Release Notes for McAfee Firewall 2.10 Copyright (c) May 2000 Networks Associates Technology, Inc. All Rights Reserved. Thank you for using McAfee Firewall. Readme file contains important information regarding this release. Network Associates strongly recommends that you read the entire document. Network Associates welcomes your comments and suggestions. Please use the information provided in this file to contact Customer Care, technical support, or the documentation team for this product. WHAT'S IN THIS FILE - NF1 New Features - DC1 Documentation - SR1 System Requirements ++ - IN1 Installation - KN1 Known Issues - FQ1 Frequently Asked Questions - AD1 Additional Information ++ - NA1 Contacting Network Associates - YC1 Statement of Year 2000 Compliance - CT1 Copyright and Trademark Attributions NOTE: A unique identifying code precedes each heading in this file. To jump to a particular heading within the file, copy the three-character code--NA1, for example--from the list above into your text editor's Find dialog box, or equivalent, then search for the identifying code to move directly to that heading. **** IMPORTANT NOTES **** * McAfee Firewall was previously known as ConSeal Private Desktop. Any reference you may find on ConSeal Private Desktop refers to the same product now known as McAfee Firewall. * You must have Winsock 2 to fully install McAfee Firewall. For more information, refer to the FQ1 section below. If you need an update on Winsock 2, you can download the available version at http://www.microsoft.com/windows95/downloads/ contents/wuadmintools/s_wunetworkingtools/ w95sockets2/default.asp ******* __________________ NF1 - NEW FEATURES * Added automatic recognition of virtual adapters, including PGPnet, ICS, PPTP, PPPoE (Sympatico's HSE and WinPoET), SecuRemote and Extranet. * Added popup message telling trial users when their license expires (warning starts 5 days before expiry). * Suppression of a false error in the log file: Packet32: PacketOpenAdapter Could not open adapter. __________________ DC1 - DOCUMENTATION Network Associates provides each of its products with an extensive set of documentation, consisting usually of one or more product guides saved in Adobe Acrobat Portable Document Format (.PDF), and an online help system, whose form can vary, depending on the platform on which the product runs. Acrobat .PDF files are flexible online documents that contain hyperlinks, outlines and other aids for easy navigation and information retrieval. You can also install an Acrobat plug-in file that allows you to read .PDF documents from within your web browser while online. Copies of the product documentation come with the product CD-ROM. A copy of the free Acrobat Reader also comes with the product CD-ROM or is available from the Adobe website at: http://www.adobe.com/prodindex/acrobat/readstep.html Most Network Associates products can include a documentation set drawn from these components: NOTE: Not all products will include all listed documents. Consult the User's Guide or Administrator's Guide that comes with your product for a complete list. * A printed Getting Started Guide, which introduces the product, provides installation instructions, outlines product features, and provides a brief overview. In many cases, an electronic version of this guide will also be available on the product CD-ROM or from the Network Associates FTP site in Adobe Acrobat .PDF format. * A User’s Guide saved on the product CD-ROM or installed on your hard disk in Adobe Acrobat .PDF format. Network Associates User's Guides document all product functions extensively, and discuss how best to use your Network Associates product to accomplish your tasks. * An Administrator's Guide saved on the product CD-ROM or installed on your hard disk in Adobe Acrobat .PDF format. Administrator's Guides describe how to deploy, maintain and administer Network Associates server-based products in a networked environment. * Specialized guides. These can include reference guides, deployment guides, configuration guides, vulnerability guides for intrusion detection software, and other product-specific documentation. * An online help system. Online help gives you quick access to hints and tips about how to use your Network Associates software. The format of the online help system for the product will vary, depending on which platform or operating system you use to run your Network Associates product. In most cases, the software will display a Help menu item or link that you can use to start the system. Some products might also include context- sensitive online help. Right-click buttons, lists or other elements within dialog boxes to see brief, descriptive help topics. * A LICENSE.TXT file. This file outlines the terms of your license to use your Network Associates product. Read it carefully. If you install the Network Associates product, you agree to the license terms. * This Readme.txt file. This file contains last-minute additions or changes to the documentation, lists any known behavior or other issues with the product release, and often describes new product features incorporated into incremental product updates. To get answers to your technical support questions, send messages to: techsupport@mcafee.com. To ask about your eligibility for updates and upgrades, check your registration, or ask general questions related to Network Associates software, send messages to: custcare@nai.com _________________________ SR1 - SYSTEM REQUIREMENTS To use McAfee Firewall you need: * IBM PC or compatible computer running Windows 95/98 or Windows NT with SP4 or higher. * 5 megabytes (MB) minimum of RAM. * 16 MB free hard disk space. Additional disk space is required to install any optional Internet software that may be included on the compact disc (CD) version. * Microsoft mouse or compatible pointing device. * Access to the Internet, either a dial-up account with an Internet Service Provider (ISP) or a constant connection through a network. * Winsock 2 __________________ IN1 - INSTALLATION To install McAfee Firewall: * Close all open programs. * Insert the McAfee Firewall CD in the CD-ROM drive. * In the McAfee Firewall Setup screen, click Install McAfee Firewall. If the setup screen doesn’t start automatically when you close your CD-ROM drive, click Start on the Windows taskbar, click Run, then type d:\setup. If D is not the drive letter of your CD-ROM drive, substitute the correct drive letter. * Read the text in the Welcome to McAfee Firewall screen, then click Next to display the Software License Agreement. After you read the license agreement, click Yes to continue. * In the Choose Destination Location window, do one of the following: * To install the software into the default location C:\Program Files\McAfee Firewall, click Next>. * To install the files in an alternate location, click Browse, locate the appropriate directory, and then click OK. Click Next> to copy the McAfee Firewall files to your hard drive. * The final installation screen notifies you that the installation is complete and lets you choose to view the McAfee Firewall ReadMe file and start McAfee Firewall. By default, these options are selected. To disable either option, clear its check box. * Click Finish. Installing Windows NT Network Component You must first install McAfee Firewall before applying these instructions. All steps must be performed in the order shown below. * Start Network Control Panel (SETTINGS->CONTROL PANEL->NETWORK>). * Select tab. * Select . * Select . * If you have the McAfee Firewall CD, enter pathname to "WINNT4.0" subdirectory found in the CD installation folder. For example, if your CD-ROM drive letter is drive E, enter E:\MCFIRE\WINNT4.0. The McAfee Firewall Network Driver files wer also copied into the McAfee Firewall installation folder. To access the McAfee Firewall Driver files from here enter C:\Program Files\Mcafee\McAfee Firewall * Select . * Select "McAfee Firewall." * Select . The network component will install and will appear as the "McAfee Firewall Network Driver" network protocol. * Select from network control panel dialog box. Reboot your computer. Changing McAfee Firewall Operation To/From and NT Service McAfee Firewall for Windows NT can be run as an NT service to provide continuous protection for your PC. To manually setup McAfee Firewall as a service, please follow these instructions: * Start the Network Control Services Panel START->SETTINGS->CONTROL PANEL->SERVICES. * Highlight "McAfee Firewall" service. * Select . * Select the desired mode: MANUAL - McAfee Firewall runs only upon manual launch. AUTOMATIC - McAfee Firewall launched during login sequence. * Reboot your system for the service changes to take effect. __________________ KN1 - KNOWN ISSUES * McAfee Firewall does not currently fully support Windows 2000. You are able to use the program, however, features that uses the system settings will not work. see section on AD1 ________________________________ FQ1 - FREQUENTLY ASKED QUESTIONS * What is WinSock2? WinSock ("Windows Sockets") is an interface in your computer between the applications that you use (Explorer, Netscape, Eudora, Word, etc.) and the Operating System. This layer controls how your applications will interact with the rest of the computer. WinSock2 is an updated release of the original WinSock, adding new functionality and capabilites to Windows operating systems, thereby allowing your system to do more. Older machines may notice a slight slow down to some activities. * What will WinSock2 do to my PC? WinSock2 will enable your system to work with new applications that rely on improved WinSock features and management. Some older applications may not work and older machines may be slowed down slightly by WinSock2. * How do I install (uninstall ) WinSock2? Most WinSock2 kits are self-installing. If you install WinSock2 and have already attempted an installation, please reinstall McAfee Firewall completely after rebooting your PC. Most WinSock2 installation kits include an uninstall option and backup features. * Where do I get information about WinSock2 and the kit? WinSock2 is a free upgrade available from many sources including (but not limited to) software.com, download.com, ZDNet, Microsoft and Tucows. You can also download an update at: http://www.microsoft.com/windows95/downloads/ contents/wuadmintools/s_wunetworkingtools/ w95sockets2/default.asp * What does McAfee Firewall do? How does it do it? McAfee Firewall filters traffic at the devices that your system uses - network cards and modems. This means that McAfee Firewall can reject inbound traffic before that traffic can reach vital functions in your PC and before it can waste valuable system resources. McAfee Firewall does this by monitoring applications that are either trusted or not trusted. When trusted applications need to access a network, McAfee Firewall manages everything in the computer to allow that application's traffic. When McAfee Firewall see non-trusted applications trying to access a network, it blocks all traffic to and from that application. Some network communications are needed to maintain network-based services. These are managed through user defined rules under the SYSTEM button. The default SYSTEM settings will provide protection from hostile threats. The installation routine will prompt with some basic questions to set up McAfee Firewall to do what you need (e.g. allow fileshares or not). * APPLICATION and SYSTEM: What do they mean? McAfee Firewall manages your network privacy through two large areas---APPLICATION traffic and SYSTEM traffic. APPLICATION traffic is based on trusting or not trusting applications that you know and use. SYSTEM traffic is more static and will allow or not allow things like fileshares and ICMP (control) traffic. When you click on APPLICATION, you must choose whether you will automatically trust all applications or not. If you choose to trust all applications, everthing that applications on your PC try to do will automatically be allowed. This is probably not a good thing to do, is it will open your PC to attack. If you choose to not trust applications, McAfee Firewall will begin to manage a "trusted" list and a "not trusted" list. You can always click on APPLICATION to see these lists and move known applications around. Once McAfee Firewall knows an application, it remembers it the next time the McAfee Firewall or the application in question is run. As new applications are run in the "not-trusted" mode, the system will prompt you for whether to trust this application or not. If McAfee Firewall asks you about an application that you know you are not currently running, or you do not have on your system, care should be taken in trusting it. Make certain you know what you are doing. While McAfee Firewall blocks the trojan horse, Back Oriface (BO), be default, it provides a good example of what might happen with other suspect applications. As BO attempted to run on your system and communicate out, McAfee Firewall would have captured this activity and asked you whether or not to trust it. It would have appeared to you as an application without an icon. Since you don't know what is happening, block it. System behaviour is defined under the SYSTEM button on a per device basis. Each device can have its own behaviour. For example, a network card may allow fileshares (sharing computer resources between trusted computers using the NetBIOS protocol); but that could be turned off over a modem to the Internet. The same applies to other basic services. For the most part, you need not concern yourself with protocols such as ARP, ICMP, NetBEUI and the like. If you need them, you probably know what they are. * What does the McAfee Firewall main window show? The MAIN window of McAfee Firewall (below the FILE, APPLICATION, SYSTEM, SYSTRAY and HELP tabs) shows activity that is live on your system. It also provides you with "radio-buttons" for global options like logging and overall behaviour of McAfee Firewall. * What do SUMMARY and DETAIL mean? SUMMARY shows basic applications that are trusted or not trusted in the main window of McAfee Firewall. DETAIL splits the main window into a left-hand summary side and a right-hand detail side that describe the network activity on your system. * What is the left-hand side for in DETAIL mode? The left-hand side show the two major network activity areas in your system: APPLICATION traffic and SYSTEM traffic. It also shows red current activity icon and blue log icon (if logging is enabled). Note that this is similar to the window's appearance when running SUMMARY mode with the addition of the current activity and log icons. When there is activity in the application area, a "+" sign appears in front of the icon. Clicking on the "+" sign will make it a "-" sign and will show the applications that McAfee Firewall is currently monitoring. There is always a "+" or a "-" in front of the system and application icons. This works exactly the same way as Windows Explorer, except that McAfee Firewall presents activities and applications (not files and folders). Each application can also be in a closed, explicit or inactive state. If a "+" or "-" sign appears in front of an application, that application is doing something. Clicking on the "+" or "-" sign will cause it to change state. In the explicit state, the application traffic will show "real-time" with red (block) arrows or green (allow) arrows for traffic direction and an icon to show the type of traffic as well as IP address or system names for the traffic. Applications with a red "X" on them are untrusted applications. * What is the right-hand side for in DETAIL mode? The right-hand side shows details on items that are highlighted on the left-hand side. * What does an X on an application mean? An "X" means that the application is not trusted and is being blocked by McAfee Firewall. * What do the little + and - signs mean and how do I use them? As described in section D., the "+" and "-" indicate activity in an item. The "+" sign is a closed state and shows not details. When the "+" sign is clicked, it becomes a "-" sign and represents an explicit state that shows details on the left-hand side of the main window. * The system is prompting me to trust an application. What should I do? The system will treat applications in one of two ways: (1)trust all applications or (2)don't trust all applications. This is set by clicking on APPLICATION and removing or adding a check mark to the TRUST ALL APPLICATIONS box. When there is no check mark here, McAfee Firewall will build a trusted list and a not-trusted list of applications. As new applications are run, if McAfee Firewall does not trust all applications, it will prompt the user to decide how it should treat each application. To change the status of an application, click on APPLICATION and move the application in question from the left, trusted list to or from the right, not-trusted list. NOTE-trusted applications can send and receive traffic; not-trusted applications can not. * Log files: Where are my log files and how do they work? The log files reside in the Private Desktop folder. This folder is in C:\PROGRAM FILES\McAfee\McAfee Firewall unless you chose another folder at installation. The files are of the format YYYYMM.log. For example, in September of 1999, the current log file will be 199909.log. Each log file can be up to 2 MB in size before warnings are generated by the system and only essential messages are then written. If there is no log file, a new one is built for the current month. This means that a full log file can be deleted or renamed, and a new one will instantly replace it. The log file is in a ".txt" format and can be read with any text editor. * Network Control Buttons: What do they do? The NETWORK CONTROL buttons are at top left of the McAfee Firewall application window. They determine the overall behaviour of McAfee Firewall. Only one button can be selected at a time here: The first BLOCK EVERYTHING button will cause all traffic to be blocked regardless of any options chosen anywhere else. The second FILTER TRAFFIC button will cause all traffic to be processed as defined by options chosen elsewhere in McAfee Firewall. The final ALLOW EVERYTHING button will cause all traffic to be allowed, regardless of options chosen elsewhere in McAfee Firewall. This is a permissive mode and effectively turns off all protection provided by McAfee Firewall. * Display Buttons: What do they do? The DISPLAY buttons are in the top middle of the McAfee Firewall application window. They determine the single screen or split screen nature of the main portion of the McAfee Firewall window. * System Tray: How can McAfee Firewall start in the system tray? Click on SYS TRAY and select "Start in System Tray" * Auto Start: How can McAfee Firewall run automatically when I start my PC? You need to put a shortcut to the McAfee Firewall icon in the startup folder. This is C:\WINDOWS\ START MENU\ PROGRAM\STARTUP. This will make McAfee Firewall run instantly when your system is booted. * Network traffic: Why does McAfee Firewall shut off existing network traffic when it is launched? McAfee Firewall is first and foremost a security product. If you suspect you are under attack, launching McAfee Firewall will quickly and effectively terminate hostile network traffic. Any applications that you were running before launching McAfee Firewall, will now be monitored. Having stated the above, we recommend that McAfee Firewall always be run upon system startup. * Internet dialup connection is lost when McAfee Firewall is closed. McAfee Firewall forces you to disconnect and reconnect from the Internet when it is closed. If you have attracted hostile attention, this will help because it will give your PC a new IP address. If someone was attacking you when you closed McAfee Firewall, this will force him or her to find you again before resuming an attack. Make certain your McAfee Firewall is always active when connected to other systems. We recommend that McAfee Firewall be run upon system startup and remain on during your entire session. ____________________________ AD1 - ADDITIONAL INFORMATION * Fixed System Tray menu items for Block, Filter and Allow. * Fixed bug that, under certain circumstances, would block traffic for up to 8 seconds when a new IP address was assigned. * Fixed a bug in that prevents VPN's from connecting. * Added a warning about using the "Record Application Traffic" option, since it can use a lot of disk space very quickly. ___________________________________ NA1 - CONTACTING NETWORK ASSOCIATES On December 1, 1997, McAfee Associates merged with Network General Corporation, Pretty Good Privacy, Inc., and Helix Software, Inc. to form Network Associates, Inc. The combined Company subsequently acquired Dr Solomon's Software, Trusted Information Systems, and CyberMedia, Inc. Network Associates continues to market and support the product lines from each of the former entities. You may direct all questions, comments, or requests concerning the software you purchased, your registration status, or similar issues to the Network Associates Customer Care department at the addresses or phone numbers listed below. Contact the Network Associates Customer Care department at: 1. Phone (408) 988-3832 Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time 2. Fax (408) 970-9727 24-hour, Group III Fax 3. Fax-back automated response system (408) 346-3414 4. E-mail: custcare@nai.com Send correspondence to any of the following Network Associates locations: Network Associates Corporate Headquarters 3965 Freedom Circle McCandless Towers Santa Clara, CA 95054 Phone numbers for corporate-licensed customers: Phone: (408) 988-3832 Fax: (408) 970-9727 Phone numbers for retail-licensed customers: Phone: (972) 278-6100 Fax: (408) 970-9727 **** McAfee Contact Information **** If you need further assistance or have specific questions about McAfee products, send your questions via email to the appropriate address below: * For general questions about ordering software: mcafeestore@beyond.com * For help in downloading software: mcafeedownloadhelp@beyond.com * For a status on an existing order: mcafeeorderstatus@beyond.com * To inquire about a promotion: mcafeepromotions@beyond.com Support via the Web McAfee is famous for its dedication to customer satisfaction. We have continued this tradition by making our site on the World Wide Web (http://www.mcafee.com) a valuable resource for answers to technical support issues. We encourage you to make this your first stop for answers to frequently asked questions, for updates to McAfee software, and for access to McAfee news and virus information. Take advantage of the McAfee Product KnowledgeCenter-your free online product support center - 24 hours a day, 7 days a week (http://support.mcafee.com/tech_supp/pkc.asp). Support forums If you do not find what you need or do not have web access, try one of our automated services. World Wide Web www.mcafee.com CompuServe GO MCAFEE America Online keyword MCAFEE Microsoft Network mcafee If the automated services do not have the answers you need, please contact McAfee at the following numbers Monday through Friday between 9:00 AM and 6:00 PM Pacific time for 30-day free support and and 24 hours a day - 7 days a week for Per Minute or Per Incident support. 30-Day Free Telephone Support 972-855-7044 Per Minute Telephone Support 1-900-225-5624 Per Incident Telephone Support($35)1-800-950-1165 Disclaimer: Time and telephone numbers are subject to change without prior notice. ******** Network Associates offices outside the United States: Network Associates Australia Level 1, 500 Pacific Highway St. Leonards, NSW Sydney, Australia 2065 Phone: 61-2-8425-4200 Fax: 61-2-9439-5166 Network Associates Austria Pulvermuehlstrasse 17 Linz, Austria Postal Code A-4040 Phone: 43-732-757-244 Fax: 43-732-757-244-20 Network Associates Belgium Bessenveldtstraat 25a Diegem, Belgium - 1831 Phone: 32-3-716-4070 Fax: 61-2-716-4770 Network Associates do Brasil Rua Geraldo Flausino Gomez 78 Cj. - 51 Brooklin Novo - São Paulo SP - 04575-060 - Brasil Phone: (55 11) 5505 1009 Fax: (55 11) 5505 1006 Network Associates Canada 139 Main Street, Suite 201 Unionville, Ontario Canada L3R 2G6 Phone: (905) 479-4189 Fax: (905) 479-4540 Network Associates People's Republic of China New Century Office Tower, Room 1557 No. 6 Southern Road Capitol Gym Beijing People's Republic of China 100044 Phone: 86 10 6849-2650 Fax: 86 10 6849-2069 Network Associates Denmark Lautruphoej 1-3 2750 Ballerup Danmark Phone: 45 70 277 277 Fax: 45 44 209 910 NA Network Associates Oy Sinikalliontie 9, 3rd Floor 02630 Espoo Finland Phone: 358 9 5270 70 Fax: 358 9 5270 7100 Network Associates France S.A. 50 Rue de Londres 75008 Paris France Phone: 33 1 44 908 737 Fax: 33 1 45 227 554 Network Associates GmbH Ohmstraße 1 D-85716 Unterschleißheim Deutschland Phone: 49 (0)89/3707-0 Fax: 49 (0)89/3707-1199 Network Associates Hong Kong 19th Floor, Matheson Centre 3 Matheson Way Causeway Bay Hong Kong 63225 Phone: 852-2832-9525 Fax: 852-2832-9530 Network Associates Srl Centro Direzionale Summit Palazzo D/1 Via Brescia, 28 20063 - Cernusco sul Naviglio (MI) ITALY Phone: 39 02 92 65 01 Fax: 39 02 92 14 16 44 Network Associates Japan, Inc. Toranomon 33 Mori Bldg. 3-8-21 Toranomon Minato-ku Tokyo 105-0001 Japan Phone: 81 3 5408 0700 Fax: 81 3 5408 0780 Network Associates Latin America 1200 South Pine Island Road, Suite 205 Plantation, Florida 33324 United States Phone: (954) 452-1721 Fax: (954) 236-8031 Network Associates de Mexico Andres Bello No. 10, 4 Piso 4th Floor Col. Polanco Mexico City, Mexico D.F. 11560 Phone: (525) 282-9180 Fax: (525) 282-9183 Network Associates International B.V. Gatwickstraat 25 1043 GL Amsterdam The Netherlands Phone: 31 20 586 6100 Fax: 31 20 586 6101 Network Associates Portugal Av. da Liberdade, 114 1269-046 Lisboa Portugal Phone: 351 1 340 4543 Fax: 351 1 340 4575 Net Tools Network Associates South Africa Bardev House, St. Andrews Meadowbrook Lane Epson Downs, P.O. Box 7062 Bryanston, Johannesburg South Africa 2021 Phone: 27 11 706-1629 Fax: 27 11 706-1569 Network Associates South East Asia 78 Shenton Way #29-02 Singapore 079120 Phone: 65 222-7555 Fax: 65 222-7555 Network Associates Spain Orense 4, 4a Planta. Edificio Trieste 28020 Madrid Spain Phone: 34 91 598 18 00 Fax: 34 91 556 14 04 Network Associates Sweden Datavägen 3A Box 596 S-175 26 Järfälla Sweden Phone: 46 (0) 8 580 88 400 Fax: 46 (0) 8 580 88 405 Network Associates AG Baeulerwisenstrasse 3 8152 Glattbrugg Switzerland Phone: 0041 1 808 99 66 Fax: 0041 1 808 99 77 Network Associates Taiwan Suite 6, 11F No. 188, Sec. 5 Nan King E. Rd. Taipei, Taiwan, Republic of China Phone: 886-2-27-474-8800 Fax: 886-2-27-635-5864 Network Associates International Ltd. Minton Place, Victoria Street Windsor, Berkshire SL4 1EG United Kingdom Phone: 44 (0)1753 827 500 Fax: 44 (0)1753 827 520 Or, you can receive online assistance through any of the following resources: 1. Internet E-mail: support@nai.com 2. Internet FTP: ftp://ftp.nai.com 3. World Wide Web: http://support.nai.com 4. America Online: keyword MCAFEE 5. CompuServe: GO NAI To provide the answers you need quickly and efficiently, the Network Associates technical support staff needs some information about your computer and your software. Please have this information ready when you call: - Program name and version number - Computer brand and model - Any additional hardware or peripherals connected to your computer - Operating system type and version numbers - Network name, operating system, and version - Network card installed, where applicable - Modem manufacturer, model, and bits-per- second rate, where applicable - Relevant browsers or applications and their version numbers, where applicable - How to reproduce your problem: when it occurs, whether you can reproduce it regularly, and under what conditions - Information needed to contact you by voice, fax, or e-mail Network Associates also seeks and appreciates general feedback. * FOR PRODUCT UPGRADES * Network Associates has a worldwide range of partnerships and reseller relationships with hundreds of independent vendors, each of which can provide you with consulting services, sales advice, and product support for Network Associates software. To find a reseller near your location, see the RESELLER.TXT file located on your product CD-ROM or installed on your hard disk. For assistance in locating a local reseller, you can also contact Network Associates Customer Care. * FOR REPORTING PROBLEMS * Network Associates prides itself on delivering a high-quality product. If you find any problems, please take a moment to review the contents of this file. If the problem you've encountered appears in the Known Issues section of this README.TXT file, Network Associates is already aware of the problem, and you need not report it. If you find any feature that does not appear to function properly on your system, or if you believe an application would benefit greatly from enhancement, please contact Network Associates or one of its resellers with your suggestions or concerns. * FOR ON-SITE TRAINING INFORMATION * Contact Network Associates Customer Service at (800) 338-8754. * NETWORK ASSOCIATES BETA SITE * To test pre-release software and obtain update files, including virus definition (.DAT) files, visit the Network Associates beta site at http://beta.nai.com. You will have access to Public Beta and External Test Areas. Your feedback will make a difference. * AVERT ANTI-VIRUS RESEARCH SITE * To see the latest information about emerging virus threats, submit samples of potentially infected files, and download updated scanning engine files, EXTRA.DAT files, and similar anti-virus software for testing, visit the AVERT research site at: http://www.avertlabs.com. _______________________________________ YC1 - STATEMENT OF YEAR 2000 COMPLIANCE To learn about Network Associates Year 2000 standards and testing models, and to see a list of compliant Network Associates products, visit the Network Associates website at: http://www.nai.com/y2k For further information or questions, send an e-mail message to: y2k@nai.com. __________________________________________ CT1 - COPYRIGHT AND TRADEMARK ATTRIBUTIONS Copyright (c) 1999 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies. * TRADEMARKS * * ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon’s, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey- International, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, and ZAC 2000 are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. * LICENSE AGREEMENT * NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR LICENSE TO USE THE SOFTWARE THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE LICENSE.TXT, README.1ST, OR OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE, EITHER AS A TEXT FILE OR AS PART OF THE SOFTWARE PACKAGING. IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH THEREIN, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.