part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language in any form or by any means without the written permission of
Network Associates, Inc.
TRADEMARK ATTRIBUTIONS
ACTIVE SECURITY, ACTIVE SECURITY (IN KATAKANA), ACTIVEHELP, ACTIVESHIELD,
ANTIVIRUS ANYWARE AND DESIGN, BOMB SHELTER, CERTIFIED NETWORK EXPERT,
CLEAN-UP, CLEANUP WIZARD, CNX, CNX CERTIFICATION CERTIFIED NETWORK EXPERT
AND DESIGN, CYBERCOP, CYBERCOP (IN KATAKANA), CYBERMEDIA, CYBERMEDIA
UNINSTALLER, DESIGN (STYLIZED N), DISK MINDER, DISTRIBUTED SNIF FER SYSTEM,
DISTRIBUTED SNIFFER SYSTEM (IN KATAKANA), DR SOLOMON’S, DR SOLOMON’S LABEL,
ENTERPRISE SECURECAST, ENTERPRISE SECURECAST (IN KATAKANA), EZ SETUP, FIRST
AID, FORCEFIELD, GMT, GROUPSHIELD, GROUPSHIELD (IN KATAKANA), GUARD DOG,
HELPDESK, HOMEGUARD, HUNTER, ISDN TEL/SCOPE, LANGURU, LANGURU (IN
KATAKANA), M AND DESIGN, MAGIC SOLUTIONS, MAGIC SOLUTIONS (IN KATAKANA),
MAGIC UNIVERSITY, MA GICSPY, MAGICTREE, MCAFEE, MCAFEE (IN KATAKANA),
MCAFEE AND DESIGN, MULTIMEDIA CLOAKING, NET TOOLS, NET TOOLS (IN
KATAKANA), NETCRYPTO, NETOCTUPUS, NETSCAN, NETSHIELD, NETSTALKER,
NETWORK ASSOCIATES, NETXRAY, NOTESGUARD, NUTS & BOLTS, OIL CHANGE, PC
MEDIC, PC MEDIC 97, PCNOTARY, PGP, PGP (PRETTY GOOD PRIVACY), PRETTY GOOD
PRIVACY, PRIMESUPPORT, RECOVERKEY, RECOVERKEY - INTERNATIONAL, REGISTRY
WIZARD, REPORTMAGIC, RINGFENCE, ROUTER P M, SALESMAGIC, SECURECAST , SERVICE
LEVEL MANAGER, SERVICEMAGIC, SMARTDESK, SNIFFER, SNIFFER (IN HANGUL),
SNIFFMASTER, SNIFFMASTER (IN HANGUL), SNIFFMASTER (IN KATAKANA), SNIFFNET,
STALKER, SUPPORTMAGIC, TIS, TMEG, TNV, TVD, TNS, TOTAL NETWORK SECURITY,
TOTAL NETWORK VISI BILITY, TOTAL NETWORK VISIBILITY (IN KATAKAN A), TOTAL
SERVICE DESK, TOTA L VIRUS DEFENSE, TRUSTED M AIL, UNINSTALLER, VIREX, VIRUS
FORUM, VIRUSCAN, VIRU SSCAN, WEBSCAN, WEBSHI ELD, WEBSHIELD (IN KATAKANA),
WEBSNIFFER, WEBSTALK ER, WEBWALL, WHO’S WATCHING YOUR NETWORK,
WINGAUGE, YOUR E-BUSINESS DEFENDER, ZAC 2000, ZIP MANAGER are registered
McAfee Perpetual End User License Agr eement – United States of America
NOTICE TO ALL USERS: CA REFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") PRODUCED
BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN I NDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT
AGREE TO ALL OF THE TER MS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SO FTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)
1.License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the
specified version of the Software and the accompanying docume ntation (the "Documenta tion"). You may instal l
one copy of t he S oftwar e on one co mpute r, w orkst atio n, pe rsona l di gita l ass istan t, pa ger, "sma rt ph one" or ot her
electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as
a suite or bundle with more than one specified Software product, this license applies to all such specified
Software produ ct s, subject to any restri ct ions or usage terms specified on the applicable price list or product
packaging that apply to any of such Software products individually.
a.Use
b.Server-Mo de U se
c.Volume License Use
. The Software is licensed as a single product; it may not be used on more than one Client Device
or by more than one user at a time, except as set for th in th is Section 1. The Software is "in use" on a
Client Device when it is l oaded into th e temporary memory (i.e. , random-a ccess memory or RAM) or
installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client
Device. This license authorizes you to make one copy of t he Software solely for backup or archiv al
purposes, p rovided t hat th e copy yo u make co ntains all of the Sof tware' s propri etar y notice s unalt ered
and unobstructed.
. You may use the Software on a Client Device as a server ("Se rver") within a
multi-user or n et wor ke d en vi ronm ent (" Se rver -Mo de" ) on ly if s uch use is pe rmit te d i n the a p pl icab le
price list or product packaging for the Software. A separate license is required for each Client Device
or "seat" that may connect to the Server at any time, regardless of whether such licensed Client
Devices or seats are concurrently connected to, accessing or using the Sof t w are. Use of software or
hardware that reduces the numbe r of Client Devic es or seats directly accessing or utilizing th e
Software (e.g ., " m ultiplexing" or "pooling" software or hardware) d oes not reduce the number of
licenses required (i.e., the required number of licenses would equal the number of distinct inputs to
the multiple xing or pooling software or hardware " front end "). If the number of Client Devices or seats
that can conn ect to th e Soft war e can exce ed th e numbe r of li censes you ha ve obt aine d, the n you mus t
have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use
limits specified for the licenses you have obtained. This l icen se au th or iz es you t o make o r d ownlo ad
one copy of the Documentation for each Client Device or seat that is licensed, provided that each such
copy contains all of th e D ocumentation's proprietary notices una ltered and unobstruct ed.
. If the Software is licens ed with volume license terms s pecified in the applic able
product invoicing or product packaging for the Software, you may make, use and install as many
additional copies of the Software on the number of Client Devices as the volume license te rms specify.
You must have a reasona ble mechanism in place to ensure that the number of Client Devices on which
the Software has be en installed does no t ex ceed the number of licenses you have obtain ed. This
license authorizes you to make or download one copy of the Documentation for each additional copy
authorized by the volume license, provided that each su ch copy contains all o f t he D ocumentation' s
proprietary noti ce s unaltered and unobst ructed.
Product Guideiii
2.Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other
requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the
Software and destroy all copies of the Software an d the Documentat ion.
3.Updates. For the time period specified in the applicable product invoicing or product packaging for the
Software, you are entitled to download revisions or updates to the Software when and as Mc Afee publishes t hem
via its elect ronic bullet in boar d syste m, websi te or t hrough o ther on line ser vices. For a pe riod of ninety (90) days
from the date of the of original purchase of the Software, you are entitled to download one (1) revision or upgrade
to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through
other online services. After the specified time period, you have no further rights to receive any revisions or
upgrades with out purchase of a new lic ense to the Software .
4.Ownership Ri ghts. The Software is protected by U ni t ed St ates copyright laws and international treaty
provisions. McAfee and its suppliers o wn and retain all right, title and intere st in and to the Software, in cludin g
all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your
possession, installatio n, or us e of the Software does not trans fer to you any title to the in tellectual p roperty in the
Software, and you will not acquire any rights to the Software e xcept as e xpressly s et for th in thi s Agreement. All
copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear
on and in the Softw ar e and Documentati on.
5.Restrictions. You may not sell, lease, license, rent, lo an or otherwise transf er, with or without consid eration, the
Software. Mc A fee updates its Soft ware frequently and performance dat a for its Software change. Before
conducting be nchmark tests rega rding this Softwa re, contact McAfe e to verify that You possess the correct
Software for the test and the then current version and editio n of the Software . You agree not to permit any third
party (other than t hi rd parties under contract with You whic h contains nondiscl os u r e obligations no less
restrictive than thos e set forth herein) to use the Licensed Pro gram in any form and sha ll use all reasonab le efforts
to ensure that no im p r oper or unauthorize d use of the Licensed Prog r am is made. You may no t p ermit third
parties to benefit from the use or functionality of the Software via a timesharing, service bureau or other
arrangement, except to the extent such use is specified in the applicable list price or product packaging for the
Software. You m ay not transfer any of th e ri ghts granted to you under this Agreement. You may not re ver se
engineer, decompile, or disassemble the Software, except to the extent the forego in g restriction is ex pr essly
prohibited by applicable law. You may not mo dify, or crea te derivative wo rks based upon, the Software in whole
or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above.
You may not rem ove any proprieta ry notices or labels on the Software. All ri ghts not expressly set forth
hereunder are res erved by McAfee.
6.Warranty and Disclaimer.
a.Limited Warranty
. McAfee warrants that for sixty (60) days from the date of original purchase the
media (e.g., diskettes) on which the Software is contained will be free from defects in materials and
workmanship.
b.Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any
breach of the fo regoing warranty s hall be, at McAfee' s option, either (i) return of the purchase price
paid for the license, if any, or (ii) replacement of the defective media in which the Software is
contained. You m us t r et ur n the defective media to M cAfee at your expense w ith a copy of your
receipt. This limited war ranty is void if the defect has resu lted from accident , abuse, or misapp lication.
Any replacement media will be warran te d for the remainder of the original warranty period. Outside
the United States, this remedy is not available to the extent McAfee is subject to restrictions under
United States export control laws and regulations.
ivMcAfee Internet Security 5.0
c.Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW,
MCAFEE DISCLAIMS ALL WARRANTIES, EI THER EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE
AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR
SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE
INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE.
WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY
THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR
OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME
STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED
WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing
provisions shall be enforceable to the maximum extent permitted by applicable law.
7.Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU
OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL
OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN
EXCESS OF THE LIST PRICE MCAFEE CHAR GES FOR A LICENSE TO THE SOFTWARE, EVEN IF
MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS
LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL
INJURY TO THE EXTENT THAT APPLICABLE LAW PROHI BITS SUCH LIMITATION.
FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND
EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum
extent permitted by applic able law.
8.United States Government. Th e Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR
Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release,
performance, di splay or disclosure of the Software an d accompanying Do cumentation by th e U ni t ed States
Government shall be govern ed solely b y the ter ms of this Agreement and shall b e prohibite d except t o the ex tent
expressly permitted by the terms of this Agreement.
9.Export Controls. You are advised that the Software is subject to the U.S. Export Administration Regulations.
You shall not exp ort, import or transfer Software cont rary to U.S. or other applicable laws, w hether directly or
indirectly, and will not cause, app ro ve or otherwise facilitate others such as agen ts o r any th ird parties in doing
so. You represen t and agrees that neit her the United States Bureau of Export A dministration nor any other
federal agency has suspended, revoked or denied your export privileges. You agree not to use or transfer the
Software for end use relating to an y nuclear, chemical or biological weapons, or missile technology unless
authorized by the U.S. Government by regulation or specific license. Additionally, you acknowledge that the
Software is sub j ect to export control regulations in the E ur opean Union and you h ereby declare and agree that
the Software will not be used for any other purpose than civil (non-military) purposes. The parties agree to
cooperate w ith eac h ot he r with re spec t to any app lic at io n f or a ny req ui re d li cen ses an d ap pr ova ls, ho wev er, yo u
acknowledge it is your ultimate responsibility to comply with any and all export and import laws and that
McAfee has no further responsibility after the initial sale to you within the original country of sale.
Product Guidev
10. High Risk Activities. The Softwar e i s not fault-tolerant and is not designed o r i nt ended for use in hazardous
environments requiring fa il-safe perf ormance, including wi thout limitatio n, in the operati on of nuclear f acilities,
aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines,
or any other application in which the failure of the Software could lead directly to death, personal injury, or
severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any
express or impli ed w arranty of fitness f o r High Risk Activities .
11. Miscellaneous. This Agreement is governed by the laws of the United States and the State of California,
without reference to conflic t o f laws principles. The applicatio n of th e Unit ed Na tio ns Con v entio n of Contracts
for the International Sa le of Goods is e xpress ly exc luded. This Agree ment se ts f orth a ll rig hts for the user of the
Software and is the entire agreement between the parties. McAfee reserves the right to periodically audit you to
ensure that you are not usi ng an y Soft ware in v io lat io n of t his Agree men t. D uri ng yo ur sta ndar d bus ine ss hour s
and upon prior wr itt en notice, McAfee may visit you and you w i ll m ake available to Mc A fee or its
representatives any records perta ining to the Softwar e to McAfee. The cost of any requeste d audit will be solely
borne by McAfee, unless such aud it di scloses an underpayment or amount due to McAfee in exce ss of five
percent (5%) of the initial li cens e f ee fo r th e S of twar e or y ou ar e usin g the Software in an unauthorized manor,
in which case you shall pay the cost of the au di t. This Agreement supersedes any other communications w ith
respect to the Software and Documentation. This Agreement may not be modified except by a written addendum
issued by a duly authorized representative of McAfee. No provision hereof shall be deemed waived unless such
waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision
of this Agreement is held invalid, the remainder of this Agreement shall continue in full force and effect. The
parties c onfirm th a t it is their wish that this Agreement has been writ ten in the English language on ly.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write:
Network Associ ates, Inc., McAfee Software Division, 3 965 Freedom Circle, Santa Clara, Califo rn ia 95054.
http://www.nai.com.
viMcAfee Internet Security 5.0
McAfee Perpetual End User License Agr eement – Canada
NOTICE TO ALL USERS: CA REFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK
ASSOCIATES INTERNATIONAL B.V. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN I NDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT
AGREE TO ALL OF THE TER MS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SO FTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)
1.License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of
this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the
specified version of the Software and the accompanying docume ntation (the "Documenta tion"). You may instal l
one copy of t he S oftwar e on one co mpute r, w orkst atio n, pe rsona l di gita l ass istan t, pa ger, "sma rt ph one" or ot her
electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as
a suite or bundle with more than one specified Software product, this license applies to all such specified
Software produ ct s, subject to any restri ct ions or usage terms specified on the applicable price list or product
packaging that apply to any of such Software products individually which you acknowledge you have received
and read.
a.Use
b.Server-Mo de U se
. The Software is licensed as a single product; it may not be used on more than one Client Device
or by more than one user at a time, except as set for th in th is Section 1. The Software is "in use" on a
Client Device when it is l oaded into th e temporary memory (i.e. , random-a ccess memory or RAM) or
installed into the permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that Client
Device. This license authorizes you to make one copy of t he Software solely for backup or archiv al
purposes, p rovided t hat th e copy yo u make co ntains all of the Sof tware' s propri etar y notice s unalt ered
and unobstructed.
. You may use the Software on a Client Device as a server ("Se rver") within a
multi-user or n et wor ke d en vi ronm ent (" Se rver -Mo de" ) on ly if s uch use is pe rmit te d i n the a p pl icab le
price list or prod uc t p ack ag in g f or t he S of twar e w hic h y ou a ck now le dge y o u hav e r ec eive d and r ea d.
A separate licens e is required for each Client Device or "s eat" that may connect to the Server at any
time, regardless of whether such licensed Client Devices or seats are concurrently connected to,
accessing or using t he Software. Use of software or hardware th at reduces the number of Client
Devices or seats directly accessing or utilizing the Software (e.g., "multiplexing" or "pooling"
software or hardware) does not reduce the number of licens es required (i.e., the required number of
licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware
"front end"). If the number of Client Devices or seats that can connect to the Software can exceed the
number of lice nses yo u have obt ained, then you m ust have a reasona ble mecha nism in pl ace to ensure
that your use of the Software does not exceed the use limits specified for the licenses you have
obtained. This license authorizes you to make or download one copy of the Documentation for each
Client Devi ce or sea t that i s licensed , provi ded that each such c opy cont ains all of the Doc umentati on's
proprietary noti ce s unaltered and unobst ructed.
Product Guidevii
c.Volume License Use. If the Software is licensed with volume lic ense terms specified in t he applicable
price list or product packaging for the Software, you may make, use and install as many additional
copies of the Softw ar e on the number of Client D evices as the volume license authorizes. Y ou must
have a reasonable mechanism in place to ensure that t he number of Clien t Devices on which the
Software has been installed does not exceed the number of licenses you have obtained. This license
authorizes you to m ake or download one co py of the Documentation for each additional copy
authorized by th e volume license, provided that each su ch copy contains all o f t he D ocumentation' s
proprietary notices unaltered and unobstructed.
2.Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as set forth
herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other
requirements described herein. Upon any termination or expiration of this Agreement, you must cease use of the
Software and destroy all copies of the Software an d the Documentat ion.
3.Updates. For th e time period specified in the applicable price list or prod uct packaging for the Software, you are
entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic
bulletin board system, website or through other online services. For a period of ninety (90) days from the date
of the of origina l pu rchase of the Software, you are entitled to download one (1) revision or upgrade to the
Software whe n and as McAfee publi shes it via its electro nic bulletin board system, websit e or through other
online services. After the specified time period, you have no further rights to receive any revisions or upgrades
without purchase of a new license to the Software.
4.Ownership Ri ghts. The Software is protected by Uni t ed St ates copyright laws and international treaty
provisions. McAfee and its suppliers o wn and retain all right, title and intere st in and to the Software, in cludin g
all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your
possession, installatio n, or us e of the Software does not trans fer to you any title to the in tellectual p roperty in the
Software, and you will not acquire any rights to the Software e xcept as e xpressly s et for th in thi s Agreement. All
copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear
on and in the Softw ar e and Documentati on.
5.Restrictions. You may not sell, leas e, license, rent, lo an or otherwise transf er, with or without consid eration, the
Software. Mc A fee updates its Soft ware frequently and performance dat a for its Software change. Before
conducting be nchmark tests rega rding this Softwa re, contact McAfe e to verify that You possess the correct
Software for the test and the then current version and edition of the Software. Benchmark tests of former,
outdated or inappropriate versions or editions of the Software may yield results that are not reflective of the
performance of the current version o r edition of the Software. You agree not to permit any thir d party (other than
third parties under contract with you which contract contains nondisclosure obligations no less restrictive than
those set forth herein) to use the Software in any form and shall use all reasonable efforts to ensure that there is
no improper or un aut horized use of the Sof tware. You may not per m it third parties to benefit from the use or
functionalit y of the Software via a timesharing, service bureau o r other arrangement, except to the extent such
use is specified in th e applicable list pri ce or product packag in g for the Software. Y ou m ay not transfer any of
the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the
Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. The interface
information necessary to achieve interopera bility of the Software with indep endently created comp uter programs
will be supplied by McAfee on reque st and on payment of suc h reasonable costs and expenses of McAfee in
supplying th at i nfor mat i on. Yo u ma y not m odif y, or cre a te de ri vati ve work s ba sed up on, th e Sof twar e in whol e
or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above.
You may not remove or alter any proprietary notices or labels o n the Softwa re or Documen tation . All righ ts not
expressly set fo rth hereunder are reserved by McA f ee.
6.Warranty and Disclaimer.
viiiMcAfee Internet Security 5.0
a.Limi ted Warranty. McAfee warrants that for sixty (60) days from the date of original purchase the
media (e.g., diskettes) on which the Software is contained will be free from defects in materials and
workmanship.
b.Customer Remedies
. McAfee's and its suppliers' entire liability and your exclusive remedy for any
breach of the fo regoing warranty s hall be, at McAfee' s option, either (i) re t urn of the purchase price
paid for the license, if any, or (ii) replacement of the defective media in which the Software is
contained. You m us t r et ur n the defective media to M cAfee at your expense w ith a copy of your
receipt. This limited war ranty is void if the defect has resu lted from acciden t, abuse, or misapp lication.
Any replacement media will be warran te d for the remainder of the original warranty period. Outside
the United States, this remedy is not available to the extent McAfee is subject to restrictions under
United States export control laws and regulations.
c.Warranty Disclaimer
. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW,
MCAFEE DISCLAIMS ALL WARRANTIES, REPRESENATIONS AND CONDITIONS,
EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LI M ITED TO IMP LI ED
WARRANTIES OR CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE
ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING
THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE
INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE.
WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY,
REPRESENTATION OR CONDITION THAT THE SOFTWARE WILL BE ERROR-FRE E OR
FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL
MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW
LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT
APPLY TO YOU.
7.Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU
OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL
OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN
EXCESS OF THE LIST PRICE MCAFEE CHAR GES FOR A LICENSE TO THE SOFTWARE, EVEN IF
MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS
LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL
INJURY TO THE EXTENT THAT APPLICABLE LAW PROHI BITS SUCH LIMITATION.
FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND
EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum
extent permitted by applic able law.
8.United States Government. The Software and accompanying Documentation are deemed to be "commercial
computer software" and "commercial computer software documentation," respectively, pursuant to DFAR
Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release,
performance, di splay or disclosure of the Software an d accompanying Do cumentation by th e U ni t ed States
Government shall be govern ed solely b y the ter ms of this Agreement and shall b e prohibite d except t o the ex tent
expressly permitted by the terms of this Agreement.
Product Guideix
9.Export Controls. You have been advised that the Software is subject to the U. S. Export Administrat ion
Regulations and applicable loca l export contro l laws. Yo u shall not export, import or trans fer Pro ducts con trary
to U.S. or other applicable local laws , whether directly or indirectly, and will not cause, approve or otherwise
facilitate others such a s agen ts or an y third par ties i n doing s o. If appl icable to you, you re present a nd agr ee that
neither the Uni ted S tates Bureau of Expo rt Admi nistr atio n nor any other fe dera l agenc y has suspend ed, r evoked
or denied your export privileges. You agree not to use or transfer the Software for end use relating to any nuclear,
chemical or biological weapons, or missile technology unless authorized by the U.S. Government and any other
applicable local authority by regula tion or specifi c license. Additionall y, you acknowledge tha t the Software is
subject to exp ort cont rol reg ul at ion s in t he Eur ope an Unio n an d you he reb y de cl are an d ag ree t hat the Sof twar e
will not be used for any other purpose than civil (non-military) purposes. The parties agree to cooperate with
each other with respect to any application for any required licenses and approvals, however, you acknowledge it
is your ultimate responsibi lity to comply with any and all e xport and import laws and that McAfee has no furthe r
responsibility after the initial sale to you within the original country of sale.
10. High Risk Activities. The Software is not fault-tolerant and is not designed o r i nt ended for use in hazardous
environments requiring fa il-safe perf ormance, including wi thout limitatio n, in the operati on of nuclear f acilities,
aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines,
or any other application in which the failure of the Software could lead directly to death, personal injury, or
severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any
express or implied warranty or condition of fitness for High Risk Activities.
11. Miscellaneous. This Agreement is governed by the la w s o f t he N etherlands. The app lication of the United
Nations Conven tion of Contract s for the In ternation al Sale of Goods is ex pressly ex cluded. D isputes wi th respe ct
to this Agreement, as well as with respect to its conclusion and execution, will be submitted exclusively to the
competent court in Amsterdam. This Agreement s ets forth al l rights for the user of the Soft ware and is the ent ire
agreement between the parties. McAfee reserves the right to periodically audit you to ensure that you are not
using any Software in violation of this Agreement. Durin g your standard business hours an d up on pr io r written
notice, McAfee may visit you and yo u w i ll m ake available to McAfee or its represe nt at ives any records
pertaining to the Software to McAf ee. The cost of any req ues ted audit will be solely borne by McAfee, unless
such audit discloses an underpayment or amount due to McAfee in excess of five percent (5%) of the initial
license fee for the Software or you are using the Software in an unauthorized manor, in which case you shall pay
the cost of the audit. This Agreement supersedes any other communications with respect to the Software and
Documentation. This Agreement may n ot be modified except by a writt en addendum issued by a duly authori zed
representative of McAfee. No pr ovi s ion hereof shall be deemed waived un le ss such waiver shall be in writing
and signed by McA fee or a d uly auth orize d rep rese ntati ve o f McAf ee. I f an y pr ovis ion of thi s Ag reeme nt is hel d
invalid, the remainder of this Agreement shall continue in full force and effect. The parties have required that
this Agreement and all documents relating thereto be drawn up in English. Les parties ont demandé que cette
convention ainsi que tous les doc um ents que s'y attachent soient rédigés en anglais.
12. MCAFEE CUSTOMER CONTACT. If you have any questions concerning these terms and conditions, or if
you would like to contact McAfee for any other reason, pl ease call +31 20 586 61 00 or write: McAfee,
Gatwickstraat 25, 1043 GL Amsterdam, Netherlands. You will find our In ternet web-site at http:// www.nai.com.
The Internet provides a vast wealth of information and entertainment at your
fingertips. Yet, as soon as you connect, your computer is exposed to a
multitude of privacy and security threats. Protect your privacy and secure
your computer and your data with McAfee Internet Security. Incorporating
McAfee's award-winning technologies, McAfee Internet Security provides
one of the most comprehensive sets of privacy and security tools you can buy.
McAfee Internet Security destroys viruses, outwits hackers, secures your
personal information, privatizes your Web browsing, blocks ads and pop ups,
manages your cookies and pass words, locks down your files, folde rs and
drives, filters objectionable content, and puts you in control of the
communications in and out of your PC. McAfee Internet Security provides
powerful protection for today's Int e rnet users.
Introduction
In the last few years the Inter net has changed from a communications network
that government entities and universities used almost exclusively, to an
information treasure house that people of all ages and occupations can now
access. With an Internet account, you can send electronic mail (e-mail) around
the world in seconds, do research without leaving home, meet new friends in
an online chat room, or shop without getting out of your bathrobe. However,
with all these conveniences come a certain element of risk. When you use the
Internet, information is transmitted from your computer to other computers
on the Internet – information you may not want other people to have. And
those computers can also send files to your computer that may contain viruses.
While most of these files are harmless, some can invade your privacy or even
damage the data on your computer’s hard drive.
1
McAfee Internet Security addresses any of these potential risks with its
comprehensive features designed to protect your privacy and security when
using the Internet.
With its new features, you can now also act as an Administrator and apply
customized protection settings not only for yourself, but for other users of
your computer and easily monitor potential risks they may encounter while
browsing the Internet.
Product Guide15
Welcome to McAfee Internet Security 5.0
What’s included with McAfee Internet Security?
nThe Administrator: As the Administrator, you are able to set up
protection settings for other users of your computer. You can add, edit
and delete a user’s profile—then setup individual privacy, security and
Internet filtering options that McAfee Internet Security will apply
whenever any of these users are browsing the Web through your
computer.
nActivity Logs: Activity Logs allow you to view a list of all the
interactions that you and other profiled users of your com puter had with
McAfee Internet Security, including the date and time of the activity.
You can print, save or clear this list.
nSecurity Check: You can run an extensive check of your computer for
any privacy or security problems via this feature. After McAfee Internet
Security performs the check, it displays any problem found, provides
additional information about the problem, and guides you through on
how to solve the problem.
nVirusScan: McAfee Internet Security uses McAfee VirusS can to a ddress
virus-related problems you may encounter through the Internet. This
feature allows you to set how to perform a virus scan operation on your
computer; what to do if a virus is found; and how it should alert you
once the virus is detected. You can also direct VirusScan to keep a record
of actions performed on your computer.
nFirewall: McAfee Internet Security incorporates McAfee Firewall to
protect your computer while it is connected to the Internet. McAfee
Firewall is a highly-flexible, easy-to-use program. Whether you are
connected to the Internet via DSL, cable modem or standard dial-up,
Internet communication in to and out of your PC is secure.
nQuickClean Lite: Remove unnecessary files using QuickClean Lite. The
QuickClean Lite wizard enables you to clean your computer of
unnecessary f iles and free valuable hard disk spa c e.
nShredder: For privacy and security reasons, you may want to be positive
that the information stored in files you delete is permanently erased
from your computer. Shredder does this for you by “security wiping”
deleted files so they cannot be restored or rebuilt using an “undelete”
type of utility.
16McAfee Internet Secu rity 5.0
What’s new in this release?
This release of McAfee Internet Security includes the following new features
and functional enhancements.
nIncludes VirusScan Home Edition 7 - Includes the latest version of the
award winning VirusScan anti-virus software to protect your system
from viruses, Trojans, Internet wo rms, harmful scripts, and other
malware. With automated updates and exclusive H.A.W.K. (Hostile
Activity Watch Kernel) pr otections, Vi rusScan keeps y o ur computing
free of even the latest threats.
nIncludes McAfee Firewall 4 - Includes the latest version of McAfee
Firewall. McAfee Firewall enables you to control the communications in
and out of your PC and helps keep hackers at bay. With powerful
Application Control, Intrusion Detection, and easy Home Networking
and Custom Rule Creation Wizards, McAfee Firewall provides essential
security for your Internet connection.
nSpyware/Adware Protection - Helps enhance your privacy by rooting
out snooper programs that attempt to track your Web surfing habits.
Now you can easily find and shut down these tracking programs that
often piggyback on popular freeware utilities and games.
nExtended Stealth Program Protect ion - Helps keep your PC free of
hidden key loggers that try to capture and steal your passwords and a
whole host of even more insidious programs that may be watching and
recording everything you do on your PC. Adds an essential layer of
protection against this growing threat to your privacy and security.
Welcome to McAfee Internet Security 5.0
nPop-Up Bloc ker - Puts an end to thos e p esky a nd annoying p o p- up ad s
so prevalent on the Internet. Now you'll be able to surf the Internet
without these and other ads getting in your way and slowing you down.
nAllow/Block Applications Per User - Lets you to control which
applications are available to different family members. Parents can
readily use installed programs while blocking access to younger family
members, protecting the family PC while restricting access to
questionab le material.
nFiltering of Usenet Newsgroups - Usenet is said to exemplify the best
and worst of the Internet. Now you can take charge of which
newsgroups and content various family members might be exposed to
and filter out objectionable material while retaining access to the wealth
of information Usenet provides.
nMRU Cleaner - Deletes the telltale trail left behind the files you've
opened and viewed recently. Enhances your privacy by clearing MRU's
(Most Recently Used) of Windows based utilities and many other
popular programs.
Product Guide17
Welcome to McAfee Internet Security 5.0
nUsability Enhancements - McAfee Internet Security 5.0 includes user
interface enhancements to make it easier than ever to protect your online
security and privacy.
About this manual
This manual provides the basic information you need to install, set up and get
started with McAfee Internet Security 5.0. More de tailed information a bout
how to perform tasks within McAfee Internet Security is provided via online
Help. You can get Help while working with the different windows and dialog
boxes.
You can also view the Readme.txt file which contains other general
information, known issues, etc., about this product.
McAfee Internet Security and your online
connection
You must have an Internet connection through a local network or a modem t o
use all McAfee Internet Security features. Some networks have an Internet
connection that you can use by connecting to the network – either directly or
through dial–up networking. Your computer mu st hav e a mod em installed if
you don’t connect through a network.
You can establish an Internet connection through an Internet Service Provider
(ISP) such as MSN, AOL, or Earthlink, etc. An ISP acts as a middleman
between you and the Internet. Your computer connects (using your modem)
to the ISP’s equipment, which in turn connects your compu ter to the Inter net.
In addition, you must also have a br owser. A browser is software, such as
Microsoft Intern et Explore r or Netscape Navigator, tha t allows y ou to view
text and graphics and download files from Web sites.
18McAfee Internet Secu rity 5.0
Welcome to McAfee Internet Security 5.0
McAfee Internet Security features
This section briefly describes other features of McAfee Internet Security that
protect you from the most common Internet threats.
Only the designated administrator or a user with administrative rights can
have access to these features which allow them to customize protection
settings for themselves and in the case of the Administrator, protection for
other profiled users of the same computer.
Protection from privacy threats
nIdentity Protector monitors your Internet connection and warns you
before private i nformation is sent to an nonsecure Internet site. It stops
programs and other people that use your computer (like your kids) from
sending your name and credit card numbers over the Internet without
your approval.
nCookie Blocker prevents Web sites from storing cookies on your hard
drive. Third-party Web sites use cookies to track your Web browsing
habits. You can choose your level of interaction with Cookie Blocker.
nWeb Trail Cleaner cleans your Web browsing trails such as cached files;
list of URLs (Uniform Resource Locator, also known as Web address)
visited; and history files—when you close your browser. This feature
prevents other users of your computer from tracking your online
movements by viewing the files and URL addresses left over from your
Internet browsing.
nReferer Filter prevents search information that you request at one Web
site from being passed along to the next site you visit. Without Referer
Filter, your browser may be allowing the transfer of your search request
information from one Web site to another.
Protection from security threat s
nGatekeeper allows you to cont rol the programs that have a ccess to your
Internet connection. Programs on your PC can be programmed to access
to the Internet without your consent.
nFile Guardian protects files that contain your sensitive data from being
opened, renamed, copied, moved, or deleted. Programs, such as ActiveX
and Java programs, can scan your PC for personal information or delete
files without your permission.
File Guardian also limits access to protected files ei ther to programs you
specify or through file encryption. It can limit the programs that can
access your tax, online banking, or personal accounting data files.
Product Guide19
Welcome to McAfee Internet Security 5.0
nPassword Manager stores your Web site login names and passwords for
protected Web sites in one secure location. When you are visiting a site
that requires this information, you can drag it from Browser Buddy to
the form displayed in your browser. No more storing your login names
and passwords in an nonsecure location, such as post-it notes on yo ur
monitor or in a text file on your Windows desktop.
nBrowser Buddy is convenient tool with a dual purpose. First, Browser
Buddy lets you view a summary of cookie activity. Just choose a Web site
that you have visited from the drop-down list. Second, Browser Buddy
gives you access to the passwords that you have stored in Password
Manager. When you log on a password-controlled Web Site, you can
drag and drop a user name and pas sword from Browser Buddy to the
appropriate box in the login form. To access Browser Buddy, right-click
the McAfee Guardian icon in the Windows system tray and click
Browser Buddy in the pop-up menu.
Protection from virus threa ts
Using McAfee VirusScan, the following features are available:
nScan to start the default virus scan task immediately, or conf igure a virus
scan task that suits your ne eds.
nScheduler to launch the McAfee VirusScan Scheduler. This utility
enables you to configure and run unattended virus scan operations.
nVirus info to display virus information via the McAfee Web site.
Safeguard your computer against intrusions and attacks
Protect yourself while online with the advanced security of McAfee Firewall.
Easy-to-use, yet highly secure, McAfee Firewall safeguards your PC's
connection to the Internet whether you connect via DSL, cable modem, or
dial-up. McAfee Firewall gives you t he powerful tools you need to control the
communications into and out of your PC.
20McAfee Internet Secu rity 5.0
Installing McAfee Internet Security
Before you begin
McAfee distributes McAfee Internet Security 5.0 in two formats:
1As an archived file that you can download from the McAfee web site.
2On CD-ROM.
Although the method you use to transfer files from an archive obtained via
download differs from the method you us e to transfer files from a CD that is
placed in your CD-ROM drive, the installation steps followed after that a re the
same for both distribution types. Review the system requirements shown
below to verify that this software will run on your computer.
System requirements
To install this product, you require the following:
Desktop and notebook computers
nWindows 98, Windows Me, Windows 2000 Professional, W indows XP
Home Edition, or Windows XP Professional.
2
nInternet Explorer 4.01, Service Pack 2 or higher required for Windows
NT; IE 5.01 or later recommended.
n71 megabytes (MB) of hard disk space.
n32 MB of RAM.
nAn Intel Pentium-class or compatible processor rated at 100 MHz or
higher.
nCD-ROM drive.
nInternet access for product updating.
Additional requirements for wireless devices
McAfee Internet Security includes the latest version of McAfee VirusScan
software. In order to fully protect your wireless device from viruses, trojans,
and worms, etc., your wireless device requires the following:
Product Guide21
Installing McAfee Internet Security
Palm OS and Palm requirements
McAfee VirusScan for Palm Desktop with HotSync Manager 3.0 will install
and run on any IBM PC or PC-compatible computer equipped with Palm
Desktop 3.0 or later. The latest version of Palm Desktop and HotSync 3.0 is a
free download from Palm's site (at www.palm.com). The device-resident
portion is quite simple and should work on any device with the Palm OS.
Windows CE or Pocket PC System requirements
McAfee VirusScan for Windows CE or Pocket PC will install and run on any
IBM PC or PC-compatible computer equipped with ActiveSync 3.0 or later.
Any CE device with ActiveSync 3 will function properly.
Symbian EPOC System requirements
McAfee VirusScan for Symbian’s EPOC will install and run on any IBM PC or
PC-compatible computer equipped with PsiWin 2.3 (or equivalent for
non-Psion EPOC devices. All EPOC devices should ship with PsiWin 2.3
/EPOC Connect 5. These include:
nPsion Revo
nPsion Series 5mx
nPsion Series 7
nPsion netBook
nOregon Scientific Osaris
nEricsson MC218
nEricsson R380
If you have an older device but the current PsiWin/EPOC Connect software,
McAfee VirusScan for Symbian’s EPOC will function properly, including the
Psion HC, the MC series, the Workabout series, all Psion Series 3 models, the
Psion Sienna, the Psion Series 5, the Geofox One, and the Phillips Illium.
If you do not have PsiWin 2.3, Symbian offers a free product called EPOC
Connect Lite which also works.
22McAfee Internet Secu rity 5.0
Installation steps
After inserting the McAfee Internet Security 5.0 installation CD into your
computer’s CD-ROM drive, an Autorun image should automatically display.
To install McAfee Internet Security software immediately, click Install McAfee
Internet Security, then skip to Step 5 to continue with Setup.
Use the steps b e low to i nst al l you r sof twa re.
1If your computer runs Windows 2000 Professional, or Windows XP, log
on to your computer as a user with administrative rights. You mus t have
administrative rights to install this software.
2Insert t he McAfee I nternet Security 5.0 CD in to your computer’s
CD-ROM drive. If the Installation Wizard does not automatically
display, go to Step 3. Otherwise, skip to Step 4.
3Use the following procedure if the Autorun installation menu does not
display, or, if you obtained your software via download at a McAfee web
site.
aFrom the Windows Start menu, select Run.
bType <X>:\SETUP.EXE in the text box provided, then click OK.
Installing McAfee Internet Security
The Run dialog box displays.
4Here, <X> represents the drive letter for your CD-ROM drive or the path
to the folder that contains your extracted McAfee Firewall files. To
search for the correct files on your hard disk or CD-ROM, click Browse.
aBefore proceeding with the installation, Setup first checks to see
whether your computer has the Microsoft Windows Installer (MSI)
utility running as part of your system software. If your computer
runs Windows XP, the current version of MSI already exists on
your system. If your computer runs an earlier Windows release,
you may still have MSI in your computer if you previously installed
other software that uses MSI. In either of these cases, Setup will
display its first wizard pane l immediately. Skip to Step 5 t o
continue.
bIf Setup does not find MSI or an earlier version of MSI is installed
in your computer, it installs files necessary to continue the
installation, then prompts you to restart your computer. Click
Restart System. When your computer restarts, Setup will continue
from where it left off.
5Refer to steps displayed on the Installation Wizard to complete your
installation.
Product Guide23
Installing McAfee Internet Security
NOTE
If your computer does not have the required fonts to view the End
User’s License Agreement (EULA), then you may locate the
appropriate EULA on your McAf ee software installation CD. You
must read and agree to the terms of the agreement to complete your
installation.
Troubleshooting installation problems
A failed installation can cause software problems that are difficult to track
down. The major causes of installation failure are:
nAttempting to install while other software is running.
nTemporary files that conflict with the installation.
nHard drive errors.
Follow the procedure outlined below to minimize the affect that these
common conditions may have on your installation.
Step 1: Close other software
Disable all software running in the background:
1Hold down the Ctrl and Alt keys on your keyboard, and then press the
Delete key once. The Close Program dialog box appears.
2Click End Task for every item on the list except Explorer.
3Repeat steps 2 and 3 until you’ve closed everything except Explorer.
4When you see only Explorer in the Close Program dialog box, click
Cancel.
Step 2: Remove t empor ary f iles
Delete the contents of the Windows Temp folder:
1Double-click the My Computer icon on your desktop. The My Compute r
window opens. Double-click the C: drive. You are now viewing the
contents of your hard drive.
2Double-click the Windows folder.
3In the Windows folder, double-click the Temp folder.
4In the menu, click Edit, then click Select All. All of the items in your
Temp folder are highlighted.
5Press the Delete key on your keyboard to delete the files. If Windows
asks about deleting files, click Yes.
24McAfee Internet Secu rity 5.0
Installing McAfee Internet Security
6In the Windows taskbar, click Start, then click Shut Down.
7Click Restart the computer, then click Yes in the Shut Down Windows
dialog box to restar t your PC.
Step 3: Clean your hard drive
Run the Windows hard drive utilities, ScanDisk and Disk Defragmenter to
identify and fix any error s on you r hard drive:
1Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click ScanDisk .
2In the ScanDisk window, select Standard and Automatically fix errors.
3Click Advanced. In the Advanced Settings dialog box, make sure the
following settings are selected:
M Only if errors found
M Replace log
M Delete
M Free
4Ignore the other options, and click OK. Click Start. ScanDisk begins
scanning your drive for errors. Depending on the size of your hard drive,
ScanDisk may take several minutes to complete its job.
5When ScanDisk is finished, close ScanDisk.
6Click Start on the Windows taskbar, point to Programs, then Accessories,
then System Tools, and click Disk Defragmenter.
7Click OK to start Disk Defragmenter. Depending on the speed of your
computer and the size of your drive, this may take several minutes to
complete.
8Close Disk Defragmenter when it has finished defragmenting your disk.
Removing or modifying your McAfee I nternet
Security installation
If your computer’s operating system is...
nWindows 2000 Professional
nWindows XP Home Edition
nWindows XP Professional Edition
Product Guide25
Installing McAfee Internet Security
... you must log on to your computer using a profile with administr ative rights.
Then do the following.
1From the Windows Control Panel, start the Add/Remove applet.
2Select McAfee Internet Security and click:
M Remove to remove McAfee Internet Security from your computer.
M Change to modify your McAfee Internet Security installation.
3Refer to steps displayed on the McAfee Internet Security Installation
Wizard to complete your changes.
Restart your computer as directed by setup.
Important information about Windows XP
migration
Upgrading your computer's operating system from any version of Windows
to Windows XP causes all McAfee products installed before migration to
become disabled after migration to Windows XP.
You will be made aware of this situation as you make your first attempt to
start a McAfee product (after migration) - you will be instructed to reinstall the
product.
As such, you will need to uninstall all McAfee products and reinstall using
your installation CD or the software obtained from McAfee via download.
26McAfee Internet Secu rity 5.0
Getting Started with McAfee
Internet Security 5.0
McAfee Internet Security is a simple program to use. In fact, this one chapter
covers the main things you need to know about using McAfee Internet
Security . You begin with answering a few questions via the Interview so that
McAfee Internet Security can effectively use its feature to protect you from
Internet threats.
3
Introduction
The McAfee Internet Security 5.0 Home page is your central entry point to
access and use all of McAfee Internet Security’s tasks, wizards, and
components. This screen displays three regions that provide you with
dynamic information about current status and navigation links to all tasks.
Product Guide27
Getting Started with McAfee Internet Security 5.0
The Title bar and Tool bar
Title bar
The Home page displays most of your standard Windows elements; that
which includes:
nThe title bar displays the name of the program that is currently running.
nClose and minimize buttons. McAfee Internet Security 5.0’s interface is
of fixed length and width. You cannot resize the interface.
Tool bar
The tool bar displays four browser-like buttons that are common to all screens.
nBack. Click Back to return to the last screen viewed.
nHome. Click Home to go to the McAfee Internet Security Home page
from any screen.
nNext. In conjunction with the Back button, use Next to go to any
previously viewed screen during your current session.
nHelp. Click Help to view its submenu. The Help submenu may include
any of the following items.
Help submenu itemSelect this item to...
Help on this pagew View online Help for the screen you are currently
Contents and index
Help on the Web
McAfee at Home on the
Web
About McAfee Internet
Security
Status information
Depending upon your configuration, the McAfee Internet Security 5.0 Home
page displays other helpful information such as:
nThe name or user name of the person currently logged in represented by
Welcome (name)...
nRunning status:
28McAfee Internet Secu rity 5.0
viewing.
w View online Help for McAfee Internet Security.
w Start your Internet browser and go directly to the
McAfee Help Web site at McAfeeHelp.com.
w Start your Internet browser and go directly to
McAfee-at-home.com.
w Version information about McAfee Internet
Security.
Getting Started with McAfee Internet Security 5.0
M If McAfee Internet Security is not running displays, click Start
McAfee Internet Security to start the program.
M If McAfee Internet Security is running displays, click Stop McAfee
Internet Security to stop the program.
nUpdate status:
M If McAfee Internet Security is up-to-date displays, you are using
the most current version of McAfee Internet Security 5.0.
M If Check for an update displays, click Download update to start
McAfee Instant Updater and check for an update to McAfee
Internet Security 5.0.
nNumber of warnings logged.
M If one or more warnings were logged and not reviewed, click View
warnings to start the Activity log page.
M For more information about Activity logs, please refer to online
Help.
McAfee Firewall st atu s
In order to view McAfee Firewall status information, you must first activate
McAfee Firewall. Activation requires that you perform a few preliminary
configuration steps; the Firewall Configuration Assistant guides you through
this process.
About Tasks
If the Network Traffic monitor does not display on the McAfee Internet
Security home page, click Activate McAfee Firewall to start the McAfee
Firewall Configuration Assistant.
For more information about the Network Traffic monitor or the McAfee
Firewall Configuration assistant, please refer to McAfee Firewallon page 75.
The Task pane displays links that allow you to start McAfee Internet Securi ty’s Tasks. Depending upon your configuration, the Task pane displays McAfee,
links that allow you start the Home page for any other current McAfee
product that you have installed in your computer.
Starting a task is as easy as clicking its link. The Task list allows you to start
McAfee Internet Security’s major components. Although the tasks you can
perform will vary based upon your computer’s operating system and its
configuration, primary tasks include:
Change user settings
Select this task to perform the following:
Product Guide29
Getting Started with McAfee Internet Security 5.0
nAdd or remove a user.
nChange a user or the Administrator’s settings.
The User Setting s pr operties sheet
The User Settings property sheet allows the Administrator to configure their
own personal settings or any other us er’s settings. Self-administrating users
can only change their personal settings.
There are four tabs on the user settings property s heet Each tab allows you t o
configure settings - grouped by their classification.
nPrivacy settings:
Click the Privacy Settings tab to configure your Internet privacy level.
For example, you can filter Cookies, Web bugs and block annoying ads
and pop up windows encountered while browsing th e Internet.
You can also configure Web Trail cleaner to remove records stored on
your computer that were created as you used the Internet. Records of
this type include Temporary Internet Files and historical records such as
URLs visited, created by your Internet browser.
The Privacy settings sheet allows you to protec t personal information
about each user that you want to protect from prying eyes and programs
while browsing the Internet.
nSecurity Settings:
Click the Security Setting tab to monitor your Internet connection and
safeguard your computer against suspicious and potential malicious
activities. Additionally, you can configure McAfee Internet Security to
alert you if you visit harmful Web sites; or if a program in your computer
attempt to access th e Internet without your knowl edge.
nFrom this page of the Change User Settings property sheet, you can
setup File Guardian to protect files, folders, programs, and drives from
unauthorized a ccess.
nUser Preferences:
The User Preferences tab on the Change User Settings property sheet
enables all users to configure how McAfee Internet Security responds to
particular events. Here you configure how McAfee Internet
Security starts, ho w it should alert you, and manage user passwords.
30McAfee Internet Secu rity 5.0
Loading...
+ 98 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.