Detailed instructions for use are in the User's Guide.
[. . . ] McAfee Office
Version 3. 1
User's Guide
COPYRIGHT
Copyright (c) 1999-2000 Networks Associates Technology, Inc. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc. , or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
* ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, * ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon's, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach, Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, and ZAC 2000 are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF SPECIFIED SOFTWARE ("SOFTWARE") BY NETWORK ASSOCIATES, INC. BY CLICKING THE ACCEPT BUTTON OR INSTALLING THE SOFTWARE, YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO THIS AGREEMENT. [. . . ] Safe & Sound stores extra information (in each sector for each file and also in a separate directory) to provide this level of protection. NOTE: You can copy files into a protected volume file manually using My Computer or Windows Explorer to add them to your backup set and instantly protect them. DirectoryThe Directory backup type makes another copy of the files and directories selected for backup in a different location. This type of backup creates no performance drain on the system and it's simple to manage the backup area. You can use My Computer or Windows Explorer to cut or copy files in or out of the backup location or delete the files. The drawback of selecting a directory backup type is that the files are no more protected than if you had created a backup copy yourself. Specify the target destination where the backup set will be created and click Next >. Click the Settings button if you want to customize any of the settings for this backup set. Volume Settings · · Backup TypeDisplays the currently selected backup type (Protected Volume File or Directory). Enable Automatic BackupWhile this check box is selected, Safe & Sound automatically updates this backup set as you update the files it contains based on the time delay you specify. Name of Backup SetIf you are saving this backup set to a non-Windows 95/98 or NT drive (such as to a UNIX server on your network) be sure to follow the 8. 3 naming convention for this name. Write-behind DelaySelect the Mirror (0) write-behind delay if you want your backup set to remain in constant synchronization with the original files as you change them. Select a write-behind delay in seconds or minutes if you want your backup to be created during times when your PC is idle starting at any time after the time delay you select.
·
·
106
McAfee Office
McAfee Utilities
·
Protected Volume Drive Letter(available only for backup sets stored as a Protected Volume File). The drive letter you want to use for the Protected Volume File backup set. Keep Deleted Files ForSelect how long you want the backup set to keep files whose original counterparts have been deleted from your system. Limit Size of Backup VolumeDrag the slider left to reduce the backup volume size limit or right to increase the backup volume size limit.
·
·
Backup Drive Drive and Directory Folders appear in the Backup Drive list so you can select any of the ones you want to add to your backup set. Click the check boxes to place a check mark beside the drives or directories that you want to back up. Document Types You can select groups of files that you want to include in your backup set by selecting their file type. The file type, such as TXT (for a text file), indicates the file's purpose. Safe & Sound displays a list of all the registered file types in Windows 95/98. The file types with check marks show the types of files that will be included in your backup set.
Safe & Sound obtains its list of registered file types from Windows. You can view or add registered file types in My Computer or Windows Explorer.
User's Guide 107
McAfee Utilities
If you are not yet familiar with file types and want to see them, you can open My Computer or Windows Explorer, choose the Options command from the View menu, and click the File Types tab. [. . . ] You cannot change a passphrase if the PGPdisk file is mounted. Select Change Passphrase from the File menu. Enter the current passphrase in the Passphrase dialog box. Then click OK, the New Passphrase dialog box is displayed. [. . . ]