Mcafee STUDENT SURVIVAL KIT 1.0 User Manual

Student Survival Kit
Getting Started
Version 1.0
COPYRIGHT
Copyright © 2000 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates , Inc.
* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Di stributed Sniffer System, Dr Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, LA NGuru, Le ading Help Des k Technolo gy, Magic Solu tions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cl oaking, NetCrypto, Net Octopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-Inter national, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer, TIS, TMach, TMeg, Total Network S ecurity, Total Network Visibility, Total Se rvice Desk, Total Virus Defense, T-P OD, Trus ted Mach, Trusted Ma il, Uninst aller, Virex, Virex- PC, Viru s Forum, ViruScan, VirusScan, VShield, WebScan, WebS hield, WebSniffer , WebSt alker WebW all, and ZAC 2000
are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND B ECOME A PARTY TO THIS AGREEMENT. IF YO U DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and
conditions of this Agreement, McAfee hereby grants to you a non-exclusive, no n-transferable right to use one copy of the specified version of the Software and the accompanying d ocumentation (the "Documentation"). You may install one copy of the Software on one computer, workstation, personal digital assistant, pager, "smart phone" or other electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more than one specified Software product, this license applies to all such specified Software products, subject to any restrictions or usage terms specified on the applicable price list or p roduct packaging that apply to any of such Software products individually.
Issued May 2000/ McA fee Student Survival Kit v1.0
(i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the nu mber of licens es you have obtained, then you must have a reasonable mechanism in place to en sure that you r use of the Software does not exceed the use limits specified for the licens es you h ave obtained . This licen se authorizes you to make or download one copy of the Documentation for each Client Device or seat that is licensed, provided that each such copy contains all of the Documentation's proprietary notices.
c. Volume Licenses. If the Software is licensed with volume license terms specified in the
applicable price list or product packaging for the Software, you may make, use and install as many additional copies of the Software on the number of Client Devices as the volume license authorizes. You must have a reasonable mechanism in place to ensure that the number of Client Devices on which the Software has been installed does not exceed the number of licenses you have obtained. This license authori zes you to make or downl oad one copy of the Document ation for each additional copy authorized by the volume license, provided that each such copy contains all of the Documentation's proprietary notices.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as
set forth herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must destroy all copies of the Software and the Documentation. You may terminate this Agreement at any point by destroying all copies of the Software and the Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the
Software you are entitled to download revisions or updates to the Software when and as McAfee publishes them via its electronic bulletin board system, website or through other online services. For a period of ninety (90) days from the date of the original purchase of the Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through other online services. After the specified time period, you have no further rights to receive any revisions or upgrades without purchase of a new license or annual upgrade plan to the Software.
4. Ownership Rights. The Software is protected by United States copyright laws and international
treaty provisions. McAfee and its suppliers own and retain all right, title an d interest in and to the Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual property rights therein. Your possession, installation, or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software and Documentation made hereund er must contain the s ame proprietar y notices that appear o n and in the Software and Documentation.
Getting Started iii
5. Restrictions. You may not rent, lease, loan or resell the Software. You may not permit third parties
to benefit from the use or functionality of the Software via a timesharing, service bureau or other arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You may not transfer any of the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the extent the foregoing restriction is expres s ly prohibited by applicabl e law . Y ou may n ot mo di fy, or create derivative works based upon, the Software in whole or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above. You may not remove any proprietary notices or labels on the Software. All rights not expressly set forth hereunder are reserved by McAfee. McAfee reserves the right to periodically conduct audits upon advance written notice to verify compliance with the terms of this Agreement.
6. Warranty and Disclaimer a. Limited Warranty. McAfee warrants that for sixty (60) day s from the date of origi nal purchase
the media (e.g., diskettes) on which the Software is contained will be free from defects in materials and workmanship.
b. Customer Remedies. McAfee's and its suppliers' entire liability and your exclusive remedy for
any breach of the foregoing warranty shall be, at McAfee's option, either (i) return of the purchase price paid for the license, if any, or (ii) repl acement of the defective med ia in which the Software is contained. You must return the defective media to McAfee at your expense with a copy of your receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period. Outside the United St ates, this remedy is not av ailable to the extent McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
iv Student Survival Kit
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIER S BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES. IN NO EVENT WILL MCAFEE BE L IABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICE NSE TO THE SOFTW ARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentation are deemed to be "commercial computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release, performance, display or disclosure of the Software and accompanying Documentation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement.
9. Export Controls. Neither the Software nor the Documentation and underlying information or technology may be downloaded or otherwise exported or re-exported (i) into (or to a national or resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or any other country to which the United States has embargoed goods; or (ii) to anyone on the United States Treasury Department's list of Specially Designated Nations or the United States Commerce Department's Table of Denial Orders. By downloading or using the Software you are agreeing to the foregoing and you are certifying that you are not located in, under the control of, or a national or resident of any such country or on any such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING: EXPORT OF THE SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF EXPOR T ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE, WHICH RESTRICT THE EXPORT AND RE-EXPORT OF CERTAIN PRODUCTS AND TECHNICAL DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER SUCH RULES AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE EXPORTED OR RE-EXPORTED, DIRECTLY OR INDIRECTLY, (A) WITHOUT ALL EXPORT OR RE-EXPORT LICENSES AND UNITED STATES OR OTHER GOVERNMENTAL APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN V IOLATION OF ANY APPLICABLE PROHIBITION AGAINST THE EXPORT OR RE-EXPORT OF ANY PART OF THE SOFTWARE.
Getting Started v
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT THE IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS CONSISTENT AS TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING COUNTRIES ARE NOT AN EXHAUSTIVE LIST THERE MAY EXIST RESTRICTIONS ON THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM, CHINA (INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL, RUSSIA, SAUDI ARABIA, SINGAPORE, AND SOUTH KOREA. YOU ACKNOWLEDGE IT IS YOUR ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY AND ALL GOVERNMENT EXPORT AND OTHER APPLICABLE LAWS AND THAT MCAFEE HAS NO FURTHER RESPONSIBILITY AFTER THE INITIAL SALE TO YOU WITHIN THE ORIGINAL COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in hazardous environments requiring fail-safe performance, including without limitation, in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines, or any other application in which the failure of the Software could lead directly to death, personal injury, or severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any express or implied warranty of fitness for High Risk Activities.
11.Miscellaneous. This Agreement is governed by the laws of the United States and the State of California, without reference to conflict of laws principles. The application of the United Nations Convention of Contracts for the International Sale of Goods is expres sly excluded. This Agreement sets forth all rights for the user of the Software and is the entire agreement between the parties. This Agreement supersedes any other communications with respect to the Software and Docum entation. This Agreement may not be modified except by a written addendum issued by a duly authorized representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision of this Agreement is held invalid, the remainder of this Agreement shall contin ue in full force and effect. The parties confirm that it is their wish that this Agreement has been written in the English language only.
12.McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write: McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054. http://www.mcafee.com.
Statements made to you in the course of this sale are subject to the Year 2000 Information and Readiness Disclosure Act (Public Law 105-271). In the case of a dispute, this Act may reduce your legal rights regarding the use of any statements regarding Year 2000 readiness, unless otherwise specified in your contract or tariff.
vi Student Survival Kit
Table of Contents
Chapter1. WelcometoStudentSurvivalKit......................11
Programsandfeatures............................................11
CentralInterface.............................................11
Single update button . . . . . . . . . . . ..............................12
McAfeeVirusScan ...........................................12
QuickClean .................................................12
WinGauge ..................................................12
ConfigurationAssistant.......................................12
RegistryBackupandRestore ..................................13
Safe & Sound . . . . ...........................................13
McAfeeImage...............................................13
McAfeeScheduler ...........................................13
RescueDisk ................................................13
AdBlocking ................................................13
EmailEncryption ............................................13
BrowserBuddy..............................................13
Cool Tools . . . . . . . ...........................................14
About Student Survival Kit documentation . . . . . . . . . . . . . ..............14
StudentSurvivalKitonlineHelp................................14
Chapter2. InstallingStudentSurvivalKit ........................17
Systemrequirements .............................................17
Installing Student Survival Kit . . . . . . . . ..............................17
Troubleshooting installation problems ..............................17
Step1:Cleanupyourharddrive ...............................18
Step2:Removetemporaryfiles ................................19
Step3:Closeothersoftware...................................19
Chapter3. UsingStudentSurvivalKit ...........................21
StudentSurvivalKitHomescreen ..................................21
Options ....................................................21
ConfigurationAssistant ..................................21
Getting Started vii
Table of Contents
UsingVirusScan .................................................23
UsingQuickClean................................................23
UsingBackupandRestore ........................................24
UsingInternetOptions............................................32
WinGauge..............................................21
TheMostImportantGauges ..........................22
WorkingWithGauges................................22
Help .......................................................23
RegistryBackup.............................................25
BackingUpRegistry .....................................25
RestoringRegistry.......................................25
Safe & Sound . . . . ...........................................25
Protected Volume Files (The Ultimate Backup Protection) . . . . . .26
Why You Should Make Regular Backups With Safe & Sound . . . .26
How Safe & Sound Creates Automatic Backups ..............27
Defining Your Backup Strategy . . . . . . . . . . . . . . ..............28
WhereWillYouStoretheBackupSet?......................28
WhatFilesareImportanttoYou? ..........................29
How Often Should You or Safe & Sound Make Backups? . . . . . . .29
McAfeeImage...............................................30
CreatinganImageofYourDisks ...........................30
SettingImageProperties .................................31
RestoringDrivesFromanImageFile .......................31
RescueDisk ................................................31
UsingaRescueDisk .....................................32
AdBlocking ................................................32
EmailEncryption ............................................33
BrowserBuddy..............................................33
.......................................................34
Appendix A. Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
HowtoContactMcAfee ...........................................35
Customerservice............................................35
Technical support ...........................................36
Supportviatheweb......................................36
viii Student Survival Kit
Table of Contents
Supportforumsandtelephonecontact......................36
McAfeetraining .............................................37
Index.......................................................39
Getting Started ix
Table of Contents
x Student Survival Kit
1Welcome to Student Survival Kit
Thank you for purchasing McAfee’s Student Survival Kit; a suite of powerful and easy-to-use Windows software utilities that helps keep your PC working at optimum efficiency and speed, as well as diagnosing, repairing, and protecting your PC and its valuable data.
Programs and features
1
Central Interface
The Student Survival Kit has an integrated central interface for you to easily access the individual components of the product suite. From the main screen, you are also able to view via the quick-glance windows, additional information such as the last time a diagnostic test was performed onyour PC, the last time the user checked for new updates, etc.
Getting Started 11
Welcome to Student Survival Kit
Single update button
Student SurvivalKit canautomatically update all of the installedcomponents via clicking the Update button in the main screen. The Update feature uses McAfeeSoftware Update Finder to searchfor any availableupdates–including updated virus pattern files–to Student Survival Kit software, downloads and installs them.
Student Survival Kit displays the McAfee Software Update Finder via a Web browser to check for updates. If an update is available, it downloads and installs it automatically for you.
McAfee VirusScan
McAfee VirusScan provides complete desktop protection with an array of scanning features that keep your system clean, mean, and virus-free. Using only the latesttechnology, VirusScan detects 100%of viruses includingfloppy disks, Internet downloads, email attachments, Intranets, shared files, CD-ROM, and online services (even inside the most popular compressed file types).
QuickClean
QuickClean wizard removes unused files in the cache folder of your Internet browser. It also removes any temporary files in folders that are used by applications and Windows. In addition, it cleans up shortcuts, Registry entries, and removereferencesin operating systemfiles that aren ot connected to any application.
WinGauge
WinGauge is a dynamic reporting tool that constantly monitors your use of Windows and yourapplications, toalert you topotential problems beforethey become serious.
Information about your systemis displayed usinggauges. You canselect what to monitor and the type of gauge to use. Most importantly, you can choose when y ou want to be notified in the eventthat yourspecified limits have been reached.
Configuration Assistant
This feature is designed to assist you via an interview to further customize how you want the components of Student Survival Kit to work on your computer.
12 Student Survival Kit
Registry Backup and Restore
This utility allows you to easily backup or restore your Windows registry.
Safe & Sound
This utility allows you to create automatic or interactive backups of selected drives, directories, files, or file types. You can back up to a protected volume file (a separate area on the drive).
McAfee Image
Allows you to save a copy ofcritical disk information ina file and restores the image later if your disk is corrupted.
McAfee Scheduler
Allows youto automatically scheduleupdates and tasks you want toperform on your computer at any given time.
Rescue Disk
Welcome to Student Survival Kit
Creates a custom rescue disk that you can use to boot up your PC and begin recovery if you cant start from the system hard drive.
Ad Blocking
Allows you toconfigure StudentSurvival Kit to silentlyfilter advertising from Web pages that you do not want to view when surfing the Internet.
Email Encryption
This feature allows you to protect your email messages from being read by other users without your knowledge.
Browser Buddy
Browser Buddyallows youtostore passwords on specificWebsite so youonly need to drag and drop them without typing itin everytimeyou accessthe site.
Getting Started 13
Welcome to Student Survival Kit
Cool Tools
Winamp
Nullsofts Winamp is an ultimate high-fidelity music player for Windows 95/98/NT. Itsupports MP3, CD and other audio formats, more than 5,000 skins and 150 audio visualization and effect plug-ins. Winamp is freeware.
For more information, visit their Web site at www.winamp.com
PowWow
PowWow® is a fully integrated instant messaging, interactive communications and online community solution. It is a highly scalable distributed community server (DCS)architecture that enablesusers to quickly and easily create, host, and moderate their own private, personalized online communities.
For more information visit their Web site at www.powwow.com
About Student Survival Kit documentation
This Getting Started manual provides the basic information you need to install, setup and use Student Survival Kit. More detailed information and step-by-stepinstructionson how toperform a task within Student Survival Kit is provided via the Help files which you can access while working within the different windows and dialog boxes. You can also review the Readme.txt file which contain other general information about the product.
Student Survival Kit online Help
To launch Student Survival Kithelp:
In the StudentSurvival Kit mainscreen,click theHelp icon. TheHelpcontents is displayed.
You can also search for a help topic via the Index or Find tabs.
•Indextab
1. In the text box, type the first few letters of the word or phrase you are looking for.
2. Locate what you are looking for; then double-click the topic or click the Display button.
14 Student Survival Kit
Welcome to Student Survival Kit
Find tab
Clicking the Find tab enables you to launch a full text search. When you search for topics via the Find tab for the first time, a Find Setup Wizard is displayed. Follow the instructions on screen to setup the full text search option. After setup is complete:
1. In the text box, type the first few letters of the word or phrase you are looking for. You can also select matching words to narrow your search.
2. Once youhave located what you are looking forin thedisplay topic box, click the topic.
Getting Started 15
Welcome to Student Survival Kit
16 Student Survival Kit
2Installing Student Survival Kit
Most installation problems are a caused by having programs running while you try to install new software. Even if the installation appears normal, you wontbe able torun the newprogram. To avoidinstallation problems, closeall open programs before you install Student Survival Kit, including programs thatruninthebackground,suchasscreensaversorviruscheckers.
System requirements
To use Student Survival Kit you need the following disk space requirements:
25 MB to completely install Student Survival Kit (including VirusScan).
2.5 MB for WinAmp.
10 MB for PowWow.
Installing Student Survival Kit
After closing all open programs, you are ready to install Student Survival Kit on your PC.
2
To ins tal lStudent Survi valKit
1. Close all open programs.
2. Insert the Student Survival Kit CD in the CD-ROM drive.
3. In the Student Survival Kit Setup screen, click Install Student Survival Kit.
NOTE: If the setup screen doesnt start automatically when you
close your CD-ROMdrive, click Start onthe Windows taskbar,click Run, then typed:\setup. If Dis not thedrive letter ofyour CD-ROM drive, substitute the correct drive letter.
Troubleshooting installation problems
A failed installation can cause software problems that are difficult to track down. The major causes of installation failure are:
Getting Started 17
Installing Student Survival Kit
Hard drive errors
Temporary files that conflict with the installation
Attempting to install while other software is running
Follow the procedure outlined below to minimize the affect that these common conditions may have on your installation.
Step 1: Clean up your hard drive
Run the Windows 95 hard drive utilities, ScanDisk and Disk Defragmenter to identify and fix any errors on your hard drive:
1. Click Start on theWindows taskbar, pointto Programs, thenAccessories, then System Tools, and click ScanDisk.
2. In the ScanDisk window, select Standard and Automatically fix errors.
NOTE: These are the default settings.
3. Click Advanced. In the Advanced Settings dialog box, make sure the following settings are selected:
4. Ignore the other options, and click OK. Click Start. ScanDisk begins
5. When ScanDisk is finished, close ScanDisk.
6. Click Start on theWindows taskbar, pointto Programs, thenAccessories,
7. Click OK tostart Disk Defragmenter. Depending on the speed of your
8. Close Disk Defragmenter when it has finished defragmenting yourdisk.
18 Student Survival Kit
Only if errors found
Replace log
Delete
Free
scanning your driveforerrors. Dependin g onthe size ofyourhard drive, ScanDisk may take several minutes to complete its job.
then System Tools, and click Disk Defragmenter.
computer and the size of your drive, this may take several minutes to complete.
Step 2: Remove temporary files
Delete the contents of the Windows Temp folder:
1. Double-clickthe My Computericonon your desktop. The MyComputer window opens. Double-click the C: drive. You are now viewing the contents of your hard drive.
2. Double-click the Windows folder.
3. In the Windows folder, double-click the Temp folder.
4. In the menu, click Edit,then click SelectAll. Allof theitemsin your Temp folder are highlighted.
5. Press the Deletekey on yourkeyboard to delete the files. If Windows asks about deleting files, click Yes.
6. In the Windows taskbar, click Start, then click Shut Down.
7. Click Restart the computer, then click Yes in the Shut Down Windows dialog box to restart your PC.
Step 3: Close other software
Installing Student Survival Kit
Disable all software running in the background:
1. Hold down the Ctrl and Alt keys on your keyboard, and then press the Delete key once. The Close Program dialog box appears.
2. Click End Task for every item on the list except Explorer.
3. Repeat steps 2 and 3 until youve closed everything except Explorer.
4. When you see only Explorer in the Close Program dialog box, click Cancel.
You are now ready to install your new software.
Getting Started 19
Installing Student Survival Kit
20 Student Survival Kit
3Using Student Survival Kit
McAfees Student Survival Kit contains a suite of utility programs that cover every aspect of your computershealth, performance, andmaintenance. Some ofthetestsareveryspecificwhilemanyaremoregeneralandallowyouto check your computers performance efficiency with one click of a button.
These utilities provide you with diagnostic, preventive, and security tools to help maintain your PCs health and well-being.
Student Survival Kit Home screen
Options
Configuration Assistant
This option is designed to assist you in activating and further customizing how Student Survival Kit components should work on your computer. It walks you through a series of configuration questions during the installation process.
It includes configurations such as automatically scheduling tasks that a component of the Student Survival Kit can perform on your computer. You can also indicate how often a particular task should be performed.
3
WinGauge
After this interview is completed, a summary detail is displayed listing all of the components that will be launched at startup so the you can see exactly what features will be loaded after boot-up.
WinGauge is a dynamic reporting tool that constantly monitors your use of Windows and yourapplications, toalert you topotential problems beforethey become serious.
Information about your systemis displayed usinggauges. You canselect what to monitor and the type of gauge to use. Most importantly, you can choose when y ou want to be notified in the eventthat yourspecified limits have been reached.
WinGauge allows you to get into the habit of constantly monitoring your system so you can take actions toprevent situations where errors couldoccur.
Getting Started 21
Using Student SurvivalKit
You can choose to have one, two, or more gauges to be active at any one timewith each gauge reporting on the status of your system. The more advanced you are,or the moredemanding your projects,the more gaugesyou may want to keep active to monitor particular aspects of your computer and applications.
By using WinGauge, and by customizing the gauges to your own specific needs, you will be warned about potential problems in time to take the necessary preventative steps.
WinGauge alerts you so that you can save your data, close programs, or take other actions to prevent your system from slowing down, crashing, or locking-up. As an added bonus, you can also drag application icons and folders into WinGauge so that the program becomes your one-stop system monitoring and application launch pad.
The Most Important Gauges
The following list summarizes the most important gauges to have active:
Highest Resources–The Highest Resources gauge measures system
resources”—small, critical memoryregionsin Windows itself.Whenany of these regions fill up, your system may crash. You can increase your resources by closing some applications.
Virtual Memory–TheVirtual Memory gauge measures howmuch ofyour
disk swap fileis in use.Themore ofyour swap fileyou use, theslower your system will run. If your swap file fills up, your system may crash.
If you find that your virtual memory is frequently high, you should consider buying and installing more RAM and making more room available on your Windows drive.
Swap File Requests–The Swap File Requests gauge measures how often Windows is accessing the swap file. The more frequently Windows accesses, the less efficient your overall system.
Drive Space–The Drive Spacegauge measuresthe amountof roomleft on your drives.If adisk fills up while a program is running, yoursystem may crash.
Working With Gauges
In WinGauge, you can set global gauge commands or set specific commands foreachgauge.Youcanalsoadd,update,orremovegauges.
22 Student Survival Kit
NOTE: For step-by-step instructions and more information on how to use WinGauge,refer to the McAfee Student Survival Kit online Helpfile.
Help
If you need step-by-step instructions on how to perform a particular task within any of the components ofStudent Survival Kit, clickthe Help icon as it appears on the right-hand side of any screen to display available Help topics.
Using VirusScan
McAfee VirusScan provides complete desktop protection with an array of scanning features that keep your system clean, mean, and virus-free. Using only the latesttechnology, VirusScan detects 100%of viruses includingfloppy disks, Internet downloads, email attachments, Intranets, shared files, CD-ROM, and online services (even inside the most popular compressed file types).
VirusScans award-winning scanning engine Hunter,includes ground-breaking variant detection and heuristic technology that detects even new unknown macro viruses before they have a chance to inflict damage.
SecureCast. ensures that your virus signature files are always the latest. New updates are pushed directly to your desktop the moment they are released.
Using Student Survival Kit
AVERT (Anti-Virus Emergency Research Team) staffs more than 85 experiencedvirus researchers aroundthe world,providing customerswith unparalleled follow-the-sun support. AVERT even makes hourly beta virus signature files available to all customers 24 hours a day.
NOTE: For step-by-step instructions and more information on how to use McAfee VirusScan, refer to the McAfee Student Survival Kit online Help file.
Using QuickClean
QuickClean wizard performs any of the following actions to keep your computer free of unused files and invalid shortcuts:
Remove unused files in the cache folder of your Internet browser.
Remove any temporary files in folders that are used by applications and
Windows.
Getting Started 23
Using Student SurvivalKit
Clean up shortcuts, Registry entries, and remove references in operating system files that are not connected to any application.
Empty the Recycle Bin.
To set up QuickClean:
1. Click Cleanup in the main Student Survival Kit window.
2. Follow the instructions on the succeeding screens. The default settings
To change the QuickClean sched ule:
1. Right-click the redand white McAfee Agent icon in the clock area of the
2. In the Whats Scheduled dialog box, select QuickClean and click
3. IntheEventScheduledialogbox,choosethetimeintervalfor
will be displayed through the wizard screens, you can change it according to your preference.
taskbar, and then select Whats Scheduled on the menu.
Schedule.
QuickClean to run from the dropdown list box.
Using Backup and Restore
The Backup and Restore feature is designed to assist you in handling the Registry component of your computer. The Registry is a repository for all the informationabout your hardware, software and network settings, configuration settings (such as desktop colors), plug-and-play data, program initialization settings, and so on.
Each time you add or remove programs or hardware, or even if you change your desktop and customization settings, the Registry is updated. These changes can affect the Registry in a number of ways. Some settings no longer do anything (especiallyif you haveremoved aprogram). Others are no longer in theoptimal place. New settings may adversely affect older settings,even to the pointof rendering applications or hardware devices inoperable. And, as the Registrychanges, just like the hard disk, itbecomes fragmented. The more fragmenteditbecomes,thesloweryoursystemruns.
24 Student Survival Kit
Registry Backup
With Registry Backup, you have the following two options:
Back-up your registry: This backs up your current registry.
Restore your registry: If you select Restore, a list of registry backups
appear. The registry that setup backed up originally is called Original.
Backing Up Regist ry
Use the following procedure to back up your registry.
1. Launch the RegistryBackup &Restore Wizardvia the Student Survival Kit window.
2. When the the Registry Backup & Restore Wizard appears, select Backup and click Next. The next panel of the Registry Backup & Restore window appears.
3. Type a comment in the textbox, and then click Finish to complete the backup process.
Restoring Registry
Using Student Survival Kit
Use the following procedure to restore your registry, using a backup.
1. Launch the RegistryBackup &Restore Wizardvia the Student Survival Kit window.
2. When the the Registry Backup & Restore Wizard appears, select Restore and click Next. The next panel of the Registry Backup & Restore window appears.
3. Then click Finish to complete the restore process.
Safe & Sound
The most important asset on your computer is the information, or data,you create and store there. Over time, this data grows in size and value. The storage devices where you keep this information are vulnerable to a wide range of environmental and human factors that can damage or destroy all or part of the data stored there.
Getting Started 25
Using Student SurvivalKit
Valuable and vulnerable disk organizational structure information is also storedin variousplaces on aharddrive. This includestheboot sector, partition tables, directories, the FAT (file allocation table), and other structural components. These structural components are used by Windows to find data on the drive, organize it, andso on.If any oneof these components isdamaged or destroyed, you will not be able toaccess thedata youve stored on thedrive.
The FAT, your drives roadmap, points to the locations where your files are physicallystored onthe drive. Filescan either be stored in contiguous locations or scattered in pieces in different places. Since files are not always stored contiguously, the FAT information becomes even more indispensable than if fileswere stored oneafter another,end to end.If a drivesfileallocation table becomes corrupt or scrambled (such as may be caused by a virus), your computer will be unable to find and assemble all the pieces of your files. This is true even if all the filesdata still exists.
Protected Volume Files (The Ultimate Backup Protection)
Safe & Sound lets you create backup sets in protected volume files, which is the safest and preferredtype ofbackup. Aprotectedvolumefile is asectioned-off area ofthe drive,sometimes called a logical drive. Safe & Soundsprotected volumefileshavesomeveryspecialcharacteristicsthatletSafe&Sound reconstruct backup files sector by sector, even if the drivesstandardFATis damaged or completely lost. In fact, files can be largely reconstructed even if large parts of the drive are unreadable or erased.
The protected volume file also includes enough information in each directory entry to compl etely reconstructafiles entire directorytree even ifall itsparent nodes are erased.
Safe & Sound provides internal redundancy in the protected volume file backups you create.It doesthis by markingeach sectorof each file thatit backs up with identifying information about the sectors contents and the file that sector belongs to. Each sector in a protected volume file contains enough information to allow files to be reconstructed from their individual sectors.
Why You Should Make Regular Backups With Safe & Sound
Your data is very valuable and costly to recreate. This means that making frequent or even mirror backupcopies ofthe importantdata onyour drives is crucial.Amirror backupcopy isalways identicalto the original information on thesourcedrive.
26 Student Survival Kit
Using Student Survival Kit
Safe & Sound automates theback-up process, doing thetime-consuming and repetitive workfor you.It letsyou decidewhich typesof filesto backup, how often to save them, and where you want the backup set located (on the same drive, another local drive, or on a shared network drive). With Safe & Sound, you can create mirror backup sets that are, a t any given time, an exact replica of the files you’ve selected to back upon thesourcedrive.You can alsospecify a short time delay in the backup, or back up manually by copying files to the backup set on your drive if you prefer.
All forms of data storage are susceptible to losing the information they hold. The most common types of data storagehard drives, 3.5-inch disks, ZIP disksor SyQuest tapesareoften calledpermanent storage (thus differentiating them from the volatile storage in your computers RAM, random access memory). Permanent s torage means the information remains intact even when you turn off yourcomputer. Permanent storage does not mean eternal storage.
Many thingscan cause the data on disks, tapesor drives to become garbled or lost: hardware malfunctions,worn out media,electrical storms,excessive heat, static electricity, magnets, loose cable or power cord connections, and so on. CD discs, thoughdurable, can become scratched enoughto damagetheir data. Human actions can also cause lost data, such as deleting the wrong folder or formatting the wrong drive. Even a well-designed application can sometimes causeitsownfilestobecomecorrupt.
With so much at risk, you have everything to gain by allowing Safe & Sound to automatically make backup copies for you. You simply decide what informationis important toyou, how you want itto bebacked up, and where you want the backup copy to be stored. Safe & Sound takes care of the rest!
How Safe & Sound Creates Automatic Backups
When you select to have Safe & Sound automatically create a backup set for you, it creates the first backup set while you are stepping through the Safe & Sound Wizard. Thereafter, while the Enable Automatic Backup option is selected,itcontinuestoupdateyourbackupsetatthetimedelayyou’ve specified. If you chose to make Mirror backups, Safe & Sound updates your backup set at the same time that you resave the original source files.
If youselect awrite-behind delaylonger than zero seconds (a Mirror backup), Safe & Sound updates the backup set at anytime after the specifiedtime delay when your PC is idle. This allows Safe &Sound to workin the background so that it does not interruptthe work you are doing. This is a good option to use with the protected volume file backup type since it eliminates any speed loss due to more frequent disk accesses and larger file sizes associated with the protectedvolume file backup type.
Getting Started 27
Using Student SurvivalKit
Defining Your Backup Strategy
After you decide which backup type you want to use (either a protected volume fileor adirectory backup set), the most important questions youmust answer when defining your own backup strategy are:
Where will you store the backup set?
What files are important (which files must be backed up)?
How often should you or Safe & Sound make these backups?
Where Will You Store the Backup Set?
If the survival of your business depends upon your PC being up and running at all times(and ifmoney is notan object), the ultimatewayto protect the data on your PCwould betoset up aredundantPC with identicalsized drives. This backup PCs only job would be to mirror the data on your primary PC. It would be waiting in the wings should your first PCfail for any reason. And if that happened, you couldsimply switchyour work tothe second PC whilethe first one is repaired.
Often money isa consideration in deciding where youll store your backup sets. The least expensive way of making backups has traditionally been to copy data to 3.5-inch disks, though this is the most labor intensive way of storing backups because it requires you to switch disks by hand.
In todayscomputermarketplace,youmaydiscoverthatitisascosteffective to acquire a separate backup hard drive where you can keep a current mirror backup copy of one or more other drives that you use on your PC.
In addition, you may want the backup copy to be stored at a remote location, for increased protection. As long as Safe & Sound can access a logical drive mapped on your PC, it can store th e backup set there. That is, the backup set canbestoredonasharednetworkdrive.
NOTE: YoucanusetheMapNetworkDrivecommand,availableby
Even if you cannot invest in another drive or disks for storing your backups, you can still create a backup copy of your data on the same drive. This offers the least protection should that drive fail, but the potential for datarecovery is increased by havingtwo setsof your mostimportant information stored there. It is further enhanced if you select the protected volume file backup type, which allows recovery in many circumstances even with the drive physically damaged.
28 Student Survival Kit
Right-clicking My Computer, to assign (map) a drive letter to a location on a network drive. This makes that location a logical driveon your PC. For more details, see your Windows online Help.
NOTE: If your data usually resides on a server, you can make a local
copy so y ou can access data even when the server goes down.
What Files are Important to Yo u?
Safe & Sound automatically selects filesthat aretypically importantto include in a backup set. However, you can select other files or types of files to include in your backup set.
In addition, you can create multiple backup sets of data for particular purposes. Each of these backup sets can be created when and where you specify. They caneach includeexactly the filesor typesoffiles thatyou choose. For example, you might create individual backup sets for each of your clients if you produce data for clients that is stored on your computer, such as advertising layouts, graphic images, books, or accounting data.
How Often Should You or Safe & Sound Make Backups?
The more recent your backup set, the happier youll be if your PC does encounter a problem that compromises the data on your primary drives. However, you maywant to keepthe default Write-behindDelay of 20minutes to give you time to recover a previous version of a file if you ever need to.
Using Student Survival Kit
TIP: Save early, save often. While working in applications, you can almostalwayspress C you save your work, the less you have to lose at any given point in time. You may also want to be sure the auto-save option is selected in your applications for more frequent backups.
NOTE: For step-by-step instructions and more information on how to use Safe & Sound, refer to the McAf ee Student Survival Kit online Help file.
TRL-S to saveyour work asyou go.The more often
Getting Started 29
Using Student SurvivalKit
McAfee Image
Although it happens rarely, data stored ona hard drive can become damaged in severalways. Forexample, the electric company maybe working down the street and accidentally send a spike, or power surge, to your PC. Even if you use a surge protector and connect all the computerspowercordsandthe modems phone line to a surge protector (instead of connecting them directly to wall connectors), power surges can still reach your PC and cause lost or corrupted data.
An important step in preventing disaster is using McAfee Image to make a snapshotof the most critical areas on your hard drives. Since even a recent backup copy is still notas goodas recovering your current data,youll want to try to recover the latest data first if anything goes wrong. If you use Image to makea snapshot of themost crucialinformationon your drives, then if adrive becomes corrupted, you canuse Restoreto restorethe mostcurrent versionof your data.
McAfee Imagesaves information that youll need if your hard disk ever fails, including the boot record, partition tables and FAT information. Its a good idea to run McAfee Image daily, as well as whenever youve reorganized a disks files using a defragmenter. This ensures that you can use Image’s Restore option to restore the latest states of your files and folders (or directories). Image stores its information in a file on your hard drive. This file is stored using a special, patent-pending method that allows the file to be recovered even if the hardware is severely damaged.
NOTE:Set the Image Properties sheet optionto run Image automatically
each time you start Windows. Image will examine your system and update the imageonly ifneeded. Doing thisensures you alwayshave the latest data saved for your disks.
Creating an Image of Your Disks
Creating an image copy ofyour hard disks asa file (nbimage.dat)onlytakes a moment. You should create a new image file any time youve rearranged files or added many new files to your hard drive.
To createan image of your hard drives, select the Create a New ImageBackup option and click Finish. Image saves the hard drive, and displays a message letting you know the process is complete. Click OK.
Be sure to create a Rescue disk using McAfee UtilitiesRescue Disk. Rescue Disk places some Image information on your 3.5-inch disk.
30 Student Survival Kit
nbimage.dat file on your system
Setting Image Properties
You can setImage Propertiesto specifywhether Image savesthe FileAllocation Tables (FAT), which is a roadmap or index to where all the pieces of files on a
disk drive are located. Most likely, youllwant to keep this check box selected. You can also haveImage create a newimage copyof your hard disks each time you start Windows (recommended).
Restoring Drives From an Image File
When all else fails, you can restore the critical information on one or more drives from an image file. Restoring an image file does NOTrecover deleted files. If you have deleted data fil es that you need, you can restore a copy of them from your last backup set (protected volume file or directory) created with Safe & Sound.
WARNING: Do not restore an image, except as a last resort. The Image
file does not contain your data files, those are located in your Safe & Sound backup set.
NOTE: For step-by-step instructions and more information on how to use McAfee Image, referto the McAfee StudentSurvival Kitonline Help file.
Using Student Survival Kit
Rescue Disk
Rescue Disk letsyoucreate an emergencyboot disk thatyoucan use toboot up your PC if you encounter a problem that prevents you from starting the computer from the system hard drive. The system hard drive is the hard drive that contains your Windows directory or folder.
NOTE:The rescue diskset bootsfroma floppy butincludesa companion
ZIP or SyQuest disk that lets you run Windows in a paired-down configuration to try to recoveryour system in theevent of a catastrophe. The largecompanion rescue disk also containscritical parts ofWindows that can help recover your system in the event some portions of Windows becomedamaged. To use this feature, simply run Rescue D isk on a system that hasa ZIP orotherhigh-capacity removable media drive and follow the on-screen instructions.
Getting Started 31
Using Student SurvivalKit
To create a Rescue Disk:
1. ClicktheNext>buttonintheEmergencyDiskWizard.
2. Follow the screen instructions.
3. Click Next >. Then click Finish.
4. Insert a disk into drive A and click OK.
RescueDiskformatsthediskandcopiescriticalstartupfilestoit,aswellas any files you added. When the process is complete, Rescue Disk exits and returns to the desktop.
Using a Rescue Disk
Insert your Rescue disk into drive A, reboot your computer (or turn on the power). Ifyour system doesnt boot, access CMOSand make surethe Booting From Floppy option is enabled. Then follow the instructions on the screen.
NOTE: For more information on how to use Rescue Disk, refer to the McAfee Student Survival Kit online Help file.
Using Internet Options
Ad Blocking
This screen allows you to configure Student Survival Kit to silently filter advertisingfromWebpagesthatyoudonotwanttoviewwhilebrowsingthe Internet. This component is able to to identufy text patterns through the URL address (e.g., /live_ads/, /adbanner/,etc).
If you select to activate Ad blocking, you have the option to add, edit or remove text patterns already identified by Student Survival Kit.
•·To add ablocked textpattern, click Add. Anentry iscreated in theBlocked Text Pattern dialog box, enter the substring; then click Apply.
•·To edit anexisting text pattern,select from theBlocked TextPattern dialog box; click Edit. The click Apply.
•·To remove an existing text pattern, select from the Blocked Text Pattern dialog box; click Remove. Then click Apply.
32 Student Survival Kit
Email Encryption
If you are using an email application supported by the plug-ins, you can encrypt and sign your messages by selecting the appropriate options from your applicationstoolbar.
If youremail application isnot supported bytheplug-ins, youcan copy the message to the clipboard and perform the appropriate functions from there. If youwant to includeany file attachments, you canencrypt and sign them from the Windows Explorer before attaching them to your email.
For more information, see the Student Survival Kit online Help.
Browser Buddy
You can depend on Browser Buddy to help you easily navigate through the intricacies of the Web. For example, when you connect to Web sites that require a name and password, you can use Browser Buddy to:
Drag your username orpassword from Password Manager and drop it on the login form for the Web site.
Add new password information for a Web site.
Using Student Survival Kit
You can also run the Password Manager from its dialog box. To open Browser Buddy, right-click the McAfee Guardian icon on the
Windows taskbar, then click Browser Buddy. The dialog box is displayed.
To add a new username and password:
1. In Browser Buddy, select Add New Entry from the Password Manager drop-down list. The Enter password to save dialog box is displayed.
2. In the Web site text box, enter the Web site address; in the Username text box, type the name by which you identify yourself to this Web site, this may correspond to User Name, Member ID, Member Name, Login ID, or Login Name, and so on.
3. In the Password text box, type the password that confirms your identity. (In Password Manager, Internet Guard Dog displays one asterisk for each characterinyourpassword.)
4. Click OK.
Getting Started 33
Using Student SurvivalKit
To retrieveyour username and password:
1. InBrowser Buddy, selectthe site nameif it doesntappear automatically in the Current Web Site list.
2. Drag your username or password from the Password Manager box to appropriate field in your Web sites login form. The text appears in the field. (If the site that youare logging into displays your password text as a series of asterisks( *), StudentSurvival Kit willdisplay one asteriskfor each characterinyourpassword.)
3. Continue logging in as usual to the Web site.
34 Student Survival Kit
AProduct Support
BEFORE YOU CONTACT McAfee Software for technical support, locate yourself near the computer with Student Survival Kit installed and verify the information listed below:
Have you sent in your product registration card?
Version of Student Survival Kit
Customer number if registered
Model name of hard disk (internal or external)
Version of system software
Amount of memory (RAM)
Extra cards, boards or monitors
Name and version of conflicting software
EXACT error message as on screen
What steps were performed prior to receiving error message?
A
A complete description of problem
How to Contact McAfee
Customer service
To order products or obtain product information, contact the McAfee Customer Service department at (972) 308-9960 or write to the following address:
McAfee Software 3965 FreedomCircle Santa Clara, CA 95054 U.S.A.
You can also order products online at http://store.mcafee.com
Getting Started 35
Product Support
If you need further assistance or have specific questions about our products, send your questions via email to the appropriate address below:
For general questions about ordering software: mcafeestore@beyond.com
For help in downloading software: mcafeedownloadhelp@beyond.com
For a status on an existing order: mcafeeorderstatus@beyond.com
To inquire about a promotion: mcafeepromotions@beyond.com
Technical support
Support via the web
McAfee is famous for its dedication to customer satisfaction. We have continued this tradition by making our site on the World Wide Web (http://www.mcafee.com) a valuable resource for answers to technical support issues.
We encourage you tomake thisyour first stop for answersto frequentlyasked questions,for updates toMcAfeesoftware, and foraccess toMcAfeenews and virus information.
Take advantage of the McAfee Product KnowledgeCenteryour free online product support center - 24 hours a day, 7 days a week (http://support.mcafee.com/tech_supp/pkc.asp).
Support forums and telephone contact
Ifyoudonotfindwhatyouneedordonothavewebaccess,tryoneofour automated services.
Table A-1.
World WideWeb www.mcafee.com CompuServe GO MCAFEE America Online keyword MCAFEE Microsoft Network mcafee
36 Student Survival Kit
If the automated services do not have theanswers you need, please contact McAfee at the following numbers Monday through Friday between 9:00 AM and 6:00 PM Pacific time for 30-day free support, and 24 hours a day - 7 days aweekforPerMinuteorPerIncidentsupport.
30-Day FreeTelephone Support 972-308-9960 Per MinuteTelephone Support 1-900-225-5624 Per IncidentTelephone Support($35) 1-800-950-1165
McAfee training
For information about scheduling on-site training for any McAfee product, call (800) 338-8754.
Disclaimer:Timeandtelephonenumbersaresubjecttochangewithoutprior notice.
Product Support
Table A-1.
Getting Started 37
Product Support
38 Student Survival Kit
Index
A
Ad Blocking13, 32 Agent
scheduling QuickClean 24
B
Backing Up Registry 25 Backup
strategies 28
Backups
automatic 27 frequency of saving 29 where to store them 28 why you need them 26
Browser Buddy 13
to 29
, 33
C
Configuration Assistant 12 Cool Tools 14
E
Email Encryption13, 33 emergency boot disk 31
Internet Options 32
M
Map NetworkDrive 28 McAfee Image13, 30 McAfee Scheduler13 McAfee VirusScan12 mirror backup 26
O
Options 21
P
permanent storage
definition 27
Protected Volume
Files 26
Q
QuickClean 12 QuickClean wizard
setting defaults for 24
F
File
Allocation Table 31
I
Image
Properties 31
R
Registry 24 Registry Backup 25 Registry Backup and Restore 13 Rescue Disk 13, 31 Restoring Registry 25
S
Safe & Sound 13, 25 server
backup a local copy of files 29
Getting Started 39
Settings dialog box
QuickClean options 24 Student Survival Kit online Help 14 System
hard drive31 System requirements 17
U
Using Backup and Restore 24 Using QuickClean 23 Using VirusScan 23
W
Windows
95/98 Registry 24 WinGauge 12 wizards
QuickClean
?? to 24
Index
Getting Started 40
Loading...