Mcafee VIRUSSCAN WIRELESS 1.0 QUICK START GUIDE

VirusScan Wireless
Version 1.0
QuickStart Guide
COPYRIGHT
Copyright (c) 1999-2000 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form o r by any means without the written permis sion of N etworks Associa tes Technology, Inc., or its suppliers or affiliate companies.
* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, * ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee A ssociates, MoneyMagic, More Power To You, Multimedia Cloaking, Ne tCrypto, NetOctopus, N etRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence, Rou te r PM, Safe & Sound, Sal es Magi c, Secur eCa st, Ser vice Level Manag er, Ser vi ceMag ic , Site Meter , Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach,Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, and ZAC 2000 are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES, INC. ("McAfee"). BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL THE SOFTWARE. (IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.)
1. License Grant. Subject to the payment of the applicable license fees, and subject to t he terms and
conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the "Documentation"). You may install one copy of the Software on one computer, workstation, personal digital assistant, pager, "smart phone" or other electronic device for which the Software was designed (each, a "Client Device"). If the Software is licensed as a suite or bundle with more than one specified Software product, this license applies to all such specified Software products, subject to any restrictions or usage terms specified on the applicable price list or product
packaging
that apply to any of such Software products individually.
a. Use. The Software is licensed as a single product; it may not be used on more than one Client
Device or by more than one user at a time, except as set forth in this Section 1. The Software is "in use" on a Client Device when it is loaded into the temporary memory (i.e., random-access memory or RAM) or installed into the permanent memory (e.g., hard disk, CD-ROM, or other
Issued October 2000 / McAfe e VirusScan Wireless
storage devi ce) of that Cl ien t Devic e. Th is lic ense author ize s you to mak e one copy of the Software solely for backup or archival pur poses, provided that t he copy you make contains all of the Software’s proprietary notices.
b. Server-Mode. You may use the Software on a Client Device as a server ("Server") within a
multi-user or networked environment ("Server-Mode") only if such use is permitted in the applicable price list or product packaging for the Software. A separate license is required for each Client Device or "seat" that may connect to the Server at any time, regardless of whether such licensed Client Devices or seats are concurrently connected to, accessing or using the Software. Use of software or h ardware t hat reduces the nu mber of Clie nt Devices or seats di rectly acce ssing or utilizing the Software (e.g., "multiplexing" or "pooling" software or hardwar e) does not reduce the number of licenses r equired (i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of licenses you have obt ain ed , th en yo u mu st hav e a r eas on ab le m ech a nism in pl ace to en s ure that yo ur use of the Software does not exceed the use limits specified for the licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each Client Device or seat that is licensed, provided that each such copy contains all of the Documentation’s proprietary notices.(i.e., the required number of licenses would equal the number of distinct inputs to the multiplexing or pooling software or hardware "front end"). If the number of Client Devices or seats that can connect to the Software can exceed the number of licenses you have obtained, then you must have a reasonable mechanism in place to ensure that your use of the Software does not exceed the use limits specified for the licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each Client Device or seat that is li censed, provided th at each such co py contai ns all of the Docu mentatio n’ s propri etary notices.
c. Volume Licenses. If the Software is licensed with volume license terms spec ified in the applicable
price list or product packaging for the Software, you may make, use and install as many additional copies of the Software on the number of Client Devices as the volume license authorizes. You must have a reasonable mechanism in place to ensure that the number of Client Devices on which the Software has been installed does not exceed the number of licenses you have obtained. This license authorizes you to make or download one copy of the Documentation for each additional copy authorized by the volume license, provided that each such copy contains all of the Documentat i on’s proprietary notice s.
2. Term. This Agreement is effective for an unlimited duration unless and until earlier terminated as
set forth herein. This Agreement will terminate automatically if you fail to comply with any of the limitations or other requirements described herein. Upon any termination or expiration of this Agreement, you must destroy al l copies of the Software and the Documen tation. You may terminate this Agreement at any point by destroying all copies of the Software and the Documentation.
3. Updates. For the time period specified in the applicable price list or product packaging for the
Software you are entitled to download revisions or updates to the Software when and as M cAfee publishes them via its electronic bulletin board system, website or through other online services. For a period of ninety (90) days from the date of the original purchase of the Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through other online services. After the s pecified time period, you have no further rights to receive any revisions or upgrades without purchase of a new license or annual upgrade plan t o t he Software.
4. Ownership Rights. The Software is protected by United States copyright laws and international
treaty provisions. Mc A f ee and its su ppliers ow n an d r eta i n all r ig h t, title a n d i n ter est in a nd to th e Software, including all copyrig hts, paten ts, trade s ecret rights, trademarks and othe r intellectua l property rights therein. Your possession, installation, or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software and Documentation made hereunder must contain the same proprietary notices that appear on and in the Software and Documentation.
QuickStart Guide iii
5. Restrictions. You may not rent, lease, loan or resell the Software. You may not permit
third parties to benefit from the use or functionality of the Software via a timesharing, service bureau or other arrangement, except to the extent such use is specified in the applicable list price or product packaging for the Software. You may not transfer any of the rights granted to you under this Agreement. You may not reverse engineer, decompile, or disassemble the Software, except to the extent the foregoing restriction is expressly prohibited by applicable law. You may not modify, or create derivative works based upon, the Software in whole or in part. You may not copy the Software or Documentation except as expressly permitted in Section 1 above. You may not remove any proprietary notices or labels on the Software. All rights not expressly set forth hereunder are reserved by McAfee. McAfee reserves the right to periodically conduct audits upon advance written notice to verify compliance with the terms of this Agreement.
6. Warranty and Disclaimer a. Limited Warranty. McAfee warrants that for sixty (60) days from the date of original
purchase the media (e.g., diskettes) on which the Software is contained will be free from defects in materia ls and workmanship.
b. Customer Remedies. McAfee’s and its suppliers’ entire liability and your exclusive
remedy for any breach of the for egoing warranty shall be, at McAfee’s option, either (i) return of the purchase price paid for the license, if any, or (ii) replacement of the defectiv e media in which the Sof tware i s conta ined. You must return the defective media to McAfee at your expense with a copy of your re ceipt. This limited warranty is void if the defect has resulted from acc ident, abuse, or misapplication. Any replacement media w ill b e w arr ante d f o r th e rema in der of th e o ri gi nal wa rr anty per i od. Ou ts id e t he United States, this remedy is not ava ilable to the exten t McAfee is subject to rest rictions under United States export con trol law s and regulatio ns .
c. Warranty Disclaimer. Except for the limited warranty set forth herein, THE
SOFTWARE IS PROVIDED "AS IS ." TO THE M AXIMUM EX TENT PERMITT ED BY APPLICABLE LAW, MCAFEE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT WITH RESPECT TO THE SOFTWARE AND THE ACCOMPANYING DOCUMENTATION. YOU ASSUME RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, MCAFEE MAKES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS. SOME STATES AND JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. The foregoing provisions shall be enforceable to the maximum extent permitted by applicable law.
iv VirusScan Wireless
7. Limitation of Liability. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER IN TORT, CONTRACT, OR OTHERWISE, SHALL MCAFEE OR ITS SUPPLIERS BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGE S OR LOSSES . IN NO E VENT WILL M CAFEE BE LIABLE FO R ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHA RGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMI TATIO N AND EXCL USIO N M AY N OT AP PLY TO YO U. The forego ing provisions shall be enforceable to the maximum extent permitted by applicable law.
8. United States Government. The Software and accompanying Documentati on are deemed to be "commercial computer software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR Section
12.212, as applicabl e . Any use, modification, reproduction, release, perf ormance, display or disclosure of the Software and accompanying Documentation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement.
9. Export Controls. Neither the Software nor the Documentation and underlying information or technology may be downloaded or otherwise exported or re-exported (i) into (or to a national or re sident of ) Cuba, Iran, Iraq, Libya, North K orea, Sudan, Syria or any other country to which the United States has embargoed goods; or (ii) to anyone on the United States Treasury Department’s list of Specially Designated Nations or the United States Commerce Department’ s Table of Denial Orders. By downloading or using the Software you are agr eeing to the foregoing and you are certifying that you are not located in, under the control of, or a national or resident of any such country or on any such list.
IN ADDITIO N, YOU SH OULD BE A WARE O F THE FO LLOWING : EXPORT O F THE SOFTWARE MAY BE SUBJECT TO COMPLIANCE WITH THE RULES AND REGULATIONS PROMULGATED FROM TIME TO TIME BY THE BUREAU OF EXPORT ADMINISTRATION, UNITED STATES DEPARTMENT OF COMMERCE, WHICH RESTRICT THE EXPORT AND RE-EXPORT OF CERTAIN PRODUCTS AND TECHNICAL DATA. IF THE EXPORT OF THE SOFTWARE IS CONTROLLED UNDER SUCH RULES AND REGULATIONS, THEN THE SOFTWARE SHALL NOT BE EXPORTED OR RE-EXPORTED, DIRECTLY OR INDIRECTLY, (A) WITHOUT ALL EXPORT OR RE-EXPORT LICENSES AND UNITED STATES OR OTHER GOVERNM EN TA L APPRO V AL S REQU IR ED BY AN Y APP LIC ABL E LA WS , OR (B) IN VIOLATION OF ANY APPLICABLE PROHIBITION AGAINST THE EXPORT OR RE-EXPORT OF ANY PART OF THE SOF TWARE.
QuickStart Guide v
SOME COUNTRIES HAVE RESTRICTIONS ON THE USE OF ENCRYPTION WITHIN THEIR BORDERS, OR THE IMPORT OR EXPORT OF ENCRYPTION EVEN IF FOR ONLY TEMPORARY PERSONAL OR BUSINESS USE. YOU ACKNOWLEDGE THAT THE IMPL EM ENTA TION AND EN FORC EMEN T OF TH ESE LAW S IS N OT AL WA YS CONSISTENT AS TO SPECIFIC COUNTRIES. ALTHOUGH THE FOLLOWING COUNTRIES ARE NOT AN EXHAUSTIVE LIST THERE MAY EXIST RESTRICTIONS ON THE EXPORTATION TO, OR IMPORTATION OF, ENCRYPTION BY: BELGIUM, CHINA (INCLUDING HONG KONG), FRANCE, INDIA, INDONESIA, ISRAEL, RUSSIA, SAUDI ARABIA, SINGAPORE, AND SOUTH KOREA. YOU ACKNOWLEDGE IT IS YOUR ULTIMATE RESPONSIBILITY TO COMPLY WITH ANY AND ALL GOVERNME NT EXPORT AND OTHER APPLICABL E LAWS AND THAT MCAFEE HAS NO FURTHER RESPONSIBILITY AFTER THE INITIAL SALE TO YOU WITHIN THE ORIGINAL COUNTRY OF SALE.
10.High Risk Activities. The Software is not fault-tolerant and is not designed or intended for use in hazardous environments requiring fail-safe performance, including without limitation, in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, weapons systems, direct life-support machines, or any other application in which the failure o f the Software co uld lead directly to death, person al injury, or severe physical or property damage (collectively, "High Risk Activities"). McAfee expressly disclaims any express or implied warranty of fitness for High Risk Activities.
11. Miscellaneous. This Agreement is governed by the laws of the United States and the State of California, without reference to conflict of laws principles. The application of the Unite d Na ti ons Co nv enti on of C on tra cts f or the I n ter nati ona l S ale of Goo ds i s e xp res sly excluded. This Agreement sets forth all rights for the user of the Software and is the entire agreement between the parties. This Agreement supersedes any other communications with respect to the Software and Documentation. This Agreement may not be modified except by a written addendum issued by a duly authorized representat ive of McAfee. No provision hereof shall be deemed waived unless such waiver shall be in writing and signed by McAfee or a duly authorized representative of McAfee. If any provision of this Agreement is held invalid , the remainder of this Agreement shall continue in full force and effect. The parties confirm that it is their wish that this Agreement has been written in the English language only.
12.McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would like to contact McAfee for any other reason, please call (972) 308-9960, or write: McAfee Software, 3965 Freedom Circle, Santa Cla ra, California 95054. http://www.mcafeehelp.com.
Statements made to you in the cours e of this sale a re subject to the Year 2000 Information and Readines s Di sclo sure Act ( Pub lic L aw 1 05-271 ). In t he case of a d isp ute, thi s Ac t may reduce your legal rights regarding the use of any statements regarding Year 2000 readiness, unless otherwise specif ied in your contract or tarif f .
vi VirusScan Wirele ss

Table of Contents

Chapter 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
About VirusScan Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
About handheld devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
About data synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
About DAT files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Installing VirusScan Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Organization of this QuickStart Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Contacting McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Chapter 2. VirusScan for Palm OS® . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
About Palm OS® . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Starting Palm AV components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Avai lable o pt ions o n the device componen t . . . . . . . . . . . . . . . . . . . . . . . . . .18
Available options on the PC component . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
What to Scan options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
When to Scan options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Other options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Updating Palm OS® anti-virus DAT files . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Removing VirusScan Wireless for Pal m OS® comp on ents . . . . . . . . . . . . . .22
Anti-virus alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Chapter 3. VirusScan for Windows® CE® and Pocket PC . . . . . . . . . . .23
About Windows® CE® . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
About Pocket PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Available options on the PC component . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
What to Scan options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
When to Scan options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Other options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Updating Windows® CE® or Pocket PC anti-virus DAT files . . . . . . . . . . . . .25
Anti-virus alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
QuickStart Guide vii
Table of Contents
Chapter 4. VirusScan for Symbian’s EPOC . . . . . . . . . . . . . . . . . . . . . . .27
About EPOC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Available options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
What to Scan options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
When to Scan options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Other options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Updating Symbian anti-virus DAT files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Anti-virus alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
Chapter 5. When a virus is detected . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Appendix A. Product Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
How to Contact McAfee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Customer service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Support via the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Telephone support numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
viii VirusScan Wirele ss
Table of Contents
QuickStart Guide ix
Table of Contents
x VirusScan Wireless

1Introduction

As the demand for handheld devices continue to grow, it carries with it, the
threat of compromising your data against viruses especially whenever you
exchange information between your PC and your handheld device.

About VirusScan Wireless

Viru sS c a n Wi re l ess is an a p p l ica tion d esi gned to pr otect y o u r d a ta b y
scanning the files on your handheld dev ice ever ytime a data excha nge or
update is perf ormed w ith you r comp uter. I t pr otects your sy stem fr om vi ruses
that may have been placed on your handheld device during the use of feat ures
such a s in f ra red tr ansfers and wi reless tran sa ction s .
While VirusScan Wireless protects your handheld device f rom any virus
threats, it is rec ommended that you also have an anti-virus appli cation
installed on your desktop computer like McAfee VirusScan.
For info rm a ti o n o n McA fe e V iru s S ca n, you can vis i t
www.mcafee-at-home.com

About handheld devices

1
Handheld devices that are currently available in the market today are
primarily designed as a more convenient alternative in storing and retrieving
information such as personal activities , people’s addresses, telephone
numbers, appointments, expenses, etc.
Either at work or at home, you can easily keep track of records in all of these
areas by simply using your handheld device. You can even set an alarm to alert
you of import ant meetings, e ve nts, or tasks to do during the day, week or
month. Figure 1-1 shows an example of a handhe l d devi ce.
QuickStart Guide 11
Loading...
+ 25 hidden pages