* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX,
Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr
Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk,
Hunter, ISDN Tel/Scope, LM 1, LANGuru,Leading Help Desk Technology, Magic Solutions, MagicSpy,
MagicTree,Magic University, M agicWin, MagicWord, McAfee, McAfeeAssociates,MoneyMagic, More
Power To You,MultimediaCloaking,NetCrypto, NetOctopus, NetRoom, NetScan,N et Shield,NetShield,
NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts,
PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty
Good Privacy, PrimeSupport,RecoverKey, RecoverKey-International, ReportMagic,RingFence, Router
PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer,
SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM,
TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk,
Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum,
ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker WebWall, and ZAC 2000
are registeredtrademarks of Network Associates and/orits affiliates in the USand/or other countries. All
other registered and unregistered trademarks in this document are the sole property of their respective
owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS:CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY
NETWORK ASSOCIATES, INC. ("McAfee").BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO
NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and
conditions of this Agreement, McAfeehereby grantsto you a non-exclusive, non-transferable right
to use one copy of the specified version of the Software and theaccompanying documentation (the
"Documentation"). You may install one copy of the Software o n one computer, workstation,
personal digital assistant, pager, "smart phone" or other electronic d evice for which the Software
was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more
than one specified Software product, this license applies to all such specified Software products,
subject to any restrictions or usage terms specified on the applicable price list or product packaging
that apply to any of such Software products individually.
Issued February 2000/ Internet Guard Dog v3.0
(i.e., the required number of licenses would equal the number of distinct inputs to the
multiplexing or pooling software or hardware "front end"). If the number of Client Devices or
seats that canconnect tothe Softwarecan exceedthe numberof licensesyou haveobtained, then
you must have a reasonablemechanism in placeto ensure thatyour use of the Software does not
exceed theuse limits specified for the licenses you have obtained. This license authorizesyou to
make or downloadone copyof theDocumentation for eachClient Deviceor seatthat islicensed,
provided that each such copy contains all of the Documentation's proprietary notices.
c. Volume Licenses. If the Software is licensed with volume license terms specified in the
applicable price list or product packaging for the Software, you may make, u se and install as
many additional copies of the Software on the number of Client Devices as the volume license
authorizes. You must have a reasonable mechanism in place to ensure that the number of Cl ient
Devices on which the Software has been installed does not exceed the number of licenses you
have obtained. This license authorizesyou to makeor downloadone copy ofthe Documentation
for each additional copy authorizedby thevolume license,provided thateach such copy contains
all of the Documentation's proprietary notices.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as
set forth herein. This Agreement will terminate automatically if you fail to comply with any of the
limitations or other requirements described herein. Upon any termination or expiration of this
Agreement, you must destroy all copies of the Software and the Documentation.You may
terminate this Agreement at any point by destroying all copies of the Software and the
Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the
Software you are entitled to download revisions or updates to the Software when and as McAfee
publishes them via its electronic bulletin board system, website or through other online services.
For a period of ninety (90) days from the date of the original purchase of the Software, you are
entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it
via its electronic bulletin board system, website or through other online services.After the
specified time period, you have no further rights to receive any revisions or upgrades without
purchase of a new license or annual upgrade plan to the Software.
4. Ownership Rights. The Software is protected by United States copyright laws and international
treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the
Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual
property rights therein. Your possession, installation, or use of the Software does not transfer to
you any title to the intellectual property in the Software, and you will not acquire any rights to the
Software except as expressly set forth in this Agreement.All copies of the Software and
Documentation made hereundermust containthe same proprietarynotices thatappear onand inthe
Software and Documentation.
User’sGuideiii
5. Restrictions. Youmay notrent, lease, loan or resell the Software. You may not permitthird parties
to benefit from the use or functionality of the Software via a timesharing, service bureau or other
arrangement, except to the extent such use is specified in the applicable list price or product
packaging for the Software. You may not transfer any of the rights granted to you under this
Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the
extent the foregoing restriction is expressly prohibited by applicable law. You may not modify, or
create derivative works based upon, the Software in whole or in part. You may not copy the
Software orDocumentation exceptas expressly permitted inSection 1above. You maynot remove
any proprietary notices or labels on the Software. All rights not expressly set forth hereunder are
reserved by McAfee.McAfee reserves the right to periodically conduct audits upon advance
written notice to verify compliance with the terms of this Agreement.
6. Warranty and Disclaimer
a. Limited Warranty. McAfee warrantsthat forsixty (60)days from the date of original purchase
the media (e.g., diskettes) on which the Software is contained will be free from defects in
materials and workmanship.
b. Customer Remedies. McAfee's and its suppliers' entire liability and your exclusive remedy for
any breach of the foregoing warranty shall be, at McAfee's option, either (i) return of the
purchase price paidfor the license, if any, or(ii) replacementof the defective media in which the
Software is contained. You must return the defective media to McAfee at your expense with a
copy of your receipt. This limited warranty is void if the defect has resulted from accident,
abuse, or misapplication. Any replacement media will be warranted for the remainder of the
original warranty period. Outside the United States, this remedy is not available to the extent
McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS."TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED,
INCLUDINGBUTNOTLIMITEDTOIMPLIEDWARRANTIESOF
MERCHANTABILITY,FITNESSFORAPARTICULARPURPOSE,AND
NONINFRINGEMENTWITHRESPECTTOTHESOFTWAREANDTHE
ACCOMPANYINGDOCUMENTATION.YOU ASSUME RESPONSIBILITYFOR
SELECTING THE S OFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR
THE INSTALLATION OF, USE OF,AND RESULTSOBTAINED FROMTHE SOFTWARE.
WITHOUTLIMITINGTHEFOREGOINGPROVISIONS,MCAFEEMAKESNO
WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM
INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET
YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW
LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT
APPLY TO YOU.The foregoing provisions shall be enforceable to the maximum extent
permitted by applicable law.
ivInternet Guard Dog
7. Limitation of Liability.UNDER NO CIRCUMSTANCESAND UNDERNO LEGALTHEORY,
WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS
BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL,
INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE,
COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES
OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLEFOR ANY DAMAGES IN EXCESS
OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF
MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR
PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH
LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW
THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES,
SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU.The foregoing
provisions shall be enforceable to the maximum extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentation are deemed to be
"commercialcomputersoftware"and"commercialcomputersoftwaredocumentation,"
respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any
use, modification, reproduction, release, performance, display or disclosure of the Software and
accompanying Documentation by the United States Government shall be governed solely by the
terms of this Agreement and shall be prohibited except to the extent expressly permitted by the
terms of this Agreement.
9. Export Controls. Neither the Software nor the Documentation and underlying information or
technology may be downloaded or otherwise exported or re-exported (i) into (or to a national or
resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or any other country to which the
United States has embargoed goods; or (ii) to anyone on the United States Treasury Department's
list of Specially Designated Nations or the United States Commerce Department's Table of Denial
Orders. By downloading or using the Software you are agreeing to the foregoing and you are
certifying that you are not located in, under the control of, or a national or resident of any such
country or on any such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING:EXPORT OF THE
SOFTWAREMAYBESUBJECTTOCOMPLIANCEWITHTHERULESAND
REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF EXPORT
ADMINISTRATION,UNITEDSTATESDEPARTMENTOFCOMMERCE,WHICH
RESTRICT THE EXPORT AND RE-EXPOR T OF CERTAIN PRODUCTS AND TECHNICAL
DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER SUCH RULES
AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE EXPORTED OR
RE-EXPORTED, DIRECTLY ORINDIRECTLY, (A)WITHOUT ALL EXP ORTOR
RE-EXPORTLICENSESANDUNITEDSTATESOROTHERGOVERNMENTAL
APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN VIOLATION OF ANY
APPLICABLE PROHIBITION AGAINST THE EXPORT OR RE-EXPORT OF ANY PART OF
THE SOFTWARE.
User’sGuidev
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN
THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY
TEMPORARY PERSONAL OR BUSINESS USE.YOU ACKNOWLEDGE THAT THE
IMPLEMENTATION ANDENFORCEMENT OFTHESE LAWSIS NOTALWAYS
CONSISTENTAST OSPECIFICCOUNTRIES.ALTHOUGHTHEFOLLOWING
COUNTRIES ARE NOT AN EXHAUSTIVE LIST THERE MAY EXIST RESTRICTIONS ON
THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM, CHINA
(INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL, RUSSIA, SAUDI
ARABIA, SINGAPORE, AND SOUTH KOREA.YOU ACKNOWLEDGE IT IS YOUR
ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY AND ALL GOVERNMENT
EXPORT AND OTHER APPLICABLE LAWS AND THAT MCAFEE HAS NO FURTHER
RESPONSIBILITY AFTER THE INITIAL SALE TO YOU WITHIN THE ORIGINAL
COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in
hazardous environments requiring fail-safe performance, including without limitation, in the
operation of nuclear facilities, aircraft navigation or communication systems, air traffic control,
weapons systems, direct life-support machines, or any other application in which the failure of the
Software could lead directly to death, personal injury, or severe physical or property damage
(collectively, "High Risk Activities").McAfee expressly disclaims any express or implied
warranty of fitness for High Risk Activities.
11.Miscellaneous. This Agreement is governed by the laws of the United States and the State of
California, without reference to conflict of laws principles. The application of the United Nations
Conventionof Contractsfor the International Sale ofGoods is expressly excluded. ThisAgreement
sets forthall rightsfor the user ofthe Software and isthe entire agreementbetween theparties. This
Agreement supersedes any other communicationswith respectto theSoftware andDocumentation.
This Agreement may not be modified except by a written addendum issued by a duly authorized
representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall
be in writing and signed by McAfee or a duly authorized representative of McAfee.If any
provision of this Agreement is held invalid, the remainder of this Agreement shall continue in full
force and effect. The parties confirm that it is their wish that this Agreement has been written in
the English language only.
12.McAfee Customer Contact. If you have any questions concerning these terms and conditions, or
if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408)
970-9727, or write:McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054.
http://www.mcafee.com.
Statements made to you in the course of this sale are subject to the Year 2000 Information and
Readiness Disclosure Act(Public Law105-271). Inthe case of a dispute,this Actmay reduce your
legal rights regarding the use of any statements regarding Year 2000 readiness, unless otherwise
specified in your contract or tariff.
which in turn connects to the Internet. You may also be connected to the
Internet through an online service such as America Online or Compuserve.
In addition, you must also have a browser. A browser is software, such as
Netscape Navigator or Microsoft Internet Explorer (it must be a version
designed for Windows 95 or Windows 98), that allows you to view text and
graphics and download files from Web sites.
Internet Guard Dog features
This section brieflydescribes other featuresof Internet Guard Dogthat protect
you from the most common Internet threats. If you want more background
information on Internet privacy, security, and virus issues, see “Internet
Security and Privacy” on page 55.
NOTE: Only the designated Administrator or Self-Administrator can
have access to these features which allow them to customize protection
settings for themselves and in the case of the Administrator, protection
forotherprofiledusersofthesamecomputer.
User’s Guide3
Welcome to Internet Guard Dog™
Protection from privacy threats
•Identity Protector monitors your Internet connection and warns you
before private information is sent to an unsecure Internet site. It stops
programs and other people that use your computer (like your kids) from
sendingyour name and creditcard numbersover theInternet without your
approval.
•Cookie Blocker prevents Web sites from storing cookies o n your hard
drive. Third-party Web sites use cookies to track your Web browsing
habits. You can choose your level of interaction with Cookie Blocker. (For
more information, see “What are cookies and how are they used?” on
page 65.)
•Web Trail Cleaner cleans yourWeb browsingtrails such ascached files; list
ofURLs (Uniform ResourceLocator,also known asWeb address)visited;and
history files—when you close your browser. This feature prevents other
users of your computer to track your online movements by viewing the
files and URL addresses left over from your Internet browsing.
•Search Filterprevents search information that you request at one Web site
from being passed along to the next site you visit. Without Search Filter,
your browser can transfer your search request information from one Web
site to another without your knowledge.
Protection from security threats
•Gatekeeper allows you to control the programs that have access to your
Internet connection. Programs on your PC can be programmed to access to
the Internet without your consent.
•File Guardian protects files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. Programs, such as ActiveX
and Java programs, can scan your PC f or personal information or delete
files without your permission.
File Guardian also limits access to protected files either to programs you
specify or through file encryption. It can limitthe programs that can access
your tax, on-line banking, or personal accounting data files.
•Password Manager stores your Web site login names and passwords for
protected Web sitesin onesecurelocation. Whenyou are visitinga sitethat
requires this information, drag it from Browser Buddy to the form
displayed in your browser. No more storing your login names and
passwords in an unsecure location, such as post-it notes on your monitor
or in a text file on your Windows desktop.
4Internet Guard Dog
Protection from virus threats
Using the McAfee VirusScan, the following features are available:
•Scan to start the default virus scan task immediately, or configure a virus
scan task that suits your needs.
•Scheduler to launch the McAfee VirusScan Scheduler. This utility enables
you to configure and run unattended virus scan operations.
•Virus info to display virus information via the McAfee Web site.
What’s new in Internet Guard Dog
Internet Guard Dog version 3.0 includes these new features.
•Inclusion of McAfee VirusScan
McAfee VirusScan is now included in Internet Guard Dog. Select from
availableoptions to customized how you want itto protect your computer.
Welcome to Internet Guard Dog™
•Multi-user Logon and user settings
Internet Guard Dog now allows multiple users t o have different
protections settings. The main user can also act as an Administrator
customizing settings for other users of the same computer.
•Internet Filtering options
After an Administrator has added profiles of other users of the computer,
Internet Filtering optionscan be usedbased ondefaultURL sites,wordlist,
rating systems, and Internet access time. Administrator can also enter
additional lists or sites if desired.
•Activity Logs
An Administrator can view a list of activity, maintenance and violation
logs at the single click of a button. This list contains information such as
duration ofcomputer use or any protection setting violation thata profiled
user may have committed (e.g., attempting to pass credit card number).
Administrator also has the option to clean, print or save this list.
•Improved online Help interface
The online Help is now displayed via a tri-pane Explorer View Help
window. While viewing a topic within the Help file, the user can now also
view the table of contents as well as access the index and full-text search
options simultaneously while the topic is displayed onthe right-hand side
of the window.
User’s Guide5
Welcome to Internet Guard Dog™
Other features and enhancements
•Internet Guard Dog password
Protects the information and settings in Internet Guard Dog from being
viewed or changed. It also prevents other users of your computer from
sending out information that you specify as private.
•File Guardian enhancement
Protects individual files even when encrypted.
•Improved cookie management
Indicates whethercookies are direct or indirect and the domain where it is
coming from.
•Personal identity protection
“Mark” personal identity information and sensitive files (such as financial
records and credit card numbers) so they’ll never be sent over the Internet
without your OK.
•Encrypt sensitive files
Add an extra layer of protection by encoding files to prevent them from
being read—until you decode them.
•Browser Buddy enhancement
Store and manage your Web site passwords in one convenient, secure
location. User can now reset numbers.
•Single Update button
At the single click of a button, user can update both Internet Guard Dog
and McAfee VirusScan via the Web.
About Internet Guard Dog documentation
This manualprovides thebasicinformation youneed toinstall, set up,and use
Internet Guard Dog. More detailed information on Internet Guard Dog is
provided by the Help files which you can access while working within the
different windows.
6Internet Guard Dog
How this book is organized
This User’s Guide is designed to get you using Internet Guard Dog quickly.
Read chapters 1 and 2 to get Internet Guard Dog installed and running. You
only need to read Chapters 3, 4, 5, and 6 if you want further information on
customizing Internet GuardDog orusing specificfeatures. Read Chapter7 for
furtherinformation on McAfeeVirusScan.Ifyou are newtothe Internet orjust
want to find out more about Internet privacy and security issues, read
Appendix A.
To find outRead
Welcome to Internet Guard Dog™
Table 1-1.
What this version of Internet Guard Dog does
and how to find information about Internet
Guard Dog.
System requirements and how to install
Internet Guard Dog.
HowtousethemainfeaturesofInternet
Guard Dog.
What the Cookie Blocker, Identity Protector,
Web Trail Cleaner, and Search Filter features
are andhow to work with them.
What the Gatekeeper, File Guardian, and
Password Manager features are and how to
work with them.
What the VirusScan features are and how to
work with them.
What privacy, security, and virus issues exist
on the Internet.
How to contact McAfee Software sales,
customer service and support departments.
Chapter 1, “Welcome to
Internet Guard Dog™.”
Chapter 2, “Installing Internet
Guard Dog™.”
Chapter 3, “Quick Tour of
Internet Guard Dog™.”
Chapter 4, “Privacy Features.”
Chapter 5, “Security Features.”
Chapter 6, “McAfee
VirusScan.”
Appendix A, “Internet Security
and Privacy”
Appendix B, “Product Support”
Using Internet Guard Dog help
To launch InternetGuard Dog help
1.In the Internet Guard Dog Home screen, click Help; then select Help
Topics. The Help system is displayed via a tri-pane Explorer View
window.
User’s Guide7
Welcome to Internet Guard Dog™
2.You can search for a help topic via the Contents, Index or Find tabs.
•Contentstab
•Indextab
NOTE: To go to the next page of help, click the next >>browse button
(if activated). To return to the previous page, click the previous <<
browse button (if activated) or click the Back button.
1. Double-click a book icon to display its table of contents of
related topics.
2. Locate the topic you want; thenpoint and double-clickto open
the Help topic.
1. In the text box, type the first few letters of the word or phrase
you are looking for.
2. Locate what you are looking for; then double-click the topic or
click the Display button.
•Findtab.
Clicking the Find tab enables you to launch a full text search. When
you search for topics via the Find tab for the first time, a Find S etup
Wizard is displayed. Follow the instructions on screen to setup the
full text search option. After setup is complete:
1. In the text box, type the first few letters of the word or phrase
you are looking for. You can als o select matching words to
narrow your search.
2. Once you have located what you are looking for in the display
topic box, click the topic.
To display h elp fo r a screen
1.In the Internet Guard Dog Home screen, click Help.
2.Click Help for this screen to display a help topic that explains what you
can do in or what you may need to know about the current Internet
Guard Dog screen.
8Internet Guard Dog
Welcome to Internet Guard Dog™
To get help for settings in a dialog box
•Whenever you see thebutton in the upper-right corner of a dialog
box, click the button, then click on the setting for which you want
information.
User’s Guide9
Welcome to Internet Guard Dog™
10Internet Guard Dog
2Installing Internet Guard Dog
Most installation problems are a caused by having programs running while
you try to install new software. Even if the installation appears normal, you
won’tbeable to run thenew program.Toavoid installationproblems, close all
open programs before you install Internet Guard Dog, including programs
that run in the background, such as screen savers or virus checkers.
System requirements
To use Internet Guard Dog you need:
•IBM PC or compatible computer running Windows 95 or Windows 98.
•16 megabytes (MB) minimum of RAM.
• 20MBfreeharddiskspacetoinstallInternetGuardDogandMcAfee
VirusScan. Additionaldisk space isrequired to installany optional Internet
software that may be included on the compact disc (CD) version.
™
2
•256-color video display or better. Internet Guard Dog looks and operates
best in a resolution of 800x600 pixels ( or greater) and a color palette of
32,000colormode(15 bit) or higher.256-colorpaletteissupported,butmay
cause some color changes (caused by ‘palette swapping’) when switching
between applications.
•Microsoft mouse or compatible pointing device.
•Access to the Internet, either a dial-up account with an Internet Service
Provider (ISP) or a constant connection through a network.
•Windows 95 or Windows 98 Web browser (also called a 32-bit browser).
SomeHelp features—McAfeeSoftware onthe Web,InternetGuard Dog on
the Web, FAQs, and Report a problem—require you to connect to the
McAfee Software Web site with a Web browser (software that allows you
to viewdocuments anddownload filesfrom theWorld WideWeb). To use
®
all the online support features, the browser must be Microsoft
™
Explorer, Netscape Navigator
Windows 95 o r Windows 98.
NOTE: America Online users need AOL’s 32-bit Winsock to use
Internet Guard Dog. To upgrade from a 16-bit Winsock, contact
America Online.
,orAmericaOnlinev3.0(orlater)for
Internet
User’s Guide11
Installing Internet Guard Dog™
Installing Internet Guard Dog
After closing all open programs, you are ready to install Internet Guard Dog
on your PC. Installation should go smoothly, however, if you do have
difficulties, see “Troubleshooting installation problems” on page 12.
To installInternet Guard Do g
1.Close all open programs.
2.Insert the Internet Guard Dog CD in the CD-ROM drive.
3.In the InternetGuard Dog S etup screen, click Install Internet GuardDog.
NOTE: If the setup screen doesn’t start automatically when you
close your CD-ROM drive, click Start on the Windowstaskbar, click
Run, then typed:\setup. IfD isnot the driveletter ofyour CD-ROM
drive, substitute the correct drive letter.
4.After installationis completed, InternetGuard Dog’s Interviewfeatureis
launched. Follow through the screen instructions and provide
information as needed.
NOTE: Only the Administrator can access this Interview feature of
Internet Guard Dog. For more information, see “Using the Internet
Guard Dog Interview” on page 15.
Troubleshooting installation problems
A failed installation can cause software problems that are difficult to track
down. The major causes of installation failure are:
•Hard drive errors
•Temporary files that conflict with the installation
•Attempting to install while other software is running
Follow the procedure outlined below to minimize the affect that these
common conditions may have on your installation.
12Internet Guard Dog
Step 1: Clean up your hard drive
Run the Windows 95 hard drive utilities, ScanDisk and Disk Defragmenter to
identify and fix any errors on your hard drive:
1.ClickStart onthe Windowstaskbar, pointto Programs,then Accessories,
then System Tools, and click ScanDisk.
2.In the ScanDisk window, select Standard and Automatically fix errors.
NOTE: These are the default settings.
3.Click Advanced. In the Advanced Settings dialog box, make sure the
following settings are selected:
•O nly if errors found
•Replacelog
Installing Internet Guard Dog™
•Delete
•Free
4.Ignore the other options, and click OK. Click Start. ScanDisk begins
scanningyour drivefor errors.Depending on thesize of yourhard drive,
ScanDisk may take several minutes to complete its job.
5.When ScanDisk is finished, close ScanDisk.
6.ClickStart onthe Windowstaskbar, pointto Programs,then Accessories,
then System Tools, and click Disk Defragmenter.
7.Click OK to start Disk Defragmenter. Depending on the speed of your
computer and the size of your drive, this may take several minutes to
complete.
8.Close Disk Defragmenter whenit has finished defragmenting your disk.
Step 2: Remove temporary files
Delete the contents of the Windows Temp folder:
1.Double-click the My Computericon onyour desktop. TheMy Computer
window opens. Double-click the C: drive. You are now viewing the
contents of your hard drive.
2.Double-click the Windows folder.
3.In the Windows folder, double-click the Temp folder.
User’s Guide13
Installing Internet Guard Dog™
4.In themenu, click Edit,then click SelectAll.All of theitemsin yourTemp
folder are highlighted.
5.Press the Delete key on your keyboard to delete the files. If Windows
asks about deleting files, click Yes.
6.In the Windows taskbar, click Start, then click Shut Down.
7.Click Restart the computer, then click Yes in the Shut Down Windows
dialog box to restart your PC.
Step 3: Close other software
Disable all software running in the background:
1.Hold down the Ctrl and Alt keys on your keyboard, and then press the
Delete key once. The Close Program dialog box appears.
2.Click End Task for every item on the list except Explorer.
3.Repeat steps 2 and 3 until you’ve closed everything except Explorer.
4.When you see only Explorer in the Close Program dialog box, click
Cancel.
You are now ready to install your new software.
Installing McAfee VirusScan from the Internet
Guard Dog CD
The Internet Guard Dog CD contains a copy of McAfee VirusScan.
To install McAfee VirusScan
1.Insert the Internet Guard Dog CD in the CD-ROM drive.
2.In the Internet Guard Dog Setup screen, click Install McAfee VirusScan.
3.Follow the instructions on your screen.
14Internet Guard Dog
3Quick Tour of Internet Guard Dog
Internet Guard Dog is a simple program to use. Infact, this onechapter covers
themain thingsyou needto knowabout using Internet Guard Dog. Y ou begin
with answering a few questions via the Interview so that Internet Guard Dog
can effectively use its feature to protect you from Internet threats.
™
Using the Internet Guard DogInterview
Although Internet Guard Dog is set up to use security and privacy settings
that are appropriate for most users, some features require your input. The
Interview provides an easy means of customizing your Internet Guard Dog
settings.
Eachinterview screeneither tellsyou about aInternetGuard Dog feature,asks
you to enter information, or asks you how you want Internet Guard Dog to
respond to certain situations. (Figure 3-1.)
3
On each interview screen you can click Back to return to a previous screen or
click Next to move to the next screen. In the final interview screen, you click
Finish to save the settings you selected and close the Interview.
Figure 3-1. Internet Guard Dog Interview screen.
User’s Guide15
Quick Tour of Internet Guard Dog™
What information does Internet Guard Dog ask me to
enter?
The InternetGuardDog interview asksyou to enter the personal and financial
information that you want to protect. All the information you enter into
Internet Guard Dog is stored in encrypted form on your hard disk—it is never
sent to McAfee Software.
You may want to gather your personal information before you start the
interview. During the interview, Internet Guard Dog allows you to enter:
•A password that you can use to protect your Internet Guard Dog
information.
•Personal and financial information that you want to protect from being
sent out over the Internet without your knowledge:
•Name
•Address
•Social Security number
•Telephone number
•E-mail address
•O ther financial numbers such as bank account, brokerage account,
credit card, phone card, and so on.
•Any Web site login names and passwords that you want to store in
Password Manager.
•Information about other users of your computer. If you are the
Administrator, youcan create user profiles and set protection settings that
Internet Guard will use whenever the user is browsing the Internet via
your computer. See “How Internet Guard Dog Administrator works” on
page 17.
For optimal protection by Identity Protector, include alldashes (such as Social
Security number, bank account numbers, brokerage accounts, and ATM
cards). For example, if you enter 123-45-6789 as your social security number,
Guard Dogwill recognize the number withor without the dashes. Ifyou enter
123456789, Guard Dog won’t alert you if the number is sent out with dashes
(123-45-6789). Credit cards donot need dashes because you type the numbers
into separate boxes.
16Internet Guard Dog
Quick Tour of Internet Guard Dog™
NOTE: You can fine-tune the configuration of Internet Guard
Dog’s privacy and security features in theProtection Settings. Click
Options on the Internet Guard Dog Home screen, then click
Protection Settings.
How Internet Guard Dog Administrator works
Since InternetGuard Dognow offersmulti-user logoncapabilities, thisfeature
allows one userto actas the administratorof personal information, protection
and security settings entered via the Internet Guard Dog features. This is
particularly useful if for example, you would want to filter, block or monitor
certaintypes of informationthat youdonot want yourchildren toaccesswhen
browsing the Internet.
Creating an Internet Guard Dog Administrator account can only be done in
the Interview feature of Internet Guard Dog. And only the designated
Administrator can access and change information and protection settings of
the computer.
After thissetup iscomplete, the Administrator can add otherusers and set the
levels of security and protection for each user profile.
See the Internet Guard Dog online Help to view step-by-step instructions on
how to set an Administrator account.
Self-Administrator
The Internet Guard Dog Administrator may designate another user as a
Self-Administrator.Thisfeaturemaybeusedifforexample,theuserisan
adult and is deemed responsible enough to customize his privacy and
protection settings on his own.
This user can access Internet Guard Dog features and change his settings, not
anyone else’s.
See the Internet Guard Dog online Help to view step-by-step instructions on
how to designate a user as a Self-Administrator.
NOTE: In adding user profiles, the Administrator can designate a
user as a Self-Administrator.
User’s Guide17
Quick Tour of Internet Guard Dog™
How password protection works in Guard Dog
Whenever you start Windows, Internet Guard Dog prompts you to enter the
password you set during the Interview. When you enter an incorrect
password, it displays the hint that you provided when you created your
password.
Without the passwordyou can stillopen the GuardDogHome screen,butyou
won’t be able to change your CheckUp Settings or Protections Settings. Also,
Internet Guard Dog won’t let you use the Password Manager information in
Browser Buddy or send out information protected by Identity Protector.
WARNING: Do not forget your password. If you do, you’re only option
is to reinstall Internet Guard Dog and start all over. You will lose your
previous Internet Guard Dog settings, Password Manager information
and won’t be able to use any of your encrypted files.
Using the Internet Guard Dog Home screen
After the interview ends, Internet Guard Dog displays its Home screen
(Figure 3-2).
Figure 3-2. Internet Guard Dog Home screen.
18Internet Guard Dog
Quick Tour of Internet Guard Dog™
Table 3-1. Actions you can perform in the Home screen
T o do thisClick this
Add, edit or delete user profile; set Internet
User Setup
filtering a nd other options.
Perform or schedule a virus scan.VirusScan. This launches the
McAfee VirusScan
Perform a security checkto findany privacy or
Security Check
security problem on your computer.
Display user activity logsActivity Logs
Display the McAfee Software Home screen in
your Web browser.
Display the McAfee Software Support page in
your Web browser.
Help, then select McAfee
Software on the Web
Help, then select Internet
Guard Dog on the Web
Access the McAfee Web site.McAfee.com
Display the Support FAQ page in your Web
browser.
Initiate update of Internet Guard Dog and
McAfee VirusScan components installed on
your computer.
Help, then Frequently Asked
Questions
Update. This launches the
McAfee Software Update
Finder
Create an e-mail message addressed to
Help, then Report a problem
McAfee Software Technical Support site.
Launch the Internet Guard Dog Help file.Help, then select either Help
Topics or Help for this screen
Display Internet Guard Dog product version
Help, then About
number.
Close the Internet Guard Dog Home screen.
(This doesn’t affect the monitoring portion of
Internet Guard Dog, which continues to run.)
Closebuttoninthe
upper-right corner of
the Internet Guard Dog
window.
NOTE: If your dial-up Internet account is not set up to dial
automatically, connect to the Internet before you use any of the
Web-based Help commands.
User’s Guide19
Quick Tour of Internet Guard Dog™
How User Setup works
The Internet Guard Dog Administrator can add, edit and delete profiles of
other users who browse the Internet through the same computer. After
profiling users, the Administrator can customize their individual protection
settings, including Internet filtering options and can even monitor their
browsing habits.
User Profile
To customize protection settings for another user, click User Setup from the
Internet Guard Dog Home page, the User Setup screen is displayed. You can
add, edit or delete a user’s profile from this screen. Click any of the buttons
available and follow through the instructions displayed on screen.
Figure 3-3. User Setup screen
See the Internet Guard Dog online Help to view step-by-step instructions on
how to add, edit or delete a user’s profile.
20Internet Guard Dog
How Internet Filtering works
As a new feature of Internet Guard Dog, you can further customize the
protection settings of a profiled user via the Internet Filtering options.
Fromthe User Setupscreen,select a user;clickEdit User Options;thenclick
the Internet Filtering button.
Content Filter
After launching Internet Filtering, the Content Filter screen is displayed. This
screen allows you to quickly enable or disable Internet Guard Dog filters.
•Allow Internet Access. Select this option if you want the user to access to
the Internet at all times.
•Filter Web Access. Select this option if you want to limit the user’s access
to the Internet.
•Use Search Cleaner. Select this option if you want Internet Guard Dog to
automatically filter certain contents (e.g., words and phrases).
Quick Tour of Internet Guard Dog™
•Enable Ad Blocker. Select this option if you want Internet Guard Dog to
block certain ads that you do not want the us er to view.
•Allow Chat. Select this option if you want to allow the user to go into
online chat rooms.
•Filter Chat. Select this option ifyouwant to allow the user to gointoonline
chat rooms but filter certain contents (e.g., words and phrases).
Internet filtering
You can also set specific Internet filtering options. Click the Internet Filtering
button and select via the following drop-down menuoptions:
•Content Ratings. This option allows you to control what kind of Web
contents the user is allowed to view.
•URL List. This option allows you to control what Web sites the user is
allowed or not allowed to view.
•Word List. This option allows you to filter Web sites and chat messages
See the Internet Guard Dog online Help to view step-by-step instructions on
how to set any of these Internet filtering options.
User’s Guide21
Quick Tour of Internet Guard Dog™
Figure 3-4. Internet Filtering screen (URL List)
How Privacy and Security options work
Internet Guard Dogallows you to determine levels of privacy andsecurity
using a series of configurable options called Protection Settings. A part of
Internet Guard Dog is always on duty in the background to protect your
computer’s data and your privacy based on the choices you make. Internet
Guard Dog displays settings on a series of Protection Settings pages
containing check boxes, list boxes, buttons, and other controls that you can
use to enter settings.
For more information, see Chapter 4, “Privacy Features” and Chapter 5,
“Security Features.”
22Internet Guard Dog
Internet Guard Doghas adatabase of URLsites, extensiveword list aswell
as a new rating system to use in protecting users fromInternet privacyand
security threats.The Administratorcan alsoset thetime andday thata user
can have access to the Internet.
See the Internet Guard Dog online Help for more information and
step-by-step instructions on how to set its Internet filtering options.
Options
The Options button in the User Setup screen allows you to access and
change settings of specific Internet Guard Dog features such as changing
passwords and alert message sound effects.
See the Internet Guard Dog online Help for more information and
step-by-step instructions on how to change settings via this feature.
Using McAfee VirusScan
Quick Tour of Internet Guard Dog™
Internet Guard Dog now uses the McAfee VirusScan to address virus-related
problems you may encounter through the Internet. This feature allows you to
set how to perform a virus scan operation on your computer; what to do if a
virus isfound; and how it should alert youonce thevirus is detected. You can
also direct VirusScan to keep a recordof actions performedon yourcomputer.
For more information, see Chapter 6, “McAfee VirusScan.”
Viewing Activity Logs
Internet Guard Dognow providesa listof activities that an Administratorcan
view via theActivity Logsfeature. This listis generated basedon his preferred
security and privacy settings for him self and for other profiled users he
created. Anything from dates and time that a user logged on, to PC
maintenance, and violation (e.g., a user attempting to pass a credit card
number) can be viewed at the single click of a button.
Displays any activity of a profiled user that violates any of the preset
protection settingsthat theAdministrator has indicated (e.g., attempting
to pass a credit card number).
User’s Guide23
Quick Tour of Internet Guard Dog™
•Maintenance
Displays list of actions that Internet Guard Dog performed including the
specific feature used to complete the task.
•Activity
Displays identity of profiled user who browsed the Internet using the
computer. It also displays the day, date and time that the user logon and
off on the computer.
NOTE: For step-by-step instructions on working with any of the
report logs, see Internet Guard Dog online Help.
Updating Internet Guard Dog and VirusScan
Internet Guard Dog can keep up with new viruses and Internet threats when
you update its program files and virus patterns over the Internet.
NOTE: If you purchased Internet Guard Dog on CD, you should run
Update even if you’ve just installed Internet Guard Dog. In the time
between when the CD was created and when you installed it, new virus
patterns are likely to be available.
To update the Internet Guard Dog programor virus pattern f iles
McAfee Software programs now include a central location for launching the
product’s components. For Internet Guard Dog, you can also initiate their
updates fromthe Homescreen. Click the Update buttonin the Home screen.
InternetGuard Dog’supdate applet willlaunch and searchesforany available
update. If an update is available, information is displayed.
24Internet Guard Dog
Performing a Security Check
After completing the interview, you’ll want to find out how your PC may be
at risk. Security Check examines your PC for privacy and security problems
and then guides you through fixing any problem it finds. If you are using the
settings suggested by Internet Guard Dog in the interview, you only need to
run Security Check right after installation and then every month or so. If you
reduce the levelof protection, you shouldrun SecurityCheck more frequently.
You can also change the Security Check settings to customize how you want
this feature to work on your computer.
To perform a Security Check
1.Click Security Check on the Internet Guard Dog Home screen.
After security check is complete, Internet Guard Dog displays a report
describing any problems it discovered. (Figure 3-5 on page 25)
Quick Tour of Internet Guard Dog™
Figure 3-5. The Guard Dog Report screen
2.To view a problem thatInternet Guard Dog has identified, highlight the
item and click Fix.
3.Read the Internet Guard Dog recommendation and then click the
appropriatebutton. If you wantmore information, click Help, then click
Help for this screen.
A check mark appears next to each problem that you fix.
User’s Guide25
Quick Tour of Internet Guard Dog™
4.Repeat steps 2 and 3 for each problem that you want to fix.
5.When you have finished, click the Back or the Home button to return to
the Internet Guard D og Home screen.
What Internet Guard Dog does while your PC is
running
While you use your PC, Internet Guard Dog is on the lookout for potential
privacy and security problems and takes action when it finds a problem.
(Internet Guard Dog uses the information stored in Protection Settings to
determine what to monitor and how to react.) You can tell when Internet
GuardDogisworkingbecauseitsiconappearsintheWindowstaskbaras
shown in Figure 3-6.
Figure 3-6. The Internet Guard Dog icon in the taskbar.
Right-click todisplay the
Internet Guard Dog shortcut
menu
NOTE:If yousee an InternetGuard Dog alertmessage, see“Responding
to Internet Guard Dog alert messages”later in this chapter.
Using the Internet Guard Dog shortcut menu
Evenwhen you aren’trunning themain InternetGuard Dogprogram, youstill
have quick access to several features using the shortcut menu. Right-click the
Internet Guard Dog icon on the Windows taskbar to display this menu. You
canthendoanyofthefollowing:
•Start the Internet Guard Dog main program.
•Display Browser Buddy, which lets you retrieve your Internet passw ords
and displaysstatistics onhow manycookies havebeen allowedor blocked,
and how often it has cleared search information.
•Display Windows help for Internet Guard Dog.
•Encrypt and decrypt files that File Guardian protects.
•Close the part of Internet Guard Dog that monitors your PC while
Windows runs.
26Internet Guard Dog
Quick Tour of Internet Guard Dog™
Responding to Internet Guard Dog alert messages
Internet Guard Dog works as you work to protect your privacy and security.
When Internet Guard Dog detects a potential problem, it either handles the
problem automatically or warns you with an alert message based on your
Internet Guard Dog settings.
Each alert message tells you what potential problem triggered the message
and Internet Guard Dog’s recommendation on how to respond. If you want
more information about theproblem, clickthe QuestionMark buttonand then
click anywhere inside the alert message.
If you find over time that you are being alerted to potential security risks too
often, you can adjust the alert message settings in Protection Settings. Cookie
Blocker andGatekeeper require aperiod of adjustm ent before Internet Guard
Dog has learnedto address yourconcernswith theleast amountof disruption.
TIP: If you decide you no longer want to see an alert message, use the
question mark (?) button in the alert message to find out what setting to
change. All of the settings that control the alert messages are located
under Protection Settings in the Options menu.
Using Browser Buddy to retrieve or store your Web site
passwords
You can depend on Internet Guard Dog to help you easily navigate through
the intricacies of the Web. For example, when you connect to Web sites that
require a name and password, you can use Browser Buddy to:
•Drag your username or password from Password Manager and drop it on
the login form for the Web site.
•Add new password information for a Web site.
Browser Buddy can also tell you how many cookies have been allowed or
rejected by Cookie Blocker and how many times a search information you
initiated from one Web site, has been blocked by Search Protector from being
passed to another Web site.
TIP: Browser Buddy always remains displayed on top of any programs
open on your screen. If Browser Buddy is located in an awkward
position, you can close it a nd reopen it as needed.
User’s Guide27
Quick Tour of Internet Guard Dog™
To open Browser Buddy
1.Right-click the Internet Guard Dog icon on the Windows taskbar, then
click Browser Buddy. The dialog box is displayed.
Figure 3-7. Browser Buddy
To add a newusername and password
1.In Browser Buddy, select Add New Entry from the Password Manager
drop-down list. The Enter password to save dialog box is displayed.
2.In the Web site text box,enter the Web site address; in theUsername text
box, type the name by which you identify yourself to this Web site, this
may correspond toUser Name,Member ID, MemberName, LoginID, or
Login Name, and so on.
3.In the Password text box, type thepassword that confirms your identity.
(In Password Manager, Internet Guard Dog displays one asterisk for
each character in your password.)
4.Click OK.
To retrieve your username and passwo rd
1.In Browser Buddy,select the site name ifit doesn’t appear automatically
in the Current Web Site list.
2.Drag your username or password from the Password Manager box to
appropriate field in your Web site’s login form.
28Internet Guard Dog
The text appears inthe field.(If thesite thatyou arelogging into displays
your password text as a series of asterisks (*), Internet Guard Dog will
display one asterisk for each character in your password.)
3.Continue logging in as usual to the Web site.
Using file encryption
File encryption translates a file into a “secret” code that makes the file
unreadable. You must decode or decrypt thefilebeforeyoucanuseit.Thefile
encryption inInternet GuardDog isdesigned sothat youcan easilyencrypt or
decrypt all of the files that you designate for encryption in File Guardian.
NOTE: Before you can encrypt a file, you must add it to the Guarded
Files list in File Guardian. For step-by-step instructions on adding a file
to the Guarded Files list, see Internet Guard Dog Help.
Quick Tour of Internet Guard Dog™
To encrypt or decrypt files
•Right-click the Internet Guard Dog icon on the Windows taskbar, then
click Encrypt File Guardian files or Decrypt File Guardian files.
User’s Guide29
Quick Tour of Internet Guard Dog™
30Internet Guard Dog
4Privacy Features
Internet Guard Dog’s Privacy features protect browsing and personal
informationthat you don’t want anybody to access as aresult of your surfing
through the Internet.
What Cookie Blocker does
Cookies are smallfiles thatyour Web browserstores onyour PCat the request
of a Web server. Each time you view a Web page from the Web server, your
browser sends the cookie back to the server. These cookies can act like a tag,
which lets the Web server track what pages you view and how often you
return to them. Some Web sites, such as Microsoft Expedia
store your password and preferences so that you can automatically log on to
the site. For a more detailed description of cookies, see “What are cookies and
how are they used?” on page 65.
Internet Guard Dog’s Cookie Blocker offers three options for controlling the
use of cookies on your computer. Internet Guard Dog can:
™
,usecookiesto
4
•Reject all cookies.
•Accept all cookies.
•Display an alert message each time a cookie is sent to your browser. The
alert displays the name of the entity trying to set the cookie, and provides
you the option either to accept the cookie or not.
When setting up Cookie Blocker in Protection Settings, you can select one
optionfor direct sites andanother for indirectsites. Direct sites arethose that
you deliberately access. For example: typing the URL address in the
location bar of your Web browser; clicking a link in a Web page; or
selecting from your list of bookmarks or favorite sites. Indirect sites are
those that you access because the site you are connecting to directly
displays content from another site as part of its owncontent. For example,
if you went directly to Cool_site.com, it could display an ad from
Ads-r-us.com (the indirect site) in a separate frame in the Cool_site page.
If during the Interview, you accepted Internet Guard Dog’s
recommendation on how to respond to cookies, Cookie blocker will:
•Automatically allow cookies to be accepted from direct sites.
•Display an alert message when an indirect sites tries to set a cookie.
User’s Guide31
Privacy Features
Responding to a Cookie Blocker alert message
If during the Interview, you set Internet Guard Dog to prompt you for action
then it will display the Cookie Blocker alert message the first time a site tries
to set a cookie.
You can respond to the alert message in the following ways:
Table 4-1.
If you chooseInternet Guard Dog
Accept alwaysAccepts the cookie and adds the site to the
Allowed list. The next timeyou go to that site, all
cookies from that site are allowed automatically.
Never acceptRejects the cookie and adds the site to the
Rejected list. Thenext time yougo to that site, all
cookies from that site are refused
automatically.(In some cases, the cookie may be
written to your local hard disk, but your privacy
is protected becausethe cookieis never sent back
to the requesting page.)
Each time you visit a site that appears in either the Allowed or Rejected list,
Internet Guard Dogaddsthe numberofcookies acceptedorrejected tothelist.
You can see the totals for a Web site in the Browser Buddy.
If you change your mind about a site, you can remove it from the Allowed or
Rejected list in the Cookie Blocker settings. The next time that you visit that
site it will be as if you are visiting it for the first time. If you want to remove
cookies for a site from which you’ve previously accepted cookies, run a
Security Check and remove the cookies for that site.
TIP: You can run Security Check so that it only looks for cookies. On the
Internet Guard Dog Home screen: click the Options m e nu; select
CheckUp Settings; th en clear all options except Cookie Check. After you
are finished with the CheckUp, don’t forget to change back yoursettings.
32Internet Guard Dog
Privacy Features
Why should I change my Cookie Blocker settings?
If you want a good level of privacy protection without having to see any
Cookie Blocker alertmessages, usetherecommended settings—alwaysaccept
cookies from sites that you visit directly and decide on a case-by-case basis
whether to accept cookies coming from sites that you haven’t visited directly.
You may also change your settings under specific circumstances (see Table
5-2).
Table 4-2.
If youUse this option
Want the least number of
cookies set and highest
assurance of privacy.
Always want to know when
cookies are sent.
Are not concerned atallabout
cookies.
Reject for both Direct Sites and Indirect Sites.
If a site requires you to accept a cookie, you can
change this setting temporarily to Prompt.
Prompt for both Direct Sites and Indirect Sites.
Be prepared to respond to a large number of
alert messages.
After you respond to the Cookie Blocker alert
message, you won’t see additional alert
messages for that site.
Either turn off Cookie Blocker or change the
Indirect Sites setting to Accept.
You should choose the second method if you
want to keep a total of the cookies added to
your PC, which you can view in the Browser
Buddy.
What Identity Protector does
It i s easy to forget that whenyou sendinformation ov er the Internet, itdoesn’t
go directly from your computer to the computer that is storing the Web page
information. Instead, the information can pass through many computers
before it reaches its final destination.
Identity Protector can keep your software from sending any personal
information over the Internet to an unsecure site. Although you don’t have to
worry abouta sitewhen itusing asecure connection, thereare manyWeb sites
that use a secure connection only when dealing with credit card transactions.
(For more information, see “Privacy on the Web” on page 58.)
User’s Guide33
Privacy Features
If more than one person is using your computer, make sure that you create an
Internet Guard Dog password. If the person using your computer doesn’t
enter the Internet Guard Dog password, it automatically replaces any
protected personal information sent to an unsecure site with the text, “xxxx.”
For example, if your child tries to order the latest CD without entering your
Internet GuardDog password, it replacesyour credit card number with “xxxx
xxxx xxxx xxxx.”
Identity Protector offers three optional responses whenever an application
tries to send out information over the Internet to an unsecure site:
•Let the information go out.
•Block the information from going out.
•Display an alert message when any application tries to send the
information over the Internet to an unsecure site. This is the response that
Internet Guard Dog sets up when you add information to protect in the
Internet Guard Dog Interview.
Responding to an Identity Protector alert message
During the Interview, Internet Guard Dog asked you to enter your personal
and financial information that you want to protect. Internet Guard Dog
displays the Identity Protector alert message the first time an application tries
to send out this information to an unsecure site.
You can respond to the alert message in the following ways:
Table 4-3.
If you chooseInternet Guard Dog
This time onlyAllows the information to go out just this time.
Not this timePrevents the information from going out this
time.
34Internet Guard Dog
Privacy Features
Why should I change my Identity Protector settings?
You may want to change your settings under the following circumstances:
Table 4-4.
If youUse this option
Are the only person using
your PC and you don’t
want to be alerted every
time.
Have more than one
person using your PC.
Youwanttobewarned
any time this information
is being sent out.
Enter all of the information that you want to
prevent from going out and select Allow Always.
Create an Internet Guard Dog password. If the
Internet Guard Dog password is not entered after
you start Windows, an unauthorized user of your
PC can’t view or send out your personal
information.
Enter all of the information that you may want to
prevent from going out andselectAllow Always or
Ask Before Blocking. For information that you
always want to prevent from going out, select
Block Always.
Create an Internet Guard Dog password. If the
Internet Guard Dog password is not entered after
you start Windows, any information entered in
Identity Protector will be blocked from being sent
out.
Enter all of the information that you may want to
prevent from going out and select Ask Before
Blocking.
NOTE:When InternetGuard Dogasks foryour passwordand youenter
it, the password stays in effect until you restart Windows. If you’ve
entered your password and want to block others from sending out your
personal information, restart Windows before letting anyone else use
your PC.
User’s Guide35
Privacy Features
What Web Trail Cleaner does
As you surf the Internet, your browser stores information that makes your
browsing experience more satisfying. It uses the information as follows:
Table 4-5.
Your browser usesTo
Cached filesSpeed up thedisplay of Web page elementssuch
as graphics.
URLs visitedDisplay a list of sites that you’ve visited using
Web addresses.
HistoryDisplay a list of sites that you’ve visited using
Web site names.
The files left on your PC can be view ed by others and depending on your
browser’s settings, can take up many megabytes of disk space.
If you accepted Internet Guard Dog’s recommendation during the interview,
Internet Guard Dog displays the Web Trail Cl eaner alert message when you
close your browser.
Responding to the Web Trail Cleaner alert message
You can respond to the alert message in the following ways.
Table 4-6.
If you chooseInternet Guard Dog
CleanDeletes all of the cached files, history and URL
information associated with t he selected Web
site (Domain).
Select a site for cleaning by selecting the check
box next to the site name.
Don’t cleanCloses the Alert message and continues closing
your browser.
By default,Internet Guard Dog selects the sitesthat are not bookmarked (that
is, part of your list of favorite sites) because it is less likely that you’ll return to
these sites. If you don’t return to a site, the cached files for the site are never
used again—they just sit and take up disk space until they are ultimately
deleted by your browser.
If you later want to delete the files that you’ve left behind, run the Internet
Guard Dog Security Check.
36Internet Guard Dog
Privacy Features
Why should I change my Web Trail Cleaner settings?
You may want to change your settings under the following circumstances:
Table 4-7.
If youUse this option
Want to see exactly what files
are being deleted.
Want to remove all traces of
your browsing.
Want to remove files only for
Web sites that you haven’t
bookmarked or added to your
list of favorites.
What Search Filter does
When you perform a search in your Web browser, the search information is
displayed in the address box of your Web browser. When you go to another
site, thebrowser retains the search information and the next site you visit can
extract it without your knowledge. Search Filter blocks this information from
being passed along to the next site.
If you have Search Filter selected in the Security Settings of Internet Guard
Dog, it automatically removes search information before you go to another
Web site. Internet Guard Dog does not displ ay an alert message for this
feature, but you can see the number of times Search Filter blocks this
information in the Browser Buddy.
Prompt to Clean Up after closing Web browser.
Automatically Clean Up after closing Web
browser. (Clear the check box for “Keep
bookmarked items.”)
Automatically Clean Up after closing Web
browser.
Keep bookmarked items.
User’s Guide37
Privacy Features
38Internet Guard Dog
5Security Features
Internet Guard Dog’s security features safeguard your Internet connection
and protect the files on your PC from prying eyes and destructive programs.
What Gatekeeper does
Gatekeeper lets you control what programs on your PC can have access to
your Internet connection. Gatekeeper can also warn you about any of these
potentially harmful actions:
•Your browser is directed to a harmful site—one that has been known to
contain virus-infected files (e.g., Trojan horses, prank or destructive
ActiveX controls, or other security concerns).
•A program silently uses your modem to connect to another computer.
•A program starts up another program.
5
•A program sends out over the Internet a number that follows a common
credit card number pattern.
Responding to Gatekeeper alert messages
Internet Guard Dog can display five different Gatekeeper-related alert
messages. Ifyou are usingthe defaultsettings suggestedby theInterview, you
will see the messages related to Internet access, harmful sites, programs
starting another program, and programs sending out credit card-like
numbers.
Internet access alert message
Each time you start a program that attempts to use your Internet connection,
Internet Guard Dog checks to see if that program is in the list of programs
allowed to access the Internet. If the program is not in the list, Internet Guard
Dog displays an alert message to tell you that the program is trying toconnect
to the Internet and asks you how to deal with the program.
Because Internet Guard Dog displays an alert the first time you start an
Internet program, you may want to start each of the Internet-connected
programs you use regularly in order to get those alerts out of the way at one
time.
User’s Guide39
Security Features
You can respond to the Internet access alert message in the following ways:
Table 5-1.
If you chooseInternet Guard Dog
This time onlyAllows the program to access the Internet this time
only and warns you the next time it tries to access the
Internet.
Allow alwaysAllows the program to accessthe Internet at any time.
In Protection Settings for Gatekeeper, the program is
added to thelist of programsallowed to automatically
access the Internet. If you decide later that you do not
want this program to use your Internet connection,
select its name and click Remove.
Not this timePrevents the program from accessing the Internet.
This choice stays in effect until the next time you
restart Windows or for Internet Explorer 4 users, until
you close your browser.Use this option if you want
Internet Guard Dog to warn you the next time the
program tries to access the Internet.
Harmful site alert message
Before you can connect to a harmful site, Internet Guard Dog will display an
alert message, “Your browser is visiting Sitename,aWebsitethatmayharm
your PC or data.”
You must immediately close your browser to end your browser’s connection
tothissite.Thefasteryoucloseyourbrowser,thelesstimethesitehasto
transfer harmful data to your PC.
If you want to view the Web site anyway, click Continue.
Program starts up another program message
When another program starts to ru n another program, Internet Guard Dog
checks to see if you’ve authorized this action. If you haven’t allowed the
program to always open the other program, Internet Guard Dog displays an
alert message.
40Internet Guard Dog
You can respond to the alert message in the following ways:
Table 5-2.
If you chooseInternet Guard Dog does this
Allow alwaysAllows the program to start the other program.
Not this timePrevents the program from starting the other
program just this time.
This time onlyAllows the program to start the other program
just this time.
Any credit card number goes out message
When a program sends a number resembling a credit card number over the
Internet, an alert message is displayed.
You can respond to the alert message in the following ways:
Security Features
Table 5-3.
If you chooseInternet Guard Dog
Not this timePrevents the program from sending the number
this time.
This time onlyAllows the program to send the number just this
time.
User’s Guide41
Security Features
Why should I change my Gatekeeper settings?
The Gatekeeper settings suggested by the Interview will display the fewest
number of alert messages. If you are using an older browser version or just
want a higher level of security, you may want to change your settings under
the following circumstances:
Table 5-4.
If youUse this option
• Want to be warned when the site that you are
going to has been known to cause damage,
e.g. containsvirus-infected files,Trojan horse,
prank or destructive ActiveX controls, or other
security concerns. (To keep Internet Guard
Dog’s list ofharmful sitescurrent and effective,
use Update monthly.)
• Want to be warned when a program is using
your modem to dial out.
• Want to be warned when a program starts up
another program.
Many newer programs will warn you before
doing this, but older programs may not do so.
For example, Internet Explorer 4 uses “helper
programs” to display documents.
• Want to be warned before any number that
resembles a credit card number is sent out
over the Internet.
To protect specific numbers, see “What
Identity Protector does” on page 33.
Going to harmful sites.
My modem dials silently.
Program tries to launch
another program.
Any credit card number
goes out.
• Want to see a listof what programs you have
allowed to automatically access the Internet.
(A program is added to the list when you click
Accept Always in the Internet access alert
message.)
If you change your mind, you can remove a
program from the list. You will be warned the
next time that program tries to access the
Internet.
42Internet Guard Dog
These programs are always
allowedaccesstothe
Internet
What File Guardian does
File Guardian can protect files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. For added protection, you can
even encrypt files protected by File Guardian. Internet Guard Dog can also
alert you if a program attempts one of the following potentially harmful
activities:
•A program attempts to reformat your hard drive.
•An ActiveX control attempts to delete files on your hard drive.
•An ActiveX control attempts to scan files on your hard drive.
•A program attempts to access your system password files.
When Internet Guard Dog displays an alert message, you can decide if the
program should be allowed to continue the operation or not.
Security Features
Responding to File Guardian alert messages
Internet Guard Dog can display five different File Guardian-related alert
messages. If you are using the default setting suggested by the Interview, you
will only see: guarded file; ActiveX scan; ActiveX delete; and drive format
messages.
Guarded file alert message
Using File Guardian, you can set which files to guard on your hard drive and
what programs can be used to open the files. If an unauthorized application
attempts to access a guarded file, Internet Guard Dog displays an alert
message that tells you what application is trying to open which file.
You canthen decide whether you wantto give the program inquestion access
to the file. If you did not run the unauthorized program yourself, you should
immediately investigate the program to determine its source.
Table 5-5.
If you chooseInternet Guard Dog
Allow alwaysPermits the program to open the file and adds
Not this timeStops the program from opening the file and
theprogramtothelistofprogramsthatare
authorized to access the file without further
warnings.
warns you the next time the program tries to
open the file.
User’s Guide43
Security Features
ActiveX scan alert message
There are legitimate reasons for allowing an ActiveX control to read through,
or scan, all of your files. For example, you can go to one site on the Web that
uses an ActiveX control to look for viruses on your PC. However, if a site
begins to scan your files without warning you, Internet Guard Dog gives you
a chance to think about how much you trust the site.
When Internet Guard Dog detects an ActiveX control scanning the files on
your PC, it displays an alert message that tells you what ActiveX controls is
scanning your hard drive.
You can respond to the alert message in the following ways:
If you chooseInternet Guard Dog
Not this timeStops theActiveX control from runningthis
Table 5-6.
time.
This time onlyPermits the ActiveX control to scan your drive
ActiveX delete alert message
There are legitimate reasons forallowing anActiveX controlto delete files. For
example, if a control installs special software on your PC to let you interact
with its Web site, the control may need to delete files that it created for
temporary use. However, ifa site doesn’t warn you and begins to delete files,
Internet Guard Dog gives you a chance to see what file is being deleted and
think about how much you trust the site.
When Internet Guard Dog detects an ActiveX control deleting files on your
PC, it displays an alert message that tells you the name of the control.
If you change your mind, reload the page in your
browser and click This time only the next time
Internet Guard Dog displays its ActiveX scan
message.
just thistime.
44Internet Guard Dog
You can respond to the alert message in the following ways:
If you chooseInternet Guard Dog
Not this timeStops theActiveX control from runningthis
This time onlyPermits the ActiveX control to delete files just
Drive format alert message
When a format command is started, Internet Guard Dog doesn’t know
whether you told your PC to format a Zip disk or whether a rogue ActiveX
control has started to format your hard disk. You know that this activity is
legitimate when you start the formatting command or if you know that a
program you are using needs to format a hard disk (or a Zip or Jaz disk).
Security Features
Table 5-7.
time.
If you change your mind, reload the page in your
browser and click Allow this time the next time
Internet Guard Dog displays its ActiveX delete
message.
this time.
When Internet Guard Dog detects a format command, it displays an alert
message that tells you which program started the format command.
If you don’t know why your disk is being formatted, note the name of the
program inthe alertmessage andthen turnoff yourcomputer using its power
switch. If the program has the letters OCX as part of its name, it is an ActiveX
control.Do notrestartyour browseruntil youhave run anInternet Guard Dog
CheckUp and removed the suspicious ActiveX control from your PC.
Click
Continue if you want the program to format your disk.
User’s Guide45
Security Features
Why should I change my File Guardian settings?
You may want to change your settings under the following circumstances:
Table 5-8.
If youUse this option
• Want to be warned when an ActiveX control
looks through the files on your PC.
This may happen legitimatelyif the control
needs to find a file to use. If you are
concerned, check with the site that sent you
the control.
• Want to be warned when an ActiveX control
deletes a files.
This may happen legitimately if the control is
deleting older or temporary files that it uses. If
you are concerned, check with the site that
sent you the control.
• Want to be warned when any program tries to
format any of your drives.
An alert message appears whenever you
format a floppy disk, other removable media,
or hard disk. You may want to turn this option
off temporarily if you are going to format a lot
of disks and don’t want to see any messages.
ActiveX scans my drive
ActiveX deletes files from
my drive
My drive is being formatted
• Want to be warned when any program
accesses your Windows password files (i.e.,
any file with the .pwl extension located in the
Windows directory).
Windows functions that are
password-protected use these password files.
• Want to prevent any program from opening a
file or files. For further protection, you can
have Internet Guard Dog include the file when
you encrypt files.
You can protect individual files, files in a
specific folder, files of the same type, files on
thesamedrive.
NOTE: For step-by-step instructions on adding, editing, or removing
Password files are accessed
Guarded files
files in the Guarded Files list, allowing a program to access a guarded
file, or encrypting or decrypting files, see Internet Guard Dog Help.
46Internet Guard Dog
What Password Manager does
Password Manager lets you store your various Web site login names and
passwords in one secure location. When you are visiting a Web site that
requires this information, you can drag it from the Browser Buddy to the form
displayed in your browser.
In Protection Settings, you can:
•View your list of stored login names and passwords.
•Add a record.
•Edit a record.
•Remove a record.
You can also add a record in the Browser Buddy. For more information, see
“Using Browser Buddy to retrieve or store your Web site passwords,” in
Chapter 3.
Security Features
To add a password record
1.In the Internet Guard Dog Home screen, click the Options menu, then
select Protection Settings.
2.Click Password Manager. (If the check box next to Password Manager is
not selected, you won’t be able to add, edit, or remove records.)
3.Click Add.
4.Type the information that you want to store in the record.
5.Click OK.
To edit a passwo rd record
1.In the Password Manager list, do one of the following:
•Double-click the record you want to edit.
•Click the record you want to edit, then click
Edit.
2.Change the information that you want to store in the record.
3.Click OK.
User’s Guide47
Security Features
To remove a password record
•In the Password Manager list, click a record to select it, then click
Remove.
48Internet Guard Dog
6McAfee VirusScan
What is McAfee VirusScan?
The VirusScan name applies both to the entire set of desktop anti-virus
program components describedin this chapter,and toa particular component
of that set: SCAN32.EXE, or the VirusScan “on-demand” scanner. “On
demand” means that you as a user control when VirusScan s tarts and ends a
scan operation, which targets it examines, what it does when it finds a virus,
or anyother aspect of the program’soperation. Other VirusScan components,
by contrast, operate automatically or according to a schedule you set.
VirusScan originally consisted solely of an on-demand scanner—features
since integrated into theprogram nowprovide acluster of anti-virus functions
that give you maximum protection against virus infections and attacks from
malicious software.
The VirusScan on-demand component operates in two modes: the VirusScan
“Classic” interface gets you up and running quickly, with a minimum of
configuration options, but with the full power of the VirusScan anti-virus
scanning engine; the VirusScan Advanced mode adds flexibility to the
program’s configuration options, including the ability to run more than one
scan operation concurrently.
6
Starting VirusScan
VirusScan comes with a single, default scan operation pre-configured and
ready to run. You can start this scan operation to look for viruses on your C:
drive immediately,or you can configure and run yourown scan operations to
suit yourneeds. VirusScanAdvanced also comeswith asingle pre-configured
scan operation, which scans all of your local hard disks.
To start VirusScan, either
•ClickVirusScan from the Internet Guard Dog Home screen; or
•ClickStart in the Windows taskbar, point to Programs,thentoMcAfeeVirusScan.Next,chooseMcAfee VirusScan Central from the list that
appears.
If you want to use the VirusScan Classic window, either
•ClickStart in the Windows taskbar, then choose Run from the menu that
appears. Type SCAN32.EXE in the R un dialog box, then click OK.
User’s Guide49
McAfee VirusScan
Any of these methods will launch VirusScan.
VirusScan Central window
After launching VirusScan from the Internet Guard Dog Home screen, the
VirusScan Central window is displayed. The following main features are
available to use:
•ClickScan to start the default scan task immediately, or configure a scan
task that suits your needs (see Configuring VirusScan).
•ClickScheduler to launch the McAfee VirusScan Scheduler. This utility
enables you to configure and run unattended scan operations.
•ClickQuarantine to display a list of quarantined files. The Quarantine
feature allows you to isolate an infected file in order to avoid spreading a
virus.
•ClickUpdate to check for updated versions of VirusScan and DAT files.
VirusScan Classic window
Figure 6-8. VirusScan Classic window
After launching VirusScan Classic window, you can click Scan Now at the
right of the window to start the default scan task immediately, or configure a
scan task that suits your needs by cli cking the tabs at the top of the window
and choosing options in each property page.
The menus at the top of the VirusScan window allow you to change some
aspects of the program’s operation. You can:
•Save or restore default settings.
•Save new settings.
•Open the VirusScan activity log.
50Internet Guard Dog
Figure 6-9. VirusScan Activity Log
•Quit VirusScan.
•Change VirusScan modes.
•Activate password protection.
McAfee VirusScan
•Start VirusScan Scheduler.
•Open the online help file.
•
NOTE:
informationand step-by-stepinstructionsonhow to use any of
the features of the Classic window.
Configuring VirusScan
To perform a scan operation, VirusScan needs to know what you want it to
scan, what you want it to do ifit finds avirus, and how it should let you know
when i t has. You can also tell VirusScanto keepa recordof itsactions. A series
of property pages controls the options for each task.
Options for each task
•Choosing Where & What options
See the McAfee VirusScan online Help for more
VirusScan initially assumes that you want to scan your C: drive and all of
its subfolders, and to restrict the files it scans only to those susceptible to
virus infection
To modify these options, follow these guidelines:
User’s Guide51
McAfee VirusScan
•Choose a volume or folder on your systemor on your network that
you want VirusScan to examine for viruses.
Clickto expand the listing for an item shown in the dialog box.
Clickto collapse an item. You can select hard disks, folders or
files asscan targets, whetherthey reside on your systemor on other
computers on your network. You cannot select My Computer,
Network Neighborhood, or multiple volumes as scan targets from
VirusScan Classic—to choose these items as scan targets, you must
switch to VirusScan Advanced.
•Specify thetypesof files youwantVirusScan to examine.Bydefault,
VirusScan looks for viruses infiles with the extensions .EXE,.COM,
.DO?, .XL?, .MD?, .VXD, .SYS, .BIN, .RTF, .OBD, and .DLL. Files
with .DO?, .XL?, .RTF, .MD?, and .OBD extensions are Microsoft
Office files, all of which can harbor macro virus infections. The ?
character is a wildcard that enables VirusScan to scan both
document and template files.
•Choosing Action options
When VirusScan detects a virus, it can respond either by asking you what
it shoulddo with theinfected file, orby automatically taking an action that
you determineahead of time. You canspecify which response options you
want VirusScan to give you when it finds a virus, or which actions you
want it to take on its own. These response options include:
•Prompt User forAction. Choose this response ifyou expect to be at
your computer when VirusScan scans your disk—VirusScan will
displayan alert message when it finds avirus and offeryou thefull
range of its available response options.
•Move infected files automatically. Choose this response to have
VirusScan moveinfected files to a quarantinedirectory as soon as it
finds them. By default, VirusScan moves these files to a folder
named INFECTED that it creates at the root level of the drive on
which it found the virus. For example, if VirusScan found an
infected filein T:\MYDOCUMENTS and youspecified INFECTED
as the quarantine directory, VirusScan would copy the file to
T:\INFECTED.
You can enter a different name in the text box provided, or click
Browse to locate a suitable folder on your hard disk.
•Clean infected files automatically. Choose this response to tell
VirusScan toremove the virus code from the infected file assoon as
it finds it. If VirusScan cannot remove the virus, it will note the
incident in its log file.
52Internet Guard Dog
McAfee VirusScan
•D elete infected files automatically. Use this option to have
VirusScan delete every infected file it finds immediately. Be sure to
enable its reporting feature so that you have a record of which files
VirusScan deleted. You will need to restore deleted files from
backup copies. If VirusScan cannot delete an infected file, it will
note the incident in its log file.
•Co ntinue scanning. Use this option only if you plan to leave your
computer unattended while VirusScan checks for viruses. If you
also activate the VirusScan reporting feature, the program will
record the names o f any viruses it finds and the names of infected
files so that you can delete them at your next o pportunity.
•Choosing Report options
By default, VirusScan beeps to alert you when it finds a virus. You can use
theReportpagetoenableordisablethisalert,ortoaddanalertmessageto
the Virus Found dialog box that appears when VirusScan finds an infected
file. Thisalert messagecan containany information,from asimple warning
to instructi ons abouthow to report the incidentto a networkadministrator.
This same page determines thesize and location of VirusScan’slog file. By
default, the program lists its current settings and summarizes all of the
actions it takes during its scanning operations in a log file called
VSCLOG.TXT. You can have VirusScan write its log to this file, or you can
use any text editor to create a text file for VirusScan to use. You can then
open and print the log file for later review from within VirusScan or from
your text editor.
•Choosing Alert and Log options
You canselect the types of alert methods you want VirusScan to use when
it finds a virus.
•Display a custom message. Select the Display message checkbox,
then enter themessage youwant toappear inthe textbox provided.
You can enter a message up to 225 characters in length.
NOTE:
To have VirusScan display your message, you must
have selected Prompt user for action as your response in the
Action option.
•Beep. Select the Sound alert checkbox.
User’s Guide53
McAfee VirusScan
You can also select the Log to file option. By default, VirusScan writes log
information to the file VSCLOG.TXT in the VirusScan program directory.
You can enter a different name and path in the text box provided, or click
Browse to locate a suitable file elsewhere on your hard disk or on your
network.
54Internet Guard Dog
AInternet Security and Privacy
This chapter provides some background information that will help you
understand Internet security and privacy threats, and discusses strategies for
using Guard Dog to protect yourself and your computer.
Networks and the Internet
A computer network links individual computers together so they can share
data and resources. To network, computers need some means of
connection—either a modem or a Network Interface Card (NIC—some
computers have NICs already built-in). The modem or NIC is responsible for
sending and receiving data through the network. Networks are sometimes
called local area networks (LAN) because they link the computers at a single
locale, such as an office or building. In a small office, computers can be linked
directly by connecting them together with cable. This very simple network is
called a peer-to-peer network, wherein all of the computers are equal to one
another. Windows has peer-to-peer networking capabilities built into the
operatingsystem. The increasedtrafficin larger networks requiresthe services
of a special computer, called a server. Servers help larger networks operate by
figuring out how to route messages to the appropriate recipient.
A
The Internet is avast computer n etwork, connecting com puters together from
around world and allowing them to work together and s hare information.
When you connect to the Internet, your computer becomes a part of a
worldwide network of computers.
TCP/IP is the subsystem
The Internet is based on a system called Transmission Control
Protocol/Internet Protocol (TCP/IP). TCP allows computers to share data by
first breaking it down into little segments called packets. In addition to data,
each packet contains the address of the machine sending the packet, and the
address of the intended recipient. T he TCP part of the system is what is
responsible for addressing the data and breaking into packets. IP, the second
part of the system, is responsible forrouting packets from the sending
computer to the recipient computer.Special computerscalled routers read the
address on each packet, and figure out how to route them to the appropriate
destination.
User’s Guide55
Internet Security and Privacy
Why packets?
Whygo through all this trouble, breakingdata down into packets?The answer
lies in the origins of TCP/IP. Likethe Internet itself, itis a product of the Cold
War. The United States Department of Defense originally developed the
Internet. It was designed to ensure secure communications, even with
multiple communications network failures anticipated in the event of a
nuclearwar.TCP/IPsolvestheproblemofnetworkfailurebyassumingthat
a certainamount ofnoise alwaysexists in the network— noise referring either
to random data errors or more serious system crashes. If you have ever tried
to speak in a noisy room, you know the necessity of repeating yourself—and
that is exactly what TCP/IP is designed to do. Breaking the data down into
packets allows the Internet toseek alternate routes if one route is inaccessible.
If a packet cannot get through or arrives damaged, the receiving computer
simply requests it again until it arrives successfully.
When you send an e-mail message, for example, it is broken into several
packets. Depending on how noisy the network is, each packet may need to be
routed over a separate route in order to find its way to its destination.
Furthermore, networkproblems may causesome of thepackets to be delayed
so they arrive out of order. To compensate, TCP examines each packet as it
arrives toverify that i t's OK. Once all the packets are received, TCPputs them
back in their original order. Of course, all of this happens quickly and
automatically, so you will never see the process at work.
The Internet and the Web…what is the difference?
Before the Web, the Internet was mostly command-line driven and
character-based— you had to type in the exact Internet address of the place
youwanted togo atacommand line. In1989, TimBerners-Leeofthe European
Particle Physics Laboratoryproposeda new way toshareinformation overthe
Internet. The essential feature in Berner-Lee’s vision of the Web is that it links
documents together. When you click a link on a Web page, you are
automatically connected to another Web site. This linking function, combined
with the increasing graphics abilities of home computers, transformed the
Internet into a graphically rich place, complete with video, sound, and
pictures. Through the linking of information together in a
graphically-appealing package, the Web made the Internet more attractive to
the typical consumer.
The Internet is a network of linked com puters that uses TCP/IP as its
underlying messaging system. The World Wide Web (WWW, or just “Web”
for short) is hosted by the Internet, and i s an ever-expanding collection of
documents employing a special coding scheme named Hypertext Markup
Language (HTML).
56Internet Guard Dog
NOTE: HTML is a set of commands designed to be interpreted by Web
browsers. An HTML document consists of content (prose, graphics,
video, etc.) and a series of commands that tell a Web browser how to
display the content.
Privacy and security on the Web
Before the advent of the Web, Internet security usually posed a problem only
forsystem administrators tryingtokeep meddlesome hackersaway fromtheir
systems. When the Web arrived, the popularity of the Internet skyrocketed.
Almost overnight, people began doing all sorts of potentially sensitive
activitiesoverthe Internet, including: banking and stocktransactions;sending
personal data toWeb sites;performing W eb searches;and orderingbooks and
clothes. While the Web is responsible for making the Internet more accessible,
it also opens new possibilities for data theft, invasions of privacy, and fraud.
Internet Security and Privacy
Why does Internet privacy matter to me?
Step back and consider the range of sensitive transactionswe makeevery day.
As an example,considera simpleATM transaction: We assumethatfollowing
conditions prevail whenever we use our ATM cards:
•Privacy: Only you and the intended recipient can access the transaction
information. ThePIN you use to accessyour bankaccount providesa fairly
high level ofprivacy—as longas you don’tshare yourPIN withothers, and
don’t leave your card lying around, your checking account balance is safe
from prying eyes.
•Integrity: Nothing can intervene and change the information during the
transaction. When we take twenty dollars out of our checking account, we
have a reasonable expectation that the ATM will not add an extra zero.
•Trust: You cantrust that the recipient is who they claim to be; the recipient
cantrustthatyouarewhoyouclaimtobe.
Organizations likebanks andinsurance companiesare legally obligedto abide
by federal statutes that govern the sanctity of your transaction information.
The problem with Internet is that it has not yet evolved into well-established
institutional mechanisms that guarantee the sanctity of your information.
User’s Guide57
Internet Security and Privacy
Privacy on the Web
Who is snooping?
Hackers are a breed of human being that thrive on gaining illegal access to
computersin orderto access,steal,and sometimescorruptdata. Many hackers
are quitebenign—breakinginto a secure system is a challenge and a thrill. But
some computer hackers think that if they don’t care for someone or some
organization, it is OK to break in to their computers and wreak havoc. Other
hackers think that the on-line theft of money and resources is legitimate, as
long as it goes to support more hacking.
Snooping and sniffing
Since its inception, the Internet has been (and largely remains) an open
network. Openness means that information on the Internet travels without
any special security: Anyone whocan monitor network traffic can intercept it.
This sort of monitoring is called “sniffing,” and is easy to perform using
“sniffers.” Sniffers are programs (or hardware devices) designed to monitor
data traveling over a network. Originally, sniffers were designed to help
network administrators track down networking problems. Unfortunately, the
same tool can also be used to steal information. Sniffers are insidious and
difficult to detect.
Sniffing often begins when a hacker breaches the security of a local Internet
Security Provider (ISP). A hacker does not need physical access to the ISP’s
premises—sometimes a telephone line is sufficient (althoughit isalso possible
to sniff with physical access to network cables). Once a hacker compromises
an ISP’s system, the network traffic that travels through the ISP is no longer
secure.
Web servers and firewalls
Secure transactions are only one part of the problem. When an ISP’s Web
server receivesinformation, theISP must be able to keep theinformation safe.
Hackers liketo attack the security ofWeb serversbecause Web server security
is stillin itsinfancy. Asa consequence,Web administrators assumethat aWeb
server is open to attack, and try to keep them decoupled from other,
mission-critical computers. Some Web applications must, however, interact
with corporate databases, an open door to a clever hacker. One form of
security technology called a “firewall” can close the door, but firewalls are
often maintained poorly, andeven in the best environment, cannot safeguard
certain services.
58Internet Guard Dog
What can I do to keep my stuff safe?
With sniffer in place, a hacker can intercept credit card numbers and other
private information by capturing data transmissions, and then using
pattern-matching algorithms to filter out the valuable information.
Intercepted credit card info can be sold to criminals, intent on committing
fraud.
To avoid this problem, Web browsers incorporate encryption technologythat
cloaks information and makes it difficult to get at. Encryption is the basic
technique that the Web uses to guarantee information security.
The current encryption standard is called “Secure Sockets Layer” (SSL),
supported both by Microsoft and Netscape, and incorporated in their
browsers. An icon in the browser changes to indicate that SSL is active. When
you make a transaction with SSL active, you can be fairly comfortable that the
transaction is safe.
When you visit an SSL-secured site, the latest versions of Netscape
Communicatorand Microsoft InternetExplorer useavisual cue totellyouthat
the site is secure. For more information, see Howcan I tell ifa Website issecure?
Internet Security and Privacy
NOTE: Guard Dog’s CheckUp lets you know if your Web browser is
up-to-date. Thelatest browser versions usually offer an enhanceddegree
of security.
How can I tell if a Web site is secure?
Today, many sites use SSL to set up secure commerce on the Web. In addition
to Webserver security, the most com mon Internet browsers provide feedback
about the security level of the site to which you are currently connected. For
example,NetscapeCommunicatordisplaysa lockiconin the lowerleft corner
of the browser window. If the lock icon is broken, the site is not secure. If the
lock symbolis notbroken, thesite issecure. In addition, if the lock symbol has
a gold background, the site is using strong, 128-bit encryption.
Recent versions of Microsoft Internet Explorer and America Online browsers
also display security information. For more information about how your
browser indicates the security level of sites, refer to y our browsers on-line
help, or the printed documentation.
User’s Guide59
Internet Security and Privacy
If SSL is so great, what is the problem?
SSL is affected by acouple of problems.One problem is that not everyone has
anSSL-enabledserver or browser.SomeWeb administrators don’twant touse
SSL because they have to pay for it, and it can also slow down server
transactions. A more onerous problem that affects SSL is the way it is
implemented. It turns out that some developers made incorrect assumptions
aboutSSL,whichmeanssomeolderbrowserversionsarelesssecure.The
good news is that Microsoft and Netscape now coordinate their security
efforts, which means a more secure, universal standard for Web security.
What about authentication?
Authentication is a method of assuring that both parties to an Internet
transaction are who they claim to be. For example, if you get account balance
information from your bank, you want to be sure that you are contacting the
bank, and notsome unauthorized entity.In addition,the bank wantsto be sure
that they are providing the information to you, and not just to a person who
happens to know your bank account number.
Authentication usually entails entering a user ID and a password. To
circumvent intercepted passwords and IDs, authentication employs
encryption to scramble this information before transmitting it.
NOTE: Certificates are Microsoft technologies designed to guarantee a
person’s identity and Web site security. Personal certificates verify that
you are who you claim to be. Web si te certificates verify that a Web site
is secure andwhat itclaims to be(so Websites can’t falsifytheir identity).
When y ou open aWeb sitethat hasa certificate,Internet Explorer checks
if the certificate is correct. If the certificate is not OK, Internet Explorer
warns you. Certificates are great,in theory. Theproblem is thatthey only
establish a security standard—Web sites are free to choose to use
certificates, or not.
How does encryption work?
The onlyway to keep a secretis if you do not tell anyone,and if you do not jot
it down. If you need to share the secret, you can hide it within another
message, and let the intended recipient know how to find it. Computer
encryption hides messages by making the original data unintelligible. The
intent is to garble the data so that it can not be read. In this case, the data it self
is useless if access by an unintended recipient.
60Internet Guard Dog
Internet Security and Privacy
The simplest encryption systems use letter shifting, in which a message is
encrypted by shifting every letter n letters later in the alphabet. For example,
say A is changed to B, and B to C, etc. As long as the recipient knows how you
shifted the letters, they can easily decrypt the message by reversing the
process. Of course, a brute force approach to breaking this sort of encryption
would simply try all possible 26-letter combinations until the final message
was retrieved—not a very strong method of encryption.
Computer encryption uses a much more difficult technique of hiding the
message. Rather than a simple letter-shifting scheme, the original message is
transformed by a mathematical algorithm. The alg orithm uses a secret “key”
to scramble the message, and the key is necessary to unscramble it. The key is
similar to a house key:The more teeth a key has, the more difficult it isto pick
the lock. Similarly, “strong” encryption uses keys with many “teeth”—in this
case, bits of data.
Thereare two commonly used levelsof encryption.The internationalstandard
is 40-bit encryption, but some sites in the United States use a higher level of
128-bit encryption. The number of bits indicates the length of the key used to
encrypt data.The longer thekey, the stronger and more secure the encryption.
On the Web, your browser works with secure Web sites to establish and
manage the encryption that secures information. If your browser security
options include the Secure Sockets Layer (SSL), which ensures
data-transmission privacy, you should turn on this option to facilitate secure
data transmission.
NOTE: Guard Dog’s CheckUp automatically checks your browser’s
security level, and lets you know if you need to change it.
Security on the Web
One of themost exciting Webdevelopments isthe evolutionof downloadable,
executable programs. Java and ActiveX are two tools that help developers
create programsthat can “live”inside Web pages, and use your Web browser
to automatically run over the Internet. Java allows Web pages to host small
programs called “applets.” When Java-enabled browsers access a Web page
containing Java, they automatically download and run the applets they find
on the page. This is an intriguing development, since it makes it possible to
download and run programs over the Web. Complete, Web-driven programs
written entirely in Java are on the horizon. ActiveX is a similar technology,
developed by Microsoft.
User’s Guide61
Internet Security and Privacy
Javacontains an internalsecurity systemthataddresses securityrisks. ActiveX
uses a differentmodel, basedon certificate authentication.Certificates contain
information about who developed the A ctiveX code. The idea here is that if
you know who developed the code, it is safe to run it. Both security schemes
offer a level of safety, but no one can yet promise that executable content is
entirely safe.
Nasty applets
One possible security threat is a malign Java or Active X program that attacks
your computer over the Web. A nasty applet might, for example, thwart Java
security by circumventing its security model, and destroy data on your hard
disk, or grab sensitive information from your hard drive. The latest browsers
have done a good job of fixing these issues. As long as you are using the latest
version of your browser, you are protected. To date, there have been no
legitimate reports of hostile Java or ActiveX harming anyone.However, there
is no guarantee that an attack will not happen in the future.
Can I prevent programs from accessing the Internet?
You can use Guard Dog to specify the applications that are allowed to access
the Internet from your computer. Obviously, your default Internet browser is
one of these applications.
If the Guard Dog Gatekeeperis runningin thebackground whileyou work on
the Internet, each time an application tries to access the Internet a dialog box
appears to ask if you want to allow this access once only, always, or never.
Computer viruses and the Web
A computer virus is a small computer program that automatically replicates
itself and spreads from one computer to another. Viruses may infect
programs, your hard drive, and even some document files that employ
macros. Viruses do not infect data files, but they can create problems that
prevent you from accessing your data. Viruses are not accidents—they are
always created by computer programmers.
PC viruses are similar to biological viruses in that they:
•Are spread from host to host—the “host,” in this instance, is your PC.
•Are very good at reproducing themselves.
•Can wreak havoc on an infected host system.
62Internet Guard Dog
Biological viruses have proven to be tenacious— modern medicine’s success
in fighting viral infection has, so far, been rather limited. Fortunately, PC
viruses differ from biological viruses in that they are easier to combat, once
they are identified.
Are viruses really that dangerous?
Bear in mind that your chances of contracting a PC virus are slim, and even
more so,your chancesof contractinga trulyvicious virus. The scariest viruses
are malicious programs that intentionally corrupt or delete the data on your
PC. More benign viruses might simply display a message on your monitor or
make a strange sound, and then disappear. But even the most benign virus
occupies some disk space, andmany remainin memory,which can cause your
PC to crash or behave erratically.
Types of viruses
Internet Security and Privacy
There are three main types of viruses:
•File or program viruses: A program virus attaches itself to a specific
program on your PC. Since many PC’s share certain files in common (for
example, the DOS programcommand.com, or the command “dir”),which
make these files tempting targets for virus programmers. Program viruses
are dormant until you run the associated program.
•Boot viruses (or Master Boot Record viruses): The boot sector of a disk is
aphysicallocationonthedisk that containsinformation aboutthe disk and
the files it contains. All disks and drives have a boot sector, even if they
aren’t “bootable.” A boot virus infects the boot sector of floppy disks and
hard drives, and are activated when you access or boot from an afflicted
disk.
•Macro viruses: Macro viruses are contained in document files, such as
Microsoft Word or Excel files. These files can contain macros that can
automate yourwork—but macroscan also bewritten to dodamage toyour
PC. Macro viruses are activated when you open an infected document file.
A finalword shouldbe said abouthoax “viruses,” whichare not virusesin the
strictest sense of the term. A hoax virus replicates a hoax, spread by
misinformed (if well intentioned) e-mail claiming that if you download a
certain file, or ifyou receive ane-mail withacertain subjectline, youwill infect
your PC with a virus. E-mail messages are always safe; they are simple text
files, and cannot contain viruses. Attachments to e-mail messages (an
attachment is a file that a message sender attaches to a message—it is
downloaded to your PC when you retrieve the message) can contain viruses.
(If E-mail file access is turned on in Virus Sentry, Guard Dog automatically
scans e-mail attachments before you open them.)
User’s Guide63
Internet Security and Privacy
How can my PC become infected with a virus?
An important thing to keep in mind is that viruses are spread only when you
run an infected application (or open an infected document file, in the case of
macro viruses). A viruscannot travel overyour telephone line and infectyour
PC on its own. You must first download or copy an infected application and
then run the application in order to infect your PC with a virus.
The only way to entirely avoid virus infection is to do nothing—don’t use the
Internet; never download a file; never accept a diskette from someone else;
never shareWord or Excel files. Of course, this draconian“Robinson Crusoe”
cure is unrealistic in today’s computing environment, where sharing data is
the norm and accessing the Internet is an everyday occurrence.
NOTE:Internt GuardDog offerscomes withMcAfee VirusScanwhich is
easy to use. It automatically scans your PC for signs of virus infection,
and investigatessuspect files before they have a chance of infectingyour
PC.
Viruses are spreadwhen infecteddiskettes are sharedbetween PCs, andwhen
you download and run infectedfiles from on-lineservices, bulletin boards, or
the Internet. Another potential (but remote) route for virus transmission is
when you access Web pages that use Microsoft ActiveX technology or Sun’s
Java. Web pages that use ActiveX, for example, can automatically download
programs to your PC, and these programs might be infected with a virus.
Although there isnoknown case whereActiveX and Javahavespread viruses,
there is still a possibility— remote as it may be—for your PC to encounter a
virusinthisway.
A virus might be hidden in the next file you down load, or on a diskette you
borrow —even diskettes purchased at a store. Downloaded shareware is also
a source of infection.
NOTE: Although Java and ActiveX are not, strictly speaking, viruses
(i.e., it can’t spread and replicate), they can still harm your PC. Guard
Dog’s defaultsettings allow it tomonitor all Java and ActiveX activity on
your PC, and warn you before something potent ially dangerous occurs.
Frequently asked questions about Internet privacy
What information do Web sites collect about me?
Web sites collect information about you in two major ways.
64Internet Guard Dog
Internet Security and Privacy
•First, youcan providethe informationyourself whenyou registersoftware
or respond to Internet questionnaires.
•Second, when you ask to be allowed access to the electronic version of a
newspaper, or usea “shopping cart” to buy products on the Web,a cookie,
described in “What are cookiesand howare theyused?” o n page 65,might
be writtento yourcomputer where it stores information, such as your user
ID and password for the newspaper or the articles you bought with their
quantity and price.
What information do companies get when I register products
online?
Companies get only the information that you enter in the registration form
when you register electronically. They do not get any information about your
computer system, your use of your computer, or other stored information
unless you provide it as part of the registration.
This information is used for the company’s marketing research and to send
you information about new releases, other products, and so on. The
information mightbe sold toother companies,just asmailing listsofmagazine
subscribers or mail order companies can be sold to others.
Some companiesallow youto specifythat youdo notwant toreceive mailings
or to have your name and address sold to other companies. If the company
does not provide this option, you can enter false information to prevent
mailings, either postal or electronic, from reaching you.
What are cookies and how are they used?
A cookie is a small file that contains data. The data in the cookie varies,
depending on its purpose. Upon the request of a Web site, your Web browser
stores cookies on your computer. Usually, cookies just contain information
that enhances your Web experience. For example, when you use an Internet
site to buy computer equipment, you may add items to a “shopping basket.”
Information about the items you add to the shopping basket is stored in a
cookie on your computer because the Internet browser cannot retain
information that youentered inone Internet page when you switchto another
Internet page. The cookie saves information about yourpurchases and allows
the site to create a final order form for you.
Another example is the cookie that a Web store keeps on your computer,
holding your user name and password so that you do not need to enter this
informationeachtimeyouconnecttothesite.
User’s Guide65
Internet Security and Privacy
Some stores may use the cookie information to record each time you connect
to the site, what pages you use, and whether you click any of advertiser
banners. Reputable sites provide privacy information to tell you how the
information that is gathered is used.
The above examples of cookies are clearly useful to you, at least in someway.
However, other sitesmight downloadcookies justto collectinformation about
your Internet use. These cookies are clearly not useful to you at all.
You can use the Guard Dog Cookie Blocker to control which cookies can be
downloaded to your computer. For more information, see “What Cookie
Blocker does” on page 31.
Sources for Internet privacy and security
information
Finding out about Internet hoaxes
The United States Department of Energy—Computer Incident
Advisory Capability
Lists and describes hoaxes, viruses, and miscellaneous security information.
http://ciac.llnl.gov/
More information about computer viruses
International Computer Security Association Anti-Virus Lab
http://www.ncsa.com/virus/
Describes viruses, virus alerts, as well as hoaxes.
Yahoo!'s virus page
Yahoo!'s virus page contains links to anti-virus software companies, Usenet
virus newsgroups, and links to specific virus information.
Usenet virus FAQ
Contains a nicely organized compendium of information about viruses
collected from Usenet virus newsgroups.
http://www.cis.ohio-state.edu/hypertext/faq/bngusenet/comp/virus/top.
html
66Internet Guard Dog
More information about security
Two good starting places for information about Web security is the on-line
help for Netscape Communicator and Microsoft Internet Explorer.
National Institute of Health’s Computer Security Information site
Good links to many security information sites.
http://www.alw.nih.gov/Security/security.html
Microsoft’s Security site
White papers and descriptions of Microsoft’s security efforts
http://www.microsoft.com/security/
More information about privacy
Internet Security and Privacy
Electronic Freedom Foundation
http://www.eff.org/pub/Privacy/
Internet Privacy Coalition
http://www.privacy.org/ipc/
User’s Guide67
Internet Security and Privacy
68Internet Guard Dog
BProduct Support
BEFORE YOU CONTACT McAfee Software for technical support, locate
yourself near the computer with McAfee Guard Dog installed and verify the
information listed below:
•Have you sent in your product registration card?
•Version of Internet Guard Dog
•Customer number if registered
•Model name of hard disk (internal or external)
•Version of system software
•Amountofmemory(RAM)
•Extra cards, boards or monitors
•Name and version of conflicting software
B
•EXACT error message as on screen
•What steps were performed prior to receiving error message?
•A complete description of problem
How to Contact McAfee
Customer service
To order products or obtain product information, contact the McAfee
Customer Service department at ( 972) 308-9960 or write to the following
address:
McAfee Software
3965 Freedom Circle
Santa Clara, CA 95054
U.S.A.
You can also order products online at http://store.mcafee.com
User’s Guide69
Product Support
If you need further assistance or have specific questions about our products,
send your questions via email to the appropriate address below:
•For general questions about ordering software: mcafeestore@beyond.com
•For help in downloading software: mcafeedownloadhelp@beyond.com
•For a status on an existing order: mcafeeorderstatus@beyond.com
To inquire about a promotion: mcafeepromotions@beyond.com
Technical support
Support via the web
McAfee is famous for its dedication to customer satisfaction. We have
continued this tradition by making our site on the World Wide Web
(http://www.mcafee.com) a valuable resource for answers to technical
support issues.
We encourageyou tomake thisyour firststop foranswers tofrequently asked
questions,forupdates to McAfeesoftware,and for access toMcAfeenews and
virus information.
Take advantage of the McAfee Product KnowledgeCenter—your free online
product support center - 24 hours a day, 7 days a week
(http://support.mcafee.com/tech_supp/pkc.asp).
Support forums and telephone contact
If you do not find what you need or do not have web access, try one of our
automated services.
Table B-1.
World Wide Webwww.mcafee.com
CompuServeGO MCAFEE
America Onlinekeyword MCAFEE
Microsoft Networkmcafee
70Internet Guard Dog
If the automated services do not have the answers you need, please contact
McAfee at the following numbers Monday through Friday between 9:00 AM
and 6:00 PM Pacific time for 30-day free support, and 24 hours a day - 7 days
a week for Per Minute or Per Incident support.
30-Day Free Telephone Support972-308-9960
Per Minute Telephone Support1-900-225-5624
Per Incident Telephone Support($35)1-800-950-1165
McAfee training
For information about scheduling on-site training for any McAfee product,
call (800) 338-8754.
choosing as scan targets 52
encrypting and decrypting 29
protecting from ActiveX controls 43
protecting with File Guardian 43
VSCLOG.TXT, as VirusScan log 53
folders
choosing as scan targets 52
G
Gatekeeper
alert messages 39
any credit card number goes out alert
message 41
described 39
harmful site alert message 40
Internet access alert message 39
programstarts up another programalert
message 40
settings 42
Getting Started manual
described 7
Guard Dog
See also alert messages; Protection
Settings
alert messages
CheckUp 25
help, described 7
Home screen 18
installing 12
Log 2
manual, described 7
new features 5
password 18
shortcut menu 26
system requirements 11
taskbar icon 26
updating 24
guarding files 29
, 23
H
74Internet Guard Dog
hard drives, protecting 43
Help
opening from VirusScan Classic and
VirusScan Advanced 51
help
alert messages and 27
using 7
Index
history files 36
hoax viruses63
Home screen
items on 19
using 18
I
icon for Guard Dog 26
Identity Protector
alert message34
described 33
settings 35
indirect sites 31
infected files
moving 52
use of quarantine folder to isolate 52
Internet connection, protecting39
Internet Filtering Options 21
Internet Guard Dog Administrator 17
Internet privacy and security
Guard Dog solutions 3
, 33
login names 47
M
macro viruses 63
managing Web passwords 27
Master Boot Record viruses 63
menu, shortcut 26
messages See alert messages
modem 39
multiple users and passwords 34
O
OCX 45
online help
opening from VirusScan Classic and
VirusScan Advanced 51
options
VirusScan Classic
Action 52
Report 53
Where & What 51
Interview 15
J
Java and viruses 64
L
Log 2, 23
log file
creating with text editor 53
VSCLOG.TXT as 53
P
Password Manager
adding a new record using Browser
Buddy 28
adding record to 47
deleting record 48
described 47
editing record 47
User’s Guide75
Index
passwords
activating and deactivating 35
adding record to Password Manager 47
adding with Browser Buddy 28
Browser Buddy and 27
deleting Password Manager record 48
dragging from Browser Buddy28
editing Password Manager record47
forgotten 18
protecting Web site 47
protecting Windows 43
storing in Password Manager 47
using for Guard Dog 18
personal information, protecting33
Privacy Features 31
privacy threats 4
program extensions, designating as scan
targets 52
program viruses 63
programs, protecting 39
protecting
credit cards 39
files from ActiveX controls 43
files with encryption 29
hard drives 43
Internet connection 39
programs 39
Windows password file 43
Where & What options, configuring 51
taskbar icon 26
text
editor, use of to create log file 53
turning on/off
Guard Dog monitoring 26
V
viruses
ActiveX and 64
e-mail attachments and 63
e-mail messages and 63
file and program 63
hoax 63
how dangerous? 63
how spread 62
Java and 64
macro 63
threats 5
types of 63
updating list of 24
who creates them 62
VirusScan
Action options
configuring in VirusScan Classic 52
property pages
Action 52
Where & What 51
what it does 49
U
unsecure site 34
Update button, using 24
updating Guard Dog and virus patterns
using Update 24
URLs 36
username
adding with Browser Buddy 28
dragging from Browser Buddy 28
VirusScan Classic
Action options, choosing 52
Report options, choosing 53
starting 49
Where & What options, choosing 51
VSCLOG.TXT, as VirusScan report file 53
W
warnings See alert messages
Web password management 27
Web sites
harmful 39
storing login names and passwords 47
Web Trail Cleaner
alert message 36
described 36
settings 37
Where & What options
choosing in VirusScan Classic 51
User’s Guide77
Index
Windows
protecting password file 43
taskbar 26
using help 7
Windows Startmenu, usingto startVirusScan
Classic. 49
78Internet Guard Dog
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.