Release Notes for VirusScan for OS/2* Software v4.0.3 Copyright (c) 1999 Networks Associates Technology, Inc. All Rights Reserved. Thank you for using the VirusScan for OS/2 software. This Read Me file contains important information regarding this release. Network Associates strongly recommends that you read the entire document. Network Associates welcomes your comments and suggestions. Please use the information provided in this file to contact Customer Care, technical support, or the documentation team for this product. ___________________ WHAT'S IN THIS FILE - NF1 New Features - DC1 Documentation - SR1 System Requirements - IN1 Installation IN2 Enabling SES IN3 Installation Steps IN4 Testing Your Installation IN5 Files Installed on Your Computer IN6 Removing the VirusScan for OS/2 Software From Your Computer - KN1 Known Issues - FQ1 Frequently Asked Questions - NA1 Contacting Network Associates - YC1 Statement of Year 2000 Compliance - CT1 Copyright and Trademark Attributions NOTE: A unique identifying code precedes each heading in this file. To jump to a particular heading within the file, copy the three-character code from the list above into your text editor's Find dialog box, or equivalent, then search for the identifying code to move directly to that heading. __________________ NF1 - NEW FEATURES VirusScan for OS/2 now offers users the convenience of a scheduler. This allows users to schedule scans for off-peak or after-hours times to avoid drain on system resources during peak productivity hours. It also allows administrators to better enforce security and anti-virus policy: the administrator can set scheduled scans for users who might otherwise forget to scan their systems on a regular basis. Other components of the VirusScan product have not been changed, and so will display v4.0.2 as their version number. ****IMPORTANT NOTES**** * Beginning with the next release of this product, the file name for this release notes file will change from WHATSNEW.TXT to README.TXT. The contents within the file will remain the same. This file name change will occur for all Network Associates products. Similarly, the license file now called README.1ST will change its name to LICENSE.TXT. Please review this file for the terms of your license to use the Network Associates products you install. Please send any questions or comments about this change to tvd_documentation@nai.com. * The 4037 .DAT files included with this release of the VirusScan for OS/2 software are compatible with Network Associates anti-virus products that use scan engine versions 4.0.xx only. These .DAT files will NOT work with v3.x or v2.x scan engines. Network Associates recommends that you upgrade to the latest version of the v4.x.xx engine for optimal virus detection and repair. The WHATSNEW.TXT or README.TXT files that accompany each product will no longer list the viruses that the product detects and removes. That information will appear only in the README.TXT file that comes with the .DAT update. **** ___________________ DC1 - DOCUMENTATION Network Associates provides each of its products with an extensive set of documentation, consisting usually of one or more product guides saved in Adobe Acrobat Portable Document Format (.PDF), and an online help system, whose form can vary, depending the platform on which the product runs. Acrobat .PDF files are flexible online documents that contain hyperlinks, outlines and other aids for easy navigation and information retrieval. You can also install an Acrobat plug-in file that allows you to read .PDF documents from within your web browser while online. Copies of the product documentation come with the product CD-ROM or are available on the Network Associates website at: ftp://ftp.nai.com/pub/manuals/total_virus_defense A copy of the free Acrobat Reader also comes with the product CD-ROM or is available from the Adobe website at: http://www.adobe.com/prodindex/acrobat/readstep.html Most Network Associates products can include a documentation set drawn from these components: NOTE: Not all products will include all listed documents. Consult the User's Guide or Administrator's Guide that comes with your product for a complete list. * A printed Getting Started Guide, which introduces the product, provides installation instructions, outlines product features, and provides a brief overview. In many cases, an electronic version of this guide will also be available on the product CD-ROM or from the Network Associates FTP site in Adobe Acrobat .PDF format. * A User's Guide saved on the product CD-ROM or installed on your hard disk in Adobe Acrobat .PDF format. Network Associates User's Guides document all product functions extensively, and discuss how best to use your Network Associates product to accomplish your tasks. * An Administrator's Guide saved on the product CD-ROM or installed on your hard disk in Adobe Acrobat .PDF format. Administrator's Guides describe how to deploy, maintain and administer Network Associates server-based products in a networked environment. * Specialized guides. These can include reference guides, deployment guides, configuration guides, vulnerability guides for intrusion detection software, and other product-specific documentation. * An online help system. Online help gives you quick access to hints and tips about how to use your Network Associates software. The format of the online help system for the product will vary, depending on which platform or operating system you use to run your Network Associates product. In most cases, the software will display a Help menu item or link that you can use to start the system. Some products might also include context- sensitive online help. Right-click buttons, lists or other elements within dialog boxes to see brief, descriptive help topics. * A LICENSE.TXT file. This file outlines the terms of your license to use your Network Associates product. Read it carefully. If you install the Network Associates product, you agree to the license terms. * This WHATSNEW.TXT file. This file contains last-minute additions or changes to the documentation, lists any known behavior or other issues with the product release, and often describes new product features incorporated into incremental product updates. To comment, ask about, or suggest improvements to Network Associates anti-virus product documentation, send e-mail to: tvd_documentation@nai.com To get answers to your technical support questions, send messages to: support@nai.com To ask about your eligibility for updates and upgrades, check your registration, or ask general questions related to Network Associates software, send messages to: custcare@nai.com _________________________ SR1 - SYSTEM REQUIREMENTS The VirusScan for OS/2 software runs under both Warp 3 and Warp 4. The system requirements below list the particular configurations necessary to run the VirusScan software under each OS/2 version. To install and run the VirusScan for OS/2 software on Warp 4 systems, your computer must: * Run OS/2 Warp 4 with the Security Enabling System component installed and enabled. You can install the Security Enabling System as an Optional System Component during your OS/2 installation. You can then enable SES with the VirusScan for OS/2 installation utility. Once you have SES installed, you can use the VirusScan for OS/2 installation utility to enable it. Note that to use the installation utility to enable SES, you must also choose to install the VShield component. If you already have SES installed and enabled on your system, you can choose to install the VShield component without enabling SES. Alternatively, you can enable SES separately by editing your system's CONFIG.SYS file. Consult "Enabling SES" later in this file to learn how to enable SES yourself. WARNING: You MUST have SES installed on your system in order for the installation utility to enable it properly. If you do not have SES installed, and you try to enable it during installation, the installation utility will prevent Program Manager from running and prevent your system from completing its startup. The installation utility CANNOT check for the presence of SES software on your computer. * Have OS/2 FixPak 4 installed. To install and run VirusScan's VShield component on Warp 3 systems, your computer must: * Run OS/2 Warp 3 with the Security Enabling System (SES) component installed and enabled. The SES component, in turn, requires OS/2 FixPak 17 (XR_W017). You can obtain both SES and FixPak 17 from IBM, or download it from the IBM website at ftp://ftp.software.ibm.com. NOTE: If you have FixPak versions later than FixPak 17 installed, you must remove them, install FixPak 17 and the SES FixPak, then reinstall later-version FixPaks in order to correctly enable SES. Once you have SES installed, you can use the VirusScan for OS/2 installation utility to enable it. Note that to use the installation utility to enable SES, you must also choose to install VShield. If you already have SES installed and enabled on your system, you can choose to install VShield without enabling SES. WARNING: You MUST have SES installed on your system in order for the installation utility to enable it properly. If you do NOT have SES installed, and you try to enable it during installation, the installation utility will prevent Program Manager from running and prevent your system from completing its startup. The installation utility CANNOT check for the presence of SES software on your computer. Alternatively, consult "Enabling SES" later in this file to learn how to enable SES yourself. * Have OS/2 FixPak 26 or later installed. You must install FixPak 26 or any later FixPak after you install the SES component. You can obtain the necessary FixPak software from IBM, or download it from the IBM website at ftp://ftp.software.ibm.com. __________________ IN1 - INSTALLATION * IN2 - ENABLING SES * Because VirusScan's VShield component relies on IBM's SES component to give it the complete file access it needs to check your system for viruses, you must enable SES before you install the VShield component. IBM has versions of SES available for use with OS/2 Warp 3 and OS/2 Warp 4. If you do not already have SES enabled, you can have the VirusScan for OS/2 installation utility enable it for you during installation. See "Installation Steps" later in this file for details. To enable SES yourself, you must add configuration data to your CONFIG.SYS file. CNFGSES.TXT, a separate text file included with this VirusScan distribution, is a model CONFIG.SYS file from which you can copy the necessary configuration data. Once you edit your CONFIG.SYS file, restart your computer to load the necessary configuration data. * IN3 - INSTALLATION STEPS * To install this version of the VirusScan for OS/2 software, follow these steps: 1. Verify that you have installed and enabled the OS/2 Security Enabling System component on your computer. To learn how to do so, see the "Enabling SES" earlier in this file. 2. Create a temporary directory on your hard disk or on a disk available on your network, then download the VirusScan for OS/2 installation files from the Network Associates website to the directory you created. Next, use a utility that can extract files from .zip archives to uncompress the files you downloaded into the directory you created. 3. Locate the INSTALL.EXE file in your temporary directory, then double-click it to begin your installation. 4. Follow the instructions shown in the installation panels to continue. You can choose to install the VirusScan on-demand scanner, the VShield on-access scanner, or both. NOTE: If you choose to install the VShield on-access scanner, you MUST have SES installed on your computer for it to work properly. If you have SES installed on your system, but not enabled, you should choose to enable SES through the VirusScan installation utility. WARNING: If you choose to enable SES but do not have it already installed on your computer, the installation utility will prevent Program Manager from running and your system from completing its startup. The installation utility CANNOT check for the presence of SES software on your computer. Be sure you have followed all of the steps shown in the previous sections before you continue with your installation. 5. When you finish your installation, restart your computer. * IN4 - TESTING YOUR INSTALLATION * The EICAR Standard Anti-Virus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations. To test your installation, copy the following line into its own file, then save the file with the name EICAR.COM. X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* The file size will be 69 or 70 bytes. Next, start your anti-virus software and allow it to scan the directory that contains EICAR.COM. When your software scans this file, it will report finding the EICAR virus. Note that this file is NOT A VIRUS. Delete the file when you have finished testing your installation to avoid alarming unsuspecting users. * IN5 - FILES INSTALLED ON YOUR COMPUTER * These primary program files for the VirusScan for OS/2 software are located in the default installation directory C:\NETA\VSCANOS2: ================================================ APIO32.DLL = VShield scanning engine for OS/2 CLEAN.DAT = Virus definition file COMMON.PKG = Package file for OS/2 installation utility CRYER.EXE = VShield alert message generation utility CRYER.HLP = Help file for configuration program EPFIEXTS.DLL = OS/2 installation support file EPFIHELP.INF = IBM Information file used together with the OS/2 Information Presentation Facility EPFIHPLB.HLP = IBM help file, similar to EPFIHELP.INF EPFIICIS.ICO = IBM installation support file; lists files for uninstallation EPFIMSG.MSG = IBM localization file EPFINSTS.EXE = IBM installation and maintenance program; used for uninstalling EPFIPII.DLL = OS/2 installation support file EPFIPRCS.EXE = OS/2 installation support file EPFIRSBK.DLL = OS/2 installation support file EPFIUPK2.EXE = IBM unpacking utility GDDAEMON.EXE = VShield scanning daemon; allows interaction between the VShield filter driver and the scanning engine HELPFILE.INF = VirusScan for OS/2 help file LICENSE.DAT = License compliance checker MESSAGES.DAT = Localization file NAMES.DAT = Virus names list NOV16.DLL = Network message file for Novell networks NOV32.DLL = Network message file for Novell networks OS2GUARD.DSC = Package description file for OS/2 installation utility OS2GUARD.ICF = Catalog file for OS/2 installation utility; lists files for uninstallation OS2GUARD.MIF = Desktop Management Interface (DMI) Management Information Format file OS2GUARD.PKG = Package file for OS/2 installation utility OS2GUARD.RSP = Automated installation response file for Netview OS2SCAN.EXE = VirusScan for OS/2 command-line program file PACKING.LST = packing list for validation PMSCAN.EXE = VirusScan for OS/2 on-demand scanning component used with graphical user interface PTOOLKIT.EXE = VirusScan for OS/2 on-demand graphical user interface file PTOOLKIT.HLP = VirusScan for OS/2 help file README.1ST = Network Associates license document SCAN.DAT = Virus definitions file VALIDATE.EXE = Network Associates validation utility VSCMN.DLL = Code common to the two VirusScan Scheduler executables VSEDITOR.EXE = The VirusScan Scheduler Editor program file VSEDITOR.INI = Screen data for the VirusScan Schedule editor VSENGINE.EXE = The VirusScan Scheduler engine VSENGINE.INI = Event data for the VirusScan Schedule editor VSOOM30.DLL = Standard Libraries from Visual Age C++ VSOOOB3.DLL = Standard Libraries from Visual Age C++ VSOOOR3U.DLL = Standard Libraries from Visual Age C++ VSOOOU3.DLL = Standard Libraries from Visual Age C++ VSOOOV3.DLL = Standard Libraries from Visual Age C++ VSOOS30.DLL = Standard Libraries from Visual Age C++ VSSERES.DLL = Schedule Editor Resources WHATSNEW.TXT = This document Files located in the OS/2 directory: ==================================== VSHIELD.FLT = VShield filter driver; enables file access for scanning engine * IN6 - REMOVING THE VIRUSSCAN FOR OS/2 SOFTWARE FROM YOUR COMPUTER* To remove the VirusScan for OS/2 software from your computer, follow these steps: 1. Locate and open the VirusScan folder on your computer. By default, the VirusScan installation utility places this folder on the OS/2 desktop. 2. Double-click the VirusScan Uninstaller program icon to open it. The Uninstaller window appears. 3. Choose Delete from the Action menu. A dialog box appears, where you can choose the components you want to remove. 4. Click Select All to choose all VirusScan components. 5. Click Delete to remove all VirusScan components, then confirm your action when the utility prompts you to do so. The uninstaller will remove each VirusScan component and delete the VirusScan folder from your OS/2 desktop. 6. Restart your computer to complete the uninstallation and return your computer to its previous state. __________________ KN1 - KNOWN ISSUES 1. This release of the VirusScan for OS/2 software supports network messaging and alerting on Novell servers only. 2. If the user enters invalid data when specifying a quarantine directory, VirusScan will not successfully quarantine files. 3. The VShield on-access scanner cannot detect Word macro viruses unless the "Scan all files" option is enabled. 4. When using the VirusScan "Automatic Network Messaging" feature, the message text cannot contain spaces. Use hyphens, underscores, or periods between the words of the alert message to successfully use this feature. 5. The /MOVE option does not work in all instances with this release of the VirusScan for OS/2 software. 6. The "Shred" feature does not work with this release of the VirusScan for OS/2 software. 7. The VirusScan on-demand scanner will sometimes change the time and date stamp of files that it moves, even if the files were not opened or modified. 8. If the VirusScan for OS/2 software is configured to rename files which could not be successfully cleaned, the renamed file will also be moved to the installation directory. 9. If the VirusScan for OS/2 software is configured to deny access to files which could not be successfully cleaned, these files will also be renamed. 10. Any attempt to add programs to the VirusScan Scheduler New Programs List box will cause your system to become unstable. ________________________________ FQ1 - FREQUENTLY ASKED QUESTIONS Q: I've installed the VShield component, but I don't see an icon on my desktop. How do I configure the program? A: The VShield for OS/2 scanner runs in a minimized state. By default, programs that run in this state in OS/2 appear in the Minimized Window viewer, not on the desktop. To see the VShield icon, first open the OS/2 System icon, then open the Minimized Window Viewer. You can then start the VShield configuration utility to choose your scanning and other options. To configure your OS/2 system to display minimized programs as icons on your desktop, you must change your system setup. To do so, open the System Setup icon, then open the System icon. In Warp 3 systems, this opens the System - Settings dialog box. In Warp 4 systems, this opens the System - Properties dialog box. In either case, click the Window tab to display the correct property page, then select the Minimize Window to Desktop button in the Minimize Button Behavior area. Next, click the close box to save your settings and close the dialog box. ___________________________________ NA1 - CONTACTING NETWORK ASSOCIATES On December 1, 1997, McAfee Associates merged with Network General Corporation, Pretty Good Privacy, Inc., and Helix Software, Inc. to form Network Associates, Inc. The combined Company subsequently acquired Dr Solomon's Software, Trusted Information Systems, Magic Solutions, and CyberMedia, Inc. Network Associates continues to market and support the product lines from each of the former entities. You may direct all questions, comments, or requests concerning the software you purchased, your registration status, or similar issues to the Network Associates Customer Care department at the addresses or phone numbers listed below. Contact the Network Associates Customer Care department at: 1. Phone (408) 988-3832 Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time 2. Fax (408) 970-9727 24-hour, Group III Fax 3. E-mail: custcare@nai.com Send correspondence to any of the following Network Associates locations: Network Associates Corporate Headquarters 3965 Freedom Circle McCandless Towers Santa Clara, CA 95054 Phone numbers for corporate-licensed customers: Phone: (408) 988-3832 Fax: (408) 970-9727 Phone numbers for retail-licensed customers: Phone: (972) 855-7044 Fax: (408) 970-9727 Network Associates offices outside the United States: Network Associates Australia Level 1, 500 Pacific Highway St. Leonards, NSW Sydney, Australia 2065 Phone: 61-2-8425-4200 Fax: 61-2-9439-5166 Network Associates Austria Pulvermuehlstrasse 17 Linz, Austria Postal Code A-4040 Phone: 43-732-757-244 Fax: 43-732-757-244-20 Network Associates Belgique BDC Heyzel Esplanade, boîte 43 1020 Bruxelles Belgique Phone: 0032-2-478.10.29 Fax: 0032-2-478.66.21 Network Associates do Brasil Rua Geraldo Flausino Gomez 78 Cj. - 51 Brooklin Novo - São Paulo SP - 04575-060 - Brasil Phone: (55 11) 5505 1009 Fax: (55 11) 5505 1006 Network Associates Canada 139 Main Street, Suite 201 Unionville, Ontario Canada L3R 2G6 Phone: (905) 479-4189 Fax: (905) 479-4540 Network Associates People's Republic of China New Century Office Tower, Room 1557 No. 6 Southern Road Capitol Gym Beijing People's Republic of China 100044 Phone: 86 10 6849-2650 Fax: 86 10 6849-2069 Network Associates Denmark Lautruphoej 1-3 2750 Ballerup Danmark Phone: 45 70 277 277 Fax: 45 44 209 910 NA Network Associates Oy Sinikalliontie 9, 3rd Floor 02630 Espoo Finland Phone: 358 9 5270 70 Fax: 358 9 5270 7100 Network Associates France S.A. 50 Rue de Londres 75008 Paris France Phone: 33 1 44 908 737 Fax: 33 1 45 227 554 Network Associates GmbH Ohmstraße 1 D-85716 Unterschleißheim Deutschland Phone: 49 (0)89/3707-0 Fax: 49 (0)89/3707-1199 Network Associates Hong Kong 19th Floor, Matheson Centre 3 Matheson Way Causeway Bay Hong Kong 63225 Phone: 852-2832-9525 Fax: 852-2832-9530 Network Associates Srl Centro Direzionale Summit Palazzo D/1 Via Brescia, 28 20063 - Cernusco sul Naviglio (MI) ITALY Phone: 39 02 92 65 01 Fax: 39 02 92 14 16 44 Network Associates Japan, Inc. Toranomon 33 Mori Bldg. 3-8-21 Toranomon Minato-ku Tokyo 105-0001 Japan Phone: 81 3 5408 0700 Fax: 81 3 5408 0780 Network Associates Latin America 1200 South Pine Island Road, Suite 205 Plantation, Florida 33324 United States Phone: (954) 452-1721 Fax: (954) 236-8031 Network Associates de Mexico Andres Bello No. 10, 4 Piso 4th Floor Col. Polanco Mexico City, Mexico D.F. 11560 Phone: (525) 282-9180 Fax: (525) 282-9183 Network Associates International B.V. Gatwickstraat 25 1043 GL Amsterdam The Netherlands Phone: 31 20 586 6100 Fax: 31 20 586 6101 Network Associates Portugal Av. da Liberdade, 114 1269-046 Lisboa Portugal Phone: 351 1 340 4543 Fax: 351 1 340 4575 Net Tools Network Associates South Africa Bardev House, St. Andrews Meadowbrook Lane Epson Downs, P.O. Box 7062 Bryanston, Johannesburg South Africa 2021 Phone: 27 11 706-1629 Fax: 27 11 706-1569 Network Associates South East Asia 78 Shenton Way #29-02 Singapore 079120 Phone: 65 222-7555 Fax: 65 222-7555 Network Associates Spain Orense 4, 4a Planta. Edificio Trieste 28020 Madrid Spain Phone: 34 91 598 18 00 Fax: 34 91 556 14 04 Network Associates Sweden Datavägen 3A Box 596 S-175 26 Järfälla Sweden Phone: 46 (0) 8 580 88 400 Fax: 46 (0) 8 580 88 405 Network Associates AG Baeulerwisenstrasse 3 8152 Glattbrugg Switzerland Phone: 0041 1 808 99 66 Fax: 0041 1 808 99 77 Network Associates Taiwan Suite 6, 11F No. 188, Sec. 5 Nan King E. Rd. Taipei, Taiwan, Republic of China Phone: 886-2-27-474-8800 Fax: 886-2-27-635-5864 Network Associates International Ltd. Minton Place, Victoria Street Windsor, Berkshire SL4 1EG United Kingdom Phone: 44 (0)1753 827 500 Fax: 44 (0)1753 827 520 Or, you can receive online assistance through any of the following resources: 1. Internet E-mail: support@nai.com 2. Internet FTP: ftp://ftp.nai.com 3. World Wide Web: http://support.nai.com 4. America Online: keyword MCAFEE 5. CompuServe: GO NAI To provide the answers you need quickly and efficiently, the Network Associates technical support staff needs some information about your computer and your software. Please have this information ready when you call: - Program name and version number - Computer brand and model - Any additional hardware or peripherals connected to your computer - Operating system type and version numbers - Network name, operating system, and version - Network card installed, where applicable - Modem manufacturer, model, and bits-per- second rate, where applicable - Relevant browsers or applications and their version numbers, where applicable - How to reproduce your problem: when it occurs, whether you can reproduce it regularly, and under what conditions - Information needed to contact you by voice, fax, or e-mail Network Associates also seeks and appreciates general feedback. * FOR PRODUCT UPGRADES * Network Associates has a worldwide range of partnerships and reseller relationships with hundreds of independent vendors, each of which can provide you with consulting services, sales advice, and product support for Network Associates software. To find a reseller near your location, see the RESELLER.TXT file located on your product CD-ROM or installed on your hard disk. For assistance in locating a local reseller, you can also contact Network Associates Customer Care. * FOR REPORTING PROBLEMS * Network Associates prides itself on delivering a high-quality product. If you find any problems, please take a moment to review the contents of this file. If the problem you've encountered appears in the Known Issues section of this WHATSNEW.TXT file, Network Associates is already aware of the problem, and you need not report it. If you find any feature that does not appear to function properly on your system, or if you believe an application would benefit greatly from enhancement, please contact Network Associates or one of its resellers with your suggestions or concerns. * FOR ON-SITE TRAINING INFORMATION * Contact Network Associates Customer Service at (800) 338-8754. * NETWORK ASSOCIATES BETA SITE * To test pre-release software and obtain update files, including virus definition (.DAT) files, visit the Network Associates beta site at http://beta.nai.com. You will have access to Public Beta and External Test Areas. Your feedback will make a difference. * AVERT ANTI-VIRUS RESEARCH SITE * To see the latest information about emerging virus threats, submit samples of potentially infected files, and download updated scanning engine files, EXTRA.DAT files, and similar anti-virus software for testing, visit the AVERT research site at: http://www.avertlabs.com. _______________________________________ YC1 - STATEMENT OF YEAR 2000 COMPLIANCE To learn about Network Associates Year 2000 standards and testing models, and to see a list of compliant Network Associates products, visit the Network Associates website at: http://www.nai.com/y2k For further information or questions, send an e-mail message to: y2k@nai.com. __________________________________________ CT1 - COPYRIGHT AND TRADEMARK ATTRIBUTIONS Copyright (c) 1999 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies. * TRADEMARKS * * ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon's, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey- International, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, and ZAC 2000 are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. * LICENSE AGREEMENT * NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR LICENSE TO USE THE SOFTWARE THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE LICENSE.TXT, README.1ST, OR OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE, EITHER AS A TEXT FILE OR AS PART OF THE SOFTWARE PACKAGING. IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH THEREIN, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.