Mcafee QUICKCLEAN 1.0 User Manual

McAfee QuickClean

User’s Guide
Version 1.0
COPYRIGHT
Copyright (c) 1999-2000 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies.
* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, * ActiveHelp, Bomb Shelter, Build ing a W orld o f Trust , Ciph erLink, Clean -Up, Cl oaking , CNX, Compass 7 , Cybe rCop, C yberM edia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hu nter, ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp Desk Technology, Mag ic Solutions, Magi cSpy, MagicTree, Mag ic University, Magi cWin, MagicWord, McAfe e, McAfee Associates, MoneyMagic, More Power To You, Multime dia Cloaking , NetCryp to, NetOctopu s, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer, TIS, TMach, TMeg, Total Network Security, Tota l Network Visibility, Tota l Service Desk, Total Virus Defense, T-POD, Trusted Mach,Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, Web Shield, WebSniffe r, WebStalker, WebWall, and ZAC 2000 are regist ered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Gran t. Subject to the payment of the applicable license fees, and subject to the terms and
conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation"). You may install one copy of the Software on one computer, workstation, personal digital assistant, pager, "smart phone" or other electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more than one specified Software product, this license applies to all such specified Software products, subject to any restr ictions or usa ge terms specifie d on the applicab le price list or product
packaging
that apply to any of such Software product s ind ividually.
a. Use. The Software is licensed as a single product; it may not be used on more than one Client
Device or by more than one user at a time, except as set forth in this Section 1. The Software is "in use" on a Client Device when it is loaded into the temporary memory (i.e., random-access memory or RAM) or installed into the permanent memory (e.g., hard disk, CD-ROM, or other
Issued August 2000 / McAfee QuickClean v1.0
storage device) of that Client Device. This license authorizes you to make one copy of the Software solely for backup or archival purposes, provided that the copy you make contains all of the Software’s proprietary notices.
b. Server-Mode. You may use the Software on a Client Device as a server ("Server") within a
multi-user or networked environment ("Server-Mode") only if such use is permitted in the applicable price list or pr oduct packagin g for the Software. A separate li cense is required for each Client Device or "seat" that may connect to the Server at any time, regardless of whether such licensed Client Devices or seats are concurrently connected to, accessing or using the Software. Use of software or h ardware t hat reduces the num ber of Cli ent Devices or seat s directly accessing or utilizing the Software (e.g., "m ultiplexing " or "pooling" softw are or hardwar e) does not redu ce the number of licenses required (i.e., t he requir ed n umber of licens es w ould equal t he number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Softw are can exceed the numb er of licens es y ou have obtained, then you must have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use limits specified for the licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each Client Device or seat that is licensed, provided that each such copy contains all of the Documentation’s proprietary notices.(i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of licenses you have obtained, then you must have a reasonable mech anism in place to ensure that your use of the Software does not exceed the use limits spec ifie d fo r th e licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each Client Device or seat that is licensed, provided that each such copy contains all of the Documentation’s proprietary notices.
c. Volume Licenses. If the Softw are is licensed with vol ume license terms specified in the applicable
price list or product packaging for the Software, you may make, use and install as many additional copies of the Software on the number of Client Devices as the volume license authorizes. You must have a reasonabl e mechanism in place to ensure that the number of Client Devices on which the Software has been installed does not exceed the number of licenses you have obtained. This license auth orizes you to make or download one copy of t he Documentation for each additional copy authorized by t he volume license, provi ded that each such copy contains all of the Documentation’s proprietary notices.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as
set forth herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must destroy a ll copies of the Software and th e Documentation. You may ter minate this Agreement at any point by destroying all copies of the Software and the Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the
Software you are entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic bulletin board system, website or through other online services. For a period of ninety (90) days from the date of the original purchase of the Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin bo ard system, websit e or throug h other online services. Af ter the specified time period, you have n o fur th er rig ht s to rece i ve an y re v isi ons or up gr ade s wi th out p urc ha se o f a new license or annual upgrade plan to the Software.
4. Ownership Rights. The Software is protected by United States copyright laws and international
treaty provisions. McAfee and its suppliers own and retain all right, title and interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possess ion, installation , or use of the Software does not transfer to y ou any title to the intel lectual property in the Software, and yo u will not ac quire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear on and in the Software and Documentation.
Users Guide iii
5. Restrictions. You may not rent, lease, loan o r resell the Software. You may not permit
third parties to benefit from the use or functionality of the Softw are via a timesharing, service bureau or other arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You may not tran sfer any of the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. You may not modify, or create derivative works based upon, the Software in whole or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above. You may not remove any proprietary notices or labels on the Software. All rights not expressly set forth hereunder are reserved by McAfee. McAfee reserves the right to periodically conduct audits upon advance written notice to verify compliance with the terms of this Agreement.
6. Warranty and Disclaimer a. Limited Warranty. McAfee warrants that for sixty (60) days from the date of original
purchase the media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship.
b. Customer Remedies. McAfee’s and its suppliers’ entire liability and your exclusive
remedy for any breach of the foregoing warranty shall be, at McA fee’s option, either (i) return of the purchase price paid for the license, if any, or (ii) replacement of the defective media in which the Software is contained. You must return the defective media to McAfee at your expense with a copy of your receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period. Outside the United States, this remedy is not available to the extent McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE
SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMU M EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOF TWARE WILL MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
iv McAfee QuickClean
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentation are deemed to be "commercial computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section
12.212, as applicable. Any use, modification, reproduction, release, performance, display or disclosure of the Software and accompanying Documentation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement.
9. Export Controls. Neither the Software nor the Documentation and underlying information or technology may be downloaded or otherwise exported or re-exported (i) into (or to a national or resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or any other country to which the United Sta tes has embargoed go ods; or (ii) to anyon e on the United States Treasury Department’s list of Specially Designated Nations or the United States Commerce Department’ s Table of Denial O rders. By downloading or using the Software you are agreeing to the foregoing and you are certifyin g that you are not located in, under th e control of, or a na tional or resident of any such country o r on any such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING: EXPORT OF THE SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF EXPORT ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE, WHICH RESTRICT THE EXPORT AND RE-EXPORT OF CERTAIN PRODUCTS AND TECHNICAL DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER SUCH RULES AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE EXPORTED OR RE-EXPORTED, DIRECTLY OR INDIRECTLY, (A) WITHOUT ALL EXPORT OR RE-EXPORT LICENSES AND UNITED STATES OR OTHER GOVERNMENTAL APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN VIOLATION OF ANY APPLICABLE PROHIBITION AGAINST THE EXPORT OR RE-EXPORT OF ANY PART OF THE SOFTWARE.
User’s Guide v
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT THE IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS CONSISTENT AS TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING COUNTRIES ARE NOT AN EXHAUSTIVE LIST THERE MAY EXIST RESTRICTIONS ON THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM, CHINA (INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL, RUSSIA, SAUDI ARABIA, SINGAPORE, AND SOUTH KOREA. YOU ACKNOWLEDGE IT IS YOUR ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY AND ALL GOVERNMENT EXPORT AND OTHER APPLICABLE LAWS AND THAT MCAFEE HAS NO FURTHER RESPONSIBILITY AFTER THE INITIAL SALE TO YOU WITHIN THE ORIGINAL COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is n ot designed or inten ded for use in hazardous environ ments requiring fail-safe performance, including without limitation, in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control , weapons systems , direct life-support machine s, or any other application in which the failure of the Softw are could lead directly to death , personal injury, or severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any express or implied warranty of fitness for High Risk Activities.
11.Miscellaneous. This Agreement is governed by the laws of the United States and the State of California, without reference to conflict of laws principles. The application of the United Nations Convention of Con tracts for the Internation al Sale of Goo ds is expressly excluded. This Agreement sets forth all rights for the user of the Software and is the entire agreement between the parties. This Agreement supersedes any other communications with respect to the Software and Documentation. This Agreement may not be modified except by a written addendum issued by a duly authorized representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision of this Agreement is held invalid, the remainder of th is Agreement shall continue in full force and effect. The parties confirm that it is their wish that this Agreement has been written in the English language only.
12.McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would l ike to conta ct McAf ee for any oth er reason, please call ( 408) 988-3832, fax (408) 970-9 727, or write: McAfee So ftware, 3965 Freedom Circle, Santa Clara, California 95054. http://software.mcafee.com.
Statements made to you in the course of this sale are subject to the Year 2000 Information and Readiness Disclosure Act (Public Law 105-271). In the case of a dispute, this Act may reduce your legal rights regarding the use of any statements regarding Year 2000 readiness, unless otherwise specified in your contract or tariff.
vi McAfee QuickClean

Table of Contents

Chapter 1. Welcome to QuickClean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Using QuickClean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
About this manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Chapter 2. Installing QuickClean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
Installing QuickClean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
Create the SmartLinks database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Updating the SmartLinks database . . . . . . . . . . . . . . . . . . . . . . . . .12
About the Interview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Putting QuickClean to work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
About QuickClean wizards? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
About PowerClean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Changing QuickClean defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
About McAfee Guardian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Chapter 3. Freeing Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 9
Using QuickClean Lite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Keeping computer free of unnecessary files . . . . . . . . . . . . . . . . . . . . . .19
Setting up QuickClean Lite to run automatically . . . . . . . . . . . . . . . . . .19
Scheduling QuickClean Lite to run at a specific time . . . . . . . . . . . . . . .20
Using SpaceMaker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Freeing specific amount of disk space on a drive . . . . . . . . . . . . . . . . .20
Changing defaults for SpaceMaker . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Chapter 4. Managing Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Using Remove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
Getting rid of an application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
Using Transport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Making a copy of an application to rebuild on another computer . . . . .25
Rebuilding a transported application on another computer . . . . . . . . .25
Using Archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Archiving an application to be used later . . . . . . . . . . . . . . . . . . . . . . . .26
Users Guide vii
Table of Contents
Using Move . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Moving an application from one location to another . . . . . . . . . . . . . . .27
Using BackTrack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Monitoring installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Setting BackTrack Monitor to run in the background . . . . . . . . . . . . . .29
Monitoring installation of a single application . . . . . . . . . . . . . . . . . . . .29
Undoing an monitored application installation . . . . . . . . . . . . . . . . . . . .29
Chapter 5. Restoring Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Using Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Restoring an archived or backed-up application . . . . . . . . . . . . . . . . . .31
Restoring deleted files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Getting rid of backup copies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
About Activity Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Viewing what QuickClean has done . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Chapter 6. Using PowerClean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
PowerClean feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
PowerClean feature open in read-only mode . . . . . . . . . . . . . . . . . . . . .38
Working with the PowerClean feature . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Default file groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
Creating a custom group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
PowerClean command menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
Using the tab panes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
About color codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
Changing the defaults for the PowerClean feature . . . . . . . . . . . . . . . . .44
Viewing what PowerClean feature has done . . . . . . . . . . . . . . . . . . . . . .45
Appendix A. Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
How to Contact McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Customer service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Support via the web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Telephone support numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 9
Users Guide viii

1Welcome to QuickClean

QuickClean can be used for many more purposes than simply uninstalling old
applications.
For example, QuickClean can clean up junk files that have built up on your
computer as you browsed the Internet, and it can do this cleanup
automatically on a schedule that you specif y. QuickClean can also move
applications from one hard disk to another even to another computer—and
change all references to the application at the same time.
Consider the following questions for more suggestions.

Using QuickClean

Think about how you use your computer to see how useful QuickClean can be.
Do you….
Have programs that you dont use anymore, for example games that you dont play frequently?
Use the Archive wizard to create an archive of programs or games by compressing them. Then when you want to play a game again, click the old shortcut to the game and let QuickClean restore it to its original location.
1
Use the Internet? When you surf the Internet, your computer can collect megabytes of
Internet junk files. Images, plug-ins, and other files you wont need again are downloaded to your computer. QuickClean Lite can delete these files quickly and reclaim disk space.
Have a Zip QuickCleans Archive and Transport wizards can compress en tire
applications to a large removable disk. When you wa nt the applications again, you restore them to the original computer or rebuild them on a different computer without losing a ny setup information.
Perhaps more importantly, you can specify that QuickClean backups should be stored on a large removable disk to save space on your internal hard drive.
Have a new, second hard disk? Use the Move wizard to relocate applications on the new disk and free
space on the old disk without losing any setup information.
®
drive or other large-capacity removable disk drive?
User’s Guide 9
Welcome to QuickClean
Have outdated applications that you will never use again? If you have old applications that you no longer use, the Remove wizard
will remove all traces of them from your computer. Of course, if you think you might use an application again in some
circumstances, you can use the Archive wizard to create a compressed backup copy and keep shortcuts to the application on your computer so that you can restore it easily.

About this manual

This manual contains general information about using QuickClean. It does not describe step-by-step use of the QuickClean wizards.
More detailed procedural information and step-by-step information about the wizards are contained in the online help. In any dialog box, click Help for specific information about the dialog box. When using the PowerClean feature, click PowerClean Help on the Help menu.
For information on new additions to QuickClean, you can also open the Readme.txt file located in the QuickClean folder on your computer to view additional information.
10 McAfee QuickClean

2Installing QuickClean

The installation program on the QuickClean CD lets you install the program easily on your computer. Installation should start automatically when you put the CD in the CD-ROM drive. The information in the following paragraphs will help you install and start using QuickClean.

Installing QuickClean

You can install and run QuickClean if your computer is running Windows® 95 or later, or Windows NT 4.0 or later.
NOTE: To install QuickClean on Windows NT, you must be logged in as
a user who has Administrator privileges.

To install QuickClea n:

1. Insert the QuickClean CD into your CD drive. The installation wizard should start automatically. If it does not, click the
drive letter of your CD drive in Windows Explorer, and double-click the file named Setup.exe in the file list.
2
2. In the first installation wizard page, click Install QuickClean.
3. Follow the instructions in the wizard pages to choose the drive and folder where QuickClean should be installed.
After each step, click Next.
4. Click Finish in the final setup screen. By default, the Readme file appears in Notepad. If you do not want to
read the release notes in the Readme file, clear the check in the View release notes? check box before you click Finish.
User’s Guide 11
Installing QuickClean

Create the SmartLinks database

The SmartLinks database stores information about the relationship between files on your computer. It stores the names and locations of all files needed by the operating system. For each application, the SmartLinks database stores information about all of the files that the application needs to run correctly, including icons, dynamically lin ked libra rie s (D L L s) , and o ther executable files, as well as operating system files that are used by the application. This information makes the SmartLinks database a complete, cross-referenced record of how executable and system files are used on your computer.
It is this information that m akes using QuickClean quick and safe. It ensu res that applications can be moved, archived, deleted, a nd transported safely a nd completely, and it determines the files that can be safely deleted without damaging an application or the operating system.
The SmartLinks database is created when you insta ll QuickClean. Because building the database the first time can take several minutes, it is created in the background as you provide some default information in an interview wizard.
Updating the Sm artLi nks data base
After QuickClean has created the SmartLinks database for your computer, updating it takes much less time. Only records for files that have changed are updated.
QuickClean updates the SmartLinks database in the following circumstances:
Each time you start QuickClean, the old version of the database is compared with new information on your computer.
After you restore files or applications from QuickClean ba ckup copies, QuickClean records changes tha t it has just made.
After you delete or archive files or applications, Qu ickClean records changes.
After you manually select a wizard from the ma in QuickClean screen, QuickClean records changes that the wizard makes.

About the Interview

As you install QuickClean, you answer a few questions about how you use files on your computer, and whether you want to schedule some QuickClean events.
To run the interview again, click Customization Interview on the Options menu in the main QuickClean screen.
12 McAfee QuickClean
The Settings dialog box pages also let you view or change all settings that you specified in the interview. For information about using the Settings dialog box, see Changing QuickClean defaults,” on page 14.

Putting QuickClean to work

QuickClean uses safe and simple wizards to perform its major tasks. When you use an QuickClean wizard to clean up your hard disk or manage applications, at each step you see exactly what you are specifying, and you can go back to previous screens and change options if you change your mind.
Even if you are an expert computer user, QuickClean wizards can automate tasks, such as removing junk files, that would otherwise be time-consuming or error-prone.
To run a QuickClean wizard, click its button in the main QuickClean window.

About QuickClean wizards?

QuickClean wizards simplify cleaning up disk space and managing applications.
Installing QuickClean
NOTE: Wizards are designed to be easy to understand and to use. Each
wizard screen tells you what you need to know to enter information or choose options. I f you want to know more about a wizard, click Help.
By default, SpaceMaker and Remove wizards create backup copies of files before they are deleted. Although you can turn off backup creation when you run the wizard, it is a good idea to make backups. Later, when you are sure that you do not want to undo any QuickClean actions, you can delete the backup copy.
Table 2- 1. The QuickClean wizards
This wizard... Does this... QuickClean
Lite
Remove Deletes any application you specify, and removes all related
Deletes various kinds of junk files and unconnected items on various folders such as your PCs Internet Cache, Recycle Bin, Temporary Files, Shortcut and Windows Registry. QuickClean can be scheduled to run automatically at any interval you specify.
shortcuts and Registry entries.
User’s Guide 13
Installing QuickClean
Table 2-1. The QuickClean wizards (Continued)
This wizard... Does this... Archive Compresses an application into a backup file that you can
restore whenever you need it again. You can also in cl ude data files that are associated with the application, if there are any.
Move Relocates an application. Complet ely moves an applic ation
from one drive or folder to anothereven to another computerand adjust s shortcuts and Registry entries to refer to the application in its new location.
Transport Packages an application so that you can reb uild it wit h the
same option settings on another computer. You can also se lect and include data files that are associated wit h th e applic at ion .
Restore Restores deleted applications or files if backup copies were
created. You can restore an entire application, a few files from an
application, or a few mis cel lan eou s fi les, such as those deleted by Remove or SpaceMakerbut only if backup copies were created before the files were deleted.
BackTrack Monitors application installation.
Lets you undo the installation of any application if it was monitored by BackTrack.
SpaceMaker Deletes old files in specific categories until it has freed the
amount of disk space you specify.

About PowerClean

PowerClean is not a wizard. It is a feature that lets you see files on your computer, organized into categories, such as Internet Junk, Duplicate Files, Archives, Multimedia Files, and so on. The feature also displays application information that is stored in the Windo ws Registry.
If you are an experienced computer user, you can use PowerClean to manage files manu ally . I f yo u ar e i nte re ste d in t rack ing sp ecif ic fi les or fi les in spe cif ic folders, you can even create custom files groups.

Changing QuickClean defaults

As you install QuickClean, you have the chance to change some basic defaults in the Interview. Later, after QuickClean is installed, you can use the Settings dialog box to review or change all default settings.
14 McAfee QuickClean
Installing QuickClean
To see exactly what the default settings are, or to change them, click Settings on the Options menu in the main QuickClean screen. Then in the next window displayed, select any of the buttons available corresponding to the component category you want to change the default setting on or view its default settings.
NOTE: The SpaceMaker, BackTrack, and QuickClean Lite wizards and the PowerClean feature all have Settings dialog box pages where you specify their default behavior, including the age that files must be before they can be deleted.
You can change most option settings temporarily when you run a wizard, and you can open the Settings dialog box page for the wizard and make permanent changes to the default.
Table 2-2 on page 15 provides a brief description of each Settings dialog box page and tells you where to find more information.
NOTE: For information about any Settings dialog box page, click Help.
Table 2-2. Options in the Settings dialog box
Options on this page... Set this default behavior to determine...
General Which drives are tracke d by the Sm a rtLinks database,
and which files and folders are excluded from all wizard or PowerClean lists.
Click Help in the General page of the Settings dialog box for inform ation about these options.
SpaceMaker How old files must be before they can be deleted, and
which kinds of files can be deleted.
PowerClean Whether backups are cr eated for deleted files, how old
files must be before they can be deleted, and other delete protection options.
BackTrack Whether BackTracks Installation Monito r runs as you
work, which kinds of installations it monitors, and how long BackTrack archives are kept before they are deleted.
User’s Guide 15
Installing QuickClean
Table 2-2. Options in the Settings dialog box (Continued)
Options on this page... Set this default behavior to determine...
QuickClean How old files must be before they can be deleted, and
Folders The default backup, Archive, BackTrack, and

About McAfee Guardian

You use McAfee Guardian to schedule the QuickClean Lite wizard that keeps your computer free of junk files and to set up Installation Monitor so that it either does or does not run in the background as you work.
Ð TIP: If the Guardian icon does not appear in the taskbar, start Guardian
by clicking McAfee Guardian from the QuickClean menu in the Windows Start menu Programs list.
what kinds of files can be deleted.
Transport compressed file locations . Click Help in the Folders page of the Settings dialog
box for inform ation about these options.
McAfee Guardian is the program that all McAfee Software applications use to manage scheduled and as-you-work events.
16 McAfee QuickClean
Loading...
+ 36 hidden pages