home *** CD-ROM | disk | FTP | other *** search
/ NetGuide 2004 April / NETGUID0404N.iso / pc / featured / Shareware / SygatePF / spf1.exe / SPF.chm / spf55.brs < prev    next >
Encoding:
INI File  |  2003-12-24  |  5.0 KB  |  97 lines

  1. [Am I Under Attack?]
  2. Help - The System Tray Icon is Flashing | Help_-_The_System_Tray_Icon_is_Flashing.htm
  3.  
  4. [Configuring Advanced Rules for Security]
  5. About Advanced Rules | About_Advanced_Rules.htm
  6. Setting up Advanced Rules | Setting_up_Advanced_Rules.htm
  7. Overview of Creating Advanced Rules | Overview_of_Creating_Advanced_Rules.htm
  8. Advanced Rules: Provide a Name, Specify Allow or Block | Advanced_Rules__Provide_a_Name,_Specify_Allow_or_Block.htm
  9. Advanced Rules: Specify a Source | Advanced_Rules__Specify_a_Source.htm
  10. Advanced Rules: Specify Ports and Protocols | Advanced_Rules__Specify_Ports_and_Protocols.htm
  11. Advanced Rules: Define a Schedule | Advanced_Rules__Define_a_Schedule.htm
  12. Advanced Rules: Specifying Applications | Advanced_Rules__Specifying_Applications.htm
  13.  
  14. [Getting Around]
  15. Starting and Using the Software | Starting_and_Using_the_Software.htm
  16. Password Protecting Your Security Settings | Password_Protecting_Your_Security_Settings.htm
  17. Shortcut to the Software: the System Tray Icon | Shortcut_to_the_Software__the_System_Tray_Icon.htm
  18. Using the Main Console | Using_the_Main_Console.htm
  19. Using the Menus and the Toolbar | Using_the_Menus_and_the_Toolbar.htm
  20. What is this Pop-Up Window About? | What_is_this_Pop-Up_Window_About.htm
  21.  
  22. [Monitoring Your System: Logs]
  23. Introduction to Logs | Introduction_to_Logs.htm
  24. Understanding Logs | Understanding_Logs.htm
  25. Exporting Logs | Exporting_Logs.htm
  26. Viewing Logs | Viewing_Logs.htm
  27. Viewing the Security Log | Viewing_the_Security_Log.htm
  28. Viewing the Traffic Log | Viewing_the_Traffic_Log.htm
  29. Viewing the Packet Log | Viewing_the_Packet_Log.htm
  30. Viewing the System Log | Viewing_the_System_Log.htm
  31. Back Tracing Logged Events | Back_Tracing_Logged_Events.htm
  32.  
  33. [More About Default Values]
  34. Defaults: A Summary of Rules and Settings | Agent_Defaults__A_Summary_of_Rules_and_Settings.htm
  35.  
  36. [Protecting Your System]
  37. Setting up Protection for Your System | Setting_up_Protection_for_Your_System.htm
  38. How to Set Permissions by Application | How_to_Set_Permissions_by_Application.htm
  39. How to Change Configuration Options | How_to_Change_Configuration_Options.htm
  40. About Advanced Rules | About_Advanced_Rules.htm
  41.  
  42. [Receiving and Installing the Software]
  43. Receiving the Software | Receiving_the_Software.htm
  44. Installing the Software | Installing_the_Software.htm
  45. Upgrading Sygate Personal Firewall | Upgrading_Sygate_Personal_Firewall.htm
  46. Registering Sygate Personal Firewall | Registering_Sygate_Personal_Firewall.htm
  47. Uninstalling the Software | Uninstalling_the_Software.htm
  48.  
  49. [Setting Up Protection Based on Application]
  50. How to Set Permissions by Application | How_to_Set_Permissions_by_Application.htm
  51. Reviewing and Changing the Permission Status of an Application | Reviewing_and_Changing_the_Permission_Status_of_an_Application.htm
  52.  
  53. [Setting Up Protection by Configuration Changes]
  54. How to Change Configuration Options | How_to_Change_Configuration_Options.htm
  55. Review of General Configuration Options | Review_of_General_Configuration_Options.htm
  56. Sharing Files and Folders | Sharing_Files_and_Folders.htm
  57. Setting Detailed Security Options | Setting_Detailed_Security_Options.htm
  58. Setting Up Email Notification of Security Events | Setting_Up_Email_Notification_of_Security_Events.htm
  59. Updating Your Security | Updating_Your_Security.htm
  60. Logging Security Events on Your System | Logging_Security_Events_on_Your_System.htm
  61.  
  62. [Test Your System's Vulnerability]
  63. Using Sygate's Online Services | Using_Sygate_s_Online_Services.htm
  64. Performing a Quick Scan | Performing_a_Quick_Scan.htm
  65. Performing a Stealth Scan | performing_a_stealth_scan.htm
  66. Performing a Trojan Scan | performing_a_trojan_scan.htm
  67. Performing a TCP Scan | performing_a_tcp_scan.htm
  68. Performing a UDP Scan | performing_a_udp_scan.htm
  69. Performing an ICMP Scan | performing_an_icmp_scan.htm
  70.  
  71. [The Software in Context]
  72. Introduction | Introduction.htm
  73. Some Options May Not Show | Some_Options_May_Not_Show-FREE.htm
  74. How Firewalls Work | How_Firewalls_Work.htm
  75. What Does the Software Do? | What_Does_the_Software_Do_.htm
  76. Agent Defaults: an Introduction | Agent_Defaults__an_Introduction.htm
  77.  
  78. [Troubleshooting]
  79. Troubleshooting Sygate Personal Firewall | Troubleshooting_Sygate_Personal_Firewall.htm
  80. Firewall Configuration, Usage, and Software Expiration | Firewall_Configuration,_Usage,_and_Software_Expiration.htm
  81. Firewall Protection Against Attacks, Viruses, Trojans | Firewall_Protection_Against_Attacks,_Viruses,_Trojans.htm
  82. Firewall and Internet Connection Sharing, VPNs, and Networking | Firewall_and_Internet_Connection_Sharing,_VPNs,_and_Networking.htm
  83.  
  84. [Understanding Pop-Up Messages]
  85. What is this Pop-Up Window About? | What_is_this_Pop-Up_Window_About.htm
  86. Why Did I Get a Pop-Up Message? | Why_Did_I_Get_a_Pop-Up_Message_.htm
  87. Why Did I get a Security Notification? | Why_did_I_get_a_Security_Notification_.htm
  88.  
  89. [Welcome]
  90. Welcome to Online Help | Welcome_to_Online_Help.htm
  91. What's New | What_s_New.htm
  92. Related Documentation | Related_Documentation.htm
  93. Intended Audience | Intended_Audience.htm
  94. Technical Support | Technical_Support.htm
  95.  
  96.  
  97.