home *** CD-ROM | disk | FTP | other *** search
Text File | 2000-10-03 | 36.8 KB | 1,070 lines |
- Release Notes for McAfee Firewall v2.14
- Copyright (c) October 2000 Network Associates
- Technology, Inc. All Rights Reserved.
-
- Thank you for using McAfee Firewall. Readme
- file contains important information
- regarding this release. Network Associates
- strongly recommends that you read the entire
- document.
-
- Network Associates welcomes your comments and
- suggestions. Please use the information
- provided in this file to contact Customer
- Service, technical support, or the documentation
- team for this product.
-
- WHAT'S IN THIS FILE
-
- - NF1 New Features
- - DC1 Documentation
- - SR1 System Requirements
- - IN1 Installation
- - KN1 Known Issues
- - FQ1 Frequently Asked Questions
- - AD1 Additional Information
- - NA1 Contacting Networks Associates
- - CT1 Copyright and Trademark Attributions
-
- NOTE: A unique identifying code precedes
- each heading in this file. To jump to
- a particular heading within the file,
- copy the three-character code--NA1,
- for example--from the list above into
- your text editor's Find dialog box, or
- equivalent, then search for the
- identifying code to move directly to
- that heading.
-
- **** IMPORTANT NOTES ****
-
- * McAfee Firewall was previously known as
- ConSeal Private Desktop. Any reference you
- may find on ConSeal Private Desktop refers
- to the same product now known as McAfee Firewall.
-
- * You must have Winsock 2 to fully install McAfee
- Firewall. For more information, refer to the
- FQ1 section below.
-
- If you need an update on Winsock 2,
- you can download the available version at
- http://www.microsoft.com/windows95/downloads/
- contents/wuadmintools/s_wunetworkingtools/
- w95sockets2/default.asp
-
- * McAfee Firewall supports MediaPlayer 7
- provided that you allow Internet Control
- Message Protocol (ICMP). To apply this
- setting - access McAfee Firewall's System
- Settings; go to Properties; then ICMP;
- switch selection from "blocked" to "limit".
-
- Note: For maximum security, perform a Windows
- update. From your browser, click the Tools
- drop-down menu; then select Windows Update.
- Performing this update patches for an exploit
- on "ICMP redirect".
-
- *******
-
- __________________
- NF1 - NEW FEATURES
-
- * McAfee Firewall now supports Windows
- 2000 in addition to Windows ME,
- Windows 95 and Windows 98.
-
- * McAfee Firewall now also supports
- America Online (AOL) version 5.0
-
- * Added update capability in the help
- menu.
-
- * Added automatic recognition of
- virtual adapters, including PGPnet,
- ICS, PPTP, PPPoE (Sympatico's HSE
- and WinPoET), SecuRemote and Extranet.
-
- * Added popup message telling trial
- users when their license expires
- (warning starts 5 days before expiry).
-
- * Suppression of a false error in the log
- file: Packet32: PacketOpenAdapter
- Could not open adapter.
-
- __________________
- DC1 - DOCUMENTATION
-
- Network Associates provides each of its
- products with an extensive set of documentation,
- consisting usually of one or more product guides
- saved in Adobe Acrobat Portable Document Format
- (.PDF), and an online help system, whose form
- can vary, depending on the platform on which the
- product runs.
-
- Acrobat .PDF files are flexible online documents
- that contain hyperlinks, outlines and other aids
- for easy navigation and information retrieval.
- You can also install an Acrobat plug-in file
- that allows you to read .PDF documents from
- within your web browser while online. Copies
- of the product documentation come with the
- product CD-ROM.
-
- A copy of the free Acrobat Reader also comes
- with the product CD-ROM or is available from
- the Adobe website at:
-
- http://www.adobe.com/prodindex/acrobat/readstep.html
-
-
-
- Most Network Associates products can include a
- documentation set drawn from these components:
-
- NOTE: Not all products will include all listed
- documents. Consult the User's Guide or
- Administrator's Guide that comes with
- your product for a complete list.
-
- * A printed Getting Started Guide, which
- introduces the product, provides
- installation instructions, outlines product
- features, and provides a brief overview. In
- many cases, an electronic version of this
- guide will also be available on the product
- CD-ROM or from the Network Associates FTP
- site in Adobe Acrobat .PDF format.
-
- * A UserÆs Guide saved on the product CD-ROM or
- installed on your hard disk in Adobe Acrobat
- .PDF format. Network Associates User's Guides
- document all product functions extensively,
- and discuss how best to use your Network
- Associates product to accomplish your tasks.
-
- * An Administrator's Guide saved on the product
- CD-ROM or installed on your hard disk in
- Adobe Acrobat .PDF format. Administrator's
- Guides describe how to deploy, maintain and
- administer Network Associates server-based
- products in a networked environment.
-
- * Specialized guides. These can include
- reference guides, deployment guides,
- configuration guides, vulnerability guides
- for intrusion detection software, and other
- product-specific documentation.
-
- * An online help system. Online help gives you
- quick access to hints and tips about how to
- use your Network Associates software. The
- format of the online help system for the
- product will vary, depending on which
- platform or operating system you use to run
- your Network Associates product. In most
- cases, the software will display a Help menu
- item or link that you can use to start the
- system.
-
- Some products might also include context-
- sensitive online help. Right-click buttons,
- lists or other elements within dialog boxes
- to see brief, descriptive help topics.
-
- * A LICENSE.TXT file. This file outlines the
- terms of your license to use your Network
- Associates product. Read it carefully. If
- you install the Network Associates product,
- you agree to the license terms.
-
- * This Readme.txt file. This file contains
- last-minute additions or changes to the
- documentation, lists any known behavior or
- other issues with the product release,
- and often describes new product features
- incorporated into incremental product
- updates.
-
- To get answers to your technical support
- questions, send messages to:
-
- techsupport@mcafee.com.
-
- To ask about your eligibility for updates and
- upgrades, check your registration, or ask
- general questions related to Network Associates
- software, send messages to:
-
- custcare@nai.com
-
- _________________________
- SR1 - SYSTEM REQUIREMENTS
-
- To use McAfee Firewall you need:
-
- * IBM PC or compatible computer running
- Windows 95/98/2000/ME or Windows NT
- with SP4 or higher.
- * 5 megabytes (MB) minimum of RAM.
- * 16 MB free hard disk space. Additional
- disk space is required to install any
- optional Internet software that may be
- included on the compact disc (CD) version.
- * Microsoft mouse or compatible pointing device.
- * Access to the Internet, either a dial-up
- account with an Internet Service Provider
- (ISP) or a constant connection through a
- network.
- * Winsock 2
-
- __________________
- IN1 - INSTALLATION
-
- To install McAfee Firewall:
-
- * Close all open programs.
- * Insert the McAfee Firewall CD in the
- CD-ROM drive.
- * In the McAfee Firewall Setup screen,
- click Install McAfee Firewall. If the setup screen
- doesnÆt start automatically when you close
- your CD-ROM drive, click Start on the Windows
- taskbar, click Run, then type d:\setup. If D
- is not the drive letter of your CD-ROM drive,
- substitute the correct drive letter.
- * Read the text in the Welcome to McAfee Firewall
- screen, then click Next to display the
- Software License Agreement. After you read the
- license agreement, click Yes to continue.
- * In the Choose Destination Location window,
- do one of the following:
- * To install the software into the default
- location C:\Program Files\McAfee Firewall, click Next>.
- * To install the files in an alternate location,
- click Browse, locate the appropriate directory,
- and then click OK. Click Next> to copy the
- McAfee Firewall files to your hard drive.
- * The final installation screen notifies you that
- the installation is complete and lets you choose
- to view the McAfee Firewall ReadMe file and start McAfee
- Firewall. By default, these options are selected.
- To disable either option, clear its check box.
- * Click Finish.
-
- Installing Windows NT Network Component
-
- You must first install McAfee Firewall before applying
- these instructions. All steps must be performed in the
- order shown below.
-
- * Start Network Control Panel
- (<START BUTTON->SETTINGS->CONTROL PANEL->NETWORK>).
- * Select <PROTOCOLS> tab.
- * Select <ADD>.
- * Select <HAVE DISK...>.
- * If you have the McAfee Firewall CD, enter pathname
- to "WINNT4.0" subdirectory found in the CD
- installation folder. For example, if your CD-ROM
- drive letter is drive E, enter E:\MCFIRE\WINNT4.0.
-
- The McAfee Firewall Network Driver files were also
- copied into the McAfee Firewall installation folder.
- To access the McAfee Firewall Driver files from here
- enter C:\Program Files\Mcafee\McAfee Firewall
-
- * Select <OK>.
- * Select "McAfee Firewall."
- * Select <OK>.
- The network component will install and will appear
- as the "McAfee Firewall Network Driver" network
- protocol.
- * Select <CLOSE> from network control panel dialog box.
- Reboot your computer.
-
- Changing McAfee Firewall Operation To/From and NT Service
-
- McAfee Firewall for Windows NT can be run as an NT service
- to provide continuous protection for your PC. To manually
- setup McAfee Firewall as a service, please follow these
- instructions:
-
- * Start the Network Control Services Panel
- START->SETTINGS->CONTROL PANEL->SERVICES.
- * Highlight "McAfee Firewall" service.
- * Select <STARTUP>.
- * Select the desired mode:
- MANUAL - McAfee Firewall runs only upon manual launch.
- AUTOMATIC - McAfee Firewall launched during login
- sequence.
- * Reboot your system for the service changes to take
- effect.
-
- Installing Windows 2000 Network Component
-
- You must first install McAfee Firewall before applying
- these instructions. All steps must be performed in the
- order shown below.
-
- * Start Network Control Panel
- (<START BUTTON->SETTINGS->CONTROL PANEL->NETWORK>).
- Right-click on the <LOCAL AREA CONNECTION> and
- select <PROPERTIES>.
- * Select <INSTALL>.
- * Select <PROTOCOLS> button.
- * Select <ADD>.
- * Select <HAVE DISK...>.
- * If you have the McAfee Firewall CD, enter pathname
- to "WIN2K" subdirectory found in the CD
- installation folder. For example, if your CD-ROM
- drive letter is drive E, enter E:\MCFIRE\WIN2K
-
- The McAfee Firewall Network Driver files were also
- copied into the McAfee Firewall installation folder.
- To access the McAfee Firewall Driver files from here
- enter C:\Program Files\Mcafee\McAfee Firewall
-
- * Select <OK>.
- * Select "McAfee Firewall."
- * Select <OK>.
- The network component will install and will appear
- as the "McAfee Firewall Network Driver" network
- protocol.
- * Select <CLOSE> from network control panel dialog box.
- Reboot your computer.
- __________________
- KN1 - KNOWN ISSUES
-
- * When using Internet connection sharing (ICS),
- there is no outbound filtering.
-
- * Currently, McAfee Firewall does not use
- Winsock to route packets. This means that what it is
- doing is not known exactly, and therefore would
- not know what packets to allow.
-
- This issue is currently under investigation.
- For more information on Winsock, read the topic on
- Winsock2 under the Frequently Asked Questions
- section.
-
- ________________________________
- FQ1 - FREQUENTLY ASKED QUESTIONS
-
- * What is WinSock2?
- WinSock ("Windows Sockets") is an interface
- in your computer between the applications that
- you use (Explorer, Netscape, Eudora, Word, etc.)
- and the Operating System. This layer controls how
- your applications will interact with the rest of
- the computer. WinSock2 is an updated release of the
- original WinSock, adding new functionality and
- capabilites to Windows operating systems, thereby
- allowing your system to do more. Older machines
- may notice a slight slow down to some activities.
-
- * What will WinSock2 do to my PC?
- WinSock2 will enable your system to work with
- new applications that rely on improved WinSock
- features and management. Some older applications
- may not work and older machines may be slowed down
- slightly by WinSock2.
-
- * How do I install (uninstall ) WinSock2?
- Most WinSock2 kits are self-installing. If you
- install WinSock2 and have already attempted an
- installation, please reinstall McAfee Firewall
- completely after rebooting your PC. Most WinSock2
- installation kits include an uninstall option
- and backup features.
-
- * Where do I get information about WinSock2
- and the kit?
- WinSock2 is a free upgrade available from many
- sources including (but not limited to) software.com,
- download.com, ZDNet, Microsoft and Tucows.
- You can also download an update at:
- http://www.microsoft.com/windows95/downloads/
- contents/wuadmintools/s_wunetworkingtools/
- w95sockets2/default.asp
-
- * What does McAfee Firewall do? How does it do it?
- McAfee Firewall filters traffic at the devices that
- your system uses - network cards and modems. This means
- that McAfee Firewall can reject inbound traffic before
- that traffic can reach vital functions in your PC and
- before it can waste valuable system resources.
-
- McAfee Firewall does this by monitoring applications
- that are either trusted or not trusted. When trusted
- applications need to access a network, McAfee Firewall
- manages everything in the computer to allow that
- application's traffic. When McAfee Firewall see
- non-trusted applications trying to access a network,
- it blocks all traffic to and from that application.
-
- Some network communications are needed to maintain
- network-based services. These are managed through
- user defined rules under the SYSTEM button. The default
- SYSTEM settings will provide protection from hostile
- threats. The installation routine will prompt with some
- basic questions to set up McAfee Firewall to do what
- you need (e.g. allow fileshares or not).
-
- * APPLICATION and SYSTEM: What do they mean?
- McAfee Firewall manages your network privacy
- through two large areas---APPLICATION traffic and
- SYSTEM traffic. APPLICATION traffic is based on trusting
- or not trusting applications that you know and use.
- SYSTEM traffic is more static and will allow or not allow
- things like fileshares and ICMP (control) traffic.
-
- When you click on APPLICATION, you must choose whether
- you will automatically trust all applications or not. If
- you choose to trust all applications, everthing that
- applications on your PC try to do will automatically
- be allowed. This is probably not a good thing to do,
- is it will open your PC to attack. If you choose to not
- trust applications, McAfee Firewall will begin to manage
- a "trusted" list and a "not trusted" list. You can always
- click on APPLICATION to see these lists and move known
- applications around.
-
- Once McAfee Firewall knows an application, it remembers
- it the next time the McAfee Firewall or the application
- in question is run. As new applications are run in the
- "not-trusted" mode, the system will prompt you for
- whether to trust this application or not.
-
- If McAfee Firewall asks you about an application that you
- know you are not currently running, or you do not have on
- your system, care should be taken in trusting it. Make
- certain you know what you are doing. While McAfee Firewall
- blocks the trojan horse, Back Oriface (BO), be default,
- it provides a good example of what might happen with other
- suspect applications. As BO attempted to run on your system
- and communicate out, McAfee Firewall would have captured
- this activity and asked you whether or not to trust it.
- It would have appeared to you as an application without
- an icon. Since you don't know what is happening, block it.
-
- System behaviour is defined under the SYSTEM button on a
- per device basis. Each device can have its own behaviour.
- For example, a network card may allow fileshares (sharing
- computer resources between trusted computers using the
- NetBIOS protocol); but that could be turned off over a
- modem to the Internet. The same applies to other basic
- services. For the most part, you need not concern yourself
- with protocols such as ARP, ICMP, NetBEUI and the like. If
- you need them, you probably know what they are.
-
- * What does the McAfee Firewall main window show?
- The MAIN window of McAfee Firewall (below the
- FILE, APPLICATION, SYSTEM, SYSTRAY and HELP tabs) shows
- activity that is live on your system. It also provides
- you with "radio-buttons" for global options like logging
- and overall behaviour of McAfee Firewall.
-
- * What do SUMMARY and DETAIL mean?
- SUMMARY shows basic applications that are trusted or
- not trusted in the main window of McAfee Firewall.
- DETAIL splits the main window into a left-hand
- summary side and a right-hand detail side that describe
- the network activity on your system.
-
- * What is the left-hand side for in DETAIL mode?
- The left-hand side show the two major network activity
- areas in your system: APPLICATION traffic and SYSTEM
- traffic. It also shows red current activity icon and
- blue log icon (if logging is enabled). Note that this
- is similar to the window's appearance when running SUMMARY
- mode with the addition of the current activity and log icons.
-
- When there is activity in the application area, a "+"
- sign appears in front of the icon. Clicking on the "+" sign
- will make it a "-" sign and will show the applications that
- McAfee Firewall is currently monitoring. There is
- always a "+" or a "-" in front of the system and application
- icons. This works exactly the same way as Windows Explorer,
- except that McAfee Firewall presents activities and
- applications (not files and folders).
-
- Each application can also be in a closed, explicit or inactive
- state. If a "+" or "-" sign appears in front of an application,
- that application is doing something. Clicking on the "+" or "-"
- sign will cause it to change state. In the explicit state, the
- application traffic will show "real-time" with red (block)
- arrows or green (allow) arrows for traffic direction and an
- icon to show the type of traffic as well as IP address or
- system names for the traffic. Applications with a red "X"
- on them are untrusted applications.
-
- * What is the right-hand side for in DETAIL mode?
- The right-hand side shows details on items that are
- highlighted on the left-hand side.
-
- * What does an X on an application mean?
- An "X" means that the application is not trusted and is
- being blocked by McAfee Firewall.
-
- * What do the little + and - signs mean and how do I use them?
- As described in section D., the "+" and "-" indicate activity
- in an item. The "+" sign is a closed state and shows not
- details. When the "+" sign is clicked, it becomes a "-"
- sign and represents an explicit state that shows details
- on the left-hand side of the main window.
-
- * The system is prompting me to trust an application.
- What should I do?
- The system will treat applications in one of two ways:
- (1)trust all applications or (2)don't trust all applications.
- This is set by clicking on APPLICATION and removing or adding
- a check mark to the TRUST ALL APPLICATIONS box.
-
- When there is no check mark here, McAfee Firewall
- will build a trusted list and a not-trusted list of applications.
- As new applications are run, if McAfee Firewall does
- not trust all applications, it will prompt the user to
- decide how it should treat each application. To change the
- status of an application, click on APPLICATION and move the
- application in question from the left, trusted list to or
- from the right, not-trusted list. NOTE-trusted applications
- can send and receive traffic; not-trusted applications can not.
-
- * Log files: Where are my log files and how do they work?
- The log files reside in the Private Desktop folder. This folder
- is in C:\PROGRAM FILES\McAfee\McAfee Firewall unless you chose
- another folder at installation. The files are of the format
- YYYYMM.log. For example, in September of 1999, the current
- log file will be 199909.log. Each log file can be up to 2
- MB in size before warnings are generated by the system and
- only essential messages are then written. If there is no log
- file, a new one is built for the current month. This means
- that a full log file can be deleted or renamed, and a new
- one will instantly replace it.
-
- The log file is in a ".txt" format and can be read
- with any text editor.
-
- * Network Control Buttons: What do they do?
- The NETWORK CONTROL buttons are at top left of the
- McAfee Firewall application window.
- They determine the overall behaviour of McAfee Firewall.
- Only one button can be selected at a time here:
-
- The first BLOCK EVERYTHING button will cause all traffic to
- be blocked regardless of any options chosen anywhere else.
- The second FILTER TRAFFIC button will cause all traffic to
- be processed as defined by options chosen elsewhere in
- McAfee Firewall.
- The final ALLOW EVERYTHING button will cause all traffic to
- be allowed, regardless of options chosen elsewhere in
- McAfee Firewall. This is a permissive mode and
- effectively turns off all protection provided by McAfee
- Firewall.
-
- * Display Buttons: What do they do?
- The DISPLAY buttons are in the top middle of the
- McAfee Firewall application window. They determine
- the single screen or split screen nature of the main portion of
- the McAfee Firewall window.
-
- * System Tray: How can McAfee Firewall start in the system tray?
- Click on SYS TRAY and select "Start in System Tray"
-
- * Auto Start: How can McAfee Firewall run automatically
- when I start my PC?
- You need to put a shortcut to the McAfee Firewall
- icon in the startup folder. This is C:\WINDOWS\ START MENU\
- PROGRAM\STARTUP. This will make McAfee Firewall run
- instantly when your system is booted.
-
- * Network traffic: Why does McAfee Firewall shut off existing
- network traffic when it is launched?
- McAfee Firewall is first and foremost a security product.
- If you suspect you are under attack, launching McAfee Firewall
- will quickly and effectively terminate hostile network
- traffic. Any applications that you were running before launching
- McAfee Firewall, will now be monitored.
-
- Having stated the above, we recommend that McAfee Firewall
- always be run upon system startup.
-
- * Internet dialup connection is lost when McAfee Firewall
- is closed.
- McAfee Firewall forces you to disconnect and reconnect
- from the Internet when it is closed. If you have attracted
- hostile attention, this will help because it will give your
- PC a new IP address. If someone was attacking you when you
- closed McAfee Firewall, this will force him or her to
- find you again before resuming an attack.
-
- Make certain your McAfee Firewall is always active
- when connected to other systems. We recommend that McAfee Firewall
- be run upon system startup and remain on during
- your entire session.
-
-
- ____________________________
- AD1 - ADDITIONAL INFORMATION
-
- * Fixed System Tray menu items for
- Block, Filter and Allow.
-
- * Fixed bug that, under certain
- circumstances, would block traffic
- for up to 8 seconds when a new IP
- address was assigned.
-
- * Fixed a bug in that prevents VPN's
- from connecting.
-
- * Added a warning about using the
- "Record Application Traffic"
- option, since it can use a lot
- of disk space very quickly.
-
- ___________________________________
- NA1 - CONTACTING NETWORK ASSOCIATES
-
-
- On December 1, 1997, McAfee Associates merged
- with Network General Corporation, Pretty Good
- Privacy, Inc., and Helix Software, Inc. to form
- Network Associates, Inc. The combined Company
- subsequently acquired Dr Solomon's Software,
- Trusted Information Systems, and CyberMedia,
- Inc.
-
- Network Associates continues to market and
- support the product lines from each of the
- former entities. You may direct all questions,
- comments, or requests concerning the software
- you purchased, your registration status, or
- similar issues to the Network Associates
- Customer Care department at the addresses or
- phone numbers listed below.
-
- Contact the Network Associates Customer Care
- department at:
-
- 1. Phone (408) 988-3832
- Monday-Friday, 6:00 A.M. - 6:00 P.M.
- Pacific time
-
- 2. Fax (408) 970-9727
- 24-hour, Group III Fax
-
- 3. Fax-back automated response system
- (408) 346-3414
-
- 4. E-mail: custcare@nai.com
-
- Send correspondence to any of the following
- Network Associates locations:
-
- Network Associates Corporate Headquarters
- 3965 Freedom Circle
- McCandless Towers
- Santa Clara, CA 95054
-
- Phone numbers for corporate-licensed
- customers:
- Phone: (408) 988-3832
- Fax: (408) 970-9727
-
- Phone numbers for retail-licensed
- customers:
- Phone: (972) 278-6100
- Fax: (408) 970-9727
-
-
- **** McAfee Contact Information ****
-
- If you need further assistance or have specific
- questions about McAfee products, send your
- questions via email to the appropriate
- address below:
-
- * Customer service
- To order products or obtain product information,
- contact the McAfee Customer Care department at
- (972) 308-9960 or write to the following address:
- McAfee Software
- 3965 Freedom Circle
- Santa Clara, CA 95054
- U.S.A.
-
- Customer Service e-mail: custserv@nai.com
-
- * Support via the Web
- McAfee is famous for its dedication to customer
- satisfaction. We have continued this tradition by
- making our site on the World Wide Web
- (http://www.mcafeehelp.com) a valuable resource
- for answers to technical support issues.
- We encourage you to make this your first stop for
- answers to frequently asked questions, for updates
- to McAfee software, and for access to McAfee news
- and virus information.
-
- Take advantage of the McAfee Product KnowledgeCenter
- your free online product support center - 24 hours
- a day, 7 days a week (http://www.mcafeehelp.com).
-
- * Telephone support numbers
-
- 30-Day Free Telephone Support 972-855-7044
-
- Disclaimer: Time and telephone numbers
- are subject to change without prior notice.
-
- ********
-
- Network Associates offices outside the United
- States:
-
- Network Associates Australia
- Level 1, 500 Pacific Highway
- St. Leonards, NSW
- Sydney, Australia 2065
- Phone: 61-2-8425-4200
- Fax: 61-2-9439-5166
-
- Network Associates Austria
- Pulvermuehlstrasse 17
- Linz, Austria
- Postal Code A-4040
- Phone: 43-732-757-244
- Fax: 43-732-757-244-20
-
- Network Associates Belgium
- Bessenveldtstraat 25a
- Diegem, Belgium - 1831
- Phone: 32-3-716-4070
- Fax: 61-2-716-4770
-
- Network Associates do Brasil
- Rua Geraldo Flausino Gomez 78
- Cj. - 51 Brooklin Novo - Sπo Paulo
- SP - 04575-060 - Brasil
- Phone: (55 11) 5505 1009
- Fax: (55 11) 5505 1006
-
- Network Associates Canada
- 139 Main Street, Suite 201
- Unionville, Ontario
- Canada L3R 2G6
- Phone: (905) 479-4189
- Fax: (905) 479-4540
-
- Network Associates
- People's Republic of China
- New Century Office Tower, Room 1557
- No. 6 Southern Road Capitol Gym
- Beijing
- People's Republic of China 100044
- Phone: 86 10 6849-2650
- Fax: 86 10 6849-2069
-
- Network Associates Denmark
- Lautruphoej 1-3
- 2750 Ballerup
- Danmark
- Phone: 45 70 277 277
- Fax: 45 44 209 910
-
- NA Network Associates Oy
- Sinikalliontie 9, 3rd Floor
- 02630 Espoo
- Finland
- Phone: 358 9 5270 70
- Fax: 358 9 5270 7100
-
- Network Associates France S.A.
- 50 Rue de Londres
- 75008 Paris
- France
- Phone: 33 1 44 908 737
- Fax: 33 1 45 227 554
-
- Network Associates GmbH
- Ohmstra▀e 1
- D-85716 Unterschlei▀heim
- Deutschland
- Phone: 49 (0)89/3707-0
- Fax: 49 (0)89/3707-1199
-
-
- Network Associates Hong Kong
- 19th Floor, Matheson Centre
- 3 Matheson Way
- Causeway Bay
- Hong Kong 63225
- Phone: 852-2832-9525
- Fax: 852-2832-9530
-
- Network Associates Srl
- Centro Direzionale Summit
- Palazzo D/1
- Via Brescia, 28
- 20063 - Cernusco sul Naviglio (MI)
- ITALY
- Phone: 39 02 92 65 01
- Fax: 39 02 92 14 16 44
-
- Network Associates Japan, Inc.
- Toranomon 33 Mori Bldg.
- 3-8-21 Toranomon Minato-ku
- Tokyo 105-0001 Japan
- Phone: 81 3 5408 0700
- Fax: 81 3 5408 0780
-
- Network Associates Latin America
- 1200 South Pine Island Road, Suite 205
- Plantation, Florida 33324
- United States
- Phone: (954) 452-1721
- Fax: (954) 236-8031
-
- Network Associates de Mexico
- Andres Bello No. 10, 4 Piso
- 4th Floor
- Col. Polanco
- Mexico City, Mexico D.F. 11560
- Phone: (525) 282-9180
- Fax: (525) 282-9183
-
- Network Associates International B.V.
- Gatwickstraat 25
- 1043 GL Amsterdam
- The Netherlands
- Phone: 31 20 586 6100
- Fax: 31 20 586 6101
-
- Network Associates Portugal
- Av. da Liberdade, 114
- 1269-046 Lisboa
- Portugal
- Phone: 351 1 340 4543
- Fax: 351 1 340 4575
-
- Net Tools Network Associates South Africa
- Bardev House, St. Andrews
- Meadowbrook Lane
- Epson Downs, P.O. Box 7062
- Bryanston, Johannesburg
- South Africa 2021
- Phone: 27 11 706-1629
- Fax: 27 11 706-1569
-
- Network Associates South East Asia
- 78 Shenton Way
- #29-02
- Singapore 079120
- Phone: 65 222-7555
- Fax: 65 222-7555
-
- Network Associates Spain
- Orense 4, 4a Planta.
- Edificio Trieste
- 28020 Madrid
- Spain
- Phone: 34 91 598 18 00
- Fax: 34 91 556 14 04
-
- Network Associates Sweden
- DatavΣgen 3A
- Box 596
- S-175 26 JΣrfΣlla
- Sweden
- Phone: 46 (0) 8 580 88 400
- Fax: 46 (0) 8 580 88 405
-
- Network Associates AG
- Baeulerwisenstrasse 3
- 8152 Glattbrugg
- Switzerland
- Phone: 0041 1 808 99 66
- Fax: 0041 1 808 99 77
-
- Network Associates Taiwan
- Suite 6, 11F
- No. 188, Sec. 5
- Nan King E. Rd.
- Taipei, Taiwan, Republic of China
- Phone: 886-2-27-474-8800
- Fax: 886-2-27-635-5864
-
- Network Associates International Ltd.
- Minton Place, Victoria Street
- Windsor, Berkshire
- SL4 1EG
- United Kingdom
- Phone: 44 (0)1753 827 500
- Fax: 44 (0)1753 827 520
-
-
- To provide the answers you need quickly and
- efficiently, the Network Associates technical
- support staff needs some information about
- your computer and your software. Please have
- this information ready when you call:
-
- - Program name and version number
- - Computer brand and model
- - Any additional hardware or peripherals
- connected to your computer
- - Operating system type and version numbers
- - Network name, operating system, and version
- - Network card installed, where applicable
- - Modem manufacturer, model, and bits-per-
- second rate, where applicable
- - Relevant browsers or applications and their
- version numbers, where applicable
- - How to reproduce your problem: when it
- occurs, whether you can reproduce it
- regularly, and under what conditions
- - Information needed to contact you by voice,
- fax, or e-mail
-
- Network Associates also seeks and appreciates
- general feedback.
-
-
- * FOR PRODUCT UPGRADES *
-
- Network Associates has a worldwide range of
- partnerships and reseller relationships with
- hundreds of independent vendors, each of which
- can provide you with consulting services, sales
- advice, and product support for Network
- Associates software. To find a reseller near
- your location, see the RESELLER.TXT file
- located on your product CD-ROM or installed on
- your hard disk. For assistance in locating a
- local reseller, you can also contact Network
- Associates Customer Care.
-
-
- * FOR REPORTING PROBLEMS *
-
- Network Associates prides itself on delivering
- a high-quality product. If you find any
- problems, please take a moment to review the
- contents of this file. If the problem you've
- encountered appears in the Known Issues section
- of this README.TXT file, Network Associates is
- already aware of the problem, and you need not
- report it.
-
- If you find any feature that does not appear to
- function properly on your system, or if you
- believe an application would benefit greatly
- from enhancement, please contact Network
- Associates or one of its resellers with your
- suggestions or concerns.
-
-
- * NETWORK ASSOCIATES BETA SITE *
-
- To test pre-release software and obtain update
- files, including virus definition (.DAT) files,
- visit the Network Associates beta site at
- http://beta.nai.com. You will have access to
- Public Beta and External Test Areas. Your
- feedback will make a difference.
-
-
- * AVERT ANTI-VIRUS RESEARCH SITE *
-
- To see the latest information about emerging
- virus threats, submit samples of potentially
- infected files, and download updated scanning
- engine files, EXTRA.DAT files, and similar
- anti-virus software for testing, visit the
- AVERT research site at:
-
- http://www.avertlabs.com.
-
- __________________________________________
- CT1 - COPYRIGHT AND TRADEMARK ATTRIBUTIONS
-
- Copyright (c) 1999-2000 Network Associates
- Technology, Inc. All Rights Reserved. No
- part of this publication may be reproduced,
- transmitted, transcribed, stored in a
- retrieval system, or translated into any
- language in any form or by any means without
- the written permission of Networks Associates
- Technology, Inc., or its suppliers or
- affiliate companies.
-
- * TRADEMARKS *
-
- * ActiveHelp, Bomb Shelter, Building a World
- of Trust, CipherLink, Clean-Up, Cloaking,
- CNX, * ActiveHelp, Bomb Shelter, Building a
- World of Trust, CipherLink, Clean-Up,
- Cloaking, CNX, Compass 7, CyberCop,
- CyberMedia, Data Security Letter, Discover,
- Distributed Sniffer System, Dr Solomon's,
- Enterprise Secure Cast, First Aid, ForceField,
- Gauntlet, GMT, GroupShield, HelpDesk, Hunter,
- ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp
- Desk Technology, Magic Solutions, MagicSpy,
- MagicTree, Magic University, MagicWin,
- MagicWord, McAfee, McAfee Associates,
- MoneyMagic, More Power To You, Multimedia
- Cloaking, NetCrypto, NetOctopus, NetRoom,
- NetScan, Net Shield, NetShield, NetStalker,
- Net Tools, Network Associates, Network
- General, Network Uptime!, NetXRay, Nuts &
- Bolts, PC Medic, PCNotary, PGP, PGP
- (Pretty Good Privacy), PocketScope,
- Pop-Up, PowerTelnet, Pretty Good Privacy,
- PrimeSupport, RecoverKey, RecoverKey-
- International, ReportMagic, RingFence,
- Router PM, Safe & Sound, SalesMagic,
- SecureCast, Service Level Manager,
- ServiceMagic, Site Meter, Sniffer,
- SniffMaster, SniffNet, Stalker,
- Statistical Information Retrieval
- (SIR), SupportMagic, Switch PM,
- TeleSniffer, TIS, TMach, TMeg,
- Total Network Security, Total Network
- Visibility, Total Service Desk, Total
- Virus Defense, T-POD, Trusted Mach, Trusted
- Mail, Uninstaller, Virex, Virex-PC, Virus
- Forum, ViruScan, VirusScan, VShield, WebScan,
- WebShield, WebSniffer, WebStalker, WebWall,
- and ZAC 2000 are registered trademarks of
- Network Associates and/or its affiliates
- in the US and/or other countries. All other
- registered and unregistered trademarks in
- this document are the sole property of
- their respective owners.
-
- * LICENSE AGREEMENT *
-
- NOTICE TO ALL USERS: CAREFULLY READ THE
- FOLLOWING LEGAL AGREEMENT ("AGREEMENT"),
- FOR THE LICENSE OF SPECIFIED SOFTWARE
- ("SOFTWARE") BY NETWORK ASSOCIATES, INC.
- ("McAfee"). BY CLICKING THE ACCEPT BUTTON
- OR INSTALLING THE SOFTWARE, YOU (EITHER AN
- INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO
- BE BOUND BY AND BECOME A PARTY TO THIS
- AGREEMENT. IF YOU DO NOT AGREE TO ALL OF
- THE TERMS OF THIS AGREEMENT, CLICK THE
- BUTTON THAT INDICATES THAT YOU DO NOT
- ACCEPT THE TERMS OF THIS AGREEMENT AND
- DO NOT INSTALL THE SOFTWARE.
- (IF APPLICABLE, YOU MAY RETURN THE
- PRODUCT TO THE PLACE OF PURCHASE
- FOR A FULL REFUND.)
-
-