330 Do I need to change the default firewall settings to be secure?
340 How does ^p protect me?
350 How will I know when my computer is protected?
360 How do I use Network Alerts?
370 Program alerts require a response from you.
380 Responding to alerts for unfamiliar programs.
390 Firewall Alerts inform you that a security event has taken place.
400 What are Zones?
410 What do the Stop and Lock buttons do?
420 No. The security professionals at ^pc^ have selected the proper settings to provide protection for all your Internet activities.
430 ^p gives you four main lines of defense.
432 ^p gives you three main lines of defense.
440 One of the first things you'll see when you start ^p is some pop-up alerts. Do not be alarmed, it means your computer is protected. There are two main types of alerts:
450 If you're on a home or business local network, and if you want to share files or printers over that network, use the Zone control to assign the network to your Trusted Zone.
460 In this example, MS Outlook is a program you know, and it makes sense that it needs Internet access to send and receive e-mail, so it's probably safe to click Yes. If you click No, Outlook won't be able to send or receive e-mail!
463 In this example, Microsoft Outlook is a program you know, and it makes sense that it needs Internet access to send and receive e-mail, so it's probably safe to click Yes. If you click No, Outlook won't be able to send or receive e-mail!
470 ^p offers two different protection levels for your computer, called Zones. This allows two "doors" into your computer - one that's locked, and one that those you trust can open with a key.\n\nThe Internet Zone is the locked door to your computer for those computers and Web sites you don't know or trust. When set to its default high setting (recommended), it makes your computer invisible to hackers!\n\nThe Local Zone allows those you trust to access your personal files and printers. These people have a key to access your computer. You can give anyone a key by entering their IP address into your Local Zone. The default (recommended) setting is medium.
480 As an added security measure, you may protect your settings with a password to ensure no one else can change them. Would you like to create a password?
490 If your computer is part of an ICS/NAT where multiple computers connect to the Internet through one "gateway" computer, it's quick and easy to set this up now. Simply install ^p on each computer, and then designate each computer as either a client or a gateway.
500 Congratulations on your choice to protect your information with the intelligently simple Internet security software from ^pc^. \n\nMore information can be found by pressing the help button or by visiting our website at ^pw^.\n\nTo view this tutorial at any time, click your Start menu, select Programs, and select ^p tutorial.
510 Immediately!
520 "The first thing you will notice..."
530 You'll see some alerts when you first start using ^p.
540 Network alerts are really a convenience tool - they let users on a home or business LAN configure sharing easily.
550 Program alerts appear whenever a program tries to connect to the Internet. Before deciding whether to allow or deny access, make sure the program - and the program's need for access - is legitimate.\n\nIf it's a program you recognize...\nIn this example, MS Outlook e-mail is a program you probably recognize. It needs Internet access to send and receive your e-mail, so it's probably safe to click Allow. If you click Block, it won't be able to send or receive e-mail!\n\nIf it's a program you don't recognize...\n
560 If you don't recognize the program name, the AlertAdvisor area can help. The More Info button provides details on the program and how to respond. Depending on your settings, ^pc^' products (except ^pf^) will automatically respond to alerts for you or offer advice about how you should respond.
570 Firewall Alerts appear whenever ^pc^ blocks intrusions into your computer. You're automatically protected and do not need to take any action; just click OK to close the alert.
580 ^p uses Zones to keep track of the good, the bad, and the unknown on the Internet. The Zone that a computer or network is in helps ^p decide whether to allow traffic between it and your computer.
590 You're protected, even when the lock is open! Use the Stop and Lock buttons to block all Internet traffic to your computer.
600 The next steps will tell you how to respond to each alert type.
610 If you're NOT on a home or business LAN, just click OK to secure your Internet connection.
620 To save this decision so you won't be asked again, be sure to click the "Remember" box.
630 Don't worry about answering incorrectly. You can change your answer anytime from the Programs panel of ^p.
640 Open the dashboard by double-clicking the ^pi^ icon from your system tray.
643 Open the dashboard by double-clicking the Integrity icon from your system tray.
650 Welcome to ^pc^' award-winning program control. In a few moments, you will have more protection from hackers than a firewall alone could ever provide.
660 Next step: The Program Wizard will find your Web browser and browser components and automatically configure them for a secure, hassle-free Web surfing experience. Click Next to continue.
670 Congratulations! You are now set up for secure, hassle-free Web surfing.
680 Advanced step (optional): To pre-configure other programs for Internet access, add programs below. You may either set these programs to default settings as indicated or customize the settings.
690 Tell me why
700 Access rights: Programs may actively seek out and retrieve information that you have requested from the Internet.\n\nServer rights: Programs may passively listen for requests from the Internet to communicate with your computer.
710 Congratulations! You have configured programs for secure Internet access.
720 Any programs you did not configure here will prompt you for Internet access permission the first time you use them. For questions on how to configure these future programs, click the Alert Advisor button directly from the program alert prompt. Or, visit the Help files or product tutorial.
730 Tell me more
740 Configuration Wizard
750 Please checkmark your selection below.
760 Are you sure you want to quit the tutorial?\n\nIf you quit, the tutorial will close and ^p will load.\n\nTo continue, click Resume. To quit, press Exit.
770 Tutorial
780 &Resume
790 E&xit
800 Next
810 Finish
820 ^p - Getting Started
830 Choosing settings higher than the defaults may prevent resource sharing and impede some program functions!
840 Guards the "doors" to your computer, keeping hackers out.
850 Protects your programs and keeps hacker programs from using or damaging your computer.
860 "Quarantines" potentially dangerous files that arrive as e-mail attachments, the most common means of malware distribution.
870 Prevents Internet "cookies" from giving away information about you, and keeps advertisers from tracking your Internet use.
880 Protection
890 FIREWALL
900 PROGRAM
910 Control
920 E-MAIL
930 Protection
940 PRIVACY
950 Protection
960 Are you sure you want to quit the tutorial?\n\nTo continue, click Resume. To quit, press Exit.
970 Program alerts
980 Firewall alerts
990 Should I say YES?
1000 If you don't want to see firewall alerts, check "don't show this again." Don't worry about missing these events - they're recorded in the Alerts and Logs panel for you to review anytime.
1010 The Zone a computer or network is in helps ^p decide whether to allow traffic between it and your computer.
1020 What else do I need to know?
1030 That's all for now. If you have questions while using ^p, click the Help button available from any panel. The Help provides an index, glossary, and full-text search engine to help you quickly find the information you need.
1040 Need Help?
1050 Click the help icon on any panel of the control center. You'll immediately get help for the panel you're currently working in. Use the help index, table of contents, and search engine to quickly locate any information you need!
1060 Welcome to ^p \nIt's what's next in Internet security.
1070 Lets you control your family's web surfing by selecting from a wide variety of web site categories to block.
1080 WEB
1090 Filtering
1100 ^p gives you five main lines of defense.
1110 en
1120 How does ^p protect me?
1130 Find out by taking a few minutes to read this tutorial.
1140 You'll learn some really important information:\n\n- Why your computer is secure with factory defaults\n- When you need to take action \n- What is ^pc^' automatic protection\n- How to get help at any time\n
1150 ^p gives you two main lines of defense.
1160 Eliminates viruses found on your computer and in your e-mail before damage is done.
1170 Guards the "doors" to your computer; keeps hackers out. Stealth mode makes you invisible on the Internet.
1180 Controls which programs access the Internet. Stops spyware, Trojans, and malware from "calling home".
1190 Prevents personal information from leaving your computer and transferring to untrusted Web sites.
1200 Encrypts Yahoo«, MSN, and AIM instant messages, plus blocks hackers, worms and dangerous links attempting access via IM ports.
1210 Antivirus
1220 Protection
1230 Firewall
1240 Protection
1250 Program
1260 Control
1270 Identity
1290 Protection
1300 IM
1310 Security
1320 Blocks annoying pop-ups and banner ads -- saves bandwidth; prevents cookies from tracking your surfing habits.
1330 Privacy
1340 Protection
1350 Done
1360 Detects new wireless network connections; provides advice to help you configure settings for maximum wireless protection.
1370 Wireless
1380 Security
1390 ^p gives you three main lines of defense.
61440 Open
61441 Save As
61442 All Files (*.*)
61443 Untitled
61446 an unnamed file
61457 &Hide
61472 No error message is available.
61473 An unsupported operation was attempted.
61474 A required resource was unavailable.
61475 Out of memory.
61476 An unknown error has occurred.
61696 Invalid filename.
61697 Failed to open document.
61698 Failed to save document.
61699 Save changes to %1?
61700 Failed to create empty document.
61701 The file is too large to open.
61702 Could not start print job.
61703 Failed to launch help.
61704 Internal application error.
61705 Command failed.
61706 Insufficient memory to perform operation.
61707 System registry entries have been removed and the INI file (if any) was deleted.
61708 Not all of the system registry entries (or INI file) were removed.
61709 This program requires the file %s, which was not found on this system.
61710 This program is linked to the missing export %s in the file %s. This machine may have an incompatible version of %s.
61712 Please enter an integer.
61713 Please enter a number.
61714 Please enter an integer between %1 and %2.
61715 Please enter a number between %1 and %2.
61716 Please enter no more than %1 characters.
61717 Please select a button.
61718 Please enter an integer between 0 and 255.
61719 Please enter a positive integer.
61720 Please enter a date and/or time.
61721 Please enter a currency.
61728 Unexpected file format.
61729 %1\nCannot find this file.\nPlease verify that the correct path and file name are given.
61730 Destination disk drive is full.
61731 Unable to read from %1, it is opened by someone else.
61732 Unable to write to %1, it is read-only or opened by someone else.
61733 An unexpected error occurred while reading %1.
61734 An unexpected error occurred while writing %1.
61836 Unable to read write-only property.
61837 Unable to write read-only property.
61840 Unable to load mail system support.
61841 Mail system DLL is invalid.
61842 Send Mail failed to send message.
61856 No error occurred.
61857 An unknown error occurred while accessing %1.
61858 %1 was not found.
61859 %1 contains an invalid path.
61860 %1 could not be opened because there are too many open files.
61861 Access to %1 was denied.
61862 An invalid file handle was associated with %1.
61863 %1 could not be removed because it is the current directory.
61864 %1 could not be created because the directory is full.
61865 Seek failed on %1
61866 A hardware I/O error was reported while accessing %1.
61867 A sharing violation occurred while accessing %1.
61868 A locking violation occurred while accessing %1.
61869 Disk full while accessing %1.
61870 An attempt was made to access %1 past its end.
61872 No error occurred.
61873 An unknown error occurred while accessing %1.
61874 An attempt was made to write to the reading %1.
61875 An attempt was made to access %1 past its end.
61876 An attempt was made to read from the writing %1.