* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX,
Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Di stributed Sniffer System, Dr
Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk,
Hunter, ISDN Tel/Scope, LM 1, LA NGuru, Le ading Help Des k Technolo gy, Magic Solu tions, MagicSpy,
MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More
Power To You, Multimedia Cl oaking, NetCrypto, Net Octopus, NetRoom, NetScan, Net Shield, NetShield,
NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts,
PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty
Good Privacy, PrimeSupport, RecoverKey, RecoverKey-Inter national, ReportMagic, RingFence, Router
PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer,
SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM,
TeleSniffer, TIS, TMach, TMeg, Total Network S ecurity, Total Network Visibility, Total Se rvice Desk,
Total Virus Defense, T-P OD, Trus ted Mach, Trusted Ma il, Uninst aller, Virex, Virex- PC, Viru s Forum,
ViruScan, VirusScan, VShield, WebScan, WebS hield, WebSniffer , WebSt alker WebW all, and ZAC 2000
are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All
other registered and unregistered trademarks in this document are the sole property of their respective
owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT
("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY
NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR
INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY)
CONSENT TO BE BOUND BY AND B ECOME A PARTY TO THIS AGREEMENT. IF YO U DO
NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT
INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT
INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to the terms and
conditions of this Agreement, McAfee hereby grants to you a non-exclusive, no n-transferable right
to use one copy of the specified version of the Software and the accompanying d ocumentation (the
"Documentation"). You may install one copy of the Software on one computer, workstation,
personal digital assistant, pager, "smart phone" or other electronic device for which the Software
was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more
than one specified Software product, this license applies to all such specified Software products,
subject to any restrictions or usage terms specified on the applicable price list or p roduct packaging
that apply to any of such Software products individually.
Issued May 2000/ McA fee Student Survival Kit v1.0
(i.e., the required number of licenses would equal the number of distinct inputs to the
multiplexing or pooling software or hardware "front end"). If the number of Client Devices or
seats that can connect to the Software can exceed the nu mber of licens es you have obtained, then
you must have a reasonable mechanism in place to en sure that you r use of the Software does not
exceed the use limits specified for the licens es you h ave obtained . This licen se authorizes you to
make or download one copy of the Documentation for each Client Device or seat that is licensed,
provided that each such copy contains all of the Documentation's proprietary notices.
c. Volume Licenses. If the Software is licensed with volume license terms specified in the
applicable price list or product packaging for the Software, you may make, use and install as
many additional copies of the Software on the number of Client Devices as the volume license
authorizes. You must have a reasonable mechanism in place to ensure that the number of Client
Devices on which the Software has been installed does not exceed the number of licenses you
have obtained. This license authori zes you to make or downl oad one copy of the Document ation
for each additional copy authorized by the volume license, provided that each such copy contains
all of the Documentation's proprietary notices.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as
set forth herein. This Agreement will terminate automatically if you fail to comply with any of the
limitations or other requirements described herein. Upon any termination or expiration of this
Agreement, you must destroy all copies of the Software and the Documentation. You may
terminate this Agreement at any point by destroying all copies of the Software and the
Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the
Software you are entitled to download revisions or updates to the Software when and as McAfee
publishes them via its electronic bulletin board system, website or through other online services.
For a period of ninety (90) days from the date of the original purchase of the Software, you are
entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it
via its electronic bulletin board system, website or through other online services. After the
specified time period, you have no further rights to receive any revisions or upgrades without
purchase of a new license or annual upgrade plan to the Software.
4. Ownership Rights. The Software is protected by United States copyright laws and international
treaty provisions. McAfee and its suppliers own and retain all right, title an d interest in and to the
Software, including all copyrights, patents, trade secret rights, trademarks and other intellectual
property rights therein. Your possession, installation, or use of the Software does not transfer to
you any title to the intellectual property in the Software, and you will not acquire any rights to the
Software except as expressly set forth in this Agreement. All copies of the Software and
Documentation made hereund er must contain the s ame proprietar y notices that appear o n and in the
Software and Documentation.
Getting Startediii
5. Restrictions. You may not rent, lease, loan or resell the Software. You may not permit third parties
to benefit from the use or functionality of the Software via a timesharing, service bureau or other
arrangement, except to the extent such use is specified in the applicable list price or product
packaging for the Software. You may not transfer any of the rights granted to you under this
Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the
extent the foregoing restriction is expres s ly prohibited by applicabl e law . Y ou may n ot mo di fy, or
create derivative works based upon, the Software in whole or in part. You may not copy the
Software or Documentation except as expressly permitted in Section 1 above. You may not remove
any proprietary notices or labels on the Software. All rights not expressly set forth hereunder are
reserved by McAfee. McAfee reserves the right to periodically conduct audits upon advance
written notice to verify compliance with the terms of this Agreement.
6. Warranty and Disclaimer
a. Limited Warranty. McAfee warrants that for sixty (60) day s from the date of origi nal purchase
the media (e.g., diskettes) on which the Software is contained will be free from defects in
materials and workmanship.
b. Customer Remedies. McAfee's and its suppliers' entire liability and your exclusive remedy for
any breach of the foregoing warranty shall be, at McAfee's option, either (i) return of the
purchase price paid for the license, if any, or (ii) repl acement of the defective med ia in which the
Software is contained. You must return the defective media to McAfee at your expense with a
copy of your receipt. This limited warranty is void if the defect has resulted from accident,
abuse, or misapplication. Any replacement media will be warranted for the remainder of the
original warranty period. Outside the United St ates, this remedy is not av ailable to the extent
McAfee is subject to restrictions under United States export control laws and regulations.
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE SOFTWARE IS
PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND
NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE
ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR
SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR
THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE.
WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO
WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM
INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET
YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW
LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT
APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent
permitted by applicable law.
ivStudent Survival Kit
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY,
WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIER S
BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL,
INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE,
COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES
OR LOSSES. IN NO EVENT WILL MCAFEE BE L IABLE FOR ANY DAMAGES IN EXCESS
OF THE LIST PRICE MCAFEE CHARGES FOR A LICE NSE TO THE SOFTW ARE, EVEN IF
MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR
PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH
LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW
THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES,
SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. The foregoing
provisions shall be enforceable to the maximum extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentation are deemed to be
"commercial computer software" and "commercial computer software documentation,"
respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any
use, modification, reproduction, release, performance, display or disclosure of the Software and
accompanying Documentation by the United States Government shall be governed solely by the
terms of this Agreement and shall be prohibited except to the extent expressly permitted by the
terms of this Agreement.
9. Export Controls. Neither the Software nor the Documentation and underlying information or
technology may be downloaded or otherwise exported or re-exported (i) into (or to a national or
resident of ) Cuba, Iran, Iraq, Libya, North Korea, Sudan, Syria or any other country to which the
United States has embargoed goods; or (ii) to anyone on the United States Treasury Department's
list of Specially Designated Nations or the United States Commerce Department's Table of Denial
Orders. By downloading or using the Software you are agreeing to the foregoing and you are
certifying that you are not located in, under the control of, or a national or resident of any such
country or on any such list.
IN ADDITION, YOU SHOULD BE AWARE OF THE FOLLOWING: EXPORT OF THE
SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND
REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF EXPOR T
ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE, WHICH
RESTRICT THE EXPORT AND RE-EXPORT OF CERTAIN PRODUCTS AND TECHNICAL
DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER SUCH RULES
AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE EXPORTED OR
RE-EXPORTED, DIRECTLY OR INDIRECTLY, (A) WITHOUT ALL EXPORT OR
RE-EXPORT LICENSES AND UNITED STATES OR OTHER GOVERNMENTAL
APPROVALS REQUIRED BY ANY APPLICABLE LAWS, OR (B) IN V IOLATION OF ANY
APPLICABLE PROHIBITION AGAINST THE EXPORT OR RE-EXPORT OF ANY PART OF
THE SOFTWARE.
Getting Startedv
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN
THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY
TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT THE
IMPLEMENTATION AND ENFORCEMENT OF THESE LAWS IS NOT ALWAYS
CONSISTENT AS TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING
COUNTRIES ARE NOT AN EXHAUSTIVE LIST THERE MAY EXIST RESTRICTIONS ON
THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM, CHINA
(INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL, RUSSIA, SAUDI
ARABIA, SINGAPORE, AND SOUTH KOREA. YOU ACKNOWLEDGE IT IS YOUR
ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY AND ALL GOVERNMENT
EXPORT AND OTHER APPLICABLE LAWS AND THAT MCAFEE HAS NO FURTHER
RESPONSIBILITY AFTER THE INITIAL SALE TO YOU WITHIN THE ORIGINAL
COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in
hazardous environments requiring fail-safe performance, including without limitation, in the
operation of nuclear facilities, aircraft navigation or communication systems, air traffic control,
weapons systems, direct life-support machines, or any other application in which the failure of the
Software could lead directly to death, personal injury, or severe physical or property damage
(collectively, "High Risk Activities"). McAfee expressly disclaims any express or implied
warranty of fitness for High Risk Activities.
11.Miscellaneous. This Agreement is governed by the laws of the United States and the State of
California, without reference to conflict of laws principles. The application of the United Nations
Convention of Contracts for the International Sale of Goods is expres sly excluded. This Agreement
sets forth all rights for the user of the Software and is the entire agreement between the parties. This
Agreement supersedes any other communications with respect to the Software and Docum entation.
This Agreement may not be modified except by a written addendum issued by a duly authorized
representative of McAfee. No provision hereof shall be deemed waived unless such waiver shall
be in writing and signed by McAfee or a duly authorized representative of McAfee. If any
provision of this Agreement is held invalid, the remainder of this Agreement shall contin ue in full
force and effect. The parties confirm that it is their wish that this Agreement has been written in
the English language only.
12.McAfee Customer Contact. If you have any questions concerning these terms and conditions, or
if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408)
970-9727, or write: McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054.
http://www.mcafee.com.
Statements made to you in the course of this sale are subject to the Year 2000 Information and
Readiness Disclosure Act (Public Law 105-271). In the case of a dispute, this Act may reduce your
legal rights regarding the use of any statements regarding Year 2000 readiness, unless otherwise
specified in your contract or tariff.
Thank you for purchasing McAfee’s Student Survival Kit; a suite of powerful
and easy-to-use Windows software utilities that helps keep your PC working
at optimum efficiency and speed, as well as diagnosing, repairing, and
protecting your PC and its valuable data.
Programs and features
1
Central Interface
The Student Survival Kit has an integrated central interface for you to easily
access the individual components of the product suite. From the main screen,
you are also able to view via the quick-glance windows, additional
information such as the last time a diagnostic test was performed onyour PC,
the last time the user checked for new updates, etc.
Getting Started11
Welcome to Student Survival Kit
Single update button
Student SurvivalKit canautomatically update all of the installedcomponents
via clicking the Update button in the main screen. The Update feature uses
McAfeeSoftware Update Finder to searchfor any availableupdates–including
updated virus pattern files–to Student Survival Kit software, downloads and
installs them.
Student Survival Kit displays the McAfee Software Update Finder via a Web
browser to check for updates. If an update is available, it downloads and
installs it automatically for you.
McAfee VirusScan
McAfee VirusScan provides complete desktop protection with an array of
scanning features that keep your system clean, mean, and virus-free. Using
only the latesttechnology, VirusScan detects 100%of viruses includingfloppy
disks, Internet downloads, email attachments, Intranets, shared files,
CD-ROM, and online services (even inside the most popular compressed file
types).
QuickClean
QuickClean wizard removes unused files in the cache folder of your Internet
browser. It also removes any temporary files in folders that are used by
applications and Windows. In addition, it cleans up shortcuts, Registry
entries, and removereferencesin operating systemfiles that aren ot connected
to any application.
WinGauge
WinGauge is a dynamic reporting tool that constantly monitors your use of
Windows and yourapplications, toalert you topotential problems beforethey
become serious.
Information about your systemis displayed usinggauges. You canselect what
to monitor and the type of gauge to use. Most importantly, you can choose
when y ou want to be notified in the eventthat yourspecified limits have been
reached.
Configuration Assistant
This feature is designed to assist you via an interview to further customize
how you want the components of Student Survival Kit to work on your
computer.
12Student Survival Kit
Registry Backup and Restore
This utility allows you to easily backup or restore your Windows registry.
Safe & Sound
This utility allows you to create automatic or interactive backups of selected
drives, directories, files, or file types. You can back up to a protected volume
file (a separate area on the drive).
McAfee Image
Allows you to save a copy ofcritical disk information ina file and restores the
image later if your disk is corrupted.
McAfee Scheduler
Allows youto automatically scheduleupdates and tasks you want toperform
on your computer at any given time.
Rescue Disk
Welcome to Student Survival Kit
Creates a custom rescue disk that you can use to boot up your PC and begin
recovery if you can’t start from the system hard drive.
Ad Blocking
Allows you toconfigure StudentSurvival Kit to silentlyfilter advertising from
Web pages that you do not want to view when surfing the Internet.
Email Encryption
This feature allows you to protect your email messages from being read by
other users without your knowledge.
Browser Buddy
Browser Buddyallows youtostore passwords on specificWebsite so youonly
need to drag and drop them without typing itin everytimeyou accessthe site.
Getting Started13
Welcome to Student Survival Kit
Cool Tools
Winamp
Nullsoft’s Winamp is an ultimate high-fidelity music player for Windows
95/98/NT. Itsupports MP3, CD and other audio formats, more than 5,000
skins and 150 audio visualization and effect plug-ins. Winamp is freeware.
For more information, visit their Web site at www.winamp.com
PowWow
PowWow® is a fully integrated instant messaging, interactive
communications and online community solution. It is a highly scalable
distributed community server (DCS)architecture that enablesusers to quickly
and easily create, host, and moderate their own private, personalized online
communities.
For more information visit their Web site at www.powwow.com
About Student Survival Kit documentation
This Getting Started manual provides the basic information you need to
install, setup and use Student Survival Kit. More detailed information and
step-by-stepinstructionson how toperform a task within Student Survival Kit
is provided via the Help files which you can access while working within the
different windows and dialog boxes. You can also review the Readme.txt file
which contain other general information about the product.
Student Survival Kit online Help
To launch Student Survival Kithelp:
In the StudentSurvival Kit mainscreen,click theHelp icon. TheHelpcontents
is displayed.
You can also search for a help topic via the Index or Find tabs.
•Indextab
1. In the text box, type the first few letters of the word or phrase you are
looking for.
2. Locate what you are looking for; then double-click the topic or click the
Display button.
14Student Survival Kit
Welcome to Student Survival Kit
• Find tab
Clicking the Find tab enables you to launch a full text search. When you
search for topics via the Find tab for the first time, a Find Setup Wizard is
displayed. Follow the instructions on screen to setup the full text search
option. After setup is complete:
1. In the text box, type the first few letters of the word or phrase you are
looking for. You can also select matching words to narrow your search.
2. Once youhave located what you are looking forin thedisplay topic box,
click the topic.
Getting Started15
Welcome to Student Survival Kit
16Student Survival Kit
2Installing Student Survival Kit
Most installation problems are a caused by having programs running while
you try to install new software. Even if the installation appears normal, you
won’tbe able torun the newprogram. To avoidinstallation problems, closeall
open programs before you install Student Survival Kit, including programs
thatruninthebackground,suchasscreensaversorviruscheckers.
System requirements
To use Student Survival Kit you need the following disk space requirements:
After closing all open programs, you are ready to install Student Survival Kit
on your PC.
2
To ins tal lStudent Survi valKit
1. Close all open programs.
2. Insert the Student Survival Kit CD in the CD-ROM drive.
3. In the Student Survival Kit Setup screen, click Install Student Survival
Kit.
NOTE: If the setup screen doesn’t start automatically when you
close your CD-ROMdrive, click Start onthe Windows taskbar,click
Run, then typed:\setup. If Dis not thedrive letter ofyour CD-ROM
drive, substitute the correct drive letter.
Troubleshooting installation problems
A failed installation can cause software problems that are difficult to track
down. The major causes of installation failure are:
Getting Started17
Installing Student Survival Kit
• Hard drive errors
• Temporary files that conflict with the installation
• Attempting to install while other software is running
Follow the procedure outlined below to minimize the affect that these
common conditions may have on your installation.
Step 1: Clean up your hard drive
Run the Windows 95 hard drive utilities, ScanDisk and Disk Defragmenter to
identify and fix any errors on your hard drive:
1. Click Start on theWindows taskbar, pointto Programs, thenAccessories,
then System Tools, and click ScanDisk.
2. In the ScanDisk window, select Standard and Automatically fix errors.
NOTE: These are the default settings.
3. Click Advanced. In the Advanced Settings dialog box, make sure the
following settings are selected:
4. Ignore the other options, and click OK. Click Start. ScanDisk begins
5. When ScanDisk is finished, close ScanDisk.
6. Click Start on theWindows taskbar, pointto Programs, thenAccessories,
7. Click OK tostart Disk Defragmenter. Depending on the speed of your
8. Close Disk Defragmenter when it has finished defragmenting yourdisk.
18Student Survival Kit
•Only if errors found
•Replace log
•Delete
•Free
scanning your driveforerrors. Dependin g onthe size ofyourhard drive,
ScanDisk may take several minutes to complete its job.
then System Tools, and click Disk Defragmenter.
computer and the size of your drive, this may take several minutes to
complete.
Step 2: Remove temporary files
Delete the contents of the Windows Temp folder:
1. Double-clickthe My Computericonon your desktop. The MyComputer
window opens. Double-click the C: drive. You are now viewing the
contents of your hard drive.
2. Double-click the Windows folder.
3. In the Windows folder, double-click the Temp folder.
4. In the menu, click Edit,then click SelectAll. Allof theitemsin your Temp
folder are highlighted.
5. Press the Deletekey on yourkeyboard to delete the files. If Windows
asks about deleting files, click Yes.
6. In the Windows taskbar, click Start, then click Shut Down.
7. Click Restart the computer, then click Yes in the Shut Down Windows
dialog box to restart your PC.
Step 3: Close other software
Installing Student Survival Kit
Disable all software running in the background:
1. Hold down the Ctrl and Alt keys on your keyboard, and then press the
Delete key once. The Close Program dialog box appears.
2. Click End Task for every item on the list except Explorer.
3. Repeat steps 2 and 3 until you’ve closed everything except Explorer.
4. When you see only Explorer in the Close Program dialog box, click
Cancel.
You are now ready to install your new software.
Getting Started19
Installing Student Survival Kit
20Student Survival Kit
3Using Student Survival Kit
McAfee’s Student Survival Kit contains a suite of utility programs that cover
every aspect of your computer’shealth, performance, andmaintenance. Some
ofthetestsareveryspecificwhilemanyaremoregeneralandallowyouto
check your computer’s performance efficiency with one click of a button.
These utilities provide you with diagnostic, preventive, and security tools to
help maintain your PC’s health and well-being.
Student Survival Kit Home screen
Options
Configuration Assistant
This option is designed to assist you in activating and further customizing
how Student Survival Kit components should work on your computer. It
walks you through a series of configuration questions during the installation
process.
It includes configurations such as automatically scheduling tasks that a
component of the Student Survival Kit can perform on your computer. You
can also indicate how often a particular task should be performed.
3
WinGauge
After this interview is completed, a summary detail is displayed listing all of
the components that will be launched at startup so the you can see exactly
what features will be loaded after boot-up.
WinGauge is a dynamic reporting tool that constantly monitors your use of
Windows and yourapplications, toalert you topotential problems beforethey
become serious.
Information about your systemis displayed usinggauges. You canselect what
to monitor and the type of gauge to use. Most importantly, you can choose
when y ou want to be notified in the eventthat yourspecified limits have been
reached.
WinGauge allows you to get into the habit of constantly monitoring your
system so you can take actions toprevent situations where errors couldoccur.
Getting Started21
Using Student SurvivalKit
You can choose to have one, two, or more gauges to be active at any one
time—with each gauge reporting on the status of your system. The more
advanced you are,or the moredemanding your projects,the more gaugesyou
may want to keep active to monitor particular aspects of your computer and
applications.
By using WinGauge, and by customizing the gauges to your own specific
needs, you will be warned about potential problems in time to take the
necessary preventative steps.
WinGauge alerts you so that you can save your data, close programs, or take
other actions to prevent your system from slowing down, crashing, or
locking-up. As an added bonus, you can also drag application icons and
folders into WinGauge so that the program becomes your one-stop system
monitoring and application launch pad.
The Most Important Gauges
The following list summarizes the most important gauges to have active:
resources”—small, critical memoryregionsin Windows itself.Whenany of
these regions fill up, your system may crash. You can increase your
resources by closing some applications.
disk swap fileis in use.Themore ofyour swap fileyou use, theslower your
system will run. If your swap file fills up, your system may crash.
• If you find that your virtual memory is frequently high, you should
consider buying and installing more RAM and making more room
available on your Windows drive.
• Swap File Requests–The Swap File Requests gauge measures how often
Windows is accessing the swap file. The more frequently Windows
accesses, the less efficient your overall system.
• Drive Space–The Drive Spacegauge measuresthe amountof roomleft on
your drives.If adisk fills up while a program is running, yoursystem may
crash.
Working With Gauges
In WinGauge, you can set global gauge commands or set specific commands
foreachgauge.Youcanalsoadd,update,orremovegauges.
22Student Survival Kit
NOTE: For step-by-step instructions and more information on how to
use WinGauge,refer to the McAfee Student Survival Kit online Helpfile.
Help
If you need step-by-step instructions on how to perform a particular task
within any of the components ofStudent Survival Kit, clickthe Help icon as it
appears on the right-hand side of any screen to display available Help topics.
Using VirusScan
McAfee VirusScan provides complete desktop protection with an array of
scanning features that keep your system clean, mean, and virus-free. Using
only the latesttechnology, VirusScan detects 100%of viruses includingfloppy
disks, Internet downloads, email attachments, Intranets, shared files,
CD-ROM, and online services (even inside the most popular compressed file
types).
• VirusScan’s award-winning scanning engine Hunter,includes
ground-breaking variant detection and heuristic technology that detects
even new unknown macro viruses before they have a chance to inflict
damage.
• SecureCast. ensures that your virus signature files are always the latest.
New updates are pushed directly to your desktop the moment they are
released.
Using Student Survival Kit
• AVERT (Anti-Virus Emergency Research Team) staffs more than 85
experiencedvirus researchers aroundthe world,providing customerswith
unparalleled follow-the-sun support. AVERT even makes hourly beta
virus signature files available to all customers 24 hours a day.
NOTE: For step-by-step instructions and more information on how to
use McAfee VirusScan, refer to the McAfee Student Survival Kit online
Help file.
Using QuickClean
QuickClean wizard performs any of the following actions to keep your
computer free of unused files and invalid shortcuts:
• Remove unused files in the cache folder of your Internet browser.
• Remove any temporary files in folders that are used by applications and
Windows.
Getting Started23
Using Student SurvivalKit
• Clean up shortcuts, Registry entries, and remove references in operating
system files that are not connected to any application.
• Empty the Recycle Bin.
To set up QuickClean:
1. Click Cleanup in the main Student Survival Kit window.
2.Follow the instructions on the succeeding screens. The default settings
To change the QuickClean sched ule:
1. Right-click the redand white McAfee Agent icon in the clock area of the
2. In the What’s Scheduled dialog box, select QuickClean and click
will be displayed through the wizard screens, you can change it
according to your preference.
taskbar, and then select What’s Scheduled on the menu.
Schedule.
QuickClean to run from the dropdown list box.
Using Backup and Restore
The Backup and Restore feature is designed to assist you in handling the
Registry component of your computer. The Registry is a repository for all the
informationabout your hardware, software and network settings,
configuration settings (such as desktop colors), plug-and-play data, program
initialization settings, and so on.
Each time you add or remove programs or hardware, or even if you change
your desktop and customization settings, the Registry is updated. These
changes can affect the Registry in a number of ways. Some settings no longer
do anything (especiallyif you haveremoved aprogram). Others are no longer
in theoptimal place. New settings may adversely affect older settings,even to
the pointof rendering applications or hardware devices inoperable. And, as
the Registrychanges, just like the hard disk, itbecomes fragmented. The more
fragmenteditbecomes,thesloweryoursystemruns.
24Student Survival Kit
Registry Backup
With Registry Backup, you have the following two options:
• Back-up your registry: This backs up your current registry.
• Restore your registry: If you select Restore, a list of registry backups
appear. The registry that setup backed up originally is called Original.
Backing Up Regist ry
Use the following procedure to back up your registry.
1. Launch the RegistryBackup &Restore Wizardvia the Student Survival Kit
window.
2. When the the Registry Backup & Restore Wizard appears, select Backup
and click Next. The next panel of the Registry Backup & Restore window
appears.
3. Type a comment in the textbox, and then click Finish to complete the
backup process.
Restoring Registry
Using Student Survival Kit
Use the following procedure to restore your registry, using a backup.
1. Launch the RegistryBackup &Restore Wizardvia the Student Survival Kit
window.
2. When the the Registry Backup & Restore Wizard appears, select Restore
and click Next. The next panel of the Registry Backup & Restore window
appears.
3. Then click Finish to complete the restore process.
Safe & Sound
The most important asset on your computer is the information, or data,you
create and store there. Over time, this data grows in size and value. The
storage devices where you keep this information are vulnerable to a wide
range of environmental and human factors that can damage or destroy all or
part of the data stored there.
Getting Started25
Using Student SurvivalKit
Valuable and vulnerable disk organizational structure information is also
storedin variousplaces on aharddrive. This includestheboot sector, partition
tables, directories, the FAT (file allocation table), and other structural
components. These structural components are used by Windows to find data
on the drive, organize it, andso on.If any oneof these components isdamaged
or destroyed, you will not be able toaccess thedata you’ve stored on thedrive.
The FAT, your drive’s roadmap, points to the locations where your files are
physicallystored onthe drive. Filescan either be stored in contiguous
locations or scattered in pieces in different places. Since files are not always
stored contiguously, the FAT information becomes even more indispensable
than if fileswere stored oneafter another,end to end.If a drive’sfileallocation
table becomes corrupt or scrambled (such as may be caused by a virus), your
computer will be unable to find and assemble all the pieces of your files. This
is true even if all the files’ data still exists.
Protected Volume Files (The Ultimate Backup Protection)
Safe & Sound lets you create backup sets in protected volume files, which is
the safest and preferredtype ofbackup. Aprotectedvolumefile is asectioned-off
area ofthe drive,sometimes called a logical drive. Safe & Sound’sprotected
volumefileshavesomeveryspecialcharacteristicsthatletSafe&Sound
reconstruct backup files sector by sector, even if the drive’sstandardFATis
damaged or completely lost. In fact, files can be largely reconstructed even if
large parts of the drive are unreadable or erased.
The protected volume file also includes enough information in each directory
entry to compl etely reconstructafile’s entire directorytree even ifall itsparent
nodes are erased.
Safe & Sound provides internal redundancy in the protected volume file
backups you create.It doesthis by markingeach sectorof each file thatit backs
up with identifying information about the sector’s contents and the file that
sector belongs to. Each sector in a protected volume file contains enough
information to allow files to be reconstructed from their individual sectors.
Why You Should Make Regular Backups With Safe & Sound
Your data is very valuable and costly to recreate. This means that making
frequent or even mirror backupcopies ofthe importantdata onyour drives is
crucial.Amirror backupcopy isalways identicalto the original information on
thesourcedrive.
26Student Survival Kit
Using Student Survival Kit
Safe & Sound automates theback-up process, doing thetime-consuming and
repetitive workfor you.It letsyou decidewhich typesof filesto backup, how
often to save them, and where you want the backup set located (on the same
drive, another local drive, or on a shared network drive). With Safe & Sound,
you can create mirror backup sets that are, a t any given time, an exact replica
of the files you’ve selected to back upon thesourcedrive.You can alsospecify
a short time delay in the backup, or back up manually by copying files to the
backup set on your drive if you prefer.
All forms of data storage are susceptible to losing the information they hold.
The most common types of data storage—hard drives, 3.5-inch disks, ZIP
disksor SyQuest tapes—areoften calledpermanent storage (thus differentiating
them from the volatile storage in your computer’s RAM, random access
memory). Permanent s torage means the information remains intact even
when you turn off yourcomputer. Permanent storage does not mean eternal
storage.
Many thingscan cause the data on disks, tapesor drives to become garbled or
lost: hardware malfunctions,worn out media,electrical storms,excessive heat,
static electricity, magnets, loose cable or power cord connections, and so on.
CD discs, thoughdurable, can become scratched enoughto damagetheir data.
Human actions can also cause lost data, such as deleting the wrong folder or
formatting the wrong drive. Even a well-designed application can sometimes
causeitsownfilestobecomecorrupt.
With so much at risk, you have everything to gain by allowing Safe & Sound
to automatically make backup copies for you. You simply decide what
informationis important toyou, how you want itto bebacked up, and where
you want the backup copy to be stored. Safe & Sound takes care of the rest!
How Safe & Sound Creates Automatic Backups
When you select to have Safe & Sound automatically create a backup set for
you, it creates the first backup set while you are stepping through the Safe &
Sound Wizard. Thereafter, while the Enable Automatic Backup option is
selected,itcontinuestoupdateyourbackupsetatthetimedelayyou’ve
specified. If you chose to make Mirror backups, Safe & Sound updates your
backup set at the same time that you resave the original source files.
If youselect awrite-behind delaylonger than zero seconds (a Mirror backup),
Safe & Sound updates the backup set at anytime after the specifiedtime delay
when your PC is idle. This allows Safe &Sound to workin the background so
that it does not interruptthe work you are doing. This is a good option to use
with the protected volume file backup type since it eliminates any speed loss
due to more frequent disk accesses and larger file sizes associated with the
protectedvolume file backup type.
Getting Started27
Using Student SurvivalKit
Defining Your Backup Strategy
After you decide which backup type you want to use (either a protected
volume fileor adirectory backup set), the most important questions youmust
answer when defining your own backup strategy are:
• Where will you store the backup set?
• What files are important (which files must be backed up)?
• How often should you or Safe & Sound make these backups?
Where Will You Store the Backup Set?
If the survival of your business depends upon your PC being up and running
at all times(and ifmoney is notan object), the ultimatewayto protect the data
on your PCwould betoset up aredundantPC with identicalsized drives. This
backup PC’s only job would be to mirror the data on your primary PC. It
would be waiting in the wings should your first PCfail for any reason. And if
that happened, you couldsimply switchyour work tothe second PC whilethe
first one is repaired.
Often money isa consideration in deciding where you’ll store your backup
sets. The least expensive way of making backups has traditionally been to
copy data to 3.5-inch disks, though this is the most labor intensive way of
storing backups because it requires you to switch disks by hand.
In today’scomputermarketplace,youmaydiscoverthatitisascosteffective
to acquire a separate backup hard drive where you can keep a current mirror
backup copy of one or more other drives that you use on your PC.
In addition, you may want the backup copy to be stored at a remote location,
for increased protection. As long as Safe & Sound can access a logical drive
mapped on your PC, it can store th e backup set there. That is, the backup set
canbestoredonasharednetworkdrive.
Even if you cannot invest in another drive or disks for storing your backups,
you can still create a backup copy of your data on the same drive. This offers
the least protection should that drive fail, but the potential for datarecovery is
increased by havingtwo setsof your mostimportant information stored there.
It is further enhanced if you select the protected volume file backup type,
which allows recovery in many circumstances even with the drive physically
damaged.
28Student Survival Kit
Right-clicking My Computer, to assign (map) a drive letter to a location
on a network drive. This makes that location a “logical drive” on your
PC. For more details, see your Windows online Help.
NOTE: If your data usually resides on a server, you can make a local
copy so y ou can access data even when the server goes down.
What Files are Important to Yo u?
Safe & Sound automatically selects filesthat aretypically importantto include
in a backup set. However, you can select other files or types of files to include
in your backup set.
In addition, you can create multiple backup sets of data for particular
purposes. Each of these backup sets can be created when and where you
specify. They caneach includeexactly the filesor typesoffiles thatyou choose.
For example, you might create individual backup sets for each of your clients
if you produce data for clients that is stored on your computer, such as
advertising layouts, graphic images, books, or accounting data.
How Often Should You or Safe & Sound Make Backups?
The more recent your backup set, the happier you’ll be if your PC does
encounter a problem that compromises the data on your primary drives.
However, you maywant to keepthe default Write-behindDelay of 20minutes
to give you time to recover a previous version of a file if you ever need to.
Using Student Survival Kit
TIP: Save early, save often. While working in applications, you can
almostalwayspress C
you save your work, the less you have to lose at any given point in time.
You may also want to be sure the auto-save option is selected in your
applications for more frequent backups.
NOTE: For step-by-step instructions and more information on how to
use Safe & Sound, refer to the McAf ee Student Survival Kit online Help
file.
TRL-S to saveyour work asyou go.The more often
Getting Started29
Using Student SurvivalKit
McAfee Image
Although it happens rarely, data stored ona hard drive can become damaged
in severalways. Forexample, the electric company maybe working down the
street and accidentally send a spike, or power surge, to your PC. Even if you
use a surge protector and connect all the computer’spowercordsandthe
modem’s phone line to a surge protector (instead of connecting them directly
to wall connectors), power surges can still reach your PC and cause lost or
corrupted data.
An important step in preventing disaster is using McAfee Image to make a
“snapshot” of the most critical areas on your hard drives. Since even a recent
backup copy is still notas goodas recovering your current data,you’ll want to
try to recover the latest data first if anything goes wrong. If you use Image to
makea snapshot of themost crucialinformationon your drives, then if adrive
becomes corrupted, you canuse Restoreto restorethe mostcurrent versionof
your data.
McAfee Imagesaves information that you’ll need if your hard disk ever fails,
including the boot record, partition tables and FAT information. It’s a good
idea to run McAfee Image daily, as well as whenever you’ve reorganized a
disk’s files using a defragmenter. This ensures that you can use Image’s
Restore option to restore the latest states of your files and folders (or
directories). Image stores its information in a file on your hard drive. This file
is stored using a special, patent-pending method that allows the file to be
recovered even if the hardware is severely damaged.
NOTE:Set the Image Properties sheet optionto run Image automatically
each time you start Windows. Image will examine your system and
update the imageonly ifneeded. Doing thisensures you alwayshave the
latest data saved for your disks.
Creating an Image of Your Disks
Creating an image copy ofyour hard disks asa file (nbimage.dat)onlytakes
a moment. You should create a new image file any time you’ve rearranged
files or added many new files to your hard drive.
To createan image of your hard drives, select the Create a New ImageBackup
option and click Finish. Image saves the
hard drive, and displays a message letting you know the process is complete.
Click OK.
Be sure to create a Rescue disk using McAfee Utilities’ Rescue Disk. Rescue
Disk places some Image information on your 3.5-inch disk.
30Student Survival Kit
nbimage.dat file on your system
Setting Image Properties
You can setImage Propertiesto specifywhether Image savesthe FileAllocation
Tables (FAT), which is a roadmap or index to where all the pieces of files on a
disk drive are located. Most likely, you’llwant to keep this check box selected.
You can also haveImage create a newimage copyof your hard disks each time
you start Windows (recommended).
Restoring Drives From an Image File
When all else fails, you can restore the critical information on one or more
drives from an image file. Restoring an image file does NOTrecover deleted
files. If you have deleted data fil es that you need, you can restore a copy of
them from your last backup set (protected volume file or directory) created
with Safe & Sound.
WARNING: Do not restore an image, except as a last resort. The Image
file does not contain your data files, those are located in your Safe &
Sound backup set.
NOTE: For step-by-step instructions and more information on how to
use McAfee Image, referto the McAfee StudentSurvival Kitonline Help
file.
Using Student Survival Kit
Rescue Disk
Rescue Disk letsyoucreate an emergencyboot disk thatyoucan use toboot up
your PC if you encounter a problem that prevents you from starting the
computer from the system hard drive. The system hard drive is the hard drive
that contains your Windows directory or folder.
ZIP or SyQuest disk that lets you run Windows in a paired-down
configuration to try to recoveryour system in theevent of a catastrophe.
The largecompanion rescue disk also containscritical parts ofWindows
that can help recover your system in the event some portions of
Windows becomedamaged. To use this feature, simply run Rescue D isk
on a system that hasa ZIP orotherhigh-capacity removable media drive
and follow the on-screen instructions.
Getting Started31
Using Student SurvivalKit
To create a Rescue Disk:
1. ClicktheNext>buttonintheEmergencyDiskWizard.
2. Follow the screen instructions.
3. Click Next >. Then click Finish.
4. Insert a disk into drive A and click OK.
RescueDiskformatsthediskandcopiescriticalstartupfilestoit,aswellas
any files you added. When the process is complete, Rescue Disk exits and
returns to the desktop.
Using a Rescue Disk
Insert your Rescue disk into drive A, reboot your computer (or turn on the
power). Ifyour system doesn’t boot, access CMOSand make surethe Booting
From Floppy option is enabled. Then follow the instructions on the screen.
NOTE: For more information on how to use Rescue Disk, refer to the
McAfee Student Survival Kit online Help file.
Using Internet Options
Ad Blocking
This screen allows you to configure Student Survival Kit to silently filter
advertisingfromWebpagesthatyoudonotwanttoviewwhilebrowsingthe
Internet. This component is able to to identufy text patterns through the URL
address (e.g., /live_ads/, /adbanner/,etc).
• If you select to activate Ad blocking, you have the option to add, edit or
remove text patterns already identified by Student Survival Kit.
•·To add ablocked textpattern, click Add. Anentry iscreated in theBlocked
Text Pattern dialog box, enter the substring; then click Apply.
•·To edit anexisting text pattern,select from theBlocked TextPattern dialog
box; click Edit. The click Apply.
•·To remove an existing text pattern, select from the Blocked Text Pattern
dialog box; click Remove. Then click Apply.
32Student Survival Kit
Email Encryption
• If you are using an email application supported by the plug-ins, you can
encrypt and sign your messages by selecting the appropriate options from
your application’stoolbar.
• If youremail application isnot supported bytheplug-ins, youcan copy the
message to the clipboard and perform the appropriate functions from
there. If youwant to includeany file attachments, you canencrypt and sign
them from the Windows Explorer before attaching them to your email.
For more information, see the Student Survival Kit online Help.
Browser Buddy
You can depend on Browser Buddy to help you easily navigate through the
intricacies of the Web. For example, when you connect to Web sites that
require a name and password, you can use Browser Buddy to:
• Drag your username orpassword from Password Manager and drop it on
the login form for the Web site.
• Add new password information for a Web site.
Using Student Survival Kit
You can also run the Password Manager from its dialog box.
To open Browser Buddy, right-click the McAfee Guardian icon on the
Windows taskbar, then click Browser Buddy. The dialog box is displayed.
To add a new username and password:
1. In Browser Buddy, select Add New Entry from the Password Manager
drop-down list. The Enter password to save dialog box is displayed.
2. In the Web site text box, enter the Web site address; in the Username text
box, type the name by which you identify yourself to this Web site, this
may correspond to User Name, Member ID, Member Name, Login ID, or
Login Name, and so on.
3. In the Password text box, type the password that confirms your identity.
(In Password Manager, Internet Guard Dog displays one asterisk for each
characterinyourpassword.)
4. Click OK.
Getting Started33
Using Student SurvivalKit
To retrieveyour username and password:
1. InBrowser Buddy, selectthe site nameif it doesn’tappear automatically in
the Current Web Site list.
2. Drag your username or password from the Password Manager box to
appropriate field in your Web site’s login form. The text appears in the
field. (If the site that youare logging into displays your password text as a
series of asterisks( *), StudentSurvival Kit willdisplay one asteriskfor each
characterinyourpassword.)
3. Continue logging in as usual to the Web site.
34Student Survival Kit
AProduct Support
BEFORE YOU CONTACT McAfee Software for technical support, locate
yourself near the computer with Student Survival Kit installed and verify the
information listed below:
• Have you sent in your product registration card?
• Version of Student Survival Kit
• Customer number if registered
• Model name of hard disk (internal or external)
• Version of system software
• Amount of memory (RAM)
• Extra cards, boards or monitors
• Name and version of conflicting software
• EXACT error message as on screen
• What steps were performed prior to receiving error message?
A
• A complete description of problem
How to Contact McAfee
Customer service
To order products or obtain product information, contact the McAfee
Customer Service department at (972) 308-9960 or write to the following
address:
McAfee Software
3965 FreedomCircle
Santa Clara, CA 95054
U.S.A.
You can also order products online at http://store.mcafee.com
Getting Started35
Product Support
If you need further assistance or have specific questions about our products,
send your questions via email to the appropriate address below:
• For general questions about ordering software: mcafeestore@beyond.com
• For help in downloading software: mcafeedownloadhelp@beyond.com
• For a status on an existing order: mcafeeorderstatus@beyond.com
To inquire about a promotion: mcafeepromotions@beyond.com
Technical support
Support via the web
McAfee is famous for its dedication to customer satisfaction. We have
continued this tradition by making our site on the World Wide Web
(http://www.mcafee.com) a valuable resource for answers to technical
support issues.
We encourage you tomake thisyour first stop for answersto frequentlyasked
questions,for updates toMcAfeesoftware, and foraccess toMcAfeenews and
virus information.
Take advantage of the McAfee Product KnowledgeCenter—your free online
product support center - 24 hours a day, 7 days a week
(http://support.mcafee.com/tech_supp/pkc.asp).
World WideWebwww.mcafee.com
CompuServeGO MCAFEE
America Onlinekeyword MCAFEE
Microsoft Networkmcafee
36Student Survival Kit
If the automated services do not have theanswers you need, please contact
McAfee at the following numbers Monday through Friday between 9:00 AM
and 6:00 PM Pacific time for 30-day free support, and 24 hours a day - 7 days
aweekforPerMinuteorPerIncidentsupport.
30-Day FreeTelephone Support972-308-9960
Per MinuteTelephone Support1-900-225-5624
Per IncidentTelephone Support($35)1-800-950-1165
McAfee training
For information about scheduling on-site training for any McAfee product,
call (800) 338-8754.