                  Release Notes
    for VirusScan for OS/2* Software v4.0.3 
               Copyright (c) 1999
      Networks Associates Technology, Inc.
              All Rights Reserved.

Thank you for using the VirusScan for OS/2
software. This Read Me file contains important
information regarding this release. Network
Associates strongly recommends that you read
the entire document.

Network Associates welcomes your comments and
suggestions. Please use the information
provided in this file to contact Customer Care,
technical support, or the documentation
team for this product.

___________________
WHAT'S IN THIS FILE

- NF1  New Features
- DC1  Documentation
- SR1  System Requirements
- IN1  Installation
  IN2  Enabling SES
  IN3  Installation Steps
  IN4  Testing Your Installation 
  IN5  Files Installed on Your Computer
  IN6  Removing the VirusScan for OS/2
       Software From Your Computer
- KN1  Known Issues
- FQ1  Frequently Asked Questions
- NA1  Contacting Network Associates
- YC1  Statement of Year 2000 Compliance
- CT1  Copyright and Trademark Attributions

NOTE:  A unique identifying code precedes each
       heading in this file. To jump to a
       particular heading within the file, copy
       the three-character code from the list
       above into your text editor's Find
       dialog box, or equivalent, then search
       for the identifying code to move
       directly to that heading.

__________________
NF1 - NEW FEATURES

VirusScan for OS/2 now offers users the
convenience of a scheduler. This allows
users to schedule scans for off-peak or
after-hours times to avoid drain on
system resources during peak productivity
hours. It also allows administrators to
better enforce security and anti-virus
policy: the administrator can set
scheduled scans for users who might
otherwise forget to scan their systems
on a regular basis. 

Other components of the VirusScan product
have not been changed, and so will display
v4.0.2 as their version number.

            ****IMPORTANT NOTES****

* Beginning with the next release of this
  product, the file name for this release
  notes file will change from WHATSNEW.TXT
  to README.TXT. The contents within the file
  will remain the same. This file name change
  will occur for all Network Associates
  products.

  Similarly, the license file now called
  README.1ST will change its name to
  LICENSE.TXT. Please review this file for the
  terms of your license to use the Network
  Associates products you install.

  Please send any questions or comments about
  this change to tvd_documentation@nai.com.

* The 4037 .DAT files included with this
  release of the VirusScan for OS/2 software
  are compatible with Network Associates
  anti-virus products that use scan engine
  versions 4.0.xx only. These .DAT files will
  NOT work with v3.x or v2.x scan engines.
  Network Associates recommends that you
  upgrade to the latest version of the v4.x.xx
  engine for optimal virus detection and
  repair.

  The WHATSNEW.TXT or README.TXT files that
  accompany each product will no longer list
  the viruses that the product detects and
  removes. That information will appear only
  in the README.TXT file that comes with the
  .DAT update.

                      ****
___________________
DC1 - DOCUMENTATION

Network Associates provides each of its
products with an extensive set of documentation,
consisting usually of one or more product guides
saved in Adobe Acrobat Portable Document Format
(.PDF), and an online help system, whose form
can vary, depending the platform on which the
product runs.

Acrobat .PDF files are flexible online documents
that contain hyperlinks, outlines and other aids
for easy navigation and information retrieval.
You can also install an Acrobat plug-in file
that allows you to read .PDF documents from
within your web browser while online. Copies
of the product documentation come with the
product CD-ROM or are available on the Network
Associates website at: 

ftp://ftp.nai.com/pub/manuals/total_virus_defense

A copy of the free Acrobat Reader also comes
with the product CD-ROM or is available from
the Adobe website at:

http://www.adobe.com/prodindex/acrobat/readstep.html

Most Network Associates products can include a
documentation set drawn from these components:

NOTE: Not all products will include all listed
      documents. Consult the User's Guide or
      Administrator's Guide that comes with
      your product for a complete list.

 * A printed Getting Started Guide, which
   introduces the product, provides
   installation instructions, outlines product
   features, and provides a brief overview. In
   many cases, an electronic version of this
   guide will also be available on the product
   CD-ROM or from the Network Associates FTP
   site in Adobe Acrobat .PDF format.

 * A User's Guide saved on the product CD-ROM or
   installed on your hard disk in Adobe Acrobat
   .PDF format. Network Associates User's Guides
   document all product functions extensively,
   and discuss how best to use your Network
   Associates product to accomplish your tasks.

 * An Administrator's Guide saved on the product
   CD-ROM or installed on your hard disk in
   Adobe Acrobat .PDF format. Administrator's
   Guides describe how to deploy, maintain and
   administer Network Associates server-based
   products in a networked environment.

 * Specialized guides. These can include
   reference guides, deployment guides,
   configuration guides, vulnerability guides
   for intrusion detection software, and other
   product-specific documentation.

 * An online help system. Online help gives you
   quick access to hints and tips about how to
   use your Network Associates software. The
   format of the online help system for the
   product will vary, depending on which
   platform or operating system you use to run
   your Network Associates product. In most
   cases, the software will display a Help menu
   item or link that you can use to start the
   system.
   
   Some products might also include context-
   sensitive online help. Right-click buttons,
   lists or other elements within dialog boxes
   to see brief, descriptive help topics.

 * A LICENSE.TXT file. This file outlines the
   terms of your license to use your Network
   Associates product. Read it carefully. If
   you install the Network Associates product,
   you agree to the license terms.

 * This WHATSNEW.TXT file. This file contains
   last-minute additions or changes to the
   documentation, lists any known behavior or
   other issues with the product release,
   and often describes new product features
   incorporated into incremental product
   updates.

To comment, ask about, or suggest improvements
to Network Associates anti-virus product
documentation, send e-mail to:

tvd_documentation@nai.com

To get answers to your technical support
questions, send messages to:

support@nai.com

To ask about your eligibility for updates and
upgrades, check your registration, or ask
general questions related to Network Associates
software, send messages to:

custcare@nai.com

_________________________
SR1 - SYSTEM REQUIREMENTS

The VirusScan for OS/2 software runs under both
Warp 3 and Warp 4. The system requirements below
list the particular configurations necessary to
run the VirusScan software under each OS/2
version.

To install and run the VirusScan for OS/2
software on Warp 4 systems, your computer must:

  * Run OS/2 Warp 4 with the Security Enabling
    System component installed and enabled.
    You can install the Security Enabling
    System as an Optional System Component
    during your OS/2 installation. You can then
    enable SES with the VirusScan for OS/2
    installation utility.

    Once you have SES installed, you can use the
    VirusScan
    for OS/2 installation utility to enable it.
    Note that to use the installation utility to
    enable SES, you must also choose to install
    the VShield component. If you already have
    SES installed and enabled on your system,
    you can choose to install the VShield
    component without enabling SES.

    Alternatively, you can enable SES separately
    by editing your system's CONFIG.SYS file.
    Consult "Enabling SES" later in this file to
    learn how to enable SES yourself.

    WARNING: You MUST have SES installed on your
    system in order for the installation utility
    to enable it properly. If you do not have
    SES installed, and you try to enable it
    during installation, the installation
    utility will prevent Program Manager from
    running and prevent your system from
    completing its startup. The installation
    utility CANNOT check for the presence of
    SES software on your computer.

  * Have OS/2 FixPak 4 installed.

To install and run VirusScan's VShield component
on Warp 3 systems, your computer must:

  * Run OS/2 Warp 3 with the Security Enabling
    System (SES) component installed and
    enabled. The SES component, in turn,
    requires OS/2 FixPak 17 (XR_W017). You can
    obtain both SES and FixPak 17 from IBM, or
    download it from the IBM website at
    ftp://ftp.software.ibm.com.

    NOTE: If you have FixPak versions later than
    FixPak 17 installed, you must remove them,
    install FixPak 17 and the SES FixPak, then
    reinstall later-version FixPaks in order to
    correctly enable SES.

    Once you have SES installed, you can use the
    VirusScan for OS/2 installation utility to
    enable it. Note that to use the installation
    utility to enable SES, you must also choose
    to install VShield. If you already have SES
    installed and enabled on your system, you
    can choose to install VShield without
    enabling SES.

    WARNING: You MUST have SES installed on your
    system in order for the installation utility
    to enable it properly. If you do NOT have
    SES installed, and you try to enable it
    during installation, the installation
    utility will prevent Program Manager from
    running and prevent your system from
    completing its startup. The installation
    utility CANNOT check for the presence of
    SES software on your computer.

    Alternatively, consult "Enabling SES" later
    in this file to learn how to enable SES
    yourself.

  * Have OS/2 FixPak 26 or later installed. You
    must install FixPak 26 or any later FixPak
    after you install the SES component. You
    can obtain the necessary FixPak software
    from IBM, or download it from the IBM
    website at ftp://ftp.software.ibm.com.

__________________
IN1 - INSTALLATION

* IN2 - ENABLING SES *

Because VirusScan's VShield component relies on
IBM's SES component to give it the complete file
access it needs to check your system for
viruses, you must enable SES before you install
the VShield component. IBM has versions of SES
available for use with OS/2 Warp 3 and OS/2
Warp 4.

If you do not already have SES enabled, you can
have the VirusScan for OS/2 installation utility
enable it for you during installation. See
"Installation Steps" later in this file for
details.

To enable SES yourself, you must add
configuration data to your CONFIG.SYS file.
CNFGSES.TXT, a separate text file included with
this VirusScan distribution, is a model
CONFIG.SYS file from which you can copy the
necessary configuration data. Once you edit your
CONFIG.SYS file, restart your computer to load
the necessary configuration data.


* IN3 - INSTALLATION STEPS *

To install this version of the VirusScan for
OS/2 software, follow these steps:

1.  Verify that you have installed and enabled
    the OS/2 Security Enabling System component
    on your computer. To learn how to do so, see
    the "Enabling SES" earlier in this file. 

2.  Create a temporary directory on your hard
    disk or on a disk available on your network,
    then download the VirusScan for OS/2
    installation files from the Network
    Associates website to the directory you
    created.

    Next, use a utility that can extract files
    from .zip archives to uncompress the files
    you downloaded into the directory you
    created.

3.  Locate the INSTALL.EXE file in your
    temporary directory, then double-click it
    to begin your installation.

4.  Follow the instructions shown in the
    installation panels to continue. You can
    choose to install the VirusScan on-demand
    scanner, the VShield on-access scanner, or
    both.

    NOTE: If you choose to install the VShield
    on-access scanner, you MUST have SES
    installed on your computer for it to work
    properly. If you have SES installed on your
    system, but not enabled, you should choose
    to enable SES through the VirusScan
    installation utility.

    WARNING: If you choose to enable SES but do
    not have it already installed on your
    computer, the installation utility will
    prevent Program Manager from running and
    your system from completing its startup.
    The installation utility CANNOT check for
    the presence of SES software on your
    computer. Be sure you have followed all of
    the steps shown in the previous sections
    before you continue with your installation.

5.  When you finish your installation, restart
    your computer.

* IN4 - TESTING YOUR INSTALLATION *

The EICAR Standard Anti-Virus Test File is a
combined effort by anti-virus vendors throughout
the world to implement one standard by which
customers can verify their anti-virus
installations.

To test your installation, copy the following
line into its own file, then save the file with
the name EICAR.COM.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

The file size will be 69 or 70 bytes.

Next, start your anti-virus software and allow
it to scan the directory that contains
EICAR.COM. When your software scans this file,
it will report finding the EICAR virus.

Note that this file is NOT A VIRUS. Delete the
file when you have finished testing your
installation to avoid alarming unsuspecting
users.

* IN5 - FILES INSTALLED ON YOUR COMPUTER *

These primary program files for the VirusScan
for OS/2 software are located in the default
installation directory C:\NETA\VSCANOS2:
================================================

   APIO32.DLL = VShield scanning engine for OS/2
    CLEAN.DAT = Virus definition file
   COMMON.PKG = Package file for OS/2
                installation utility
    CRYER.EXE = VShield alert message generation
                utility
    CRYER.HLP = Help file for configuration
                program
 EPFIEXTS.DLL = OS/2 installation support file
 EPFIHELP.INF = IBM Information file used
                together with the OS/2
                Information Presentation
                Facility
 EPFIHPLB.HLP = IBM help file, similar to
                EPFIHELP.INF 
 EPFIICIS.ICO = IBM installation support file;
                lists files for uninstallation
  EPFIMSG.MSG = IBM localization file
 EPFINSTS.EXE = IBM installation and maintenance
                program; used for uninstalling
  EPFIPII.DLL = OS/2 installation support file
 EPFIPRCS.EXE = OS/2 installation support file
 EPFIRSBK.DLL = OS/2 installation support file
 EPFIUPK2.EXE = IBM unpacking utility
 GDDAEMON.EXE = VShield scanning daemon; allows
                interaction between the VShield
                filter driver and the scanning
                engine
 HELPFILE.INF = VirusScan for OS/2 help file
  LICENSE.DAT = License compliance checker
 MESSAGES.DAT = Localization file
    NAMES.DAT = Virus names list
    NOV16.DLL = Network message file for Novell
                networks
    NOV32.DLL = Network message file for Novell
                networks
 OS2GUARD.DSC = Package description file for
                OS/2 installation utility
 OS2GUARD.ICF = Catalog file for OS/2
                installation utility; lists
                files for uninstallation
 OS2GUARD.MIF = Desktop Management Interface
                (DMI) Management Information
                Format file
 OS2GUARD.PKG = Package file for OS/2
                installation utility
 OS2GUARD.RSP = Automated installation response
                file for Netview
  OS2SCAN.EXE = VirusScan for OS/2 command-line
                program file
  PACKING.LST = packing list for validation
   PMSCAN.EXE = VirusScan for OS/2 on-demand
                scanning component used with
                graphical user interface
 PTOOLKIT.EXE = VirusScan for OS/2 on-demand
                graphical user interface file
 PTOOLKIT.HLP = VirusScan for OS/2 help file 
   README.1ST = Network Associates license
                document
     SCAN.DAT = Virus definitions file
 VALIDATE.EXE = Network Associates validation
                utility
    VSCMN.DLL = Code common to the two
                VirusScan Scheduler executables
 VSEDITOR.EXE = The VirusScan Scheduler Editor
                program file
 VSEDITOR.INI = Screen data for the VirusScan
                Schedule editor
 VSENGINE.EXE = The VirusScan Scheduler engine
 VSENGINE.INI = Event data for the VirusScan
                Schedule editor
  VSOOM30.DLL = Standard Libraries from Visual
                Age C++
  VSOOOB3.DLL = Standard Libraries from Visual
                Age C++
 VSOOOR3U.DLL = Standard Libraries from Visual
                Age C++
  VSOOOU3.DLL = Standard Libraries from Visual
                Age C++
  VSOOOV3.DLL = Standard Libraries from Visual
                Age C++
  VSOOS30.DLL = Standard Libraries from Visual
                Age C++
  VSSERES.DLL = Schedule Editor Resources
 WHATSNEW.TXT = This document

Files located in the OS/2 directory:
====================================

  VSHIELD.FLT = VShield filter driver;
                enables file access for
                scanning engine

* IN6 - REMOVING THE VIRUSSCAN FOR OS/2
        SOFTWARE FROM YOUR COMPUTER*

To remove the VirusScan for OS/2 software from
your computer, follow these steps:

1.  Locate and open the VirusScan folder on your
    computer. By default, the VirusScan
    installation utility places this folder on
    the OS/2 desktop.

2.  Double-click the VirusScan Uninstaller
    program icon to open it.

    The Uninstaller window appears.

3.  Choose Delete from the Action menu.

    A dialog box appears, where you can choose
    the components you want to remove.

4.  Click Select All to choose all VirusScan
    components.

5.  Click Delete to remove all VirusScan
    components, then confirm your action when
    the utility prompts you to do so.

    The uninstaller will remove each VirusScan
    component and delete the VirusScan folder
    from your OS/2 desktop.

6.  Restart your computer to complete the
    uninstallation and return your computer to
    its previous state.

__________________
KN1 - KNOWN ISSUES

1.  This release of the VirusScan for OS/2
    software supports network messaging and
    alerting on Novell servers only.

2.  If the user enters invalid data when
    specifying a quarantine directory, VirusScan
    will not successfully quarantine files. 

3.  The VShield on-access scanner cannot detect
    Word macro viruses unless the "Scan all
    files" option is enabled.

4.  When using the VirusScan "Automatic Network
    Messaging" feature, the message text cannot
    contain spaces. Use hyphens, underscores, or
    periods between the words of the alert
    message to successfully use this feature.

5.  The /MOVE option does not work in all
    instances with this release of the VirusScan 
    for OS/2 software.

6.  The "Shred" feature does not work with this
    release of the VirusScan for OS/2 software.

7.  The VirusScan on-demand scanner will
    sometimes change the time and date stamp of
    files that it moves, even if the files were
    not opened or modified.

8.  If the VirusScan for OS/2 software is
    configured to rename files which could not
    be successfully cleaned, the renamed file
    will also be moved to the installation
    directory.

9.  If the VirusScan for OS/2 software is
    configured to deny access to files which
    could not be successfully cleaned, these
    files will also be renamed.

10. Any attempt to add programs to the VirusScan
    Scheduler New Programs List box will cause
    your system to become unstable.

________________________________
FQ1 - FREQUENTLY ASKED QUESTIONS

Q:  I've installed the VShield component, but I
    don't see an icon on my desktop. How do I
    configure the program?

A:  The VShield for OS/2 scanner runs in a
    minimized state. By default, programs that
    run in this state in OS/2 appear in the
    Minimized Window viewer, not on the desktop.
    To see the VShield icon, first open the OS/2
    System icon, then open the Minimized Window
    Viewer. You can then start the VShield
    configuration utility to choose your
    scanning and other options.

    To configure your OS/2 system to display
    minimized programs as icons on your desktop,
    you must change your system setup. To do so,
    open the System Setup icon, then open the
    System icon.

    In Warp 3 systems, this opens the
    System - Settings dialog box. In Warp 4
    systems, this opens the System - Properties
    dialog box. In either case, click the Window
    tab to display the correct property page,
    then select the Minimize Window to Desktop
    button in the Minimize Button Behavior area.
    Next, click the close box to save your
    settings and close the dialog box.

___________________________________
NA1 - CONTACTING NETWORK ASSOCIATES

On December 1, 1997, McAfee Associates merged
with Network General Corporation, Pretty Good
Privacy, Inc., and Helix Software, Inc. to form
Network Associates, Inc. The combined Company
subsequently acquired Dr Solomon's Software,
Trusted Information Systems, Magic Solutions,
and CyberMedia, Inc.

Network Associates continues to market and
support the product lines from each of the
former entities. You may direct all questions,
comments, or requests concerning the software
you purchased, your registration status, or
similar issues to the Network Associates
Customer Care department at the addresses or
phone numbers listed below.

Contact the Network Associates Customer Care
department at: 

1.  Phone (408) 988-3832
    Monday-Friday, 6:00 A.M. - 6:00 P.M.
    Pacific time

2.  Fax (408) 970-9727
    24-hour, Group III Fax 

3.  E-mail: custcare@nai.com
 
Send correspondence to any of the following
Network Associates locations:
  
     Network Associates Corporate Headquarters  
     3965 Freedom Circle
     McCandless Towers   
     Santa Clara, CA 95054

     Phone numbers for corporate-licensed
     customers:
     Phone: (408) 988-3832
     Fax:   (408) 970-9727

     Phone numbers for retail-licensed
     customers:
     Phone: (972) 855-7044
     Fax:   (408) 970-9727

Network Associates offices outside the United
States:

     Network Associates Australia
     Level 1, 500 Pacific Highway
     St. Leonards, NSW
     Sydney, Australia 2065
     Phone: 61-2-8425-4200
     Fax:   61-2-9439-5166 

     Network Associates Austria
     Pulvermuehlstrasse 17
     Linz, Austria
     Postal Code A-4040
     Phone: 43-732-757-244
     Fax:   43-732-757-244-20

     Network Associates Belgique
     BDC Heyzel Esplanade, bote 43
     1020 Bruxelles
     Belgique
     Phone: 0032-2-478.10.29
     Fax:   0032-2-478.66.21

     Network Associates do Brasil
     Rua Geraldo Flausino Gomez 78
     Cj. - 51 Brooklin Novo - So Paulo
     SP - 04575-060 - Brasil
     Phone:  (55 11) 5505 1009
     Fax:    (55 11) 5505 1006

     Network Associates Canada
     139 Main Street, Suite 201
     Unionville, Ontario
     Canada L3R 2G6
     Phone: (905) 479-4189
     Fax:   (905) 479-4540

     Network Associates
     People's Republic of China
     New Century Office Tower, Room 1557
     No. 6 Southern Road Capitol Gym 
     Beijing
     People's Republic of China 100044
     Phone: 86 10 6849-2650
     Fax:   86 10 6849-2069

     Network Associates Denmark
     Lautruphoej 1-3
     2750  Ballerup
     Danmark
     Phone: 45 70 277 277
     Fax:   45 44 209 910

     NA Network Associates Oy
     Sinikalliontie 9, 3rd Floor
     02630 Espoo
     Finland
     Phone: 358 9 5270 70
     Fax:   358 9 5270 7100

     Network Associates France S.A.   
     50 Rue de Londres    
     75008 Paris     
     France
     Phone: 33 1 44 908 737
     Fax:   33 1 45 227 554  

     Network Associates GmbH
     Ohmstrae 1
     D-85716 Unterschleiheim
     Deutschland
     Phone: 49 (0)89/3707-0
     Fax:   49 (0)89/3707-1199


     Network Associates Hong Kong
     19th Floor, Matheson Centre
     3 Matheson Way
     Causeway Bay
     Hong Kong 63225
     Phone: 852-2832-9525
     Fax:   852-2832-9530

     Network Associates Srl
     Centro Direzionale Summit     
     Palazzo D/1
     Via Brescia, 28
     20063 - Cernusco sul Naviglio (MI)
     ITALY  
     Phone: 39 02 92 65 01   
     Fax:   39 02 92 14 16 44

     Network Associates Japan, Inc.
     Toranomon 33 Mori Bldg.
     3-8-21 Toranomon Minato-ku
     Tokyo 105-0001 Japan
     Phone: 81 3 5408 0700
     Fax:   81 3 5408 0780

     Network Associates Latin America
     1200 South Pine Island Road, Suite 205
     Plantation, Florida 33324
     United States
     Phone: (954) 452-1721
     Fax:   (954) 236-8031

     Network Associates de Mexico
     Andres Bello No. 10, 4 Piso
     4th Floor
     Col. Polanco
     Mexico City, Mexico D.F. 11560
     Phone: (525) 282-9180
     Fax:   (525) 282-9183

     Network Associates International B.V.   
     Gatwickstraat 25   
     1043 GL Amsterdam    
     The Netherlands    
     Phone: 31 20 586 6100
     Fax:   31 20 586 6101

     Network Associates Portugal
     Av. da Liberdade, 114
     1269-046 Lisboa
     Portugal
     Phone:  351 1 340 4543
     Fax:    351 1 340 4575

     Net Tools Network Associates South Africa
     Bardev House, St. Andrews
     Meadowbrook Lane
     Epson Downs, P.O. Box 7062
     Bryanston, Johannesburg
     South Africa 2021
     Phone: 27 11 706-1629
     Fax:   27 11 706-1569

     Network Associates South East Asia
     78 Shenton Way
     #29-02
     Singapore 079120
     Phone: 65 222-7555
     Fax:   65 222-7555

     Network Associates Spain
     Orense 4, 4a Planta.
     Edificio Trieste
     28020 Madrid
     Spain
     Phone: 34 91 598 18 00
     Fax:   34 91 556 14 04

     Network Associates Sweden
     Datavgen 3A
     Box 596
     S-175 26 Jrflla
     Sweden
     Phone: 46 (0) 8 580 88 400
     Fax:   46 (0) 8 580 88 405

     Network Associates AG
     Baeulerwisenstrasse 3
     8152 Glattbrugg
     Switzerland
     Phone: 0041 1 808 99 66
     Fax:   0041 1 808 99 77

     Network Associates Taiwan
     Suite 6, 11F
     No. 188, Sec. 5
     Nan King E. Rd.
     Taipei, Taiwan, Republic of China
     Phone: 886-2-27-474-8800
     Fax:   886-2-27-635-5864

     Network Associates International Ltd.
     Minton Place, Victoria Street
     Windsor, Berkshire
     SL4 1EG
     United Kingdom
     Phone: 44 (0)1753 827 500
     Fax:   44 (0)1753 827 520


Or, you can receive online assistance through
any of the following resources:

 1.  Internet E-mail: support@nai.com

 2.  Internet FTP: ftp://ftp.nai.com

 3.  World Wide Web: http://support.nai.com

 4.  America Online: keyword MCAFEE

 5.  CompuServe: GO NAI

To provide the answers you need quickly and
efficiently, the Network Associates technical
support staff needs some information about
your computer and your software. Please have
this information ready when you call:
                          
 - Program name and version number
 - Computer brand and model
 - Any additional hardware or peripherals
   connected to your computer
 - Operating system type and version numbers
 - Network name, operating system, and version
 - Network card installed, where applicable
 - Modem manufacturer, model, and bits-per-
   second rate, where applicable
 - Relevant browsers or applications and their
   version numbers, where applicable
 - How to reproduce your problem: when it
   occurs, whether you can reproduce it
   regularly, and under what conditions
 - Information needed to contact you by voice,
   fax, or e-mail

Network Associates also seeks and appreciates
general feedback.

 
* FOR PRODUCT UPGRADES *

Network Associates has a worldwide range of
partnerships and reseller relationships with
hundreds of independent vendors, each of which
can provide you with consulting services, sales
advice, and product support for Network 
Associates software. To find a reseller near
your location, see the RESELLER.TXT file
located on your product CD-ROM or installed on
your hard disk. For assistance in locating a
local reseller, you can also contact Network
Associates Customer Care.

 
* FOR REPORTING PROBLEMS *

Network Associates prides itself on delivering
a high-quality product. If you find any
problems, please take a moment to review the
contents of this file. If the problem you've
encountered appears in the Known Issues section
of this WHATSNEW.TXT file, Network Associates
is already aware of the problem, and you need
not report it.

If you find any feature that does not appear to
function properly on your system, or if you
believe an application would benefit greatly
from enhancement, please contact Network
Associates or one of its resellers with your
suggestions or concerns.


* FOR ON-SITE TRAINING INFORMATION *

Contact Network Associates Customer Service at
(800) 338-8754.


* NETWORK ASSOCIATES BETA SITE *

To test pre-release software and obtain update
files, including virus definition (.DAT) files,
visit the Network Associates beta site at
http://beta.nai.com. You will have access to
Public Beta and External Test Areas. Your
feedback will make a difference.


* AVERT ANTI-VIRUS RESEARCH SITE *

To see the latest information about emerging
virus threats, submit samples of potentially
infected files, and download updated scanning
engine files, EXTRA.DAT files, and similar
anti-virus software for testing, visit the
AVERT research site at:

http://www.avertlabs.com.

_______________________________________
YC1 - STATEMENT OF YEAR 2000 COMPLIANCE

To learn about Network Associates Year 2000
standards and testing models, and to see a
list of compliant Network Associates products,
visit the Network Associates website at:

             http://www.nai.com/y2k

For further information or questions, send an
e-mail message to: y2k@nai.com.   

__________________________________________
CT1 - COPYRIGHT AND TRADEMARK ATTRIBUTIONS

Copyright (c) 1999 Networks Associates
Technology, Inc. All Rights Reserved. No part
of this publication may be reproduced,
transmitted, transcribed, stored in a
retrieval system, or translated into any
language in any form or by any means without
the written permission of Networks Associates
Technology, Inc., or its suppliers or affiliate
companies.

* TRADEMARKS *

* ActiveHelp, Bomb Shelter, Building a World of
Trust, CipherLink, Clean-Up, Cloaking, CNX,
Compass 7, CyberCop, CyberMedia, Data Security
Letter, Discover, Distributed Sniffer System,
Dr Solomon's, Enterprise Secure Cast, First
Aid, ForceField, Gauntlet, GMT, GroupShield,
HelpDesk, Hunter, ISDN Tel/Scope, LM 1,
LANGuru, LeadingHelp Desk Technology, Magic
Solutions, MagicSpy, MagicTree, Magic
University, MagicWin, MagicWord, McAfee,
McAfee Associates, MoneyMagic, More Power To
You, Multimedia Cloaking, NetCrypto,
NetOctopus, NetRoom, NetScan, Net Shield,
NetShield, NetStalker, Net Tools, Network
Associates, Network General, Network Uptime!,
NetXRay, Nuts & Bolts, PC Medic, PCNotary,
PGP, PGP (Pretty Good Privacy), PocketScope,
Pop-Up, PowerTelnet, Pretty Good Privacy,
PrimeSupport, RecoverKey, RecoverKey-
International, ReportMagic, RingFence, Router
PM, Safe & Sound, SalesMagic, SecureCast,
Service Level Manager, ServiceMagic, Site
Meter, Sniffer, SniffMaster, SniffNet,
Stalker, Statistical Information Retrieval
(SIR), SupportMagic, Switch PM, TeleSniffer,
TIS, TMach, TMeg, Total Network Security,
Total Network Visibility, Total Service Desk,
Total Virus Defense, T-POD, Trusted Mach,
Trusted Mail, Uninstaller, Virex, Virex-PC,
Virus Forum, ViruScan, VirusScan, VShield,
WebScan, WebShield, WebSniffer, WebStalker,
WebWall, and ZAC 2000 are registered
trademarks of Network Associates and/or its
affiliates in the US and/or other countries.
All other registered and unregistered
trademarks in this document are the sole
property of their respective owners.

* LICENSE AGREEMENT *

NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS
OF YOUR LICENSE TO USE THE SOFTWARE THAT
THIS DOCUMENTATION DESCRIBES, CONSULT THE
LICENSE.TXT, README.1ST, OR OTHER LICENSE
DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE,
EITHER AS A TEXT FILE OR AS PART OF THE
SOFTWARE PACKAGING. IF YOU DO NOT AGREE TO
ALL OF THE TERMS SET FORTH THEREIN, DO NOT
INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY
RETURN THE PRODUCT TO THE PLACE OF PURCHASE
FOR A FULL REFUND.