home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hobby PC 9
/
Hobby PC 09.iso
/
Mcfire
/
README.TXT
< prev
next >
Wrap
Text File
|
2000-05-02
|
37KB
|
1,047 lines
Release Notes for McAfee Firewall 2.10
Copyright (c) May 2000 Networks Associates
Technology, Inc. All Rights Reserved.
Thank you for using McAfee Firewall. Readme
file contains important information
regarding this release. Network Associates
strongly recommends that you read the entire
document.
Network Associates welcomes your comments and
suggestions. Please use the information
provided in this file to contact Customer
Care, technical support, or the documentation
team for this product.
WHAT'S IN THIS FILE
- NF1 New Features
- DC1 Documentation
- SR1 System Requirements ++
- IN1 Installation
- KN1 Known Issues
- FQ1 Frequently Asked Questions
- AD1 Additional Information ++
- NA1 Contacting Network Associates
- YC1 Statement of Year 2000 Compliance
- CT1 Copyright and Trademark Attributions
NOTE: A unique identifying code precedes
each heading in this file. To jump to
a particular heading within the file,
copy the three-character code--NA1,
for example--from the list above into
your text editor's Find dialog box, or
equivalent, then search for the
identifying code to move directly to
that heading.
**** IMPORTANT NOTES ****
* McAfee Firewall was previously known as
ConSeal Private Desktop. Any reference you
may find on ConSeal Private Desktop refers
to the same product now known as McAfee Firewall.
* You must have Winsock 2 to fully install McAfee
Firewall. For more information, refer to the
FQ1 section below.
If you need an update on Winsock 2,
you can download the available version at
http://www.microsoft.com/windows95/downloads/
contents/wuadmintools/s_wunetworkingtools/
w95sockets2/default.asp
*******
__________________
NF1 - NEW FEATURES
* Added automatic recognition of
virtual adapters, including PGPnet,
ICS, PPTP, PPPoE (Sympatico's HSE
and WinPoET), SecuRemote and Extranet.
* Added popup message telling trial
users when their license expires
(warning starts 5 days before expiry).
* Suppression of a false error in the log
file: Packet32: PacketOpenAdapter
Could not open adapter.
__________________
DC1 - DOCUMENTATION
Network Associates provides each of its
products with an extensive set of documentation,
consisting usually of one or more product guides
saved in Adobe Acrobat Portable Document Format
(.PDF), and an online help system, whose form
can vary, depending on the platform on which the
product runs.
Acrobat .PDF files are flexible online documents
that contain hyperlinks, outlines and other aids
for easy navigation and information retrieval.
You can also install an Acrobat plug-in file
that allows you to read .PDF documents from
within your web browser while online. Copies
of the product documentation come with the
product CD-ROM.
A copy of the free Acrobat Reader also comes
with the product CD-ROM or is available from
the Adobe website at:
http://www.adobe.com/prodindex/acrobat/readstep.html
Most Network Associates products can include a
documentation set drawn from these components:
NOTE: Not all products will include all listed
documents. Consult the User's Guide or
Administrator's Guide that comes with
your product for a complete list.
* A printed Getting Started Guide, which
introduces the product, provides
installation instructions, outlines product
features, and provides a brief overview. In
many cases, an electronic version of this
guide will also be available on the product
CD-ROM or from the Network Associates FTP
site in Adobe Acrobat .PDF format.
* A UserÆs Guide saved on the product CD-ROM or
installed on your hard disk in Adobe Acrobat
.PDF format. Network Associates User's Guides
document all product functions extensively,
and discuss how best to use your Network
Associates product to accomplish your tasks.
* An Administrator's Guide saved on the product
CD-ROM or installed on your hard disk in
Adobe Acrobat .PDF format. Administrator's
Guides describe how to deploy, maintain and
administer Network Associates server-based
products in a networked environment.
* Specialized guides. These can include
reference guides, deployment guides,
configuration guides, vulnerability guides
for intrusion detection software, and other
product-specific documentation.
* An online help system. Online help gives you
quick access to hints and tips about how to
use your Network Associates software. The
format of the online help system for the
product will vary, depending on which
platform or operating system you use to run
your Network Associates product. In most
cases, the software will display a Help menu
item or link that you can use to start the
system.
Some products might also include context-
sensitive online help. Right-click buttons,
lists or other elements within dialog boxes
to see brief, descriptive help topics.
* A LICENSE.TXT file. This file outlines the
terms of your license to use your Network
Associates product. Read it carefully. If
you install the Network Associates product,
you agree to the license terms.
* This Readme.txt file. This file contains
last-minute additions or changes to the
documentation, lists any known behavior or
other issues with the product release,
and often describes new product features
incorporated into incremental product
updates.
To get answers to your technical support
questions, send messages to:
techsupport@mcafee.com.
To ask about your eligibility for updates and
upgrades, check your registration, or ask
general questions related to Network Associates
software, send messages to:
custcare@nai.com
_________________________
SR1 - SYSTEM REQUIREMENTS
To use McAfee Firewall you need:
* IBM PC or compatible computer running
Windows 95/98 or Windows NT with SP4 or
higher.
* 5 megabytes (MB) minimum of RAM.
* 16 MB free hard disk space. Additional
disk space is required to install any
optional Internet software that may be
included on the compact disc (CD) version.
* Microsoft mouse or compatible pointing device.
* Access to the Internet, either a dial-up
account with an Internet Service Provider
(ISP) or a constant connection through a
network.
* Winsock 2
__________________
IN1 - INSTALLATION
To install McAfee Firewall:
* Close all open programs.
* Insert the McAfee Firewall CD in the
CD-ROM drive.
* In the McAfee Firewall Setup screen,
click Install McAfee Firewall. If the setup screen
doesnÆt start automatically when you close
your CD-ROM drive, click Start on the Windows
taskbar, click Run, then type d:\setup. If D
is not the drive letter of your CD-ROM drive,
substitute the correct drive letter.
* Read the text in the Welcome to McAfee Firewall
screen, then click Next to display the
Software License Agreement. After you read the
license agreement, click Yes to continue.
* In the Choose Destination Location window,
do one of the following:
* To install the software into the default
location C:\Program Files\McAfee Firewall, click Next>.
* To install the files in an alternate location,
click Browse, locate the appropriate directory,
and then click OK. Click Next> to copy the
McAfee Firewall files to your hard drive.
* The final installation screen notifies you that
the installation is complete and lets you choose
to view the McAfee Firewall ReadMe file and start McAfee
Firewall. By default, these options are selected.
To disable either option, clear its check box.
* Click Finish.
Installing Windows NT Network Component
You must first install McAfee Firewall before applying
these instructions. All steps must be performed in the
order shown below.
* Start Network Control Panel
(<START BUTTON->SETTINGS->CONTROL PANEL->NETWORK>).
* Select <PROTOCOLS> tab.
* Select <ADD>.
* Select <HAVE DISK...>.
* If you have the McAfee Firewall CD, enter pathname
to "WINNT4.0" subdirectory found in the CD
installation folder. For example, if your CD-ROM
drive letter is drive E, enter E:\MCFIRE\WINNT4.0.
The McAfee Firewall Network Driver files wer also
copied into the McAfee Firewall installation folder.
To access the McAfee Firewall Driver files from here
enter C:\Program Files\Mcafee\McAfee Firewall
* Select <OK>.
* Select "McAfee Firewall."
* Select <OK>.
The network component will install and will appear
as the "McAfee Firewall Network Driver" network
protocol.
* Select <CLOSE> from network control panel dialog box.
Reboot your computer.
Changing McAfee Firewall Operation To/From and NT Service
McAfee Firewall for Windows NT can be run as an NT service
to provide continuous protection for your PC. To manually
setup McAfee Firewall as a service, please follow these
instructions:
* Start the Network Control Services Panel
START->SETTINGS->CONTROL PANEL->SERVICES.
* Highlight "McAfee Firewall" service.
* Select <STARTUP>.
* Select the desired mode:
MANUAL - McAfee Firewall runs only upon manual launch.
AUTOMATIC - McAfee Firewall launched during login
sequence.
* Reboot your system for the service changes to take
effect.
__________________
KN1 - KNOWN ISSUES
* McAfee Firewall does not currently fully support
Windows 2000. You are able to use the program,
however, features that uses the system settings
will not work.
see section on AD1
________________________________
FQ1 - FREQUENTLY ASKED QUESTIONS
* What is WinSock2?
WinSock ("Windows Sockets") is an interface
in your computer between the applications that
you use (Explorer, Netscape, Eudora, Word, etc.)
and the Operating System. This layer controls how
your applications will interact with the rest of
the computer. WinSock2 is an updated release of the
original WinSock, adding new functionality and
capabilites to Windows operating systems, thereby
allowing your system to do more. Older machines
may notice a slight slow down to some activities.
* What will WinSock2 do to my PC?
WinSock2 will enable your system to work with
new applications that rely on improved WinSock
features and management. Some older applications
may not work and older machines may be slowed down
slightly by WinSock2.
* How do I install (uninstall ) WinSock2?
Most WinSock2 kits are self-installing. If you
install WinSock2 and have already attempted an
installation, please reinstall McAfee Firewall
completely after rebooting your PC. Most WinSock2
installation kits include an uninstall option
and backup features.
* Where do I get information about WinSock2
and the kit?
WinSock2 is a free upgrade available from many
sources including (but not limited to) software.com,
download.com, ZDNet, Microsoft and Tucows.
You can also download an update at:
http://www.microsoft.com/windows95/downloads/
contents/wuadmintools/s_wunetworkingtools/
w95sockets2/default.asp
* What does McAfee Firewall do? How does it do it?
McAfee Firewall filters traffic at the devices that
your system uses - network cards and modems. This means
that McAfee Firewall can reject inbound traffic before
that traffic can reach vital functions in your PC and
before it can waste valuable system resources.
McAfee Firewall does this by monitoring applications
that are either trusted or not trusted. When trusted
applications need to access a network, McAfee Firewall
manages everything in the computer to allow that
application's traffic. When McAfee Firewall see
non-trusted applications trying to access a network,
it blocks all traffic to and from that application.
Some network communications are needed to maintain
network-based services. These are managed through
user defined rules under the SYSTEM button. The default
SYSTEM settings will provide protection from hostile
threats. The installation routine will prompt with some
basic questions to set up McAfee Firewall to do what
you need (e.g. allow fileshares or not).
* APPLICATION and SYSTEM: What do they mean?
McAfee Firewall manages your network privacy
through two large areas---APPLICATION traffic and
SYSTEM traffic. APPLICATION traffic is based on trusting
or not trusting applications that you know and use.
SYSTEM traffic is more static and will allow or not allow
things like fileshares and ICMP (control) traffic.
When you click on APPLICATION, you must choose whether
you will automatically trust all applications or not. If
you choose to trust all applications, everthing that
applications on your PC try to do will automatically
be allowed. This is probably not a good thing to do,
is it will open your PC to attack. If you choose to not
trust applications, McAfee Firewall will begin to manage
a "trusted" list and a "not trusted" list. You can always
click on APPLICATION to see these lists and move known
applications around.
Once McAfee Firewall knows an application, it remembers
it the next time the McAfee Firewall or the application
in question is run. As new applications are run in the
"not-trusted" mode, the system will prompt you for
whether to trust this application or not.
If McAfee Firewall asks you about an application that you
know you are not currently running, or you do not have on
your system, care should be taken in trusting it. Make
certain you know what you are doing. While McAfee Firewall
blocks the trojan horse, Back Oriface (BO), be default,
it provides a good example of what might happen with other
suspect applications. As BO attempted to run on your system
and communicate out, McAfee Firewall would have captured
this activity and asked you whether or not to trust it.
It would have appeared to you as an application without
an icon. Since you don't know what is happening, block it.
System behaviour is defined under the SYSTEM button on a
per device basis. Each device can have its own behaviour.
For example, a network card may allow fileshares (sharing
computer resources between trusted computers using the
NetBIOS protocol); but that could be turned off over a
modem to the Internet. The same applies to other basic
services. For the most part, you need not concern yourself
with protocols such as ARP, ICMP, NetBEUI and the like. If
you need them, you probably know what they are.
* What does the McAfee Firewall main window show?
The MAIN window of McAfee Firewall (below the
FILE, APPLICATION, SYSTEM, SYSTRAY and HELP tabs) shows
activity that is live on your system. It also provides
you with "radio-buttons" for global options like logging
and overall behaviour of McAfee Firewall.
* What do SUMMARY and DETAIL mean?
SUMMARY shows basic applications that are trusted or
not trusted in the main window of McAfee Firewall.
DETAIL splits the main window into a left-hand
summary side and a right-hand detail side that describe
the network activity on your system.
* What is the left-hand side for in DETAIL mode?
The left-hand side show the two major network activity
areas in your system: APPLICATION traffic and SYSTEM
traffic. It also shows red current activity icon and
blue log icon (if logging is enabled). Note that this
is similar to the window's appearance when running SUMMARY
mode with the addition of the current activity and log icons.
When there is activity in the application area, a "+"
sign appears in front of the icon. Clicking on the "+" sign
will make it a "-" sign and will show the applications that
McAfee Firewall is currently monitoring. There is
always a "+" or a "-" in front of the system and application
icons. This works exactly the same way as Windows Explorer,
except that McAfee Firewall presents activities and
applications (not files and folders).
Each application can also be in a closed, explicit or inactive
state. If a "+" or "-" sign appears in front of an application,
that application is doing something. Clicking on the "+" or "-"
sign will cause it to change state. In the explicit state, the
application traffic will show "real-time" with red (block)
arrows or green (allow) arrows for traffic direction and an
icon to show the type of traffic as well as IP address or
system names for the traffic. Applications with a red "X"
on them are untrusted applications.
* What is the right-hand side for in DETAIL mode?
The right-hand side shows details on items that are
highlighted on the left-hand side.
* What does an X on an application mean?
An "X" means that the application is not trusted and is
being blocked by McAfee Firewall.
* What do the little + and - signs mean and how do I use them?
As described in section D., the "+" and "-" indicate activity
in an item. The "+" sign is a closed state and shows not
details. When the "+" sign is clicked, it becomes a "-"
sign and represents an explicit state that shows details
on the left-hand side of the main window.
* The system is prompting me to trust an application.
What should I do?
The system will treat applications in one of two ways:
(1)trust all applications or (2)don't trust all applications.
This is set by clicking on APPLICATION and removing or adding
a check mark to the TRUST ALL APPLICATIONS box.
When there is no check mark here, McAfee Firewall
will build a trusted list and a not-trusted list of applications.
As new applications are run, if McAfee Firewall does
not trust all applications, it will prompt the user to
decide how it should treat each application. To change the
status of an application, click on APPLICATION and move the
application in question from the left, trusted list to or
from the right, not-trusted list. NOTE-trusted applications
can send and receive traffic; not-trusted applications can not.
* Log files: Where are my log files and how do they work?
The log files reside in the Private Desktop folder. This folder
is in C:\PROGRAM FILES\McAfee\McAfee Firewall unless you chose
another folder at installation. The files are of the format
YYYYMM.log. For example, in September of 1999, the current
log file will be 199909.log. Each log file can be up to 2
MB in size before warnings are generated by the system and
only essential messages are then written. If there is no log
file, a new one is built for the current month. This means
that a full log file can be deleted or renamed, and a new
one will instantly replace it.
The log file is in a ".txt" format and can be read
with any text editor.
* Network Control Buttons: What do they do?
The NETWORK CONTROL buttons are at top left of the
McAfee Firewall application window.
They determine the overall behaviour of McAfee Firewall.
Only one button can be selected at a time here:
The first BLOCK EVERYTHING button will cause all traffic to
be blocked regardless of any options chosen anywhere else.
The second FILTER TRAFFIC button will cause all traffic to
be processed as defined by options chosen elsewhere in
McAfee Firewall.
The final ALLOW EVERYTHING button will cause all traffic to
be allowed, regardless of options chosen elsewhere in
McAfee Firewall. This is a permissive mode and
effectively turns off all protection provided by McAfee
Firewall.
* Display Buttons: What do they do?
The DISPLAY buttons are in the top middle of the
McAfee Firewall application window. They determine
the single screen or split screen nature of the main portion of
the McAfee Firewall window.
* System Tray: How can McAfee Firewall start in the system tray?
Click on SYS TRAY and select "Start in System Tray"
* Auto Start: How can McAfee Firewall run automatically
when I start my PC?
You need to put a shortcut to the McAfee Firewall
icon in the startup folder. This is C:\WINDOWS\ START MENU\
PROGRAM\STARTUP. This will make McAfee Firewall run
instantly when your system is booted.
* Network traffic: Why does McAfee Firewall shut off existing
network traffic when it is launched?
McAfee Firewall is first and foremost a security product.
If you suspect you are under attack, launching McAfee Firewall
will quickly and effectively terminate hostile network
traffic. Any applications that you were running before launching
McAfee Firewall, will now be monitored.
Having stated the above, we recommend that McAfee Firewall
always be run upon system startup.
* Internet dialup connection is lost when McAfee Firewall
is closed.
McAfee Firewall forces you to disconnect and reconnect
from the Internet when it is closed. If you have attracted
hostile attention, this will help because it will give your
PC a new IP address. If someone was attacking you when you
closed McAfee Firewall, this will force him or her to
find you again before resuming an attack.
Make certain your McAfee Firewall is always active
when connected to other systems. We recommend that McAfee Firewall
be run upon system startup and remain on during
your entire session.
____________________________
AD1 - ADDITIONAL INFORMATION
* Fixed System Tray menu items for
Block, Filter and Allow.
* Fixed bug that, under certain
circumstances, would block traffic
for up to 8 seconds when a new IP
address was assigned.
* Fixed a bug in that prevents VPN's
from connecting.
* Added a warning about using the
"Record Application Traffic"
option, since it can use a lot
of disk space very quickly.
___________________________________
NA1 - CONTACTING NETWORK ASSOCIATES
On December 1, 1997, McAfee Associates merged
with Network General Corporation, Pretty Good
Privacy, Inc., and Helix Software, Inc. to form
Network Associates, Inc. The combined Company
subsequently acquired Dr Solomon's Software,
Trusted Information Systems, and CyberMedia,
Inc.
Network Associates continues to market and
support the product lines from each of the
former entities. You may direct all questions,
comments, or requests concerning the software
you purchased, your registration status, or
similar issues to the Network Associates
Customer Care department at the addresses or
phone numbers listed below.
Contact the Network Associates Customer Care
department at:
1. Phone (408) 988-3832
Monday-Friday, 6:00 A.M. - 6:00 P.M.
Pacific time
2. Fax (408) 970-9727
24-hour, Group III Fax
3. Fax-back automated response system
(408) 346-3414
4. E-mail: custcare@nai.com
Send correspondence to any of the following
Network Associates locations:
Network Associates Corporate Headquarters
3965 Freedom Circle
McCandless Towers
Santa Clara, CA 95054
Phone numbers for corporate-licensed
customers:
Phone: (408) 988-3832
Fax: (408) 970-9727
Phone numbers for retail-licensed
customers:
Phone: (972) 278-6100
Fax: (408) 970-9727
**** McAfee Contact Information ****
If you need further assistance or have specific
questions about McAfee products, send your
questions via email to the appropriate
address below:
* For general questions about ordering
software: mcafeestore@beyond.com
* For help in downloading software:
mcafeedownloadhelp@beyond.com
* For a status on an existing order:
mcafeeorderstatus@beyond.com
* To inquire about a promotion:
mcafeepromotions@beyond.com
Support via the Web
McAfee is famous for its dedication to customer
satisfaction. We have continued this tradition
by making our site on the World Wide Web
(http://www.mcafee.com) a valuable resource for
answers to technical support issues. We encourage
you to make this your first stop for answers to
frequently asked questions, for updates to
McAfee software, and for access to McAfee news
and virus information.
Take advantage of the McAfee Product
KnowledgeCenter-your free online product
support center - 24 hours a day, 7 days a week
(http://support.mcafee.com/tech_supp/pkc.asp).
Support forums
If you do not find what you need or do not
have web access, try one of our automated
services.
World Wide Web www.mcafee.com
CompuServe GO MCAFEE
America Online keyword MCAFEE
Microsoft Network mcafee
If the automated services do not have the answers
you need, please contact McAfee at the
following numbers Monday through Friday between
9:00 AM and 6:00 PM Pacific time for 30-day free
support and and 24 hours a day - 7 days a week
for Per Minute or Per Incident support.
30-Day Free Telephone Support 972-855-7044
Per Minute Telephone Support 1-900-225-5624
Per Incident Telephone Support($35)1-800-950-1165
Disclaimer: Time and telephone numbers
are subject to change without prior notice.
********
Network Associates offices outside the United
States:
Network Associates Australia
Level 1, 500 Pacific Highway
St. Leonards, NSW
Sydney, Australia 2065
Phone: 61-2-8425-4200
Fax: 61-2-9439-5166
Network Associates Austria
Pulvermuehlstrasse 17
Linz, Austria
Postal Code A-4040
Phone: 43-732-757-244
Fax: 43-732-757-244-20
Network Associates Belgium
Bessenveldtstraat 25a
Diegem, Belgium - 1831
Phone: 32-3-716-4070
Fax: 61-2-716-4770
Network Associates do Brasil
Rua Geraldo Flausino Gomez 78
Cj. - 51 Brooklin Novo - Sπo Paulo
SP - 04575-060 - Brasil
Phone: (55 11) 5505 1009
Fax: (55 11) 5505 1006
Network Associates Canada
139 Main Street, Suite 201
Unionville, Ontario
Canada L3R 2G6
Phone: (905) 479-4189
Fax: (905) 479-4540
Network Associates
People's Republic of China
New Century Office Tower, Room 1557
No. 6 Southern Road Capitol Gym
Beijing
People's Republic of China 100044
Phone: 86 10 6849-2650
Fax: 86 10 6849-2069
Network Associates Denmark
Lautruphoej 1-3
2750 Ballerup
Danmark
Phone: 45 70 277 277
Fax: 45 44 209 910
NA Network Associates Oy
Sinikalliontie 9, 3rd Floor
02630 Espoo
Finland
Phone: 358 9 5270 70
Fax: 358 9 5270 7100
Network Associates France S.A.
50 Rue de Londres
75008 Paris
France
Phone: 33 1 44 908 737
Fax: 33 1 45 227 554
Network Associates GmbH
Ohmstra▀e 1
D-85716 Unterschlei▀heim
Deutschland
Phone: 49 (0)89/3707-0
Fax: 49 (0)89/3707-1199
Network Associates Hong Kong
19th Floor, Matheson Centre
3 Matheson Way
Causeway Bay
Hong Kong 63225
Phone: 852-2832-9525
Fax: 852-2832-9530
Network Associates Srl
Centro Direzionale Summit
Palazzo D/1
Via Brescia, 28
20063 - Cernusco sul Naviglio (MI)
ITALY
Phone: 39 02 92 65 01
Fax: 39 02 92 14 16 44
Network Associates Japan, Inc.
Toranomon 33 Mori Bldg.
3-8-21 Toranomon Minato-ku
Tokyo 105-0001 Japan
Phone: 81 3 5408 0700
Fax: 81 3 5408 0780
Network Associates Latin America
1200 South Pine Island Road, Suite 205
Plantation, Florida 33324
United States
Phone: (954) 452-1721
Fax: (954) 236-8031
Network Associates de Mexico
Andres Bello No. 10, 4 Piso
4th Floor
Col. Polanco
Mexico City, Mexico D.F. 11560
Phone: (525) 282-9180
Fax: (525) 282-9183
Network Associates International B.V.
Gatwickstraat 25
1043 GL Amsterdam
The Netherlands
Phone: 31 20 586 6100
Fax: 31 20 586 6101
Network Associates Portugal
Av. da Liberdade, 114
1269-046 Lisboa
Portugal
Phone: 351 1 340 4543
Fax: 351 1 340 4575
Net Tools Network Associates South Africa
Bardev House, St. Andrews
Meadowbrook Lane
Epson Downs, P.O. Box 7062
Bryanston, Johannesburg
South Africa 2021
Phone: 27 11 706-1629
Fax: 27 11 706-1569
Network Associates South East Asia
78 Shenton Way
#29-02
Singapore 079120
Phone: 65 222-7555
Fax: 65 222-7555
Network Associates Spain
Orense 4, 4a Planta.
Edificio Trieste
28020 Madrid
Spain
Phone: 34 91 598 18 00
Fax: 34 91 556 14 04
Network Associates Sweden
DatavΣgen 3A
Box 596
S-175 26 JΣrfΣlla
Sweden
Phone: 46 (0) 8 580 88 400
Fax: 46 (0) 8 580 88 405
Network Associates AG
Baeulerwisenstrasse 3
8152 Glattbrugg
Switzerland
Phone: 0041 1 808 99 66
Fax: 0041 1 808 99 77
Network Associates Taiwan
Suite 6, 11F
No. 188, Sec. 5
Nan King E. Rd.
Taipei, Taiwan, Republic of China
Phone: 886-2-27-474-8800
Fax: 886-2-27-635-5864
Network Associates International Ltd.
Minton Place, Victoria Street
Windsor, Berkshire
SL4 1EG
United Kingdom
Phone: 44 (0)1753 827 500
Fax: 44 (0)1753 827 520
Or, you can receive online assistance through
any of the following resources:
1. Internet E-mail: support@nai.com
2. Internet FTP: ftp://ftp.nai.com
3. World Wide Web: http://support.nai.com
4. America Online: keyword MCAFEE
5. CompuServe: GO NAI
To provide the answers you need quickly and
efficiently, the Network Associates technical
support staff needs some information about
your computer and your software. Please have
this information ready when you call:
- Program name and version number
- Computer brand and model
- Any additional hardware or peripherals
connected to your computer
- Operating system type and version numbers
- Network name, operating system, and version
- Network card installed, where applicable
- Modem manufacturer, model, and bits-per-
second rate, where applicable
- Relevant browsers or applications and their
version numbers, where applicable
- How to reproduce your problem: when it
occurs, whether you can reproduce it
regularly, and under what conditions
- Information needed to contact you by voice,
fax, or e-mail
Network Associates also seeks and appreciates
general feedback.
* FOR PRODUCT UPGRADES *
Network Associates has a worldwide range of
partnerships and reseller relationships with
hundreds of independent vendors, each of which
can provide you with consulting services, sales
advice, and product support for Network
Associates software. To find a reseller near
your location, see the RESELLER.TXT file
located on your product CD-ROM or installed on
your hard disk. For assistance in locating a
local reseller, you can also contact Network
Associates Customer Care.
* FOR REPORTING PROBLEMS *
Network Associates prides itself on delivering
a high-quality product. If you find any
problems, please take a moment to review the
contents of this file. If the problem you've
encountered appears in the Known Issues section
of this README.TXT file, Network Associates is
already aware of the problem, and you need not
report it.
If you find any feature that does not appear to
function properly on your system, or if you
believe an application would benefit greatly
from enhancement, please contact Network
Associates or one of its resellers with your
suggestions or concerns.
* FOR ON-SITE TRAINING INFORMATION *
Contact Network Associates Customer Service at
(800) 338-8754.
* NETWORK ASSOCIATES BETA SITE *
To test pre-release software and obtain update
files, including virus definition (.DAT) files,
visit the Network Associates beta site at
http://beta.nai.com. You will have access to
Public Beta and External Test Areas. Your
feedback will make a difference.
* AVERT ANTI-VIRUS RESEARCH SITE *
To see the latest information about emerging
virus threats, submit samples of potentially
infected files, and download updated scanning
engine files, EXTRA.DAT files, and similar
anti-virus software for testing, visit the
AVERT research site at:
http://www.avertlabs.com.
_______________________________________
YC1 - STATEMENT OF YEAR 2000 COMPLIANCE
To learn about Network Associates Year 2000
standards and testing models, and to see a
list of compliant Network Associates products,
visit the Network Associates website at:
http://www.nai.com/y2k
For further information or questions, send an
e-mail message to: y2k@nai.com.
__________________________________________
CT1 - COPYRIGHT AND TRADEMARK ATTRIBUTIONS
Copyright (c) 1999 Networks Associates
Technology, Inc. All Rights Reserved. No part
of this publication may be reproduced,
transmitted, transcribed, stored in a
retrieval system, or translated into any
language in any form or by any means without
the written permission of Networks Associates
Technology, Inc., or its suppliers or affiliate
companies.
* TRADEMARKS *
* ActiveHelp, Bomb Shelter, Building a World of
Trust, CipherLink, Clean-Up, Cloaking, CNX,
Compass 7, CyberCop, CyberMedia, Data Security
Letter, Discover, Distributed Sniffer System,
Dr SolomonÆs, Enterprise Secure Cast, First
Aid, ForceField, Gauntlet, GMT, GroupShield,
HelpDesk, Hunter, ISDN Tel/Scope, LM 1,
LANGuru, LeadingHelp Desk Technology, Magic
Solutions, MagicSpy, MagicTree, Magic
University, MagicWin, MagicWord, McAfee,
McAfee Associates, MoneyMagic, More Power To
You, Multimedia Cloaking, NetCrypto,
NetOctopus, NetRoom, NetScan, Net Shield,
NetShield, NetStalker, Net Tools, Network
Associates, Network General, Network Uptime!,
NetXRay, Nuts & Bolts, PC Medic, PCNotary,
PGP, PGP (Pretty Good Privacy), PocketScope,
Pop-Up, PowerTelnet, Pretty Good Privacy,
PrimeSupport, RecoverKey, RecoverKey-
International, ReportMagic, RingFence, Router
PM, Safe & Sound, SalesMagic, SecureCast,
Service Level Manager, ServiceMagic, Site
Meter, Sniffer, SniffMaster, SniffNet,
Stalker, Statistical Information Retrieval
(SIR), SupportMagic, Switch PM, TeleSniffer,
TIS, TMach, TMeg, Total Network Security,
Total Network Visibility, Total Service Desk,
Total Virus Defense, T-POD, Trusted Mach,
Trusted Mail, Uninstaller, Virex, Virex-PC,
Virus Forum, ViruScan, VirusScan, VShield,
WebScan, WebShield, WebSniffer, WebStalker,
WebWall, and ZAC 2000 are registered
trademarks of Network Associates and/or its
affiliates in the US and/or other countries.
All other registered and unregistered
trademarks in this document are the sole
property of their respective owners.
* LICENSE AGREEMENT *
NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS
OF YOUR LICENSE TO USE THE SOFTWARE THAT
THIS DOCUMENTATION DESCRIBES, CONSULT THE
LICENSE.TXT, README.1ST, OR OTHER LICENSE
DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE,
EITHER AS A TEXT FILE OR AS PART OF THE
SOFTWARE PACKAGING. IF YOU DO NOT AGREE TO
ALL OF THE TERMS SET FORTH THEREIN, DO NOT
INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY
RETURN THE PRODUCT TO THE PLACE OF PURCHASE
FOR A FULL REFUND.