Index

SynDrop,

87

Teardrop,

87

UDP Flood,

88

Winnuke,

88

Configuration Assistant, 24, 26, 68, 71

Access to shares, 72

Allowed applications, 73

Network control settings, 71

Startup options, 72

Cookie Blocker, 11, 41

 

Copyright Information,

ii

Custom filtering rules,

81

D

DATs, 55, 57, 93

Default Settings for System Activity, 84

Default system activity settings

ARP, 84

DHCP, 84

ICMP, 84

Identification, 84

NetBIOS over TCP, 84

PPTP,

84

RIP,

84

E

E-mail Scan extension, 52

E-mail Scanner,

58

Emergency Disk,

52

Encryption

 

described,

102

discussed,

104

File, 33

 

F

File Guardian, 11, 37

 

Filtering protocols,

70

 

Firewall (discussed),

102

 

Firewall Communication Alert Messages, 80

Flood blocking a TCP connection,

70

Flushot,

86

 

 

Forgotten Administrator password,

28

Fraggle,

86

 

 

Frequently asked questions

 

About Internet security,

108

About McAfee Firewall,

68

G

Gatekeeper, 11, 34

Alert Messages, 34

Settings, 36

H

HAWK, 51 Hoax virus, 107

Hostile Activity Watch Kernel, 51 How to

Configure and scan my wireless device, 56

I

Identity Protector, 11, 43

Installation

Software acquisition types, 13

Steps,

13

 

 

System requirements, 13

Troubleshooting,

16

Wireless device requirements, 13

Instant Updater, 52

 

About,

93

 

 

Auto Inquiry,

94

 

Auto Update,

93

 

Configuration,

94

Home page query,

94

Manual Update, 94

Internet traffic settings,

75

Intrusion Detection

 

 

How to Configure,

85

IP Spoofing,

86

 

 

J

Java

applets, 105

discussed, 105

Jolt, 86

Jolt 2, 86

118 McAfee Internet Security 5.0

Page 118
Image 118
McAfee 5 manual 102