Symantec Norton Personal Firewall 2003 manual
- Ver online ou baixar oubaixar o manual
- 151 páginas
- 2.27 mb
Ir para a página of
Manuais similares
-
Antivirus software
Symantec Norton 360
584 páginas -
Patio Umbrella
Symantec 10
43 páginas 0.62 mb -
Computer Accessories
Symantec 11022527
584 páginas 3.61 mb -
Antivirus software
Symantec Norton 360 (2013)
44 páginas -
Antivirus software
Symantec Norton Internet Security Premier Edition 2009
38 páginas -
Patio Umbrella
Symantec NIS2005
77 páginas 2.45 mb -
Antivirus software
Symantec Norton 360 Multi-Device
618 páginas -
Network Card
Symantec Critical System
122 páginas 1.3 mb
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Symantec Norton Personal Firewall 2003. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoSymantec Norton Personal Firewall 2003 vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Symantec Norton Personal Firewall 2003 você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual Symantec Norton Personal Firewall 2003, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual Symantec Norton Personal Firewall 2003 deve conte:
- dados técnicos do dispositivo Symantec Norton Personal Firewall 2003
- nome do fabricante e ano de fabricação do dispositivo Symantec Norton Personal Firewall 2003
- instruções de utilização, regulação e manutenção do dispositivo Symantec Norton Personal Firewall 2003
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Symantec Norton Personal Firewall 2003 não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Symantec Norton Personal Firewall 2003 e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Symantec na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Symantec Norton Personal Firewall 2003, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Symantec Norton Personal Firewall 2003, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Symantec Norton Personal Firewall 2003. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
User’s Guide[...]
-
Página 2
Norton™ Personal Firewall User’s Guide The software described in this boo k is furn ished under a license agreement and may be used only in accordance with the te rms of the agreement. Documentation version 6.0 PN: 10025076 Copyright Notice Copyright • 2002 Symantec Corp oration. All Rights Reserved. Any technical doc umentation that is made [...]
-
Página 3
SYMANTEC LICENSE AND WARRANTY IMPORTANT: PLEASE READ THE TERM S AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE US ING THE SOFTWA RE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES (“SYMANTEC”) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR T HE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED B[...]
-
Página 4
PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY F ROM STATE TO STA TE AND COUNTRY TO COUNTRY. 5. DISCLAIMER OF DAMAGES: SOME STAT ES AND COUNTR IES, INCLUDING MEMB ER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DA[...]
-
Página 5
Contents Chapter 1 Responding to emergencies If you think your computer is under attack ......................... ............. 11 Recover from an emergency ........................ ........................... ............. 12 Prevent future problems ........................ ..................... .......................... 13 Chapter 2 About Norton[...]
-
Página 6
Contents 6 Chapter 4 Norton Personal Firewall basics Access Norton Personal Fi rewall .......................... ........................... ... 35 Access Norton Personal Firewall from the system tray ......... 36 Work with Norton Personal Firewall .......................... ..................... ... 37 Access Norton Personal Firewa ll protection f[...]
-
Página 7
Contents 7 Chapter 6 Controlling acces s to protected computers Control how people use your computer ................... .......................... 61 Connect to a network ...................... ..................... .......................... 61 Enable file and printer sharing .......................... .................... ...... 62 Organize comp[...]
-
Página 8
Contents 8 Chapter 8 Protecting your privacy Identify private information to protect ...................... ........................ 89 Privacy Control and SSL ........................... .................... ................. 90 Add private information ............. ..................... ........................... ... 90 Modify or remove private [...]
-
Página 9
Contents 9 Appendix A Troubleshooting Norton Personal Firewall Troubleshoot Norton Personal Firewall problems .............. ........... 112 What is wrong with this Web site? ............ .................... ........... 112 Why can’t I post informatio n online? ........ .................... ........... 113 Why did an email message I se nt never [...]
-
Página 10
Contents 10 Glossary Service and support solutions Index CD Replacement Form[...]
-
Página 11
Responding to emergencies If you have an emergency, these proced ures can help you find the solution to your problem. If you think your computer is under attack If your computer is beha ving unpredictably, and yo u have determined that the behavior is not due to a virus or a corrupted file, you may be t he victim of an Internet attack. If you suspe[...]
-
Página 12
Responding to emer gencies Recover fr om an emergenc y 12 See “Identif y the source of communications” on page 43. 6 Use Visual Tracking to ident ify the I P address of the computer that the attac ker used. Y ou can use this infor mation to report the attac k to the I S P tha t owns the I P address . See “Restrict a blocked compu ter” on pa[...]
-
Página 13
Responding to emergencies Prevent future probl ems 13 Prevent future problems Norton Personal Firewall can prote ct yo ur computer against most Internet attacks. To prepare your computer for emerge ncies: 1 Stay in formed about sec urity risks by visiting the Symant ec Security Response Web site ( securityresponse .symantec.com). 1 Keep your browse[...]
-
Página 14
Responding to emer gencies Prevent future p rob lems 14[...]
-
Página 15
About Norton Personal Firewall Norton Personal Fir ewall protects computers from Inter net attacks, guards your privacy, and speeds Web surfing by eliminating ads. What’s new in Norton Personal Firewall 2003 Norton Personal Firewall 2003 now includes: 1 Security Monitor Gives you fast access to the mo st-used Norton Perso nal Firewall tool s 1 Vi[...]
-
Página 16
About Norton Per sonal Firewall Nor ton Perso nal Firewa ll features 16 Norton Personal Firewall features Norton Pe rsonal Firewall in cludes a numb er of security tools that help keep your computer safe. You can get fast access to all Norton Personal Firewall tools from the new Security Monitor. Internet security can be a complica ted topic to und[...]
-
Página 17
About Norton Personal Firewall Norton Personal F ire wall f ea tur es 17 About Norton Personal Firewall Norton Personal Firewall provides a barrier between your computer and the Inte rnet. A firewall prevents unauthorized users from accessing private computers and networks connecte d to the In ternet. Norton Personal Firewall includes fe atures th [...]
-
Página 18
About Norton Per sonal Firewall Nor ton Perso nal Firewa ll features 18 Norton Personal Firewall features include: Intrusi on Detectio n Intrusio n Detectio n helps keep your computer safe from Internet attacks by scanning each piece of inform ation that enters and exits your computer . If it identifies a potential attack, Intrusion Detection alert[...]
-
Página 19
Installing Norton Personal Firewall Before installing Norton Personal Firewall, take a moment to review the system requiremen ts listed in this chapter. System requirements To use Norton Personal Firewall, your computer must have one of the followin g Windows op erating syst ems install ed: 1 W indows 98, 98S E 1 Wi n d o w s M e 1 W indows 2000 Pr[...]
-
Página 20
Installing Norton Personal Firewall S yst em r equi r emen ts 20 Your comp uter must also meet th e following minimum requir ements. Supported email clients Norton Personal Firewall can sc an em ail messages for private information in any POP3-compatible email client, including: 1 Microsoft • Outlo ok • Express 4.0/5.X 1 Microsoft Outlook 97 /9[...]
-
Página 21
Installing Nort on Personal Firewall Befor e installation 21 Email scanning does not support th e following email clients: 1 IM A P c l i e n t s 1 AO L clients 1 P O P3s that use S S L (S ecure Sockets Laye r ) 1 W eb- based email s uch as Hotmail and Ya hoo ! 1 Lotus No tes mail Supported instant messenger clients Norton Personal Firewall can sc [...]
-
Página 22
Installing Norton Personal Firewall Install Norton Personal Fir ewall 22 T o disable the Windows XP firew all 1 On the Windows XP taskbar, clic k Start > Control P anel > Netw ork Connectio ns . 2 If you ha ve crea ted more t han one modem or network connection, select the active connection. 3 Click Network T asks . 4 Click Change settings of[...]
-
Página 23
Installing Nort on Personal Firewall Install Norton Personal F irew all 23 3 Click Next . 4 Read the License Agreement, then clic k I accept th e license agreeme nt . If you decline, you cannot co ntinue with the installation. 5 Click Next . 6 In the Run LiveUpdate afte r insta llation window , se lect whether you want to run LiveUpdat e after the [...]
-
Página 24
Installing Norton Personal Firewall Install Norton Personal Fir ewall 24 7 Click Next . 8 Click Browse to select a fo lder into which yo u want to install Norton Personal Firewall, if it is ot her than the default location. 9 Click Next . See “Register your software” on page 25. 10 Click Next to be gin installi ng No rton Personal Firewall. Aft[...]
-
Página 25
Installing Nort on Personal Firewall Register yo ur software 25 11 Read the readme text, th en click Nex t . 12 Click Fini sh to complete the installa tion. If the opening screen does not appear Sometimes a computer’s CD-ROM drive does not automatically run a CD. T o start the installation from the Norton Personal Firewall CD 1 On your desktop, d[...]
-
Página 26
Installing Norton Personal Firewall Register yo ur software 26 2 If you would like informatio n from Symantec about Norton Personal Firewall, select the method by which you want to receive that information, then click Next . 3 Type your name, then click Next . 4 Type your a ddress, then click Next .[...]
-
Página 27
Installing Nort on Personal Firewall Register yo ur software 27 5 Do one of the following: 2 Answer the su rvey questions to help Symantec improve its products and ser vices, t hen click Next . 2 Skip the survey by clicking Next . 6 Select whether you want to register Norton Personal Firewall over the Internet or by mail. If you want to regis ter b[...]
-
Página 28
Installing Norton Personal Firewall After ins ta ll ati on 28 After installation After Nort on Pers onal Fir ewall is in stalled, a prompt appears giving you the option to r estart your computer immediately. After restart ing, the Security Assistant appears to guid e you through the configuration of Norton Personal Firewall. Restart your computer A[...]
-
Página 29
Installing Nort on Personal Firewall After ins ta ll ati on 29 T o set up Home Ne tworkin g 1 In the Security Assistant Ro admap, click Home Network ing . 2 In the Home Networking p ane, click Set up Home Netwo rking . 3 In the Home Networking Wizard, click Next . 4 Follow the on-screen instructions to configure your network . Set up Pr ogr am Cont[...]
-
Página 30
Installing Norton Personal Firewall After ins ta ll ati on 30 To s e t u p P r o g ra m C o n t ro l 1 In the Security Assistant Ro admap, click Pr ogram Scan . 2 In the Program Scan pane, click Auto matically scan pr ograms .[...]
-
Página 31
Installing Nort on Personal Firewall After ins ta ll ati on 31 3 In the Program Scan window, click Next to begin the scan. W hen the scan is complete , all Internet-enabled programs tha t were found are listed. 4 To allow Internet access for a program, c heck the c hec k box to the left of the program’s name. 5 To change the Internet access rule [...]
-
Página 32
Installing Norton Personal Firewall After ins ta ll ati on 32 T o set up Privacy Control 1 In the Security Assistant Ro admap, click Pr ivacy Control . 2 In the Pr ivacy Control p ane, click Add private i nformation to protect . 3 In the Add Pr ivate Infor mation dial og b ox, under Type of information to protect, select a category . 4 In the Descr[...]
-
Página 33
Installing Nort on Personal Firewall If you have Norton S ystemWorks installed 33 T o protect Nor ton Personal Firewall options with a password 1 In the Security Assistant Ro admap, click P assword Protectio n . 2 In the Password Prot ection pane, click Turn on password prote ction . 3 In the Password an d Co nfirm Password text boxes, type a passw[...]
-
Página 34
Installing Norton Personal Firewall If you need to uninst all Norton Personal Fir ew all 34 If you need to uninstall Norton Personal Firewall If you need to uninstall Norton Per son al Firewall from your computer, use the Uninstall Norton Personal Firewa ll option on the Windows Start menu. w During uninstall, Windows may indicate that it is instal[...]
-
Página 35
Norton Personal Firewall basics After installation, Norton Personal Firewall automatically protects any computer on which it is installed. You do not ha ve to start the program t o be protected. Access Norton Personal Firewall Launch Norton Personal Fi rewall to ch ange protection settings or monitor its activities. T o acce ss Norton Personal Fire[...]
-
Página 36
Norton Personal Firewall basics Acc ess Nort on Pe rson al Fi r ewal l 36 2 On the Windows XP taskbar, click Start > More Programs > Norton Personal Firewall > Nort on Persona l Firew all . 2 On the Windows de sk top, double-click Norton Personal Firewa ll . Access Norton Personal Fire wall from the system tray Norton Personal Firewall add[...]
-
Página 37
Norton Person al Firew all basics Work with Norton Personal F ir ewall 37 See “About Global Settings” on page 46. Use the Norton Personal Firewall Op tions to ad d additional tools to the menu. Work with Norton Personal Firewall Norton Personal Firewall works in the background, so you may only interact with the program when it a lerts you of ne[...]
-
Página 38
Norton Personal Firewall basics Work with Norton Personal F irew all 38 3 In the Security Center, do one of the following: 2 Double-click a feature you want to cust omize. 2 Select a feature, then in the lower-right corner of the window, click Customize . 4 Configure the fea ture . 5 W hen you are done making changes, clic k OK . Use the Security M[...]
-
Página 39
Norton Person al Firew all basics Work with Norton Personal F ir ewall 39 Select a t ask wit h the Security M onitor Use the Select a Task men u in the Security Monitor to quickly perform common Norton Personal Fi rewall tasks. The Select a Tas k menu includes : Respond to Norton Personal Firewall alerts Norton Personal Firewall monitors co mmunica[...]
-
Página 40
Norton Personal Firewall basics Work with Norton Personal F irew all 40 1 Wha t thes e typ es of al erts ind icate 1 How to reduce the number of these alerts you receive T o use the Alert Assistant 1 In any alert window, clic k the Alert Assistant button. 2 In the Alert Assist ant window, review the informa tion about this alert. 3 To respond to th[...]
-
Página 41
Norton Person al Firew all basics Work with Norton Personal F ir ewall 41 Use Alert Tracker Many of the Inte rnet events th at Nort on Persona l Firewall monitors are not significant enough t o trigger al erts. Alert Tracker provides an easy way to monitor these less-important security events. Alert Tracker displays the same inform ation that appea[...]
-
Página 42
Norton Personal Firewall basics Work with Norton Personal F irew all 42 T o re view r ecent Alert T rac k er messa ges 1 On the W indows desk top, double-click the Alert Trac ker . 2 To the right of the first message, click the arrow if it appears . See “Review detailed statistics” on page 10 5. 3 Double-click an entry to o pen the Log Viewer .[...]
-
Página 43
Norton Person al Firew all basics Work with Norton Personal F ir ewall 43 T o get more information about an at-risk are a 4 On the r esult s page , next to t he scan name, cl ick Show Details . Identify the source of communications Visual Tracking helps you le arn more about computer s that att empt to connect to your computer. Using Visu a l Track[...]
-
Página 44
Norton Personal Firewall basics Work with Norton Personal F irew all 44 3 In the Intrusion Detectio n window, in the A utoBlock section, select a connection yo u want to trace. 4 Click Attacker Details . Y our browser opens the Visual Tracking W eb page . When Visual Tracking is finished, it d isplays a visual representation of where this communica[...]
-
Página 45
Norton Person al Firew all basics Customiz e Norton Person al Fir ewa ll 45 Customize Norton Personal Firewall The default Norton Personal Firewall sett ings should provide adequate protection for most users. If you need to make changes, use the Options menu to access Norton Personal Fi rewall options. The options let you control more advanced sett[...]
-
Página 46
Norton Personal Firewall basics P assw ord -prote c t o ptio ns 46 About Web Content options Web Conten t options le t you control ho w Norton Personal Firewall handles interactive online content, ads, and possible privac y intrusions. Web Content options a re arranged on three tabs. About Glob al Set tings Global Settings let y ou control the defa[...]
-
Página 47
Norton Person al Firew all basics T emporar ily disable Norton Personal F ire wall 47 Reset options p assword If you forget your options password you can reset it. T o r eset your Nor ton Personal Firewall options password 1 Do one of the following: 2 On the Windows t askbar, cli ck Start > Progr ams > Norton Personal Fir ewall > Uninsta l[...]
-
Página 48
Norton Personal Firewall basics For more in format ion 48 You can also disable individual securi ty features. For ex ample, you might want to see if th e Personal Firewall is preventing a program fr om operating correctly. T o disable a protection fe a ture 1 Open Norton Personal Firewall. 2 In the Security Center, select the featu re that you want[...]
-
Página 49
Norton Person al Firew all basics For more in format ion 49 2 On the main Help menu, click Norton P ersonal Fir ewall Help . 3 In the left pane of the Help window, select one of the following tabs: 2 Contents : Displays the Help by topic. 2 Index: Lists H elp topics in alphabetical order by key word. 2 Search: Opens a search field where you can ent[...]
-
Página 50
Norton Personal Firewall basics For more in format ion 50 The Release Notes can be accessed from the Start menu. T o re a d the Release Notes 1 Do one of the following: 2 On the Windows t askbar, cli ck Start > Progr ams > Norton Personal Fir ewa ll > Pr oduct Supp ort > Norton Person al Firewall Release Notes . 2 On the Windows XP task[...]
-
Página 51
Norton Person al Firew all basics For more in format ion 51 T o re ad the User’s Guide from your h ar d disk 1 Open the locatio n into whic h you copied the PDF . 2 Double-click NP F2003.pdf . About Norton Personal Firewall on the Web The Symantec Web site provides extensive information about Norton Personal Firewall. There are several ways to ac[...]
-
Página 52
Norton Personal Firewall basics For more in format ion 52 Subscribe to the Symantec Se curity Response newsletter Each month, Symantec publishes a fr ee electronic newsletter that is focused on the needs of Internet securi ty customers. It discusses the latest antivirus tec hnology produced by Symantec Security Response, common viruses, trends in v[...]
-
Página 53
Keeping current with LiveUpdate Symantec products depe nd on current information to protect yo ur computer from newly discovered th reat s. Symant ec makes this information available to you through LiveUpdate. Using your Inte rnet connection , LiveUpdate obtains program updates and protection updat es for your computer. Your normal Internet acc ess[...]
-
Página 54
Keeping current with LiveUpdate About pro t ection updates 54 About protection updates Protection update s are files available from Symantec, by subscription, that keep your Symantec product s up-to- date with the latest anti-threat technology. The pro tection updates you receive depe nd on which product you are using. About your subscription See ?[...]
-
Página 55
Keepi ng curren t with LiveUpd ate When you should updat e 55 When you should update Run LiveUpdate as soon as you have installed your product. Once you know that your files are up-to-date, run Live Update regularly to obtain updates. For example, to keep your virus protection current, you should use LiveUpdate once a week or wheneve r new viruses [...]
-
Página 56
Keeping current with LiveUpdate If you can’t use Liv eUpdate 56 If you can’t use LiveUpdate When new updates become available, Symantec posts th em on the Symantec Web site. If you can’t run LiveUpdate, you can obtain new updates fr om the Sym antec We b site. w Your subscription must be current to obtain new prot ection updates fr om the Sym[...]
-
Página 57
Keepi ng curren t with LiveUpd ate Set L iveU pd ate to Interact ive o r E xpres s m ode 57 LiveUpdate automatically installs all available updates for your Symantec products. T o set Liv eUpdate to Int er ac tive or Expr ess mode 1 Open your Symantec product. 2 At the top of the window, click LiveUpdate . 3 On the LiveUpdate welcome screen, clic k[...]
-
Página 58
Keeping current with LiveUpdate Ru n LiveUpdat e autom atica lly 58 Run LiveUpdate automatically You can have LiveUpdate check for protection updates automatically, on a set schedule, by enabling Automatic LiveUpdate. You must continue to run LiveUpdate manually to receive product updates. w Automatic LiveUpdat e checks for an I nternet connection [...]
-
Página 59
Keepi ng curren t with LiveUpd ate Run Li veUpdat e automat ically 59 To delete the schedule for Automatic LiveUpdate, disable Automatic LiveUpdate. T o di sabl e A utoma tic Live Upda te 1 Start Norton Pe rsonal Firewall. 2 At the top of the Norton Personal Firewall main window, clic k Options . w If you se t a pass word for Optio ns, Nort on Pe r[...]
-
Página 60
Keeping current with LiveUpdate Ru n LiveUpdat e autom atica lly 60[...]
-
Página 61
Controlling access to protected computers You can configure Norton Personal Fire wall to meet your needs in many different situations. You can use the progr am to control your computer’s access to both local computers and comput ers over the Internet. You can also control how outside us ers access your computer. Control how people use your comput[...]
-
Página 62
Controlling access to p rotected computers Contr ol how people use your computer 62 See “Monitoring Norto n Pers onal Firewa ll” on page 103. Whenever you jo in a network, Norton Personal Firewall au tomatically begins monitoring the connection. You do not need to make any changes in order to be protected. Norton Person al Firewall notifies you[...]
-
Página 63
Controlling ac cess to protec ted computer s Contr ol how people us e your comp ut er 63 computers to your Trusted Zone if yo u know that their user s can be trusted and they have firewall software installed. The Home Network Wizard is the fast est way to organize co mputers into zones. You can also manually add indivi dual c omputer s to zones. T [...]
-
Página 64
Controlling access to p rotected computers Contr ol how people use your computer 64 T o manually add computers to z ones 1 Open Norton Personal Firewall. 2 In the Security Center, double-click Personal Firew all . 3 In the Personal Firewall window, on the Home Networking tab, select the zone to whic h you want to add a computer . 4 Click Add . See [...]
-
Página 65
Controlling ac cess to protec ted computer s Contr ol how people us e your comp ut er 65 Find a comput er’s IP addr ess There are t wo procedures for finding a computer’s IP address. On Windows 98/Me computers, you can use Winipcfg to find the IP address of a computer. On Windows 2000/XP compute r s, you can use Ipconfig to find the IP address [...]
-
Página 66
Controlling access to p rotected computers Contr ol how people use your computer 66 Specify a r ang e of computers You can enter a range of computers by specifying the starting (lowest numerically) IP address and the ending (highest numerically) IP address. All of the compute rs within that ra nge of IP ad dresses are included. In almost every case[...]
-
Página 67
Controlling ac cess to protec ted computer s Control how users access the Int ernet 67 Control how users access the Internet Norton Personal Firewall suppo rts most In ternet conne ction methods without needing additiona l configuration. If you access the Internet via a cable or DSL router Norton Personal Firewall works behind a ca ble or DSL rou t[...]
-
Página 68
Controlling access to p rotected computers Contro l how ou tsid e us ers a cces s you r net wor k 68 If you run a Virtual Private Network Norton Personal Firewall works with the following Virtual Private Networks (VPNs): 1 Nortel 1 VPNRemote 1 PGP 1 Sec ur eR em ot e With mo st VPNs, wh en the VP N client is active, you cannot see the Internet or o[...]
-
Página 69
Guarding against intrusion attempts Internet attacks ta ke advantage of the wa y that computers transfer information. Norton Pers onal Firewall can prot ect your computer by monitoring the information that comes into and out of your computer and blocking any attack attempts. How Norton Personal Firewall protects against network attacks Norton Perso[...]
-
Página 70
Guarding against in trusion attempts How Norton Personal F irew all prot ects ag ainst network a ttacks 70 Norton Personal Firewall monitors communications When Norton Personal Fi rewa ll is active, it mo nitors communications among your computer and other comput er s on the Internet. It also protects your computer from such co mmon s ecurity probl[...]
-
Página 71
Guarding against intrusion attempt s How Norto n Pe rson al Fir ewall pro te cts ag ains t netw ork a ttac ks 71 Because attacks may span packets, In trusion Detection examines packets in two different ways. It scans each pack et individually looking for patterns that are t ypical of an attack. It also monitors the pac kets as a stream of informati[...]
-
Página 72
Guarding against in trusion attempts Custom ize fi re wall pr ot ection 72 Customize firewall protection The default Norton Personal Firewall sett ings should provide adequate protection for most users. I f the defa ult protection is not appropriate, you can customize Norton Pers onal Firewall pro tection by using the Security Level slider to selec[...]
-
Página 73
Guarding against intrusion attempt s Customiz e firew all prot ection 73 3 Move the slider to the Security Level that you want. Y our options are : Change individual security settings If the Security Level options do not meet your nee ds, you can change the settings for Norton Personal Firewall, Java , and ActiveX protection levels. Changing an ind[...]
-
Página 74
Guarding against in trusion attempts Custom ize fi re wall pr ot ection 74 3 Click Custom Level . 4 Do one or more of the following : 2 On the Personal Firewall menu, select a level. Your o ptions are: 2 On the Java Ap plet Security or ActiveX Control Security menu, select a level. Your options are: High Blocks all communication that you do not spe[...]
-
Página 75
Guarding against intrusion attempt s Customize firewall rules 75 2 To be notified whenever unknown pr ograms access the Internet, check Enable Access Cont rol Alerts . 2 To be notified whenever a r emote computer atte mpts to conne ct to a port no program is using, check Alert when unused ports are acce ssed . 5 Click OK . Reset security settings t[...]
-
Página 76
Guarding against in trusion attempts Customiz e firewa ll rules 76 this type of communication are ignored if they appear below the first rule that matches. If no match ing rule i s found, the co mmunication is bloc ked. Depending on the Reporting level, an alert may appear. Create new firewall rules Norton Personal Fir ewall includes Pr ogram Contr[...]
-
Página 77
Guarding against intrusion attempt s Customize firewall rules 77 T o enable Automatic Progr am Control 1 Open Norton Personal Firewall. 2 In the Security Center, double-click Personal Firew all . 3 In the Personal Firewall window, on the Program Contr ol tab, c heck Turn on A utomati c Prog ram Contr ol . 4 Click OK . Scan f or Internet -enabled p [...]
-
Página 78
Guarding against in trusion attempts Customiz e firewa ll rules 78 3 In the Personal Firewall window, on the Program Contr ol tab, clic k Program Scan . 4 Select the disk or disks on your computer tha t you want to scan . 5 Click OK . 6 In the Program Scan window, do one of the following : 2 Check programs that you want to add to the Pro gram Contr[...]
-
Página 79
Guarding against intrusion attempt s Customize firewall rules 79 6 In the Internet Access Contr ol alert, select the acc ess level you want this program to ha ve . Y our options are : 7 If you want to see any risks that this program could pose to y our computer, clic k Detai ls . 8 Click OK . Chan ge Pr ogr am Control sett ings After using Norton P[...]
-
Página 80
Guarding against in trusion attempts Customiz e firewa ll rules 80 5 In the Internet Access Contr ol alert, select the acc ess level you want this program to ha ve . Y our options are : 6 Click OK . Manually add a firewall rule While Norton Personal Firewall automa tically creates most of the firewall rules that you n eed, you may want to add speci[...]
-
Página 81
Guarding against intrusion attempt s Customize firewall rules 81 3 In the Personal Firewall window, on the Advanced tab, click Tr ojan Horse Rules . 4 Follow the on-screen instructions. See “Write a firewa ll rule” on page 8 1 . T o add a Progr am Rule 1 Open Norton Personal Firewall. 2 In the Security Center, double-click Personal Firew all . [...]
-
Página 82
Guarding against in trusion attempts Customiz e firewa ll rules 82 4 Select the t ype of connectio n the ru le should mon itor . Y our options are: 5 Click Next . 6 Select the computers the rule sh ould moni tor . Y our optio ns are : 7 Click Next . 8 Select the protocols the rule should monitor . Y our options are: Connections to other computers T[...]
-
Página 83
Guarding against intrusion attempt s Customize firewall rules 83 9 Select the ports the rule should monitor . Y our options are: 10 Click Next . 11 Choos e if an d how you want N orton P ersonal Firewa ll to t rack this rule. Y our options are: 12 Click Next . 13 In the Wh at do yo u wa nt t o c a ll t h is r ul e ? text box, type a name for this r[...]
-
Página 84
Guarding against in trusion attempts Customiz e firewa ll rules 84 T o change an e xistin g firew a ll rule 1 In the G enera l Rules, Troj an Horse Ru les, or Prog ram Rules window, click Add . 2 Sel ect the ru le that you want to change . 3 Click Modify . See “Write a firewall rule” on page 81. 4 Follow the on-screen instructions to change any[...]
-
Página 85
Guarding against intrusion attempt s Customiz e Intrusion Det ection 85 T o remov e a firewall rule 1 In the G enera l Rules, Troj an Horse Ru les, or Prog ram Rules window, click Add . 2 Select the rule that y ou want to r emove. 3 Click Re move . 4 W hen you are done removing rules, click OK . Reset firewall rules to the default settings Resettin[...]
-
Página 86
Guarding against in trusion attempts Customiz e Intrusion Det ection 86 safe behavior, you can create an excl usion for the attack signat ure that matches the benign activity. w Each exclusion that you create leaves your co mputer vulnerable to attacks. Be very selective when excluding atta cks. Only exclude behavior that is always benign. T o e x [...]
-
Página 87
Guarding against intrusion attempt s Customiz e Intrusion Det ection 87 4 In the Exclud ed Signatur es li st, selec t the attack signatur e that yo u want to monitor . 5 Click Include . 6 W hen you are d one including signa tures, click OK . Enable or disabl e AutoBlock When Norton Personal Firewa ll detect s an attack, it automatically blocks the [...]
-
Página 88
Guarding against in trusion attempts Customiz e Intrusion Det ection 88 Exclude computers from AutoBlock If a computer you need to access is repeatedly placed in the AutoBlock list, you can exclude it fro m be ing blocked by AutoBlock. T o ex clude specific c omputers f rom Aut oBlock 1 Open Norton Personal Firewall. 2 In the Security Center, doubl[...]
-
Página 89
Protecting your privacy Every time that you browse the Internet, computers and Web sites collect information about you. Some of this information comes fr om forms that you fill out and choices that you make. Other information comes from your browser , which automatically provides information about the Web page you last visited and the type of compu[...]
-
Página 90
Protectin g your pr ivacy Identify privat e in forma tion to prot ect 90 Privacy Control lets you c reate a list o f information that you wa nt to rema in private. If someone attempts to se nd protected information over the Interne t, Nort on Per sonal Firewall warns them ab out t he sec urity r isk or blocks the co nnecti on . Privacy Control and [...]
-
Página 91
Protecting your privacy Custo mi ze Privac y Cont rol 91 Modify or remove private information You can modify or remove private information at any time. T o modify or remove pr iv ate inf ormation 1 Start Norton Pe rsonal Firewall. 2 In the Security Center, double-click Pr ivacy Cont rol . 3 In the Pr ivacy Control window, cli ck Pri vate Informatio[...]
-
Página 92
Protectin g your pr ivacy Customize Pr ivacy Control 92 T o set the Priv acy Leve l 1 Start Norton Pe rsonal Firewall. 2 Double-click Privacy C ontrol . 3 Move the slider to the Privac y L evel t hat you wa nt . Y o ur opti ons are : 4 Click OK . Adjust individual Privacy Control settings You can change the settings for Priv ate Information, Cookie[...]
-
Página 93
Protecting your privacy Custo mi ze Privac y Cont rol 93 4 Select the Private Informa tion setting that y ou want . Y our options are : 5 Click OK . Chan ge the Cook ie Blocki ng sett in g Many Web sites store in fo rmation they collect in cookies placed on your hard disk. When you re turn to a site that has set a cookie on your computer , the We b[...]
-
Página 94
Protectin g your pr ivacy Customize Pr ivacy Control 94 Enable or dis able Brows er Pr iv acy Browser Privacy prevents W eb site s from lea rning the type of browser that you are using, the Web site that you last visited, and other information about your browsing habits. Some Web sites that de pend on JavaScript may not work correctly if t hey cann[...]
-
Página 95
Blocking Internet advertisements Many Web sites are using more aggres si ve techniques to draw attention to the ads on their page s. Some have be gun using larger, more prominent ads, while others rely on ad windows tha t appear wh en you enter or leave the site. Along with in creasing the amount of time that it t akes to display We b pages, some a[...]
-
Página 96
Blocking Internet a dvertisements Enab le or d isabl e Ad Bloc ki ng 96 Blocking by location Every file on the Internet has a unique address or URL . Whe n you view a Web page, your computer connect s to a URL and displays the file that is stored there. If the page points to grap hics , audi o files, and other multimedia content, your browse r disp[...]
-
Página 97
Blocking Internet advertisement s Enable or disabl e Popup Window Bl ocking 97 2 Double-click Ad Blocking . 3 Check or unchec k Turn on Ad Blocking . 4 Click OK . Enable or disable Popup Window Blocking Pop-up and pop-under ads are secondary windows that Web sites open when you visit or leave the sites. Pop-ups appear on top of th e current window,[...]
-
Página 98
Blocking Internet a dvertisements Enab le or di sable F lash blo ck ing 98 Enable or disable Flash blocking When Ad Blocking is active , Norton Pe rsonal Firewall automatically blo cks all Flash animations that have the sam e dimens ions as co mmon ads. Norton Personal Firewall can also block all Flash content. This is useful if you have a slow con[...]
-
Página 99
Blocking Internet advertisement s Use te xt strings t o identify ads to block or pe rmit 99 3 In the Security Center, double-click Ad Blockin g . 4 In the Ad Blo cking window, ensure that En able Ad Blo cking is che cke d . 5 Click Open the Ad Trashcan . T he Ad Trashcan window appears . 6 W ith the windows arranged so that you can see both the adv[...]
-
Página 100
Blocking Internet a dvertisements Use te xt strings to iden tify ads to block or permit 100 Make sure that wha t you place in the (D efaults) block list isn't too general. For example, www by itself is not a go od string to block because almost every URL incl udes www. A strin g like www.slowads is more effective because it only blocks graphic[...]
-
Página 101
Blocking Internet advertisement s Use te xt strings t o identify ads to block or pe rmit 101 4 On the Ad Blocking tab, clic k Add . 5 In the Ad d New HT ML String di alog b ox, selec t the act ion that you want to take. Y o ur options are: 6 Type an HTM L string to bl ock or p ermit . 7 Click OK . Modify or remove an Ad Blocking string If you later[...]
-
Página 102
Blocking Internet a dvertisements Use te xt strings to iden tify ads to block or permit 102[...]
-
Página 103
Monitoring Norton Personal Firewall Norton Personal Firewall maintain s re cords of every ingoing and outgoing Interne t conn ection and any actions that the pr ogram takes to protect your computer. You sh ould periodically review this information to spot potential problems. There are four sources of Norton P ersonal Firewall in formation: When rev[...]
-
Página 104
Monitoring Nor ton Personal Firewall View the Status & Settings window 104 It is normal to see some denied acc ess attempts on a random basis (not all from the same IP addr ess, and not to a sequenc e of port numbers) . You may also see logged access attempts made du e to activity on your own computer such as connecting to an FTP server and sen[...]
-
Página 105
Monitoring Nort on Personal Firewall Revie w detailed stat istics 105 Reset information in the Statistics window Norton Personal Firewall au tomatically c lears all of the statis tics in the Statistics window when you rest art Windows. You can also clear the statistics manually. Thi s helps you see if a configuration change affects the statistics. [...]
-
Página 106
Monitoring Nor ton Personal Firewall Revie w detailed st atistics 106 T o re view de tailed st atistics 1 Open Norton Personal Firewall. 2 In the Security Center main window, click St atistics . 3 In the Sta tistics window, clic k Detailed Statist ics . Reset detailed statistics counters Reset the counters to clear all of the statistics and begin a[...]
-
Página 107
Monitoring Nort on Personal Firewall View Norton Personal F ir ewall Logs 10 7 T o set the stat istics displa yed in the Det ailed S tat istics window 1 Open Norton Personal Firewall. 2 In the Security Center main window, click St atistics . 3 In the Sta tistics window, clic k Detailed Statistics . 4 In the Detailed Statistics window, on th e View [...]
-
Página 108
Monitoring Nor ton Personal Firewall Vie w Norton P erson al Fi re wall L ogs 108 View the logs View the Norton Personal Firewall logs from the Statistics window. T o view the logs 1 Open Norton Personal Firewall. 2 Do one of the following: 2 In the Security Center, click Stati stics > View Log s . 2 In the Security Mon itor, on the Sel ect a Ta[...]
-
Página 109
Monitoring Nort on Personal Firewall View Norton Personal F ir ewall Logs 109 Refresh the logs The logs automatically refresh when yo u move from log to log. To view network events occurring since you began v iewing the Log Viewer, you can manually refresh all the logs or an individu al log. T o ref re sh all lo gs at once 4 In the Log V iewer, rig[...]
-
Página 110
Monitoring Nor ton Personal Firewall Vie w Norton P erson al Fi re wall L ogs 110 Change the size of the logs Norton Personal Firewall stores the infor mation for each lo g in a separate file. You can change the s ize of log file s to m anage the amoun t of hard dis k space that they occupy. When the files reach their maximum sizes, new events over[...]
-
Página 111
Troubleshooting Norton Personal Firewall The information in this ch apter will help you so lve the most frequently encountered problems. If you can’t fin d the solution to your problem here, there is a wea lth of info rmation on the Symant ec Web site. You can find updates, patches, online tutorials, Knowledge Base article s, and virus removal t [...]
-
Página 112
Troubleshooting Norton Personal Firewall T rouble shoo t Nort on P erson al F ir ewa ll pr oblems 112 T o se arch the S ymant ec service and support Web site 1 On the left side of any W eb page in t he Syma ntec W e b site, c lick search . 2 Type a wor d or ph rase tha t best r epresent s the in forma tion for w hich you are looking . Use the follo[...]
-
Página 113
Troubleshooting Nort on Personal Firewall T roubleshoot Nort on Personal F ire wall problems 113 See “Temporaril y disable N orton Personal Firewall” on page 47. If you need t o view the site, disable Norton Personal Fir ewall and try the Web site again. Keep in mind that when you disable Norton Personal Firewall, your computer may be vulnerabl[...]
-
Página 114
Troubleshooting Norton Personal Firewall T rouble shoo t Nort on P erson al F ir ewa ll pr oblems 114 If your email program mainta ins copies of sent messages in its Sent or Out folder, you can reopen th e email messag e, remove the private information, and send the message again. Why doesn’t Norton Pers onal Firewall notify me before letting pro[...]
-
Página 115
Troubleshooting Nort on Personal Firewall T roubleshoot Nort on Personal F ire wall problems 115 Some Internet service providers scan th e ports on users’ computers to ensure that they are keeping to thei r service agreements. Norton Personal Firewall might interpret this as a malicious port scan and stop communications with your cable system. If[...]
-
Página 116
Troubleshooting Norton Personal Firewall T rouble shoo t Nort on P erson al F ir ewa ll pr oblems 116[...]
-
Página 117
About the Internet The Internet is the interconnect ion of millions of computers throughout the world. It is comprised of the computer s and the connections that make it possible for any computer on the Internet to communicate with any other computer on the Internet. The Internet is analogous to a system of roads and highways. Th e superhighways of[...]
-
Página 118
About t he Inte rnet How inf orma tion is tr ansmitte d over the Int ernet 118 exchanges (MAEs). There ar e regional highways pr ov ided by large ISPs and local streets provided by local ISPs. Like a system of roads and highways, th e Inter net provides multiple rou tes from one point to another. If one part of the I nternet has too much traffic, o[...]
-
Página 119
About the Internet How inf orma tion is tr ansmitted ov er the Int ernet 119 The Internet is a packet switching network . Every communication is broken into packets by TCP (Transmission Control Protocol). Each packet contains the addresses of the sending and re ce iving computers a long with the information to be communicated. IP (Internet Protoco [...]
-
Página 120
About t he Inte rnet How Web i nf orma tion is locat ed on the In ter net 120 About UDP UDP (User Datagram Pro tocol) is used for funct ions in which the reliability of TCP is not necessar y, such as broadcasting video to multiple computers at once. UDP doesn’t provide error correct ion or retransmission of lost packets. UDP is secondar y in impo[...]
-
Página 121
About the Internet How We b in form ation is loc at ed on the Int ernet 121 Each URL maps to the IP address of the computer that stores the Web page. URLs are used beca use they are easie r to remember and type than IP addresses. Before your browser r equests a page, it asks a DNS (Dom ain Name System) server for the IP address of the Web site. IP [...]
-
Página 122
About t he Inte rnet How ports identify progr a ms on servers 122 There is one particular URL th at identifi es your computer to itself, and that is localhost. If your computer has We b server software installed, you can type http://localhost and see your Web page. The IP address that corresponds to localhost is 127.0.0.1. How ports identify progra[...]
-
Página 123
About the Internet How computers are iden tified on the Inte rnet 123 Well-known p ort s Following are some of the mo st common well-known ports . How computers are identified on the Internet Millions of computers are connected to the I nternet. When you are trying to identify co mputers, it is easier t o work with grou ps of com puters ra ther tha[...]
-
Página 124
About t he Inte rnet How computers are iden tified on the Int ernet 124 A typical subnet mask looks like this: 255.255.255.0. The 255s indicate parts of the IP address that are the same for all computer s within the subnet, while the 0 indicates a part of the IP address that is different. Subnet masks are always used in conj unction with base IP ad[...]
-
Página 125
Understanding Internet risks Norton Personal Firewall protects you fro m major risks that a re associated with the Internet. These risks incl ude the threat of network attack, malicious code in active content , exposure to inappropriate cont ent, exposure o f private information, and getting viruses from infected files. Risks from hackers Originall[...]
-
Página 126
Understanding In ternet risks Risks from hack ers 126 1 Initial access T he hacker exploits a v ulnerability found during informa tion gathering and establishes an en try point into your computer . 1 Privilege escalation T he hack er gains access t o more pr ograms and serv ices on your computer . 1 Covering tracks T he hac ker hides or removes ev [...]
-
Página 127
Understandi ng Internet risks Risks f rom h ack ers 127 Ini tial acces s The easiest way for a hacker to access a Windows computer is to use Microsoft networking. On many comp uters, Microsoft networking is enabled so that anyone on th e network can co nnect to it. Microsoft NetBIOS networ king uses th re e of the well-known ports. These ports are [...]
-
Página 128
Understanding In ternet risks Risks from active cont ent 128 Other Trojan horse programs might reco rd all your keystr okes to capture passwords and other sensitive data. No rton Personal Fire wa ll blocks the ports t hat Remo te Acc ess Tr ojan ho rse pr ograms use t o commu nicate over the Internet . Covering tr acks When a hacker has gained as m[...]
-
Página 129
Understandi ng Internet risks Risks from inappropriate cont ent and ac tivities 129 Risks from inappropriate content and activities There is a wealth of information on th e Internet th at is easily accessible to everyone. However, some topics are not suitable for all people. For example, most people consider pornographic and violent sites to be ina[...]
-
Página 130
Understanding In ternet risks Risks to your privacy 130 You may want to prevent some users from sending private information over the Internet. No rton Personal Fi rewall can block users from accessing secure sites where they might be asked for personal information. Understanding cookies Cookies are messages sent to your browser by Web sites th at a[...]
-
Página 131
Understandi ng Internet risks Risks f rom T rojan horses and viruses 131 Tracking Internet use Most browsers pass on informatio n that you might want to keep confidential. One item that your browse r normally passes to Web sites is the URL of the page from which you came . This informatio n is used by some Web sites to help you navigate throug h th[...]
-
Página 132
Understanding In ternet risks The lik elihood of being attack ed 132 A zombie program is a dormant program secre tly installed on a computer. It can later be run remotely to aid in a collective attack on another computer. Zombie prog rams don ’t norm ally damage the computer on which they reside, but are used to attack other computers. A zombie p[...]
-
Página 133
Gloss ary This glossary provides definitions of some common In ternet terms. active content Material on a Web page that changes wit h time or in response to user ac tion. Active content is implemented through ActiveX controls, Visual Basic Scripts, Java scripts, and Java applets in the HTML code that defines the page. ActiveX control A program that[...]
-
Página 134
Glossary 134 connection A method of d ata ex change that allows a rel iable transfer of dat a between two comput ers. connection attempt The data transfe r that requests the opening of a connection. cookie A small data file that some Web sites place on yo ur hard disk while you’re viewing a Web page. Web servers can use cookies to store your per [...]
-
Página 135
Glossary 135 email (electronic mail) A method of exchang ing messag es and file s with other people via computer networks. A popular protocol for sending emai l is SMTP (Simple Mail Transfer Protocol). Popular protocols for r eceiving email are POP3 (Post Office Protocol 3) and IMAP4 (Internet Message Access Proto col 4). Web-based email services u[...]
-
Página 136
Glossary 136 IP address (Internet Protocol address) A 32-bit numeric identifier that uniquely identifies a computer on the Interne t. IP addresses are usually expressed as four groups of numbers, each ranging from 0 to 255, separated by periods. For example, 206.204.52.71. ISP (Internet service provider) A company that supplies I nternet access to [...]
-
Página 137
Glossary 137 network address The portion of an IP address that is common to all computers on a par ticular network or subnet. operating system A program that ties the capabilities of computer hardware and software to input/output devices such as disks, keyboards , and mouse devices. outbound communication An attempt by your comput er to open a conn[...]
-
Página 138
Glossary 138 port number A logical communications channel to be used by a particular TCP/IP applic ation. Each application has unique port numbers associated with it. By convention, some protocols use a well-known port number (for example, HTTP uses port 80), although this is configurable. port scan An attempt to gain access to a comput er by searc[...]
-
Página 139
Glossary 139 TCP/IP (Transmission Control Protocol/ Internet Protocol) The standard family of pro tocols for communicatin g with Internet devices. threat A circumstance, event, or person with the potential to cau se harm to a system in the fo rm of destruction, disclosure, modifica tion of data, and/ or denial of serv ice. timeout A predetermined p[...]
-
Página 140
Glossary 140[...]
-
Página 141
Service and support solutions The Service & Support Web site at h ttp://service.symantec .com supports Symantec products. Customer Service he lps with nontechnical issues such as orders, upgrades, replacements, an d rebate s. Technic al Suppor t helps with technical issues such as instal ling, configuring, or troubleshooting Symantec products. [...]
-
Página 142
Service and support solutions 142 For upgrade orders, visit the Symantec St ore at: http://www.symantecstore.com Technical support Symantec offers two technical suppor t options for help with installing, configuring, or troubl eshoo ting Syma ntec produ cts: 1 Online Service and Support Connect to the Symantec Se rvice & Support Web site at htt[...]
-
Página 143
Service and support solutions 14 3 Worldwide service and support Technical support an d customer servic e solutions vary by country. For Symantec and Interna tional Partner locations out side of the United States, contact one o f the service and support offic es listed below, or connect to http://service.syman tec.com and select your re gion under [...]
-
Página 144
Service and support solutions 144[...]
-
Página 145
Inde x A access Alert Tracker 36 Block Traffic 36, 44 Help 36 LiveUpdate 36, 39 logs 39 Norton Personal Firewall 37 options 45 Program Scan 39 Security Check 42 Visual Tracking 43-44 active content 128 protection from 70 troubleshooting 113 See also ActiveX controls; Java applets ActiveX controls 113, 128 Ad Blocking 95-101 enabling and disabling 9[...]
-
Página 146
Index 146 browser information 115 privacy 94 C CompuServe 56 computer blocking 87 emergency procedu res 11 requirements 19 computers names 65 specifying 64-66 connecting to the In ternet automat ically 58 context-se nsitive Help 49 Cookie Blocking 130 options 93 troubleshooting 113 cookies 93, 113, 130 credit card numbers 91 D definitions of techni[...]
-
Página 147
Index 14 7 Internet Access Statistics contents 105-106 resetting 105 Internet Control Me ssage Protocol (ICMP) 119 Internet Group Membership Protocol (IGMP) 119 Internet -enabled applicati ons 78 Intrusion Detection 69-87 about 18, 70-71 configuring 85 Intrusion Detection service 54 IP addresses 65, 121 and subnet mask pair 123 finding 65 J Java ap[...]
-
Página 148
Index 148 options ( continued ) protecting with password 32, 46 resetting pa ssword 47 P passwords options 32 ping scans 126 Popup Window Blocki ng, enabling and disabling 97 pop-up windows, blocking 95-101, 113 pornography 129 ports 122-123 scans 70, 126 well-known 123 printers, sharing 62 Privacy Control 89-94 and SSL 90 configuration 31 in insta[...]
-
Página 149
Index 14 9 settings Norton Personal Firewall 72-85 Program Control 79 sockets 122 SSL (Secure Sockets Layer) and Privacy Control 90 statistics 105-107 detailed 105 Norton Personal Firewall 103-110 resetting 105 resetting detailed st atistics counters 106 viewing 104 statistics window 104 Status & Settings, checking 104 stealth po rts 126 subnet[...]
-
Página 150
Index 150 Z zombie programs 71, 132 zones 62-64 adding computers to 63 Restricted 88 Trusted 71[...]
-
Página 151
Norton™ Person al Fir ewall CD Rep la cement Fo rm FOR CD REPLACEMENT Please send me : ___ CD Replacement Name _________________ ____________ _________________ ____________ _________________ _____________ ________ Company Name _____________ _________________ ____________ _________________ ____________ _________________ Street Address ( No P .O. B[...]