home *** CD-ROM | disk | FTP | other *** search
-
- Release Notes for McAfee(R) QuickClean(TM) version 6.0
- Copyright (c) 2005 McAfee, Inc.
- All Rights Reserved
-
-
- =====================================================
-
-
- Thank you for using McAfee« QuickClean(TM)
- software. This file contains important
- information regarding this release. We strongly
- recommend that you read the entire document.
-
- _____________________________________________________
- WHAT'S IN THIS FILE
-
- - Installation & System Requirements
- - Configuring Microsoft Internet Explorer
- - Known Issues
- - Documentation
- - Contacting McAfee
- - Copyright and Trademark Attributions
- - Trademarks
- - License Information
-
- _____________________________________________________
- INSTALLATION AND SYSTEM REQUIREMENTS
-
- Please see product documentation for complete
- information regarding installation and system
- requirements.
-
- Note:
- Please note during application uninstall:
- After deleting all McAfee applications
- including McAfee SecurityCenter, a file
- called MCINFO.EXE will remain temporarily
- until an Internet connection is established.
- This file will not affect normal operations
- as well as installation, uninstallation, or
- re-installation of McAfee products.
-
- _____________________________________________________
- CONFIGURING MICROSOFT INTERNET EXPLORER
-
- McAfee uses ActiveX controls and cookies in its
- applications. These technologies require
- specific Internet browser configurations to
- ensure the applications are installed correctly
- and work properly on your computer.
-
- Most Internet browsers will already have the
- proper settings to install QuickClean. To avoid
- any problems with the installation, we suggest
- that you verify that your Internet browser
- settings are correct before you try to install
- QuickClean.
-
- First, determine which version of Internet
- Explorer you are using:
-
- 1. Open Internet Explorer.
- 2. On the Internet Explorer menu bar, click
- "Help," and then click "About Internet
- Explorer" to open the About Internet
- Explorer dialog box.
- 3. Look for the line labeled Version: and note
- the first three numbers.
- Example:
- Version: 5.50.4807.2300. The first three
- numbers indicate where you should look. This
- version of Internet Explorer is 5.50, so you
- would follow the steps in the "Configuring
- Internet Explorer 5.x" section.
-
-
- CONFIGURING INTERNET EXPLORER 5.x
-
- 1. Open Internet Explorer. On the Tools menu,
- click "Internet Options" to open the
- Internet Options dialog box.
- 2. Click the "Security" tab. Ensure that you
- are in the Internet Web content zone and
- that the security level for this zone is set
- to Medium (the default setting) or Low.
- 3. If you are not sure whether your security
- options are correct, click "Default Level"
- to set the zone to Medium (recommended).
- 4. If you are an advanced user who wants to
- customize your security settings, click
- "Custom Level" to open the Security Settings
- dialog box. McAfee requires that the
- following options must be enabled.
- a. Select "Enable" for these ActiveX
- controls and plug-ins options:
- - "Download signed ActiveX controls"
- - "Run ActiveX controls and plug-ins"
- - "Script ActiveX controls marked safe
- for scripting"
- b. Select "Enable" for the "Active
- scripting" option under the Scripting
- settings.
- 5. When you are done, click "OK," and then
- click "Yes" to confirm the changes.
- 6. Click "OK" to close the Security Settings
- dialog box.
- 7. Click "OK" to close the Internet Options
- dialog box.
- 8. Exit Internet Explorer.
-
-
- CONFIGURING INTERNET EXPLORER 6.x
-
- 1. Open Internet Explorer. On the Tools menu,
- click "Internet Options" to open the
- Internet Options dialog box.
- 2. Click the "Security" tab. Ensure that you
- are in the Internet Web content zone and
- that the security level for this zone is set
- to Medium (the default setting) or Low.
- 3. If you are not sure whether your security
- options are correct, click "Default Level"
- to set the zone to Medium (recommended).
- 4. If you are an advanced user who wants to
- customize your security settings, click
- "Custom Level" to open the Security Settings
- dialog box. McAfee requires that the
- following options must be enabled.
- a. Select "Enable" for these ActiveX
- controls and plug-ins options:
- - "Download signed ActiveX controls"
- - "Run ActiveX controls and plug-ins"
- - "Script ActiveX controls marked safe
- for scripting"
- b. Select "Prompt" for these ActiveX
- controls and plug-ins options:
- - "Download unsigned ActiveX controls"
- - "Initialize and script ActiveX
- controls not marked as safe"
- c. Select "Enable" for the "Active
- scripting" option under the Scripting
- settings.
- 5. When you are done, click "OK," and then
- click "Yes" to confirm the changes.
- 6. Click the "Privacy" tab on the Internet
- Options dialog box, and then click
- "Advanced" to open the Advanced Privacy
- Settings dialog box.
- 7. Ensure that "Override automatic cookie
- handling" and "Always allow session cookies"
- are selected, and then click "OK" to close
- the Security Settings dialog box.
- 8. Click "OK" to close the Internet Options
- dialog box.
- 9. Exit Internet Explorer.
-
- _____________________________________________________
- KNOWN ISSUES
-
- 1. If you install a product that contains
- McAfee Shredder or QuickClean Lite (such
- as McAfee VirusScan Professional, McAfee
- Internet Security, or UnInstaller),
- McAfee Shredder and QuickClean Lite will
- no longer function after installing and
- uninstalling the versions of these
- products that are installed with this
- QuickClean installation.
- SOLUTION: Uninstall and reinstall
- QuickClean to regain the functionality of
- McAfee Shredder and QuickClean Lite.
- 2. If you install the versions of McAfee
- Shredder and QuickClean Lite included
- with this QuickClean installation, the
- links for McAfee Shredder and QuickClean
- Lite within the user interfaces for
- VirusScan Professional 6.x and McAfee
- Internet Security 4.x will no longer
- function.
- SOLUTION: Launch McAfee Shredder and
- QuickClean Lite from the QuickClean
- interface and their Windows "Start" menu
- shortcuts.
- 3. Folder Browser allows an attempt to send
- the Recycle Bin to itself. A harmless
- error message appears.
- 4. Folder Browser displays removable drives,
- but does not allow them to be browsed.
- 5. SpaceMaker does not delete empty folders
- from the Recycle Bin in NTFS.
- 6. Application Remnant Cleaner might appear
- to stop responding while performing
- remnant analysis or cleaning, even though
- it is in the process of analyzing
- remnants.
-
- _____________________________________________________
- DOCUMENTATION
-
- Documentation is included on the product CD
- and/or is available from the McAfee
- download site:
-
- http://uk.mcafee.com/common/en-gb/redirects/qc/userguide.asp
-
- NOTE:
- Electronic copies of all product manuals are
- saved as Adobe Acrobat .PDF files. The
- product CD includes the latest version of
- Acrobat Reader, or you can download any
- version from the Adobe web site:
-
- www.adobe.com/prodindex/acrobat/readstep.html
-
-
- McAfee« QuickClean(TM) DOCUMENTATION
-
- - Product Guide.
- Introduces the product, describes product
- features, provides detailed instructions for
- configuring the software, deployment, and
- ongoing operation and maintenance.
-
- - Help system.
- A Help file, accessed from within the
- software application, provides quick access
- to concepts, definitions, and procedures for
- using the software. Includes field-level
- What's This? topics (right-click on a
- feature), full topic search, indexing, and
- page-level context-sensitive Help.
-
- - A LICENSE Agreement.
- The terms under which you may use the
- product. Read it carefully. If you install
- the product, you agree to the license
- terms.
-
- - This README file.
-
- _____________________________________________________
- PARTICIPATING IN THE MCAFEE BETA
- PROGRAM
-
- To download new beta software or to read about
- the latest beta information, visit the beta web
- site:
-
- http://beta.mcafee.com/
-
- To submit your feedback on any McAfee
- beta product, send e-mail to:
-
- beta@mcafee.com
-
- McAfee is devoted to providing
- solutions based on your input.
-
- _____________________________________________________
- CONTACTING MCAFEE
-
-
- Customer Service and Technical Support
- Home Page
- http://www.mcafeehelp.com
-
-
- Security Headquarters -- AVERT (Anti-Virus
- Emergency Response Team)
- Home Page
- http://www.mcafeesecurity.com/us/security/home.asp
-
- Virus Information Library
- http://uk.mcafee.com/virusInfo/default.asp
-
- Submit a Virus Sample
- virus_research@avertlabs.com
-
- Download Site
- Home Page
- http://download.mcafee.com/us/
-
- _____________________________________________________
- COPYRIGHT AND TRADEMARK ATTRIBUTIONS
-
- ⌐ 2005 McAfee, Inc.
- All Rights Reserved. No part of this
- publication may be reproduced, transmitted,
- transcribed, stored in a retrieval system, or
- translated into any language in any form or by
- any means without the written permission of
- McAfee, Inc., or its
- suppliers or affiliate companies.
-
- _____________________________________________________
- TRADEMARKS
-
- ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY
- (AND IN KATAKANA), ACTIVESHIELD,
- ANTIVIRUS ANYWARE AND DESIGN, CLEAN-UP,
- DESIGN (STYLIZED E), DESIGN (STYLIZED N),
- ENTERCEPT, ENTERPRISE SECURECAST,
- ENTERPRISE SECURECAST (AND IN KATAKANA),
- EPOLICY ORCHESTRATOR, FIRST AID, FORCEFIELD,
- GMT, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA),
- GUARD DOG, HOMEGUARD, HUNTER, INTRUSHIELD,
- INTRUSION PREVENTION THROUGH INNOVATION,
- M AND DESIGN, MCAFEE, MCAFEE (AND IN KATAKANA),
- MCAFEE AND DESIGN, MCAFEE.COM, MCAFEE
- VIRUSSCAN, NA NETWORK ASSOCIATES, NET TOOLS,
- NET TOOLS (AND IN KATAKANA), NETCRYPTO,
- NETOCTOPUS, NETSCAN, NETSHIELD,
- NETWORK ASSOCIATES, NETWORK ASSOCIATES
- COLLISEUM, NETXRAY, NOTESGUARD, NUTS & BOLTS,
- OIL CHANGE, PC MEDIC, PCNOTARY, PRIMESUPPORT,
- RINGFENCE, ROUTER PM, SECURECAST, SECURESELECT,
- SPAMKILLER, STALKER, THREATSCAN, TIS, TMEG,
- TOTAL VIRUS DEFENSE, TRUSTED MAIL, UNINSTALLER,
- VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN,
- VIRUSSCAN (AND IN KATAKANA), WEBSCAN, WEBSHIELD,
- WEBSHIELD (AND IN KATAKANA), WEBSTALKER, WEBWALL,
- WHAT'S THE STATE OF YOUR IDS?,
- WHO'S WATCHING YOUR NETWORK,
- YOUR E-BUSINESS DEFENDER,
- YOUR NETWORK. OUR BUSINESS. are registered
- trademarks or trademarks of McAfee, Inc. and/or
- its affiliates in the US and/or other countries.
- Red in connection with security is distinctive
- of McAfee brand products. All other registered
- and unregistered trademarks herein are the sole
- property of their respective owners.
-
- _____________________________________________________
- LICENSE INFORMATION
-
- License Agreement
-
- NOTICE TO ALL USERS: CAREFULLY READ THE
- APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO
- THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE
- GENERAL TERMS AND CONDITIONS FOR THE USE OF THE
- LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH
- TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE
- CONSULT THE SALES AND OTHER RELATED LICENSE
- GRANT OR PURCHASE ORDER DOCUMENTS THAT
- ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU
- HAVE RECEIVED SEPARATELY AS PART OF THE
- PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT
- CD, OR A FILE AVAILABLE ON THE WEB SITE FROM
- WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF
- YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH
- IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE.
- IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO
- MCAFEE, INC. OR THE PLACE OF
- PURCHASE FOR A FULL REFUND.
-
-
- Attributions
-
- This product includes or may include:
-
- - Software developed by the OpenSSL Project
- for use in the OpenSSL Toolkit
- (http://www.openssl.org/).
-
- - Cryptographic software written by Eric Young
- (eay@cryptsoft.com).
-
- - Some software programs that are licensed (or
- sublicensed) to the user under the GNU
- General Public License (GPL) or other
- similar Free Software licenses which, among
- other rights, permit the user to copy,
- modify and redistribute certain programs, or
- portions thereof, and have access to the
- source code. The GPL requires that for any
- software covered under the GPL which is
- distributed to someone in an executable
- binary format, that the source code also be
- made available to those users. For any such
- software covered under the GPL, the source
- code is made available on this CD. If any
- Free Software licenses require that Network
- Associates provide rights to use, copy or
- modify a software program that are broader
- than the rights granted in this agreement,
- then such rights shall take precedence over
- the rights and restrictions herein.
-
-
-
-
-