McAfee Office Version 3.
COPYRIGHT Copyright (c) 1999-2000 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies.
storage device) of that Client Device. This license authorizes you to make one copy of the Software solely for backup or archival purposes, provided that the copy you make contains all of the Software's proprietary notices. b. Server-Mode. You may use the Software on a Client Device as a server ("Server") within a multi-user or networked environment ("Server-Mode") only if such use is permitted in the applicable price list or product packaging for the Software.
5. Restrictions. You may not rent, lease, loan or resell the Software. You may not permit third parties to benefit from the use or functionality of the Software via a timesharing, service bureau or other arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You may not transfer any of the rights granted to you under this Agreement.
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES.
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT THE IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS CONSISTENT AS TO SPECIFIC COUNTRIES.
Table of Contents Chapter 1. Welcome to McAfee Office . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Programs and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Central interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 McAfee VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 McAfee Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Using the VShield configuration wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47 Using the VShield shortcut menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 Chapter 4. McAfee Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 McAfee Utilities central window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53 McAfee Utilities Properties . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Working with advanced information . . . . . . . . . . . . . . . . . . . . . . . .72 Specifying Discover Pro settings . . . . . . . . . . . . . . . . . . . . . . . . . . .74 Using the multi-window views . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74 Undelete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 Clean and Optimize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Manipulating the WinGauge window . . . . . . . . . . . . . . . . . . . . . . . .95 Changing WinGauge properties . . . . . . . . . . . . . . . . . . . . . . . . . . . .97 Saving and loading gauge settings . . . . . . . . . . . . . . . . . . . . . . . .101 VirusScan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102 Trash Guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Shredding non-file data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127 McAfee Zip Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127 Zip Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128 Using ZipMan Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128 Selecting McAfee Zip Manager properties . . . . . . . . . . . . . . . . . .
Table of Contents Creating the SmartLinks database . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145 Customization Interview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146 UnInstaller wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146 About PowerClean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148 About McAfee Guardian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Internet Guard Dog and your online connection . . . . . . . . . . . . . . . . . . . . . .172 Internet Guard Dog features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .172 Protection from privacy threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173 Protection from security threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173 Protection from virus threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Setting PGP Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192 Getting Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193 Quitting PGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193 From supported email applications . . . . . . . . . . . . . . . . . . . . . . . . . . . .193 Using PGP/MIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1 Welcome to McAfee Office 1 Thank you for purchasing McAfee Office—a suite of powerful and easy-to-use Windows software utilities that helps keep your PC working at optimum efficiency and speed, as well as diagnosing, repairing, and protecting your PC and its valuable data. McAfee Office contains a suite of utility programs that provide you with diagnostic, preventive, and security tools to help maintain your PC’s health and well-being.
Welcome to McAfee Office McAfee VirusScan McAfee VirusScan provides complete desktop protection with an array of scanning features that keep your system clean, mean, and virus-free. Using only the latest technology, VirusScan detects 100% of viruses including floppy disks, Internet downloads, email attachments, Intranets, shared files, CD-ROM, and online services (even inside the most popular compressed file types).
Welcome to McAfee Office • Disk Minder safely, easily, and quickly diagnoses and repairs existing or potential disk problems. • McAfee Image saves a copy of critical disk information in a file and restores the image later if your disk is corrupted. • Registry Wizard allows you to easily maintain, troubleshoot, or repair the Registry database. • Rescue Disk creates a custom rescue disk that you can use to boot up your PC and begin recovery if you can’t start from the system hard drive.
Welcome to McAfee Office • Scheduled cleaning: Schedule UnInstaller to automatically delete useless files at any time, day or night. • BackTrack: Restores and reconstructs your original setup after poor program installations. • Customization interview: Notify UnInstaller what files are most important to you, and it will never touch them. • Moves and archives programs: Moves and archives applications to another folder, drive, or computer—with all links intact.
Welcome to McAfee Office McAfee Firewall McAfee Firewall is a personal firewall that lets you monitor, control and log your PC's network activity. It protects you from Internet hackers and keeps your PC private. McAfee Firewall filters traffic at the devices that your system uses - network cards and modems. This means that it can reject inbound traffic before that traffic can reach vital functions in your PC and before it can waste valuable system resources.
Welcome to McAfee Office Other features McAfee Virtual Office McAfee offers full featured web sites with unequaled ease of use. No HTML or design experience is required to create your multi-page site. Select the McAfee Ultra Web Site, which has both business and personal templates, as well as real-time communication features such as chat and file exchange, or the free McAfee Basic Web Site.
Welcome to McAfee Office Improvements Reduction of overlapping features McAfee Office has substantially reduced the amount of disk space required for installation by only installing a shared component feature once versus the multiple installations required by the previous version. Microsoft compatibility McAfee Office is fully compatible with Windows ME. Improved uninstall capability McAfee Office will allow you to remove all installed components at once, versus having to remove them individually.
Welcome to McAfee Office 2. In Windows Explorer, navigate to the Manuals directory on the CD and double-click the User’s Guide you want to view. (To open Windows Explorer, click the Start button on your desktop, point to Programs, and then choose Windows Explorer.) The User’s Guide opens in Acrobat Reader. 3. From here you can do the following: • Browse the User’s Guide, by scrolling, using the hypertext links in the Table of Contents and Index, or search for information using the Find feature.
2 Installating McAfee Office 2 System requirements Prior to installing McAfee Office, please verify your existing PC system hardware components and configuration.
Installating McAfee Office • 18 MB of free hard drive space McAfee Internet Guard Dog • 16 megabytes (MB) minimum of RAM • 20MB free hard diskspace • Windows 95/98 Web browser (also called a 32-bit browser); 256-color video display or better • Access to the Internet, either a dial-up account with an Internet Service Provider (ISP) or a constant connection through a network.
Installating McAfee Office 3. Click Install McAfee Office. 4. Follow the instructions displayed in the window to complete installation. NOTE: Prior to installing any application from the McAfee Office suite, McAfee Office Central will identify any existing copies on your system. McAfee Office Central will proceed with uninstalling these copies to eliminate file redundancies and minimize disk space consumption before loading your new applications.
Installating McAfee Office 26 McAfee Office
3 McAfee VirusScan 3 How does VirusScan software work? VirusScan software combines the anti-virus industry’s most capable scan engine with top-notch interface enhancements that give you complete access to that engine’s power. The VirusScan graphical user interface unifies its specialized program components, but without sacrificing the flexibility you need to fit the software into your computing environment.
McAfee VirusScan Figure 3-1. McAfee VirusScan Central screen Through this user-friendly interface, you can access the main functions of McAfee VirusScan. Click the appropriate buttons as displayed to start performing a particular task within McAfee VirusScan (e.g., Scan, Schedule, Quarantine, etc). You can also click the Update button to start searching and downloading any available updates to McAfee VirusScan installed on your computer.
McAfee VirusScan • The VShield scanner. This component gives you continuous anti-virus protection from viruses that arrive on floppy disks, from your network, or from various sources on the Internet. The VShield scanner starts when you start your computer, and stays in memory until you shut down. A flexible set of property pages lets you tell the scanner which parts of your system to examine, what to look for, which parts to leave alone, and how to respond to any infected files it finds.
McAfee VirusScan • The Alert Manager Client configuration utility. This component lets you choose a destination for Alert Manager “events” that VirusScan software generates when it detects a virus or takes other noteworthy actions. You can also specify a destination directory for older-style Centralized Alerting messages, or supplement either method with Desktop Management Interface (DMI) alerts sent via your DMI client software. • The ScreenScan utility.
McAfee VirusScan All of the command-line scanners allow you to initiate targeted scan operations from an MS-DOS Prompt or Command Prompt window, or from protected MS-DOS mode. Ordinarily, you'll use the VirusScan application's graphical user interface (GUI) to perform most scanning operations, but if you have trouble starting Windows or if the VirusScan GUI components will not run in your environment, you can use the command-line scanners as a backup.
McAfee VirusScan – All VShield modules are active – The System Scan module is active, but one or more of the other VShield modules is inactive – The System Scan module is inactive, but one or more of the other VShield modules is active – All VShield modules are inactive • New interface settings for task configuration allow you to tell the VirusScan application how you want it to appear as your scheduled task runs and what you want it to do when it finishes.
McAfee VirusScan The Network Associates SecureCast service provides a convenient method you can use to receive the latest virus definition (.DAT) file updates automatically, as they become available, without your having to download them. NOTE: To update the McAfee VirusScan software installed on your computer, click the update button in the McAfee Office main window. Make sure that your PC is connected to the internet prior to performing this task.
McAfee VirusScan Figure 3-2. VirusScan main window From the McAfee VirusScan main window, you can: • Start scanning immediately. Click Scan to have the application scan your system with the last configuration options you set, or with default options. The following screen (Figure 3-2) allows you to select which area of your computer you want to scan. After selecting, click Scan Now. Following through the succeeding screens to complete the task.
McAfee VirusScan Figure 3-3. Scan Now window • View the VirusScan application activity log. Through this window you are able to view a log of VirusScan activities performed on your your computer. You can also select to clear or print any of these activity logs (see Figure 3-3). Figure 3-4.
McAfee VirusScan • Open the online help file. Choose Help Topics from the Help menu to see a list of VirusScan help topics. To see a context-sensitive description of buttons, lists and other items in the VirusScan window, choose What’s this? from the Help menu, then click an item with your left mouse button after your mouse cursor changes to . • Set options.
McAfee VirusScan If you suspect you have a virus... First of all, don’t panic! Although far from harmless, most viruses that infect your machine will not destroy data, play pranks, or render your computer unusable. Even the comparatively rare viruses that do carry a destructive payload usually produce their nasty effects in response to a trigger event. In most cases, unless you actually see evidence of a payload that has activated, you will have time to deal with the infection properly.
McAfee VirusScan 2. If you created a VirusScan Emergency Disk during installation, or if your VirusScan copy came with one, lock the disk, then insert it into your floppy drive. NOTE: If your VirusScan software copy did not come with an Emergency Disk, or if you could not create an Emergency Disk during Setup, you must create a disk on an uninfected computer. 3. Wait at least 15 seconds, then start your computer again.
McAfee VirusScan If BOOTSCAN.EXE finds a virus, it will try to clean the infected file. If it fails, it will deny access to the file and continue the scan operation. After it finishes all of its scanning passes, it shows a summary report the actions it took for each hard disk on the screen.
McAfee VirusScan What does the VShield scanner do? McAfee desktop anti-virus products use two general methods to protect your system. The first method, background scanning, operates continuously, watching for viruses as you use your computer for everyday tasks. In the VirusScan product, the VShield scanner performs this function. A second method allows you to initiate your own scan operations. The VirusScan application generally handles these tasks.
McAfee VirusScan NOTE: Because the VShield scanner runs continuously, you should not install or run more than one VShield scanner on the same workstation. Doing so can cause the scanners to interfere with each others' operations. Why use the VShield scanner? The VShield scanner has unique capabilities that make it an integral part of the VirusScan comprehensive anti-virus software security package. These capabilities include: • On-access scanning.
McAfee VirusScan Browser and e-mail client support The VShield scanner works seamlessly with many of the most popular web browsers and e-mail client software available for the Windows platform. To work with your browser, the scanner requires no setup beyond what you have already done to connect your computer to the Internet. You must configure the scanner, however, to work correctly with your e-mail client software.
McAfee VirusScan At first, the scanner enables only its System Scan module, which scans viruses that arrive on your system from floppy disks and other removable media, from local-area network connections, and similar areas. The System Scan module also scans files that arrive via your e-mail system and from the Internet, but to do so, it requires the aid of the other VShield modules: E-Mail Scan, Download Scan, and Internet Filter.
McAfee VirusScan Figure 3-6. VirusScan control panel - Components page 4. Select the Load VShield on startup checkbox at the top of the Components property page. 5. Click OK to close the control panel. Enabling the VShield scanner and its modules Once you have all VShield components installed, you can use any of four methods to enable them, in various combinations. Three methods appear here. NOTE: Enabling a module means activating it and loading it into your computer's memory for use.
McAfee VirusScan Depending on which combination of modules you enable, the VShield icon will display a different state. Method 2: Use the System Scan Status dialog box Follow these steps: 1. Double-click the VShield icon in the Windows system tray to open the System Scan Status dialog box. Figure 3-7. System Scan Status dialog box 2. For each module that you want to enable, click the corresponding tab, then click Enable. The same button in the property page for active modules will read Disable. 3.
McAfee VirusScan Figure 3-8. VShield Properties dialog box 2. For each module that you want to enable, click the corresponding icon along the left side of the dialog box, then click the Detection tab. 3. Select the Enable checkbox at the top of each page. Understanding the VShield system tray icon states The VShield scanner displays four different icon states in the Windows system tray to indicate which, if any, of its modules are active.
McAfee VirusScan Using the VShield configuration wizard After you install VirusScan software and restart your computer, the VShield scanner loads into memory immediately and begins working with a default set of options that give you basic anti-virus protection. Unless you disable it or one of its modules—or stop it entirely—you never have to worry about starting the scanner or scheduling scan tasks for it.
McAfee VirusScan The System Scan module will also scan files stored on floppy disks whenever you read from or write to them, or when you shut down your computer. If it finds a virus, the module will sound an alert and prompt you for a response. The module will also record its actions and summarize its current settings in a log file that you can review later. 4. To enable these functions, click Yes, then click Next>. Otherwise, click No, then click Next> to continue.
McAfee VirusScan – Lotus cc:Mail. Select this button if you use cc:Mail versions 6.x and later, which use a proprietary Lotus protocol for sending and receiving mail. – MAPI-compliant e-mail client. Select this button if you use Microsoft Exchange or Microsoft Outlook, as your corporate e-mail system. Specify which e-mail system you use, then click Next> to continue. NOTE: If you use both types of mail systems, select both checkboxes.
McAfee VirusScan The module will look for viruses in those files most susceptible to infection and will scan compressed files as you receive them. Otherwise, select the No, do not enable download scanning checkbox, then click Next> to continue. The next wizard panel sets options for the VShield Internet Filter module. Figure 3-12. VShield configuration wizard - Internet Filter panel 7.
McAfee VirusScan Figure 3-13. VShield configuration wizard - summary panel 8. If the summary list accurately reflects your choices, click Finish to save your changes and return to the VShield Properties dialog box. Otherwise, click
McAfee VirusScan 52 McAfee Office
4 McAfee Utilities 4 As you use your computer, the information stored on the hard drive changes. This happens when you save, modify or move documents as well as when you install, update or uninstall programs. As the information changes, there is a chance that critical information can become damaged. McAfee Utilities central window Figure 4-1. McAfee Utilities Central window The McAfee Utilities Central window offers buttons to take you to the four suites of utilities (Figure 4-1).
McAfee Utilities McAfee Utilities Properties Before using McAfee Utilities, you can access the properties dialog box to customize the way you want its components to display and work on your computer. From the McAfee Utilities central window, click Options and select Properties to display the Properties dialog box. From this box, click any of the tabs displayed to view and select available options.
McAfee Utilities Window Patterns tab The Window Patterns tab displays options you can select to customize the look of applications on your computer. • Select Enable McAfee Utilities Window Patterns to activate this option. • Select the application you want to customize from the drop-down menu. • Select Window Patterns enabled to activate your selection. Notice that a preview of your selection is displayed on the lower part of the dialog box.
McAfee Utilities • Defragmentation status displays the information as to when you last defragmented selected drive with Disk Tune. You can click Run Disk Tune... now to perform defragmentation on this drive using Disk Tune. • Error-checking status displays information as to when you last checked selected drive for errors with Diskminder. You can click Diskminder Now... to run a check on this drive for errors using Diskminder. Follow the wizard to complete the task.
McAfee Utilities • If you want to add a new file format to be excluded, click Add New. Type the new file format in the space provided within the Files to exclude text box. After making your selection, click Apply; then click OK. File Shredder tab The File Shredder tab displays options you can select to customize the way you want Shredder to work on your computer. • In the Shredding level box, select either Quick or US Gov’t multipass to set the shredding level.
McAfee Utilities Zip File Manager tab The Zip File Manager tab displays options you can select to customize the way you want Zip Manager to work on your computer. • General Options are: Show Icon on Desktop; Add to Send To menu; and Start with Wizard. • Compression Option is Save Folder Information. After making your selection, click Apply; then click OK. Repair and Recover Use McAfee Utilities Repair and Recover utilities to help you resolve problems with your PC’s system software and data.
McAfee Utilities Report errors only Before interactively fixing errors, you can run Disk Minder with the Report Errors Only option selected to examine or print reports describing a disk’s problems. To use Disk Minder to report errors only, start Disk Minder, click Properties, select the Report Errors Only check box and click OK. Then select the disks to check, whether to scan the disk surface and click Start. Disk Minder checks the disk and displays the Summary report.
McAfee Utilities Customizing Disk Minder Properties In addition to auto fix, report, and interactively fixing errors options, you can also select other properties options to set how you want Disk Minder to work on your computer. Select Properties options and click OK Figure 4-3. Disk Minder Properties Options Other options include: • Check Partition Tables–verifies partition tables, that define the partitions subdividing a physical drive into more than one logical drive.
McAfee Utilities • Check for Duplicate File Names–checks for duplicate file names—files with the same name in the same directory. • Test Drive Surface–performs read/write tests of a disk’s recordable surface media. If a sector is damaged, Disk Minder saves the data elsewhere so you can try to recover it later. Disk Minder maps out the bad sector so it won’t be used in the future. • Surface Scan Repetitions–becomes active if you select the Test Drive Surface check box.
McAfee Utilities 3. Press the UP ARROW and DOWN ARROW keys to highlight a drive and press ENTER to select it. 4. Press the RIGHT ARROW key to move the cursor back to the buttons. 5. Select Start and press ENTER to start checking the drives. Disk Minder displays a screen showing the kind of data it is checking and the options in effect. If the Display Summary for Each Drive option is set, Disk Minder displays a summary message showing the total number of errors found on each drive, if any.
McAfee Utilities The first time you run Image, it records the date and time; thereafter, Image shows you when the last Image file was created Click Properties to set whether Image will save FAT information and to turn on Image’s auto-save option, which updates the image each time you start Windows Select whether to create an image file or restore an image file; then click Finish Figure 4-4.
McAfee Utilities Select an image file from the list and click Next > to begin restoring your hard disks Click Scan >> to locate image files stored on any disk drive on your PC; you can restore image files from any drive, even damaged hard drives Figure 4-5. McAfee Image Recover 2. Do one of the following and click the Next > button: • Select an image file to use for restoring your drives from the list of those found on your system hard drive.
McAfee Utilities • File allocation tables–Select this option if your files are corrupted and you have been unable to repair them using Disk Minder. Often much or all of your data may be intact on the disk, but the file allocation tables (FATs) may be damaged. By restoring the most current copy of a disk’s FAT, you can often recover files that would otherwise be lost. 5. Click Finish to restore the drives with the specified kinds of data.
McAfee Utilities Using a Rescue Disk Insert your Rescue disk into drive A, reboot your computer (or turn on the power). If your system doesn’t boot, access CMOS and make sure the Booting From Floppy option is enabled. Then follow the instructions on the screen. Disk Minder in DOS Disk Minder displays a screen showing the kind of data it is checking and the options in effect.
McAfee Utilities 2. During CheckUp, the component currently under examination is highlighted. Status information at the bottom of the screen lets you know exactly what CheckUp is doing. To perform a specific CheckUp 1. If you are having a specific hardware problem, click the appropriate component in the CheckUp desktop. A pop-up menu appears. 2. Click the check for the selected component. First Aid will perform a CheckUp on that component only.
McAfee Utilities NOTE: If you know a component is operating properly but First Aid reports a problem, do not AutoFix it. First Aid may have incorrectly identified a “problem,” and the suggested fix may inadvertently cause a real problem to occur. If AutoFix produces unwanted changes in your PC, you can usually reverse the changes with Undo. You can AutoFix from several points in the CheckUp report: • Click AutoFix on the main CheckUp Report screen to fix critical and potential problems.
McAfee Utilities Universal Undo allows you to undo: • A monitored event. Universal Undo monitors common events such as installing new software and drivers, and allows you to restore—safely and selectively—the changes made in the course of these events. • Changes to Windows settings. Most Windows configuration settings are housed in the Control Panel.
McAfee Utilities To undo a Control Panel setting: 1. Click Undo a Windows Settings Change on the Universal Undo screen. The Undo a Windows Setting dialog box appears. 2. Follow the screen instructions. Using Ask Advisor Ask Advisor allows you to access sources of information about your computer which can assist you in troubleshooting problems or simply learn more about your computer. These sources of information include: • KnowledgeBase which contain thousands of solutions to PC problems.
McAfee Utilities 3. Click Next >. Then click Finish. 4. Insert a disk into drive A and click OK. Rescue Disk formats the disk and copies critical startup files to it, as well as any files you added. When the process is complete, Rescue Disk exits and returns to the desktop. For more information, see related topic on Rescue Disk. Discover Pro Discover Pro is a unique utility that lets you view a wealth of system information, as well as perform benchmark and diagnostic tests.
McAfee Utilities Discover Pro lets you view information about your hardware and software. Each tab in the Discover Pro window covers a specific aspect of your PC, ranging from a general overview of your system configuration through software to benchmark and diagnostic tests. You can click the Advanced button at any time to obtain a far more detailed analysis of the current tab’s topic.
McAfee Utilities Discover Pro displays the Advanced window for the active tab. All the Advanced windows have these elements in common: • Icon Panel–Click any of the icons in the panel at the left to view that type of information in the panel at the right. • Detail Information Panel–The detail information shown in the panel at the right is for the category indicated by the currently selected icon.
McAfee Utilities Specifying Discover Pro settings Discover Pro lets you specify options (after clicking the Settings button) that determine the appearance of the Discover Pro window itself, whether you can view one or more category windows at a time, and whether Discover Pro should remember the positions of windows. • Display Style–lets you pick the Discover Pro display style that you are most comfortable using. Each display style provides a differently designed Discover Pro window.
McAfee Utilities The Discover Professional display style is the larger of the two windows. It contains large buttons for each category, making them very easy to select, so if you have a large monitor, you may like using this multi-window view best. The Discover - Small Size display style is a good choice if you want the flexibility of a multi-window view, but you have a smaller monitor and need to conserve desktop “real estate.
McAfee Utilities Clean and Optimize Use McAfee Utilities Clean and Optimize utilities to help you ensure maximum performance of your computer via easy-to-use maintenance and optimization tools. Cleanup Wizard Cleanup Wizard allows you to reclaim space on the hard disk by helping you identify files that you no longer need such as duplicate files; and files that are considered no longer useful.
McAfee Utilities Using Disk Tune to defragment or consolidate a disk After you specify one or more drives to tune and click Next >, Disk Tune analyzes the drive to determine the most suitable levels of optimization. Once the analysis is complete, depending upon the degree of fragmentation, Disk Tune recommends one of four methods: • Reorder and Unfragment–defragments your files and arranges them on the hard disk according to all the criteria specified in the Advanced options.
McAfee Utilities The hard disk map Disk Tune displays a map of the hard disk with blocks—each block consists of a variable number of clusters, depending on the disk’s size—color coded to indicate their status. You can identify the contents of a block in the hard drive map by clicking it. This is useful if you want an indication of which files make up a block, whether these particular files are fragmented, or held (designated as unmovable), and so on.
McAfee Utilities • Disk Tune provides three verification levels: Verify (slow–ensures data written to a new cluster can be read), Compare (slowest–compares a relocated file’s contents against the original to ensure it is exactly the same), and None (fastest). • Ordering by Task–(Windows 98 only) Windows 98 tracks how often each of your programs are used and maintains this information in an application log file.
McAfee Utilities Selecting a file category’s check box puts that file category in the Placement Strategy panel. You can highlight a category in the panel at the right, and move it up or down in the five disk regions. For example, if you want to place recently modified files in the middle region of your disk, click the Recently Modified Files check box, highlight this category in the Placement Strategy panel, and move it to the Middle (light blue) band by clicking the Up or Down Arrow buttons.
McAfee Utilities In advanced file placement configurations, you can decide where on the disk various file groups will be located. Disk Tune divides the disk into five regions: Top, High, Middle, Low, and Bottom, and it lets you specify in which of these regions the various file categories are placed. In addition to the default file categories, Disk Tune lets you create two categories of your own file types, such as help files, graphic images, and so on.
McAfee Utilities Registry Wizard Registry Wizard (for Windows 95/98 only) makes maintenance, troubleshooting, and repair of the Windows Registry database a quick and easy process. The Windows Registry is a database that replaces many functions of Windows 3.x’s AUTOEXEC.BAT, CONFIG.SYS, and *.INI files. This Registry contains all the information about the hardware, system, programs, and network user settings on your PC. Each time you add new hardware or software, the Registry is updated.
McAfee Utilities Figure 4-13. Registry Wizard window Select the task you want Registry Wizard to perform and click the Next > button. For step-by-step procedure, see the following topics on this chapter: • “Backing up & Restoring the Registry.” • “Cleaning the Registry.” • “Repairing the Registry.” • “Tuning up the Registry.” Backing up & Restoring the Registry The Registry Wizard -Backup & Restore dialog box appears after you select the Backup & Restore option and click Next> in the Regustry Wizard.
McAfee Utilities Cleaning the Registry The Registry Wizard - Clean dialog box appears after you selected the Clean option and clicked Next > in the Registry Wizard. • Select the items to clean up and click Finish. • Registry Wizard removes selected items from the Registry and exits.
McAfee Utilities Select a column title to change the sort order of the keys Select a key handle or child key and click Repair to manually edit its value Click Advanced to go to Registry Pro where you can edit an Orphan key entry that Registry Wizard has found in the Orphan tab list Click Repair All to let Registry Wizard repair invalid key entries Select an invalid key entry and click Repair to manually edit the value, or delete the entry from the database Click an orphan key and Registry Pro selects i
McAfee Utilities When you rebuild the Registry using the Registry Wizard Tune Up option, the current Registry files are saved in your Windows directory as system.hlx and user.hlx. In the unlikely event that you encounter any problems in Windows after a tune up, you can restore your original Registry by pressing F5 when you see the Starting Windows message when you boot, and by then typing REGUNDO at the C:> prompt.
McAfee Utilities Finding orphans An orphan is an entry for a program that has moved or no longer exists. Choose the Find Orphans command from the Search menu. Registry Pro displays a list of all the orphans it finds in the database in the Orphans tab. You can select an orphan key entry and Registry Pro selects it for you in the Registry database in the top two panels of the window. You can double-click an orphan entry in the top right panel to change its value data.
McAfee Utilities Choose Refresh from the View menu. Registry Pro updates the Registry. Launch Rocket The time it takes to launch applications in Windows can vary from a few seconds to a few minutes, depending on the size of the application, the number of component files that make up the application, and the location of these files on your hard drive. McAfee Utilities Launch Rocket Wizard dramatically reduces application launch times.
McAfee Utilities Shortcut Wizard Shortcut Wizard allows you to fix or delete shortcut icons that you have created which may no longer be valid as the files or applications it points to may have already been moved to another location or deleted entirely. The Shortcut Wizard box allows you to: • Repair orphaned shortcuts automatically. After list of invalid or orphaned shortcuts is displayed in the wizard box, you can set Shortcut Wizard to automatically repair any orphaned shortcuts possible.
McAfee Utilities Figure 4-15. McAfee Crash Protector dialog box When you see this dialog box, the application has caused an error which usually means it has gone astray. Therefore your data may already be lost or damaged. This dialog box lets you choose what to do with the faulty program. The following options are available: • Close Application - closes the application that caused the error and allows you to continue working.
McAfee Utilities 2. Select the application that has stopped responding. CPR tries to recognize the program and pre-select it for you. 3. Click End Task to have CPR close the program, or click Reactivate to have CPR try to reactivate the program. IMPORTANT: An application that has stopped responding may have other problems as well. Therefore your data may already be lost or damaged. If you need to recover your work, follow the instructions in the following procedure. To attempt to recover your work: 1.
McAfee Utilities 4. Click the Apply button when you finish selecting options. 5. Click OK to close the Crash Protector Properties. Deactivating Crash Protector You can deactivate Crash Protector whenever you like without restarting Windows. To deactivate Crash Protector: 1. Right-click on the Guardian icon in the system tray (The blue cross icon near the system clock) 2. Highlight the Crash Protector Menus option 3. Click the Crash Protector Properties entry.
McAfee Utilities NOTE: By disabling CPR, Crash Protector, or portions of it, you eliminate error protection, crash recoverability, and reactivation of programs that are not responding. WinGauge WinGauge is a dynamic reporting tool that constantly monitors your use of Windows and your applications, to alert you to potential problems before they become serious. Information about your system is displayed using gauges. You can select what to monitor and the type of gauge to use.
McAfee Utilities Working with gauges In WinGauge, you can set global gauge commands or set specific commands for each gauge. You can also add, update, or remove gauges. Adding a new gauge If you don’t see a particular gauge in the WinGauge window, you can add it to the window. To add a gauge: 1. Point to a gauge or the empty gauge area and press the Right mouse button. 2. Point to and click “New Gauge” from the menu. 3. Click on one of the gauge sets to expand and view a list of available gauges.
McAfee Utilities NOTE: A short description about a gauge’s function will appear in the description window of this dialogue box when you click on the gauge name. Click the Help button for additional gauge information 4. Click OK to add a gauge. The gauge is added in the WinGauge window. Updating gauge information To immediately update your gauge information: 1. Point to a gauge and press the Right mouse button 2. Choose the Update command. WinGauge updates the gauge information.
McAfee Utilities To resize the WinGauge window: 1. Point to any corner or side of the WinGauge window. 2. Drag the window edge in any direction to a new location. Point to a side or corner of the WinGauge window and the pointer changes to a double-tipped pointer (arrow). You can drag the edge of the frame to resize the window without affecting the size of the gauges. Resizing gauges While the WinGauge window is undocked, you can resize all of the gauges in the window, as shown below.
McAfee Utilities Rearranging gauges in the WinGauge window You can drag gauges around in the gauge area to move them to a new location in the WinGauge window. You might do this to place related gauges in adjacent positions. The titlebar must be visible in order to rearrange gauges. To rearrange the gauges within the WinGauge window: 1. Point to a gauge and click the Left mouse button 2. “Pick-up” a gauge and drag it to reposition it within the WinGauge window.
McAfee Utilities Data style Selecting a Data Style of Color Lines, Color Fill, Solid Lines, or Solid Fill makes certain Colors options visible. Size Selecting double wide or tall, both, or default adjusts the gauge size. Gauge text You can select whether to display a gauge’s title and value, show the title vertically or horizontally, and show the value as a percent. You can also select where on the gauge the title and value appear. Colors You can customize a gauge by changing the colors.
McAfee Utilities • Alarm Background (default maroon red)–Sets the color for the alarm background of the gauge indicator. Regular (default lime green Text (default black) Frame (default white) Warning (default bright yellow) Alarm (default bright red) • Warning (default bright yellow)–Sets the color for warning data usage (visible when Data Style is set to Color Lines or Color Fill).
McAfee Utilities Warnings and Alarms Thresholds Threshold settings are available for warnings and alarms. Simply point, click, and drag the slider on each rule to set the threshold for warnings and/or alarms. The thresholds are constrained to each other (from Off to 100%). This constraint relationship is determined by whether the Invert Alarms check box is selected. Invert Alarms WinGauge allows you to monitor both increasing and decreasing values.
McAfee Utilities Show Bubble Help Select the Show Bubble Help check box to display Bubble Help when you point to a gauge. The delay time specifies the time in which the help information is delivered upon pointing to a gauge. Properties: Background Pattern tab The Background Pattern tab allows you to use a bitmap file as the background pattern for your WinGauge window and your gauges. To set a background pattern: 1. Right click on a gauge and select Properties. 2. Choose the Background Pattern tab. 3.
McAfee Utilities NOTE: Remember to resave the WinGauge file when additional changes are made. To save gauge settings: 1. Point to a gauge and press the Right mouse button. 2. Choose the Save As command from the Settings menu. 3. Enter a file name for these settings and click Save. (Use the .WGP file extension for settings files.) TIP: To have WinGauge automatically load a particular gauge settings file, specify the file name in the WinGauge shortcut properties sheet.
McAfee Utilities • Question Mark ( ? )–a single-character placeholder. For example, you could enter map??.bmp to exclude a range of files named map01.bmp through map99.bmp. Trash Guard also lets you select files in the Files To Exclude list and click Modify to modify the definition of these files, or click the Remove button to remove them from the list of files to exclude.
McAfee Utilities Creating automatic backups When you select to have Safe & Sound automatically create a backup set for you, it creates the first backup set while you are stepping through the Safe & Sound Wizard. Thereafter, while the Enable Automatic Backup option is selected, it continues to update your backup set at the time delay you’ve specified. If you chose to make Mirror backups, Safe & Sound updates your backup set at the same time that you resave the original source files.
McAfee Utilities What files are important Safe & Sound automatically selects files that are typically important to include in a backup set. However, you can select other files or types of files to include in your backup set. In addition, you can create multiple backup sets of data for particular purposes. Each of these backup sets can be created when and where you specify. They can each include exactly the files or types of files that you choose.
McAfee Utilities Protected Volume File–The Protected Volume File is the preferred backup type. A protected volume file is a sectioned off portion on the drive. It has special characteristics to ensure that even if organizational structures, such as the file allocation table on the drive is corrupted or lost, or the data becomes scrambled, the files in the backup set can be reconstructed.
McAfee Utilities • Protected Volume Drive Letter–(available only for backup sets stored as a Protected Volume File). The drive letter you want to use for the Protected Volume File backup set. • Keep Deleted Files For–Select how long you want the backup set to keep files whose original counterparts have been deleted from your system. • Limit Size of Backup Volume–Drag the slider left to reduce the backup volume size limit or right to increase the backup volume size limit.
McAfee Utilities If you are not yet familiar with file types and want to see them, you can open My Computer or Windows Explorer, choose the Options command from the View menu, and click the File Types tab. In the Options dialog box you can examine the list of the registered file types on your system. These are the file types that will be available to you in Safe & Sound. You can add new registered file types in the Options dialog box to make them available to Safe & Sound the next time you run it.
McAfee Utilities NOTE: Unless you create a backup set containing the entire contents of a drive, you should never drag and drop or copy/paste the contents of a Safe & Sound backup set’s folder into a drive icon or window. Though the folder names match between a Directory type backup set and the folders on the drive, the files inside are most likely very different. By default, Safe & Sound only backs up files it considers essential, such as INI, TXT, RTF, DOC and WRI files.
McAfee Utilities 3. Change the settings and click OK when you are done. Click Finish. Deleting a backup set If you created a Safe & Sound backup set as a protected volume file, you cannot delete it in My Computer or Windows Explorer. You can only delete the protected volume file using Safe & Sound. If you created a Safe & Sound backup set as a directory, you should still delete it using Safe & Sound; however, you can also delete the backup directory via My Computer or Windows Explorer.
McAfee Utilities NOTE: Performing a Rebuild is a time-consuming process because Safe & Sound searches your entire system to find all backup sets that are stored there. 3. Select the drives that contain a protected volume file you want to restore. Then click Next >. The Restore utility searches the selected drives for protected volume files or backup directories. If it finds a protected volume file, a message appears asking if you want to Save As, Ignore, or Ignore All. 4.
McAfee Utilities • Boot to Windows–Select this check box to start Windows when you start your computer. When you deselect this check box and restart your computer, it boots up and takes you to the DOS prompt (usually the C:\> prompt). To start Windows from this prompt, type WIN and press ENTER. • Boot delay in seconds–Select or enter the number of seconds of delay you want when booting the PC. You can increase the boot delay to have extra time for pressing the Windows startup hot keys.
McAfee Utilities • Name of Disk Scanner–Choose Disk Minder or Scan Disk (only for the OEM SR2 version of Windows 95 or later) to pick which one you want Windows 95 to start if it encounters a problem with a disk. • Display startup logo–Select this check box to have the Windows Startup logo to appear whenever you start Windows. • Display shutdown logo–Select this check box to have the Windows Shutdown logo to appear whenever you restart the PC in Windows.
McAfee Utilities Select the shortcut indicator type Drag the slider left to make menus appear faster, or right to make them appear slower Click the Folder icon button to display the Change Icon dialog box where you can select a custom shortcut icon by filename Click Clear Now to clear the corresponding history defaults now Your Explorer options are: • Menu speed–Drag the slider left to make menus appear faster, or right to make them appear more slowly.
McAfee Utilities Run/Add/Remove tab The Run/Add/Remove tab lets you add, remove, edit, and specify properties for programs that automatically run when you start Windows, and for programs that appear on the Start > Program menu. The Run/Add/Remove options are: • Programs Run Automatically at Windows Startup–Click Add to add a new program to run automatically at Windows startup. The next time you start Windows, the program starts automatically. These programs will be added to your StartUp folder.
McAfee Utilities Send To tab The Send To tab lets you add, remove, edit, and select properties for the commands that appear on the File > Send To menu. The Send To menu is also sometimes available in the context-sensitive pop-up menu that appears when you Right-click the mouse button, such as when you point to an icon in My Computer.
McAfee Utilities In most cases, each Context menu command has a check box beside it. By selecting or deselecting the check box, you can enable or disable each command performed by a Context menu handler. Some Context menu commands have a folder icon next to them, instead of a check box. This is the case when the same Context menu handler is used to perform the same Context menu command on more than one file type.
McAfee Utilities Starting Launch Pad To start Launch Pad, click the Launch Pad icon on your desktop, or choose the Launch Pad command from the Start > Programs > McAfee Utilities menu. An empty Launch Pad appears, which is a small window. Adding, updating, and removing icons You can add icons to Launch Pad by dragging an application icon, folder or file from its location on the desktop, Windows Explorer, or My Computer into Launch Pad.
McAfee Utilities To dock Launch Pad, drag Launch Pad close to any edge of the desktop where you want it to be docked. Then point inside the Launch Pad window and Right-click. Choose the Dock Launch Pad command from the Global menu, and Launch Pad snaps to the edge of the desktop. To undock Launch Pad, Right-click and choose the Undock Launch Pad command from the Global menu.
McAfee Utilities • Email plugins. One of the most convenient ways to use PGP is through one of the popular email applications supported by the PGP plug-ins. With these applications, you can encrypt and sign as well as decrypt and verify your messages while you are composing and reading your mail with a simple click of a button. • PGPtray. PGPtray is a convenient means for launching the various PGP utilities.
McAfee Utilities 6. Type a passphrase. An adequate passphrase contains multiple words and may include spaces, numbers, and punctuation characters. Choose something that you can remember easily but that others won’t be able to guess. NOTE: If you are creating a key with the same user name or email address as a previous key, you are given the opportunity to sign the new key with your older key.
McAfee Utilities Decrypting emails and files When someone sends you encrypted data, you can unscramble the contents and verify any appended signature to make sure that the data originated with the alleged sender and that it has not been altered. • If you are using an email application that is supported by the plug-ins, you can decrypt and verify your messages by selecting the appropriate options from your application’s tool bar.
McAfee Utilities When a PGPdisk volume is mounted, you can use it as you would any other disk. You can install applications within the volume, move or save your files to the volume. When the volume is unmounted, it is unaccessible to anyone who does not know your secret passphrase, which is a longer version of a password. Even a mounted volume is protected as it it stored in encrypted format, unless a file or application is in use.
McAfee Utilities Move your mouse around in a random manner within the Wizard window and/or randomly press characters on your keyboard until progress bar shown in the dialog box is completely filled in. The mouse movement or character pressing on your keyboard generates random information used by the PGPdisk program as part of the encryption (data scrambling) process. 9. Click Next. A progress bar indicates how much of the PGPdisk volume has been initialized. 10. Click Next to mount your PGPdisk. 11.
McAfee Utilities • Drag the key or keys you want to remove from the bottom pane of the window, to the top of the pane. 5. Click OK. McAfee Shredder When you save a file in Windows, it is stored in multiple pieces (in clusters made up of multiple sectors) on the disk. Windows also saves a roadmap, or index, that points to these clusters in two copies of the FAT (File Allocation Table). The FAT contains the directions to all the pieces of your files, so that applications can find them again later.
McAfee Utilities To shred files using drag and drop: 1. Select files in My Computer or Windows Explorer and drag them onto the McAfee Shredder icon on the desktop. If you have selected the McAfee Shredder properties option to Prompt Before Shredding, a message appears listing the first file you dragged onto the McAfee Shredder icon. It asks you to confirm that you want to shred this file. 2. Do one of the following: • Click OK to shred the listed file. Repeat this step for each file.
McAfee Utilities 4. Do one of the following: • Click OK to shred the listed file. Repeat this step for each file. • Click OK to All if you’re positive you want to shred all the specified files. • Click Skip to not shred the listed file and continue selecting whether to shred any of the remaining files you specified. • Click Cancel to return to the desktop without shredding the listed file or any others you specified.
McAfee Utilities The McAfee Zip Manager is a complete zip management utility that you can use in two ways: via ZipMan Wizard or the advanced McAfee Zip Manager. ZipMan Wizard provides you with all the zip file management features you will normally use. It takes you, step by step, through the process of zip file creation and extraction.
McAfee Utilities • Create archive–lets you create zip archives in any directories and specify which files you want to zip and place in these archives. • Add files to existing archive–lets you zip files and place them in existing archives. • Build self-extracting archive–lets you convert an existing archive, containing one or more zipped files, into an unzipping program that can decompress the files without the use of McAfee Zip Manager or another unzip program.
McAfee Utilities Compression options • Save Folder Information–saves the folder name with the files you select. When you unzip these files, McAfee Zip Manager checks whether the same folder names exist as subfolders at the location where you want to place these extracted files. If the subfolders do not exist, McAfee Zip Manager creates them. • Save Current Folder–allows you to group all files using their current folder, so that the folder information is saved for files added without a folder.
McAfee Utilities Setting overwrite, destination, and other options The Unzip Options let you customize the overwrite and extraction features of your zip file management tasks. You can specify whether the extracted files should overwrite existing files with the same name located in the folder where you are placing the extracted files, or whether you want to be notified that files with the same name already exist.
McAfee Utilities Menu bar Toolbar Column title boxes File table McAfee Zip Manager tool buttons TIP: Point to a McAfee Zip Manager tool button and the status bar at the bottom of the window displays a brief description of the tool button’s purpose.
McAfee Utilities McAfee Zip Manager file table The file table in the McAfee Zip Manager window displays the files you are currently manipulating. You can select files by clicking them, using standard Windows selection techniques. You can rearrange the columns by dragging the column title boxes left or right to a new location. You can click any column title to sort the files by that information.
McAfee Utilities 134 McAfee Office
5 McAfee Firewall 5 About McAfee Firewall McAfee Firewall is a personal firewall that lets you monitor, control and log your PC's network activity. It protects you from Internet hackers and keeps your PC private. McAfee Firewall: • Stops fileshare and printshare access attempts. • Shows who is connecting (i.e., if you allow sharing) • Stops floods and other attack packets from being received by the Operating System. • Blocks untrusted applications from communicating over the network.
McAfee Firewall Some network communications are needed to maintain network-based services. These are managed through user defined rules under the SYSTEM button feature of McAfee Firewall. The default SYSTEM settings feature provides protection from hostile threats. In addition, during the installation process, it will prompt you with some basic questions to set up McAfee Firewall to do specific tasks, according to your needs (e.g. allow sharing of files or not).
McAfee Firewall Applications Control applications McAfee Firewall monitors network traffic to see which applications are communicating. Depending on your settings, it will allow or block an application's attempt to communicate. To control which applications may communicate, click the Settings menu item and choose Applications. If you choose to "Trust all applications" (putting a check mark in the box), then applications will be added to the "Trusted" list automatically and will be allowed to communicate.
McAfee Firewall Systems Control system The operating system performs many types of network communication without reporting directly to the user. McAfee Firewall lets the user allow or block different system functions explicitly. Settings may be different for each network device, since a PC may, for example, be on an internal network as well as having a dial-up connection to the Internet. To control System settings, click on the Settings menu item and choose System.
McAfee Firewall PPTP: Blocked This should only be altered by the administrator. Other Protocols: Blocked If you are on an IPX network, you should allow "non-IP protocols". If you use PPTP, you should allow "other IP protocols". Ask your network administrator before making any change here. Password Protection While McAfee Firewall is designed to protect a Windows computer from unwanted network communication, the security it provides can be undermined if the configuration can be altered.
McAfee Firewall Display Control It is best to choose Summary mode when setting it up for other users. The information shown in Detail mode is intended for the Adminstrator and may reduce performance on high-speed networks. Logging Control It is important to log unknown traffic if you want to review the log files to look for intrusion attempts. This option should only be unselected if the computer is on a busy network and large amounts of (harmless) traffic fills the log file.
McAfee Firewall Configuring System Settings The following steps will help the Administrator set up the System portion of the configuration. While the configuration file (CPD.SFR) is not intended to be transferrable, the Applications settings can be successfully copied from one system to another. The System settings cannot. This is because different systems have different network devices and it is uncommon to find two that are the same. 1.
McAfee Firewall Configuration after Adding/Removing Network Devices The System Settings must be verified after changes are made to network devices. This is especially important if a network device is added or removed. If a device was removed, all settings may have to be re-entered, because they previous settings may now be associated with the wrong device. If a device is added, it will have to be configured for the first time. 1. Select the Settings menu item, and the System option on the popup menu. 2.
McAfee Firewall It is really important to choose a password that others will not guess. Choosing words, such as "open sesame" is a poor choice because there are password guessing programs that systematically try every word in the dictionary as well as common phrases, names, dates and other predicatable entries. It is better to choose several unrelated words, letters mixed with numbers, or completely random characters. The more, the better. There are password generation programs that can help you choose.
McAfee Firewall 144 McAfee Office
6 McAfee UnInstaller 6 UnInstaller™ can be used for many more purposes than simply uninstalling old applications. For example, UnInstaller can clean up junk files that have built up on your computer as you browsed the Internet, and it can do this cleanup automatically on a schedule that you specify. UnInstaller can also move applications from one hard disk to another— even to another computer—and change all references to the application at the same time.
McAfee UnInstaller • Each time you start UnInstaller, the old version of the database is compared with new information on your computer. • After you restore files or applications from UnInstaller backup copies, UnInstaller records changes that it has just made. • After you delete or archive files or applications, UnInstaller records changes. • After you manually select a wizard from the main UnInstaller screen, UnInstaller records changes that the wizard makes.
McAfee UnInstaller NOTE: Wizards are designed to be easy to understand and to use. Each wizard screen tells you what you need to know to enter information or choose options. If you want to know more about a wizard, click Help. By default, SpaceMaker and Remove wizards create backup copies of files before they are deleted. Although you can turn off backup creation when you run the wizard, it is a good idea to make backups.
McAfee UnInstaller Table 6-1. The UnInstaller wizards (Continued) This wizard... Does this... BackTrack Monitors application installation. Lets you undo the installation of any application if it was monitored by BackTrack. . SpaceMaker Deletes old files in specific categories until it has freed the amount of disk space you specify. . About PowerClean PowerClean is not a wizard.
McAfee UnInstaller To schedule an UnInstaller event: 1. Right-click the Guardian icon in the clock area of the Windows taskbar, and choose What’s Scheduled from the popup menu. Figure 6-16. Scheduling events The What’s Scheduled dialog box appears. 2. Select QuickClean or Installation Monitor from the list of scheduled events in the Events window and click Schedule to open the Event Schedule dialog box. The default scheduled events are: • Qclean.
McAfee UnInstaller Using QuickClean Use the QuickClean wizard to perform any of the following actions to keep your computer free of unused files and invalid shortcuts: • Remove unused files in the cache folder of your Internet browser. • Remove any temporary files in folders that are used by applications and Windows. • Clean up shortcuts, Registry entries, and remove references in operating system files that are not connected to any application. • Empty the Recycle Bin.
McAfee UnInstaller How do I schedule QuickClean to run at a specific time? Events for McAfee applications are managed by the McAfee Guardian. Each McAfee application adds to the list of events that the Guardian can run at a scheduled time. To change the QuickClean schedule: 1. Right-click the red and white McAfee Guardian icon in the clock area of the taskbar, and then select What’s Scheduled on the menu. 2. In the What’s Scheduled dialog box, select QuickClean and click Schedule. 3.
McAfee UnInstaller No file is deleted if it has been modified or accessed within the period specified by the SpaceMaker page of the Settings dialog box. The default period is 180 days. To view or change SpaceMaker defaults, click Settings from the Options menu, and click the SpaceMaker tab in the Settings dialog box. Each time you run SpaceMaker you can change most defaults temporarily.
McAfee UnInstaller Using Transport Use the Transport wizard to package an entire application and its configuration settings so that you can rebuild the application with exactly the same option settings on a different computer. To start the Transport wizard, click Transport in the UnInstaller window. You can also include associated data files in the Transport package.
McAfee UnInstaller You do not need to have UnInstaller installed on the machine where you reinstall the transported application. You do need to make sure that the application license agreement permits you to use the application on more than one computer. A package file created by the Transport wizard contains: • The application itself. • Registry entries that store application default settings, and other information needed to set up the application exactly as it was on the original computer.
McAfee UnInstaller After the Archive wizard creates the compressed archive file, it removes the application from the folder where it was installed, but leaves the shortcuts to the application in place. When you click a shortcut to the application in the Windows Start menu Programs list, or on your Windows desktop, taskbar, or elsewhere, a message box appears, explaining that UnInstaller has archived the application and asking if you would like to restore it.
McAfee UnInstaller If you have installed a second hard disk, relocate some applications from your primary hard disk to create more space there. • From your local computer to a drive on another computer. If you have more than one computer at your disposal, you can manage how you use the available disk space by moving applications between hard drives. • From one folder to another. You can reorganize application folders on your computer by combining applications in subfolders of a single folder.
McAfee UnInstaller To run Installation Monitor automatically in the background while you work, you must select either or both of the options on the BackTrack page. When BackTrack Monitor detects an installation program, it displays a message box where you can choose whether to monitor the installation. TIP: Many installation programs start automatically as soon as you insert a CD disc into your CD drive.
McAfee UnInstaller To undo an application installation: 1. Click BackTrack in the main UnInstaller screen to start the BackTrack wizard. 2. In the first BackTrack wizard screen, click Next. 3. Select the BackTrack archive from the list and click Next again. The BackTrack wizard processes the archive to determine what it needs to undo.
McAfee UnInstaller • The information in the Restore wizard list includes the name of the backup or archive file, such as “Archive of Glaxian,” the name of the wizard that created the backup, and the date the backup was created. 3. Select an archive or backup from the Restore wizard list and click Next. 4. On the second wizard screen, the names of all files that will be restored are displayed. 5. In the second wizard screen, you can select files to restore, and click Next. 6.
McAfee UnInstaller To restore individual files: 1. Click Restore in the main UnInstaller window. 2. On the Restore wizard screen, click the arrow by the dropdown list and select the backup or archive folder. To see a list of the files contained in the backup or archive, click Next. 3. Select the files you want to restore from the list that appears in the next wizard screen; then click Next. 4. In next wizard screen, you can choose: • How to replace files in restoration folders.
McAfee UnInstaller You can perform the same actions on individual files or groups of files that the UnInstaller wizards perform on entire applications. • Find out what application uses a selected file. Right-click File Links from the popup menu to see what application uses a selected file. If the selected file is an executable file, such as a .DLL or .EXE file, the File Links dialog box displays a list of the files that are used by the executable file itself.
McAfee UnInstaller When you want to use PowerClean to manage files, clear the check next to Read-only mode on the PowerClean page of the Settings dialog box. Open the Settings dialog box by clicking Settings from the Options menu. The PowerClean feature opens in a dialog box that works like the Windows Explorer. Like the Explorer window, it has a menu bar, a status bar, and a toolbar that you can customize.
McAfee UnInstaller The major file groups are described briefly in the following table. A description of the selected group or subgroup appears in the Advice tab pane. Note that some files appear in more than one group.
McAfee UnInstaller The PowerClean default file groups (Continued) Category Description Windows Registry Important Registry entries for applications. Registered File Types Files in each file-type category that is associated with an application. Custom File Groups This group contains file groups that you name and define. For information about creating your own file groups, see the following section.
McAfee UnInstaller 5. Click OK to save the new group. To change the definition of a custom file group: 1. Select the file group in the Cleanup Types list. 2. Click Edit File Group from the Tools menu. The Custom Group dialog box appears. 3. Change the information in the dialog box. You can change any information that appears, including the name of the custom group. 4. Click OK to save the changes. PowerClean menus PowerClean menu commands This menu... Contains these commands...
McAfee UnInstaller Using the tab panes? The tab panes below the group and file lists display information, either about the selected file or about the actions that you have performed during this PowerClean session. Information in the PowerClean tab panes Click this tab... Advice To see... Information about the selected default group of files, including suggestions about what you should or should not do.
McAfee UnInstaller In some cases, the color code is determined by your default settings. For example, if you specify that files of a specific type in a specific location should never be deleted, those files are marked with a red circle. Descriptions of PowerClean color codes Code Description Red circle with a diagonal line across it Files marked with this code are necessary for your computer to run correctly. You cannot delete these files from the PowerClean dialog box.
McAfee UnInstaller If you have started UnInstaller, but are not are not working with the PowerClean feature, click Options in the main UnInstaller window, then click Settings in the menu that appears. When the Settings dialog box opens, click the PowerClean tab. The original default settings are: • Turn on read-only mode. • Specify that files must be 180 days old to be deleted. • Create backups of all deleted files.
McAfee UnInstaller When you first open the Reports dialog box, you see summary information from the Master Log in all pages. To see information about a specific action, click Open. Then choose the action from the list that appears, and click OK. The information that appears depends on whether you are viewing Master Log totals, or have chosen a specific action report. Action report logs display a complete list of files that were deleted or modified by each individual action.
McAfee UnInstaller 170 McAfee Office
7 McAfee Internet Guard Dog 7 In the last few years the Internet has changed from a communications network that government entities and universities used almost exclusively, to an information treasure house that people of all ages and occupations can now access. With an Internet account, you can send electronic mail (e-mail) around the world in seconds, do research without leaving home, meet new friends in an online chat room, or shop without getting out of your bathrobe.
McAfee Internet Guard Dog Activity Logs On the Product Name Home screen, Activity Logs allow you to view a list of all the interactions that you and other profiled users of your computer had with Product Name, including the date and time of the action. You can print, save or clear this list. Security Check You can run a complete check of your computer for any privacy or security problems via this feature.
McAfee Internet Guard Dog Protection from privacy threats • Identity Protector monitors your Internet connection and warns you before private information is sent to an unsecure Internet site. It stops programs and other people that use your computer (like your kids) from sending your name and credit card numbers over the Internet without your approval. • Cookie Blocker prevents Web sites from storing cookies on your hard drive. Third-party Web sites use cookies to track your Web browsing habits.
McAfee Internet Guard Dog Protection from virus threats Using the McAfee VirusScan, the following features are available: • Scan to start the default virus scan task immediately, or configure a virus scan task that suits your needs. • Scheduler to launch the McAfee VirusScan Scheduler. This utility enables you to configure and run unattended virus scan operations. • Virus info to display virus information via the McAfee Web site.
McAfee Internet Guard Dog • Other financial numbers such as bank account, brokerage account, credit card, phone card, and so on. • Any Web site login names and passwords that you want to store in Password Manager. Information about other users of your computer. If you are the Administrator, you can create user profiles and set protection settings that Internet Guard will use whenever the user is browsing the Internet via your computer.
McAfee Internet Guard Dog Self-Administrator The Internet Guard Dog Administrator may designate another user as a Self-Administrator. This feature may be used if for example, the user is an adult and is deemed responsible enough to customize his privacy and protection settings on his own. This user can access Internet Guard Dog features and change his settings, not anyone else’s. See the Internet Guard Dog online Help to view step-by-step instructions on how to designate a user as a Self-Administrator.
McAfee Internet Guard Dog Table 7-1. Actions you can perform in the Home screen (Continued) To do this Click this Perform a security check to find any privacy or security problem on your computer. Security Check Display user activity logs Activity Logs Display the McAfee Software Home screen in your Web browser. Help, then select McAfee Software on the Web Display the McAfee Software Support page in your Web browser. Help, then select Product Name on the Web Access the McAfee Web site. McAfee.
McAfee Internet Guard Dog User Profile To customize protection settings for another user, click User Setup from the Internet Guard Dog Home page, the User Setup screen is displayed. You can add, edit or delete a user’s profile from this screen. Click any of the buttons available and follow through the instructions displayed on screen. How Internet Filtering works As a new feature of Internet Guard Dog, you can further customize the protection settings of a profiled user via the Internet Filtering options.
McAfee Internet Guard Dog • Word List. This option allows you to filter Web sites and chat messages using words and phrases. • Ad Blocker. Select this option if you want Internet Guard Dog to block certain ads that you do not want the user to view. • Internet Times. This option allows you to control the times that a user is allowed access to the Internet. • Internet Settings.
McAfee Internet Guard Dog Performing a Security Check After completing the interview, you’ll want to find out how your PC may be at risk. Security Check examines your PC for privacy and security problems and then guides you through fixing any problem it finds. If you are using the settings suggested by Product Name in the interview, you only need to run Security Check right after installation and then every month or so. If you reduce the level of protection, you should run Security Check more frequently.
McAfee Internet Guard Dog If you find over time that you are being alerted to potential security risks too often, you can adjust the alert message settings in Protection Settings. Cookie Blocker and Gatekeeper require a period of adjustment before Product Name has learned to address your concerns with the least amount of disruption. TIP: If you decide you no longer want to see an alert message, use the question mark (?) button in the alert message to find out what setting to change.
McAfee Internet Guard Dog To open Browser Buddy 1. Right-click the Product Name icon on the Windows taskbar, then click Browser Buddy. The dialog box is displayed. Figure 7-18. Browser Buddy To add a new username and password 1. In Browser Buddy, select Add New Entry from the Password Manager drop-down list. The Enter password to save dialog box is displayed. 2.
McAfee Internet Guard Dog To retrieve your username and password 1. In Browser Buddy, select the site name if it doesn’t appear automatically in the Current Web Site list. 2. Drag your username or password from the Password Manager box to appropriate field in your Web site’s login form. The text appears in the field. (If the site that you are logging into displays your password text as a series of asterisks (*), Product Name will display one asterisk for each character in your password.) 3.
McAfee Internet Guard Dog If during the Interview, you accepted Internet Guard Dog’s recommendation on how to respond to cookies, Cookie blocker will: • Automatically allow cookies to be accepted from direct sites. • Display an alert message when an indirect sites tries to set a cookie. What Identity Protector does It is easy to forget that when you send information over the Internet, it doesn’t go directly from your computer to the computer that is storing the Web page information.
McAfee Internet Guard Dog What Web Trail Cleaner does As you surf the Internet, your browser stores information that makes your browsing experience more satisfying. It uses the information as follows: Your browser uses To Cached files Speed up the display of Web page elements such as graphics. URLs visited Display a list of sites that you’ve visited using Web addresses. History Display a list of sites that you’ve visited using Web site names.
McAfee Internet Guard Dog • Your browser is directed to a harmful site—one that has been known to contain virus-infected files (e.g., Trojan horses, prank or destructive ActiveX controls, or other security concerns). • A program silently uses your modem to connect to another computer. • A program starts up another program. A program sends out over the Internet a number that follows a common credit card number pattern. Internet Guard Dog can display five different Gatekeeper-related alert messages.
McAfee Internet Guard Dog • An ActiveX control attempts to delete files on your hard drive. • An ActiveX control attempts to scan files on your hard drive. • A program attempts to access your system password files. When Product Name displays an alert message, you can decide What Password Manager does Password Manager lets you store your various Web site login names and passwords in one secure location.
McAfee Internet Guard Dog 2. Change the information that you want to store in the record. 3. Click OK. To remove a password record • 188 McAfee Office In the Password Manager list, click a record to select it, then click Remove.
8 PGP Personal Privacy 8 The PGP Personal Privacy secures and protects the privacy of your data by encrypting it so that only the intended individuals can read it. You can also sign information digitally to ensures it’s authenticity. Using PGP Personal Privacy Figure 8-1. PGP main window PGP is a security software application that enables you and your co-workers to exchange or store information securely, so that no one else can read it.
PGP Personal Privacy Basic steps for using PGP Personal Privacy This section takes a quick look at the procedures you normally follow in the course of using PGP Personal Privacy. 1. Install PGP on your computer. Refer to the Individual Product Requirements in Chapter 2 for complete installation instructions. 2. Create a private and public key pair. Before you can begin using PGP, you need to generate a key pair.
PGP Personal Privacy • If your email application is not supported by the plug-ins, you can perform the appropriate functions from PGPtray. You can also encrypt and sign files from PGPtools before attaching them to your email. Encrypting ensures that only you and your intended recipients can decipher the file’s contents; signing ensures that any tampering will be readily apparent. 6. Decrypt and verify your email and files.
PGP Personal Privacy From the System tray You can access many of the main PGP functions by clicking the lock icon, which is normally located in the System tray, and then choosing the appropriate menu item. (If you can’t find this icon in your System tray, run PGPtray from the Start menu). Performing PGP functions from the clipboard You will notice that many of the options on the System tray refer to PGP functions that you perform from the Windows clipboard.
PGP Personal Privacy Getting Help When you choose Help from the PGP menu or window, you access the PGP online Help system, which provides a general overview and instructions for all of the procedures you are likely to perform. Many of the dialog boxes also have context-sensitive help, which you access by clicking the question mark in the right corner of the window and then pointing to the area of interest on the screen. A short explanation appears.
PGP Personal Privacy Using PGP/MIME If you are using an email application with one of the plug-ins that supports the PGP/MIME standard, and you are communicating with another user whose email application also supports this standard, both of you can automatically encrypt and decrypt your email messages and any attached files when you send or retrieve your email. All you have to do is turn on the PGP/MIME encryption and signing functions from the PGP Preferences dialog box.
PGP Personal Privacy Taking shortcuts Although you will find that PGP is easy to use, a number of shortcuts are available to help you accomplish your encryption tasks even quicker. For instance, while you are managing your keys in the PGPkeys window, you can press the right mouse button to perform all the necessary PGP functions rather than accessing them from the menu bar. You can also drag a file containing a key into the PGPkeys window to add it to your keyring.
PGP Personal Privacy When a PGPdisk volume is mounted, you can use it as you would any other disk. You can install applications within the volume, move or save your files to the volume. When the volume is unmounted, it is unaccessible to anyone who does not know your secret passphrase, which is a longer version of a password. Even a mounted volume is protected as it it stored in encrypted format, unless a file or application is in use.
PGP Personal Privacy Move your mouse around in a random manner within the Wizard window and/or randomly press characters on your keyboard until progress bar shown in the dialog box is completely filled in. The mouse movement or character pressing on your keyboard generates random information used by the PGPdisk program as part of the encryption (data scrambling) process. 9. Click Next. A progress bar indicates how much of the PGPdisk volume has been initialized. 10. Click Next to mount your PGPdisk. 11.
PGP Personal Privacy Add/Remove Public Keys You can add and remove public keys for a PGPdisk file. This enables you and others who know the passphrase for those keys to use the passphrase to mount the volume. 1. Make sure that the PGPdisk is not mounted. You cannot add a public key if the PGPdisk file is mounted. 2. Choose Add/Remove Public Keys from the File menu. 3. Select the PGPdisk from the Select PGPdisk toolbar. You are prompted to enter the master passphrase.
A A Product Support BEFORE YOU CONTACT McAfee Software for technical support, locate yourself near the computer with McAfee Office installed and verify the information listed below: • Have you sent in your product registration card? • Version of McAfee Office • Customer number if registered • Model name of hard disk (internal or external) • Version of system software • Amount of memory (RAM) • Extra cards, boards or monitors • Name and version of conflicting software • EXACT error message as on screen •
Product Support Technical support Support via the web McAfee is famous for its dedication to customer satisfaction. We have continued this tradition by making our site on the World Wide Web (http://www.mcafeehelp.com) a valuable resource for answers to technical support issues. We encourage you to make this your first stop for answers to frequently asked questions, for updates to McAfee software, and for access to McAfee news and virus information.
Index A Acceleration normal or super 88 ActiveX controls 186 deleting files 187 protection against damage by 186 scanning hard drives 187 alert messages 180 help for 180 America Online mail client, supported in VShield 42 Appearance tab Properties sheet 97 applications archiving 154 monitoring installation of 156 moving to new location 155 rebuilding transported 154 removing 152 transporting 153 archive files 131 Backup 103 strategies 104 to 105 Type 106 Backup Set creating 105 to 108 modifying 109 Backups
Index Cleanup Wizard 76 utility 88 custom file groups, in PowerClean feature dialog box 163 color codes, in PowerClean feature dialog box 166 D components, included with VirusScan 27 compressed volume file 112 computer problems, attributing to viruses 37 Database refresh Registry 87 Windows 95 Registry 82 configuration of VShield using wizard 42, 47 to 51 database, SmartLinks described 145 Configuration after Adding/Removing Network Devices 142 Default settings for applications 137 configuration
Index e-mail client software choosing in configuration wizard 48 supported in VShield 42 files deleting manually 160 infected cleaning by yourself when VirusScan cannot 39 protecting from ActiveX controls 187 protecting with File Guardian 186 removing junk files 150 E-mail Scan module set up using configuration wizard 48 emergency boot disk 65 Emergency Disk creating on uninfected computer 38 use of BOOTSCAN.
Index history see problem log Internet Filtering Options 178 history files 185 Interview 174 History information 114 IPX network 139 Home screen items on 176 using 176 ISA controller card 112 Internet Guard Dog Administrator 175 K Keep Deleted Files For 107 I I/O Devices information 72 Key information 86 ICMP 138 Identity Protector described 184 L Image Properties 63 Launch Rocket 88 to 89 Import Registry file 87 indirect sites 183 infected files cleaning by yourself when VirusScan cannot 3
Index McAfee Firewall 135 McAfee Firewall - how it works 135 McAfee Firewall configuration 136 McAfee Guardian. SeeGuardian.
Index personal information, protecting 184 PPTP 139 PGP 120 privacy threats 173 PGP from supported email applications, Using 193 program components, included with VirusScan 27 PGP from the PGPtools application, Using 195 programs, protecting 186 PGP from the System tray, Using 192 Properties VShield PGP from the Windows Explorer, Using 194 setting with configuration wizard 42, PGP functions from the clipboard, Performing 47 to 51 192 Properties sheet PGP Personal Privacy 189 Appearance tab 97 PGP Pe
Index R read-only mode, turning off for PowerClean feature dialog box 162 reasons to run VShield 41 rebooting, with the Emergency Disk 37 rebuilding transported applications 153 Refresh Registry database 87 REG file type 87 Restore wizard restoring archived applications 158 restoring deleted files 159 restoring deleted application 158 deleted files 159 transported applications 153 undoing a monitored application installation 158 Restoring backup files 108 registered file types 108 Retake 103 Registry c
Index Settings dialog box BackTrack (Installation Monitor) options 156 PowerClean options 168 QuickClean options 150 SpaceMaker options 152 Setup aborting if virus detected during 37 shortcut icon 114 indicator 114 shortcut menus use of with VShield 51 Shortcut Wizard 88 to 89 SmartLinks database described 145 SMTP e-mail clients choosing options for in configuration wizard 48 Software information 72 SpaceMaker wizard when to use 151 startup keys for Windows 112 Super Acceleration 88 Swap File 78 System ha
Index V WinGauge 93 viruses effects of 37 removing before installation, necessity of and steps for 37 from infected files 37 threats 174 Winsock 2 136 Wizard, button in VShield Properties dialog box 47 wizards Archive 154 to 155 listed and described 147 Move 155 QuickClean 150 to 151 Remove 152 SpaceMaker 151 to 152 Transport 153 to 154 VirusScan components included with 27 description of program components 27 installation as best protection against infection 37 Write-behind Delay 106 what to do when v
Index 210 McAfee Office