will display the Cookie Blocker alert message the first time a site tries to set a cookie. You can respond to the alert message in the following ways: Table 4-1. If you choose Internet Guard Dog Accept always Accepts the cookie and adds the site to the Allowed list. The next time you go to that site, all cookies from that site are allowed automatically.
Privacy Features Why should I change my Cookie Blocker settings? If you want a good level of privacy protection without having to see any Cookie Blocker alert messages, use the recommended settings—always accept cookies from sites that you visit directly and decide on a case-by-case basis whether to accept cookies coming from sites that you haven’t visited directly. You may also change your settings under specific circumstances (see Table 5-2). Table 4-2.
Privacy Features If more than one person is using your computer, make sure that you create an Internet Guard Dog password. If the person using your computer doesn’t enter the Internet Guard Dog password, it automatically replaces any protected personal information sent to an unsecure site with the text, “xxxx.” For example, if your child tries to order the latest CD without entering your Internet Guard Dog password, it replaces your credit card number with “xxxx xxxx xxxx xxxx.
Privacy Features Why should I change my Identity Protector settings? You may want to change your settings under the following circumstances: Table 4-4. If you Use this option Are the only person using your PC and you don’t want to be alerted every time. Enter all of the information that you want to prevent from going out and select Allow Always. Have more than one person using your PC.
Privacy Features What Web Trail Cleaner does As you surf the Internet, your browser stores information that makes your browsing experience more satisfying. It uses the information as follows: Table 4-5. Your browser uses To Cached files Speed up the display of Web page elements such as graphics. URLs visited Display a list of sites that you’ve visited using Web addresses. History Display a list of sites that you’ve visited using Web site names.
Privacy Features Why should I change my Web Trail Cleaner settings? You may want to change your settings under the following circumstances: Table 4-7. If you Use this option Want to see exactly what files are being deleted. Prompt to Clean Up after closing Web browser. Want to remove all traces of your browsing. Automatically Clean Up after closing Web browser. (Clear the check box for “Keep bookmarked items.
Privacy Features 38 Internet Guard Dog
5 5 Security Features Internet Guard Dog’s security features safeguard your Internet connection and protect the files on your PC from prying eyes and destructive programs. What Gatekeeper does Gatekeeper lets you control what programs on your PC can have access to your Internet connection. Gatekeeper can also warn you about any of these potentially harmful actions: • Your browser is directed to a harmful site—one that has been known to contain virus-infected files (e.g.
Security Features You can respond to the Internet access alert message in the following ways: Table 5-1. If you choose Internet Guard Dog This time only Allows the program to access the Internet this time only and warns you the next time it tries to access the Internet. Allow always Allows the program to access the Internet at any time. In Protection Settings for Gatekeeper, the program is added to the list of programs allowed to automatically access the Internet.
Security Features You can respond to the alert message in the following ways: Table 5-2. If you choose Internet Guard Dog does this Allow always Allows the program to start the other program. Not this time Prevents the program from starting the other program just this time. This time only Allows the program to start the other program just this time. Any credit card number goes out message When a program sends a number resembling a credit card number over the Internet, an alert message is displayed.
Security Features Why should I change my Gatekeeper settings? The Gatekeeper settings suggested by the Interview will display the fewest number of alert messages. If you are using an older browser version or just want a higher level of security, you may want to change your settings under the following circumstances: Table 5-4. If you Use this option • Want to be warned when the site that you are going to has been known to cause damage, e.g.
Security Features What File Guardian does File Guardian can protect files that contain your sensitive data from being opened, renamed, copied, moved, or deleted. For added protection, you can even encrypt files protected by File Guardian. Internet Guard Dog can also alert you if a program attempts one of the following potentially harmful activities: • A program attempts to reformat your hard drive. • An ActiveX control attempts to delete files on your hard drive.
Security Features ActiveX scan alert message There are legitimate reasons for allowing an ActiveX control to read through, or scan, all of your files. For example, you can go to one site on the Web that uses an ActiveX control to look for viruses on your PC. However, if a site begins to scan your files without warning you, Internet Guard Dog gives you a chance to think about how much you trust the site.
Security Features You can respond to the alert message in the following ways: Table 5-7. If you choose Internet Guard Dog Not this time Stops the ActiveX control from running this time. If you change your mind, reload the page in your browser and click Allow this time the next time Internet Guard Dog displays its ActiveX delete message. This time only Permits the ActiveX control to delete files just this time.
Security Features Why should I change my File Guardian settings? You may want to change your settings under the following circumstances: Table 5-8. If you Use this option • Want to be warned when an ActiveX control looks through the files on your PC. ActiveX scans my drive This may happen legitimately if the control needs to find a file to use. If you are concerned, check with the site that sent you the control. • Want to be warned when an ActiveX control deletes a files.
Security Features What Password Manager does Password Manager lets you store your various Web site login names and passwords in one secure location. When you are visiting a Web site that requires this information, you can drag it from the Browser Buddy to the form displayed in your browser. In Protection Settings, you can: • View your list of stored login names and passwords. • Add a record. • Edit a record. • Remove a record. You can also add a record in the Browser Buddy.
Security Features To remove a password record • 48 Internet Guard Dog In the Password Manager list, click a record to select it, then click Remove.
6 McAfee VirusScan 6 What is McAfee VirusScan? The VirusScan name applies both to the entire set of desktop anti-virus program components described in this chapter, and to a particular component of that set: SCAN32.EXE, or the VirusScan “on-demand” scanner. “On demand” means that you as a user control when VirusScan starts and ends a scan operation, which targets it examines, what it does when it finds a virus, or any other aspect of the program’s operation.
McAfee VirusScan Any of these methods will launch VirusScan. VirusScan Central window After launching VirusScan from the Internet Guard Dog Home screen, the VirusScan Central window is displayed. The following main features are available to use: • Click Scan to start the default scan task immediately, or configure a scan task that suits your needs (see Configuring VirusScan). • Click Scheduler to launch the McAfee VirusScan Scheduler.
McAfee VirusScan Figure 6-9. VirusScan Activity Log • Quit VirusScan. • Change VirusScan modes. • Activate password protection. • Start VirusScan Scheduler. • Open the online help file. • NOTE: See the McAfee VirusScan online Help for more information and step-by-step instructions on how to use any of the features of the Classic window.
McAfee VirusScan • Choose a volume or folder on your system or on your network that you want VirusScan to examine for viruses. Click to expand the listing for an item shown in the dialog box. Click to collapse an item. You can select hard disks, folders or files as scan targets, whether they reside on your system or on other computers on your network.
McAfee VirusScan • Delete infected files automatically. Use this option to have VirusScan delete every infected file it finds immediately. Be sure to enable its reporting feature so that you have a record of which files VirusScan deleted. You will need to restore deleted files from backup copies. If VirusScan cannot delete an infected file, it will note the incident in its log file. • Continue scanning.
McAfee VirusScan You can also select the Log to file option. By default, VirusScan writes log information to the file VSCLOG.TXT in the VirusScan program directory. You can enter a different name and path in the text box provided, or click Browse to locate a suitable file elsewhere on your hard disk or on your network.
A Internet Security and Privacy A This chapter provides some background information that will help you understand Internet security and privacy threats, and discusses strategies for using Guard Dog to protect yourself and your computer. Networks and the Internet A computer network links individual computers together so they can share data and resources. To network, computers need some means of connection—either a modem or a Network Interface Card (NIC—some computers have NICs already built-in).
Internet Security and Privacy Why packets? Why go through all this trouble, breaking data down into packets? The answer lies in the origins of TCP/IP. Like the Internet itself, it is a product of the Cold War. The United States Department of Defense originally developed the Internet. It was designed to ensure secure communications, even with multiple communications network failures anticipated in the event of a nuclear war.
Internet Security and Privacy NOTE: HTML is a set of commands designed to be interpreted by Web browsers. An HTML document consists of content (prose, graphics, video, etc.) and a series of commands that tell a Web browser how to display the content. Privacy and security on the Web Before the advent of the Web, Internet security usually posed a problem only for system administrators trying to keep meddlesome hackers away from their systems.
Internet Security and Privacy Privacy on the Web Who is snooping? Hackers are a breed of human being that thrive on gaining illegal access to computers in order to access, steal, and sometimes corrupt data. Many hackers are quite benign—breaking into a secure system is a challenge and a thrill. But some computer hackers think that if they don’t care for someone or some organization, it is OK to break in to their computers and wreak havoc.
Internet Security and Privacy What can I do to keep my stuff safe? With sniffer in place, a hacker can intercept credit card numbers and other private information by capturing data transmissions, and then using pattern-matching algorithms to filter out the valuable information. Intercepted credit card info can be sold to criminals, intent on committing fraud. To avoid this problem, Web browsers incorporate encryption technology that cloaks information and makes it difficult to get at.
Internet Security and Privacy If SSL is so great, what is the problem? SSL is affected by a couple of problems. One problem is that not everyone has an SSL-enabled server or browser. Some Web administrators don’t want to use SSL because they have to pay for it, and it can also slow down server transactions. A more onerous problem that affects SSL is the way it is implemented. It turns out that some developers made incorrect assumptions about SSL, which means some older browser versions are less secure.
Internet Security and Privacy The simplest encryption systems use letter shifting, in which a message is encrypted by shifting every letter n letters later in the alphabet. For example, say A is changed to B, and B to C, etc. As long as the recipient knows how you shifted the letters, they can easily decrypt the message by reversing the process.
Internet Security and Privacy Java contains an internal security system that addresses security risks. ActiveX uses a different model, based on certificate authentication. Certificates contain information about who developed the ActiveX code. The idea here is that if you know who developed the code, it is safe to run it. Both security schemes offer a level of safety, but no one can yet promise that executable content is entirely safe.
Internet Security and Privacy Biological viruses have proven to be tenacious— modern medicine’s success in fighting viral infection has, so far, been rather limited. Fortunately, PC viruses differ from biological viruses in that they are easier to combat, once they are identified. Are viruses really that dangerous? Bear in mind that your chances of contracting a PC virus are slim, and even more so, your chances of contracting a truly vicious virus.
Internet Security and Privacy How can my PC become infected with a virus? An important thing to keep in mind is that viruses are spread only when you run an infected application (or open an infected document file, in the case of macro viruses). A virus cannot travel over your telephone line and infect your PC on its own. You must first download or copy an infected application and then run the application in order to infect your PC with a virus.
Internet Security and Privacy • First, you can provide the information yourself when you register software or respond to Internet questionnaires.
Internet Security and Privacy Some stores may use the cookie information to record each time you connect to the site, what pages you use, and whether you click any of advertiser banners. Reputable sites provide privacy information to tell you how the information that is gathered is used. The above examples of cookies are clearly useful to you, at least in some way. However, other sites might download cookies just to collect information about your Internet use.
Internet Security and Privacy More information about security Two good starting places for information about Web security is the on-line help for Netscape Communicator and Microsoft Internet Explorer. National Institute of Health’s Computer Security Information site Good links to many security information sites. http://www.alw.nih.gov/Security/security.html Microsoft’s Security site White papers and descriptions of Microsoft’s security efforts http://www.microsoft.
Internet Security and Privacy 68 Internet Guard Dog
B B Product Support BEFORE YOU CONTACT McAfee Software for technical support, locate yourself near the computer with McAfee Guard Dog installed and verify the information listed below: • Have you sent in your product registration card? • Version of Internet Guard Dog • Customer number if registered • Model name of hard disk (internal or external) • Version of system software • Amount of memory (RAM) • Extra cards, boards or monitors • Name and version of conflicting software • EXACT error message as on s
Product Support If you need further assistance or have specific questions about our products, send your questions via email to the appropriate address below: • For general questions about ordering software: mcafeestore@beyond.com • For help in downloading software: mcafeedownloadhelp@beyond.com • For a status on an existing order: mcafeeorderstatus@beyond.com To inquire about a promotion: mcafeepromotions@beyond.
Product Support If the automated services do not have the answers you need, please contact McAfee at the following numbers Monday through Friday between 9:00 AM and 6:00 PM Pacific time for 30-day free support, and 24 hours a day - 7 days a week for Per Minute or Per Incident support. Table B-1.
Product Support 72 Internet Guard Dog
Index A browser history 36 action options, choosing in VirusScan Classic 52 C ActiveX controls 39 deleting files 43 protection against damage by 43 scanning hard drives 43 viruses and 64 cached files 36 alert messages 27 audible, sounding 53 Cookie Blocker 32 File Guardian 43 ActiveX alert message 44 ActiveX delete alert message 44 drive format alert message 45 guarded file alert message 43 Gatekeeper 39 any credit card number goes out 41 harmful site 40 Internet access 39 program starts up another pr
Index E G e-mail attachments and viruses 63 messages and viruses 63 Gatekeeper alert messages 39 any credit card number goes out alert message 41 described 39 harmful site alert message 40 Internet access alert message 39 program starts up another program alert message 40 settings 42 encrypting files 29 File Guardian and 43 using shortcut menu 26 extensions, use of to identify scan targets 52 F file encryption 29 File Guardian ActiveX alert message 44 ActiveX delete alert message 44 alert message 43 d
Index history files 36 login names 47 hoax viruses 63 Home screen items on 19 using 18 I M macro viruses 63 managing Web passwords 27 Master Boot Record viruses 63 menu, shortcut 26 icon for Guard Dog 26 messages See alert messages Identity Protector alert message 34 described 33 settings 35 modem 39 indirect sites 31, 33 infected files moving 52 use of quarantine folder to isolate 52 Internet connection, protecting 39 Internet Filtering Options 21 Internet Guard Dog Administrator 17 Internet priv
Index passwords activating and deactivating 35 adding record to Password Manager 47 adding with Browser Buddy 28 Browser Buddy and 27 deleting Password Manager record 48 dragging from Browser Buddy 28 editing Password Manager record 47 forgotten 18 protecting Web site 47 protecting Windows 43 storing in Password Manager 47 using for Guard Dog 18 personal information, protecting 33 Privacy Features 31 Q quarantine folder, use of to isolate infected files 52 question mark button 27 R report file VSCLOG.
Index shareware and viruses 64 V shortcut menu 26 viruses ActiveX and 64 e-mail attachments and 63 e-mail messages and 63 file and program 63 hoax 63 how dangerous? 63 how spread 62 Java and 64 macro 63 threats 5 types of 63 updating list of 24 who creates them 62 Start menu using to start VirusScan Classic 49 T targets for scanning adding 52 task action options, configuring 52 adding scan targets to 52 logging options, configuring in VirusScan Classic 53 report options, configuring for VirusScan Clas
Index Windows protecting password file 43 taskbar 26 using help 7 Windows Start menu, using to start VirusScan Classic.