Symantec Norton Personal Firewall 2003 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Symantec Norton Personal Firewall 2003, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Symantec Norton Personal Firewall 2003 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Symantec Norton Personal Firewall 2003. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Symantec Norton Personal Firewall 2003 should contain:
- informations concerning technical data of Symantec Norton Personal Firewall 2003
- name of the manufacturer and a year of construction of the Symantec Norton Personal Firewall 2003 item
- rules of operation, control and maintenance of the Symantec Norton Personal Firewall 2003 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Symantec Norton Personal Firewall 2003 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Symantec Norton Personal Firewall 2003, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Symantec service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Symantec Norton Personal Firewall 2003.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Symantec Norton Personal Firewall 2003 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    User’s Guide[...]

  • Page 2

    Norton™ Personal Firewall User’s Guide The software described in this boo k is furn ished under a license agreement and may be used only in accordance with the te rms of the agreement. Documentation version 6.0 PN: 10025076 Copyright Notice Copyright • 2002 Symantec Corp oration. All Rights Reserved. Any technical doc umentation that is made [...]

  • Page 3

    SYMANTEC LICENSE AND WARRANTY IMPORTANT: PLEASE READ THE TERM S AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE US ING THE SOFTWA RE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES (“SYMANTEC”) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR T HE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED B[...]

  • Page 4

    PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY F ROM STATE TO STA TE AND COUNTRY TO COUNTRY. 5. DISCLAIMER OF DAMAGES: SOME STAT ES AND COUNTR IES, INCLUDING MEMB ER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DA[...]

  • Page 5

    Contents Chapter 1 Responding to emergencies If you think your computer is under attack ......................... ............. 11 Recover from an emergency ........................ ........................... ............. 12 Prevent future problems ........................ ..................... .......................... 13 Chapter 2 About Norton[...]

  • Page 6

    Contents 6 Chapter 4 Norton Personal Firewall basics Access Norton Personal Fi rewall .......................... ........................... ... 35 Access Norton Personal Firewall from the system tray ......... 36 Work with Norton Personal Firewall .......................... ..................... ... 37 Access Norton Personal Firewa ll protection f[...]

  • Page 7

    Contents 7 Chapter 6 Controlling acces s to protected computers Control how people use your computer ................... .......................... 61 Connect to a network ...................... ..................... .......................... 61 Enable file and printer sharing .......................... .................... ...... 62 Organize comp[...]

  • Page 8

    Contents 8 Chapter 8 Protecting your privacy Identify private information to protect ...................... ........................ 89 Privacy Control and SSL ........................... .................... ................. 90 Add private information ............. ..................... ........................... ... 90 Modify or remove private [...]

  • Page 9

    Contents 9 Appendix A Troubleshooting Norton Personal Firewall Troubleshoot Norton Personal Firewall problems .............. ........... 112 What is wrong with this Web site? ............ .................... ........... 112 Why can’t I post informatio n online? ........ .................... ........... 113 Why did an email message I se nt never [...]

  • Page 10

    Contents 10 Glossary Service and support solutions Index CD Replacement Form[...]

  • Page 11

    Responding to emergencies If you have an emergency, these proced ures can help you find the solution to your problem. If you think your computer is under attack If your computer is beha ving unpredictably, and yo u have determined that the behavior is not due to a virus or a corrupted file, you may be t he victim of an Internet attack. If you suspe[...]

  • Page 12

    Responding to emer gencies Recover fr om an emergenc y 12 See “Identif y the source of communications” on page 43. 6 Use Visual Tracking to ident ify the I P address of the computer that the attac ker used. Y ou can use this infor mation to report the attac k to the I S P tha t owns the I P address . See “Restrict a blocked compu ter” on pa[...]

  • Page 13

    Responding to emergencies Prevent future probl ems 13 Prevent future problems Norton Personal Firewall can prote ct yo ur computer against most Internet attacks. To prepare your computer for emerge ncies: 1 Stay in formed about sec urity risks by visiting the Symant ec Security Response Web site ( securityresponse .symantec.com). 1 Keep your browse[...]

  • Page 14

    Responding to emer gencies Prevent future p rob lems 14[...]

  • Page 15

    About Norton Personal Firewall Norton Personal Fir ewall protects computers from Inter net attacks, guards your privacy, and speeds Web surfing by eliminating ads. What’s new in Norton Personal Firewall 2003 Norton Personal Firewall 2003 now includes: 1 Security Monitor Gives you fast access to the mo st-used Norton Perso nal Firewall tool s 1 Vi[...]

  • Page 16

    About Norton Per sonal Firewall Nor ton Perso nal Firewa ll features 16 Norton Personal Firewall features Norton Pe rsonal Firewall in cludes a numb er of security tools that help keep your computer safe. You can get fast access to all Norton Personal Firewall tools from the new Security Monitor. Internet security can be a complica ted topic to und[...]

  • Page 17

    About Norton Personal Firewall Norton Personal F ire wall f ea tur es 17 About Norton Personal Firewall Norton Personal Firewall provides a barrier between your computer and the Inte rnet. A firewall prevents unauthorized users from accessing private computers and networks connecte d to the In ternet. Norton Personal Firewall includes fe atures th [...]

  • Page 18

    About Norton Per sonal Firewall Nor ton Perso nal Firewa ll features 18 Norton Personal Firewall features include: Intrusi on Detectio n Intrusio n Detectio n helps keep your computer safe from Internet attacks by scanning each piece of inform ation that enters and exits your computer . If it identifies a potential attack, Intrusion Detection alert[...]

  • Page 19

    Installing Norton Personal Firewall Before installing Norton Personal Firewall, take a moment to review the system requiremen ts listed in this chapter. System requirements To use Norton Personal Firewall, your computer must have one of the followin g Windows op erating syst ems install ed: 1 W indows 98, 98S E 1 Wi n d o w s M e 1 W indows 2000 Pr[...]

  • Page 20

    Installing Norton Personal Firewall S yst em r equi r emen ts 20 Your comp uter must also meet th e following minimum requir ements. Supported email clients Norton Personal Firewall can sc an em ail messages for private information in any POP3-compatible email client, including: 1 Microsoft • Outlo ok • Express 4.0/5.X 1 Microsoft Outlook 97 /9[...]

  • Page 21

    Installing Nort on Personal Firewall Befor e installation 21 Email scanning does not support th e following email clients: 1 IM A P c l i e n t s 1 AO L clients 1 P O P3s that use S S L (S ecure Sockets Laye r ) 1 W eb- based email s uch as Hotmail and Ya hoo ! 1 Lotus No tes mail Supported instant messenger clients Norton Personal Firewall can sc [...]

  • Page 22

    Installing Norton Personal Firewall Install Norton Personal Fir ewall 22 T o disable the Windows XP firew all 1 On the Windows XP taskbar, clic k Start > Control P anel > Netw ork Connectio ns . 2 If you ha ve crea ted more t han one modem or network connection, select the active connection. 3 Click Network T asks . 4 Click Change settings of[...]

  • Page 23

    Installing Nort on Personal Firewall Install Norton Personal F irew all 23 3 Click Next . 4 Read the License Agreement, then clic k I accept th e license agreeme nt . If you decline, you cannot co ntinue with the installation. 5 Click Next . 6 In the Run LiveUpdate afte r insta llation window , se lect whether you want to run LiveUpdat e after the [...]

  • Page 24

    Installing Norton Personal Firewall Install Norton Personal Fir ewall 24 7 Click Next . 8 Click Browse to select a fo lder into which yo u want to install Norton Personal Firewall, if it is ot her than the default location. 9 Click Next . See “Register your software” on page 25. 10 Click Next to be gin installi ng No rton Personal Firewall. Aft[...]

  • Page 25

    Installing Nort on Personal Firewall Register yo ur software 25 11 Read the readme text, th en click Nex t . 12 Click Fini sh to complete the installa tion. If the opening screen does not appear Sometimes a computer’s CD-ROM drive does not automatically run a CD. T o start the installation from the Norton Personal Firewall CD 1 On your desktop, d[...]

  • Page 26

    Installing Norton Personal Firewall Register yo ur software 26 2 If you would like informatio n from Symantec about Norton Personal Firewall, select the method by which you want to receive that information, then click Next . 3 Type your name, then click Next . 4 Type your a ddress, then click Next .[...]

  • Page 27

    Installing Nort on Personal Firewall Register yo ur software 27 5 Do one of the following: 2 Answer the su rvey questions to help Symantec improve its products and ser vices, t hen click Next . 2 Skip the survey by clicking Next . 6 Select whether you want to register Norton Personal Firewall over the Internet or by mail. If you want to regis ter b[...]

  • Page 28

    Installing Norton Personal Firewall After ins ta ll ati on 28 After installation After Nort on Pers onal Fir ewall is in stalled, a prompt appears giving you the option to r estart your computer immediately. After restart ing, the Security Assistant appears to guid e you through the configuration of Norton Personal Firewall. Restart your computer A[...]

  • Page 29

    Installing Nort on Personal Firewall After ins ta ll ati on 29 T o set up Home Ne tworkin g 1 In the Security Assistant Ro admap, click Home Network ing . 2 In the Home Networking p ane, click Set up Home Netwo rking . 3 In the Home Networking Wizard, click Next . 4 Follow the on-screen instructions to configure your network . Set up Pr ogr am Cont[...]

  • Page 30

    Installing Norton Personal Firewall After ins ta ll ati on 30 To s e t u p P r o g ra m C o n t ro l 1 In the Security Assistant Ro admap, click Pr ogram Scan . 2 In the Program Scan pane, click Auto matically scan pr ograms .[...]

  • Page 31

    Installing Nort on Personal Firewall After ins ta ll ati on 31 3 In the Program Scan window, click Next to begin the scan. W hen the scan is complete , all Internet-enabled programs tha t were found are listed. 4 To allow Internet access for a program, c heck the c hec k box to the left of the program’s name. 5 To change the Internet access rule [...]

  • Page 32

    Installing Norton Personal Firewall After ins ta ll ati on 32 T o set up Privacy Control 1 In the Security Assistant Ro admap, click Pr ivacy Control . 2 In the Pr ivacy Control p ane, click Add private i nformation to protect . 3 In the Add Pr ivate Infor mation dial og b ox, under Type of information to protect, select a category . 4 In the Descr[...]

  • Page 33

    Installing Nort on Personal Firewall If you have Norton S ystemWorks installed 33 T o protect Nor ton Personal Firewall options with a password 1 In the Security Assistant Ro admap, click P assword Protectio n . 2 In the Password Prot ection pane, click Turn on password prote ction . 3 In the Password an d Co nfirm Password text boxes, type a passw[...]

  • Page 34

    Installing Norton Personal Firewall If you need to uninst all Norton Personal Fir ew all 34 If you need to uninstall Norton Personal Firewall If you need to uninstall Norton Per son al Firewall from your computer, use the Uninstall Norton Personal Firewa ll option on the Windows Start menu. w During uninstall, Windows may indicate that it is instal[...]

  • Page 35

    Norton Personal Firewall basics After installation, Norton Personal Firewall automatically protects any computer on which it is installed. You do not ha ve to start the program t o be protected. Access Norton Personal Firewall Launch Norton Personal Fi rewall to ch ange protection settings or monitor its activities. T o acce ss Norton Personal Fire[...]

  • Page 36

    Norton Personal Firewall basics Acc ess Nort on Pe rson al Fi r ewal l 36 2 On the Windows XP taskbar, click Start > More Programs > Norton Personal Firewall > Nort on Persona l Firew all . 2 On the Windows de sk top, double-click Norton Personal Firewa ll . Access Norton Personal Fire wall from the system tray Norton Personal Firewall add[...]

  • Page 37

    Norton Person al Firew all basics Work with Norton Personal F ir ewall 37 See “About Global Settings” on page 46. Use the Norton Personal Firewall Op tions to ad d additional tools to the menu. Work with Norton Personal Firewall Norton Personal Firewall works in the background, so you may only interact with the program when it a lerts you of ne[...]

  • Page 38

    Norton Personal Firewall basics Work with Norton Personal F irew all 38 3 In the Security Center, do one of the following: 2 Double-click a feature you want to cust omize. 2 Select a feature, then in the lower-right corner of the window, click Customize . 4 Configure the fea ture . 5 W hen you are done making changes, clic k OK . Use the Security M[...]

  • Page 39

    Norton Person al Firew all basics Work with Norton Personal F ir ewall 39 Select a t ask wit h the Security M onitor Use the Select a Task men u in the Security Monitor to quickly perform common Norton Personal Fi rewall tasks. The Select a Tas k menu includes : Respond to Norton Personal Firewall alerts Norton Personal Firewall monitors co mmunica[...]

  • Page 40

    Norton Personal Firewall basics Work with Norton Personal F irew all 40 1 Wha t thes e typ es of al erts ind icate 1 How to reduce the number of these alerts you receive T o use the Alert Assistant 1 In any alert window, clic k the Alert Assistant button. 2 In the Alert Assist ant window, review the informa tion about this alert. 3 To respond to th[...]

  • Page 41

    Norton Person al Firew all basics Work with Norton Personal F ir ewall 41 Use Alert Tracker Many of the Inte rnet events th at Nort on Persona l Firewall monitors are not significant enough t o trigger al erts. Alert Tracker provides an easy way to monitor these less-important security events. Alert Tracker displays the same inform ation that appea[...]

  • Page 42

    Norton Personal Firewall basics Work with Norton Personal F irew all 42 T o re view r ecent Alert T rac k er messa ges 1 On the W indows desk top, double-click the Alert Trac ker . 2 To the right of the first message, click the arrow if it appears . See “Review detailed statistics” on page 10 5. 3 Double-click an entry to o pen the Log Viewer .[...]

  • Page 43

    Norton Person al Firew all basics Work with Norton Personal F ir ewall 43 T o get more information about an at-risk are a 4 On the r esult s page , next to t he scan name, cl ick Show Details . Identify the source of communications Visual Tracking helps you le arn more about computer s that att empt to connect to your computer. Using Visu a l Track[...]

  • Page 44

    Norton Personal Firewall basics Work with Norton Personal F irew all 44 3 In the Intrusion Detectio n window, in the A utoBlock section, select a connection yo u want to trace. 4 Click Attacker Details . Y our browser opens the Visual Tracking W eb page . When Visual Tracking is finished, it d isplays a visual representation of where this communica[...]

  • Page 45

    Norton Person al Firew all basics Customiz e Norton Person al Fir ewa ll 45 Customize Norton Personal Firewall The default Norton Personal Firewall sett ings should provide adequate protection for most users. If you need to make changes, use the Options menu to access Norton Personal Fi rewall options. The options let you control more advanced sett[...]

  • Page 46

    Norton Personal Firewall basics P assw ord -prote c t o ptio ns 46 About Web Content options Web Conten t options le t you control ho w Norton Personal Firewall handles interactive online content, ads, and possible privac y intrusions. Web Content options a re arranged on three tabs. About Glob al Set tings Global Settings let y ou control the defa[...]

  • Page 47

    Norton Person al Firew all basics T emporar ily disable Norton Personal F ire wall 47 Reset options p assword If you forget your options password you can reset it. T o r eset your Nor ton Personal Firewall options password 1 Do one of the following: 2 On the Windows t askbar, cli ck Start > Progr ams > Norton Personal Fir ewall > Uninsta l[...]

  • Page 48

    Norton Personal Firewall basics For more in format ion 48 You can also disable individual securi ty features. For ex ample, you might want to see if th e Personal Firewall is preventing a program fr om operating correctly. T o disable a protection fe a ture 1 Open Norton Personal Firewall. 2 In the Security Center, select the featu re that you want[...]

  • Page 49

    Norton Person al Firew all basics For more in format ion 49 2 On the main Help menu, click Norton P ersonal Fir ewall Help . 3 In the left pane of the Help window, select one of the following tabs: 2 Contents : Displays the Help by topic. 2 Index: Lists H elp topics in alphabetical order by key word. 2 Search: Opens a search field where you can ent[...]

  • Page 50

    Norton Personal Firewall basics For more in format ion 50 The Release Notes can be accessed from the Start menu. T o re a d the Release Notes 1 Do one of the following: 2 On the Windows t askbar, cli ck Start > Progr ams > Norton Personal Fir ewa ll > Pr oduct Supp ort > Norton Person al Firewall Release Notes . 2 On the Windows XP task[...]

  • Page 51

    Norton Person al Firew all basics For more in format ion 51 T o re ad the User’s Guide from your h ar d disk 1 Open the locatio n into whic h you copied the PDF . 2 Double-click NP F2003.pdf . About Norton Personal Firewall on the Web The Symantec Web site provides extensive information about Norton Personal Firewall. There are several ways to ac[...]

  • Page 52

    Norton Personal Firewall basics For more in format ion 52 Subscribe to the Symantec Se curity Response newsletter Each month, Symantec publishes a fr ee electronic newsletter that is focused on the needs of Internet securi ty customers. It discusses the latest antivirus tec hnology produced by Symantec Security Response, common viruses, trends in v[...]

  • Page 53

    Keeping current with LiveUpdate Symantec products depe nd on current information to protect yo ur computer from newly discovered th reat s. Symant ec makes this information available to you through LiveUpdate. Using your Inte rnet connection , LiveUpdate obtains program updates and protection updat es for your computer. Your normal Internet acc ess[...]

  • Page 54

    Keeping current with LiveUpdate About pro t ection updates 54 About protection updates Protection update s are files available from Symantec, by subscription, that keep your Symantec product s up-to- date with the latest anti-threat technology. The pro tection updates you receive depe nd on which product you are using. About your subscription See ?[...]

  • Page 55

    Keepi ng curren t with LiveUpd ate When you should updat e 55 When you should update Run LiveUpdate as soon as you have installed your product. Once you know that your files are up-to-date, run Live Update regularly to obtain updates. For example, to keep your virus protection current, you should use LiveUpdate once a week or wheneve r new viruses [...]

  • Page 56

    Keeping current with LiveUpdate If you can’t use Liv eUpdate 56 If you can’t use LiveUpdate When new updates become available, Symantec posts th em on the Symantec Web site. If you can’t run LiveUpdate, you can obtain new updates fr om the Sym antec We b site. w Your subscription must be current to obtain new prot ection updates fr om the Sym[...]

  • Page 57

    Keepi ng curren t with LiveUpd ate Set L iveU pd ate to Interact ive o r E xpres s m ode 57 LiveUpdate automatically installs all available updates for your Symantec products. T o set Liv eUpdate to Int er ac tive or Expr ess mode 1 Open your Symantec product. 2 At the top of the window, click LiveUpdate . 3 On the LiveUpdate welcome screen, clic k[...]

  • Page 58

    Keeping current with LiveUpdate Ru n LiveUpdat e autom atica lly 58 Run LiveUpdate automatically You can have LiveUpdate check for protection updates automatically, on a set schedule, by enabling Automatic LiveUpdate. You must continue to run LiveUpdate manually to receive product updates. w Automatic LiveUpdat e checks for an I nternet connection [...]

  • Page 59

    Keepi ng curren t with LiveUpd ate Run Li veUpdat e automat ically 59 To delete the schedule for Automatic LiveUpdate, disable Automatic LiveUpdate. T o di sabl e A utoma tic Live Upda te 1 Start Norton Pe rsonal Firewall. 2 At the top of the Norton Personal Firewall main window, clic k Options . w If you se t a pass word for Optio ns, Nort on Pe r[...]

  • Page 60

    Keeping current with LiveUpdate Ru n LiveUpdat e autom atica lly 60[...]

  • Page 61

    Controlling access to protected computers You can configure Norton Personal Fire wall to meet your needs in many different situations. You can use the progr am to control your computer’s access to both local computers and comput ers over the Internet. You can also control how outside us ers access your computer. Control how people use your comput[...]

  • Page 62

    Controlling access to p rotected computers Contr ol how people use your computer 62 See “Monitoring Norto n Pers onal Firewa ll” on page 103. Whenever you jo in a network, Norton Personal Firewall au tomatically begins monitoring the connection. You do not need to make any changes in order to be protected. Norton Person al Firewall notifies you[...]

  • Page 63

    Controlling ac cess to protec ted computer s Contr ol how people us e your comp ut er 63 computers to your Trusted Zone if yo u know that their user s can be trusted and they have firewall software installed. The Home Network Wizard is the fast est way to organize co mputers into zones. You can also manually add indivi dual c omputer s to zones. T [...]

  • Page 64

    Controlling access to p rotected computers Contr ol how people use your computer 64 T o manually add computers to z ones 1 Open Norton Personal Firewall. 2 In the Security Center, double-click Personal Firew all . 3 In the Personal Firewall window, on the Home Networking tab, select the zone to whic h you want to add a computer . 4 Click Add . See [...]

  • Page 65

    Controlling ac cess to protec ted computer s Contr ol how people us e your comp ut er 65 Find a comput er’s IP addr ess There are t wo procedures for finding a computer’s IP address. On Windows 98/Me computers, you can use Winipcfg to find the IP address of a computer. On Windows 2000/XP compute r s, you can use Ipconfig to find the IP address [...]

  • Page 66

    Controlling access to p rotected computers Contr ol how people use your computer 66 Specify a r ang e of computers You can enter a range of computers by specifying the starting (lowest numerically) IP address and the ending (highest numerically) IP address. All of the compute rs within that ra nge of IP ad dresses are included. In almost every case[...]

  • Page 67

    Controlling ac cess to protec ted computer s Control how users access the Int ernet 67 Control how users access the Internet Norton Personal Firewall suppo rts most In ternet conne ction methods without needing additiona l configuration. If you access the Internet via a cable or DSL router Norton Personal Firewall works behind a ca ble or DSL rou t[...]

  • Page 68

    Controlling access to p rotected computers Contro l how ou tsid e us ers a cces s you r net wor k 68 If you run a Virtual Private Network Norton Personal Firewall works with the following Virtual Private Networks (VPNs): 1 Nortel 1 VPNRemote 1 PGP 1 Sec ur eR em ot e With mo st VPNs, wh en the VP N client is active, you cannot see the Internet or o[...]

  • Page 69

    Guarding against intrusion attempts Internet attacks ta ke advantage of the wa y that computers transfer information. Norton Pers onal Firewall can prot ect your computer by monitoring the information that comes into and out of your computer and blocking any attack attempts. How Norton Personal Firewall protects against network attacks Norton Perso[...]

  • Page 70

    Guarding against in trusion attempts How Norton Personal F irew all prot ects ag ainst network a ttacks 70 Norton Personal Firewall monitors communications When Norton Personal Fi rewa ll is active, it mo nitors communications among your computer and other comput er s on the Internet. It also protects your computer from such co mmon s ecurity probl[...]

  • Page 71

    Guarding against intrusion attempt s How Norto n Pe rson al Fir ewall pro te cts ag ains t netw ork a ttac ks 71 Because attacks may span packets, In trusion Detection examines packets in two different ways. It scans each pack et individually looking for patterns that are t ypical of an attack. It also monitors the pac kets as a stream of informati[...]

  • Page 72

    Guarding against in trusion attempts Custom ize fi re wall pr ot ection 72 Customize firewall protection The default Norton Personal Firewall sett ings should provide adequate protection for most users. I f the defa ult protection is not appropriate, you can customize Norton Pers onal Firewall pro tection by using the Security Level slider to selec[...]

  • Page 73

    Guarding against intrusion attempt s Customiz e firew all prot ection 73 3 Move the slider to the Security Level that you want. Y our options are : Change individual security settings If the Security Level options do not meet your nee ds, you can change the settings for Norton Personal Firewall, Java , and ActiveX protection levels. Changing an ind[...]

  • Page 74

    Guarding against in trusion attempts Custom ize fi re wall pr ot ection 74 3 Click Custom Level . 4 Do one or more of the following : 2 On the Personal Firewall menu, select a level. Your o ptions are: 2 On the Java Ap plet Security or ActiveX Control Security menu, select a level. Your options are: High Blocks all communication that you do not spe[...]

  • Page 75

    Guarding against intrusion attempt s Customize firewall rules 75 2 To be notified whenever unknown pr ograms access the Internet, check Enable Access Cont rol Alerts . 2 To be notified whenever a r emote computer atte mpts to conne ct to a port no program is using, check Alert when unused ports are acce ssed . 5 Click OK . Reset security settings t[...]

  • Page 76

    Guarding against in trusion attempts Customiz e firewa ll rules 76 this type of communication are ignored if they appear below the first rule that matches. If no match ing rule i s found, the co mmunication is bloc ked. Depending on the Reporting level, an alert may appear. Create new firewall rules Norton Personal Fir ewall includes Pr ogram Contr[...]

  • Page 77

    Guarding against intrusion attempt s Customize firewall rules 77 T o enable Automatic Progr am Control 1 Open Norton Personal Firewall. 2 In the Security Center, double-click Personal Firew all . 3 In the Personal Firewall window, on the Program Contr ol tab, c heck Turn on A utomati c Prog ram Contr ol . 4 Click OK . Scan f or Internet -enabled p [...]

  • Page 78

    Guarding against in trusion attempts Customiz e firewa ll rules 78 3 In the Personal Firewall window, on the Program Contr ol tab, clic k Program Scan . 4 Select the disk or disks on your computer tha t you want to scan . 5 Click OK . 6 In the Program Scan window, do one of the following : 2 Check programs that you want to add to the Pro gram Contr[...]

  • Page 79

    Guarding against intrusion attempt s Customize firewall rules 79 6 In the Internet Access Contr ol alert, select the acc ess level you want this program to ha ve . Y our options are : 7 If you want to see any risks that this program could pose to y our computer, clic k Detai ls . 8 Click OK . Chan ge Pr ogr am Control sett ings After using Norton P[...]

  • Page 80

    Guarding against in trusion attempts Customiz e firewa ll rules 80 5 In the Internet Access Contr ol alert, select the acc ess level you want this program to ha ve . Y our options are : 6 Click OK . Manually add a firewall rule While Norton Personal Firewall automa tically creates most of the firewall rules that you n eed, you may want to add speci[...]

  • Page 81

    Guarding against intrusion attempt s Customize firewall rules 81 3 In the Personal Firewall window, on the Advanced tab, click Tr ojan Horse Rules . 4 Follow the on-screen instructions. See “Write a firewa ll rule” on page 8 1 . T o add a Progr am Rule 1 Open Norton Personal Firewall. 2 In the Security Center, double-click Personal Firew all . [...]

  • Page 82

    Guarding against in trusion attempts Customiz e firewa ll rules 82 4 Select the t ype of connectio n the ru le should mon itor . Y our options are: 5 Click Next . 6 Select the computers the rule sh ould moni tor . Y our optio ns are : 7 Click Next . 8 Select the protocols the rule should monitor . Y our options are: Connections to other computers T[...]

  • Page 83

    Guarding against intrusion attempt s Customize firewall rules 83 9 Select the ports the rule should monitor . Y our options are: 10 Click Next . 11 Choos e if an d how you want N orton P ersonal Firewa ll to t rack this rule. Y our options are: 12 Click Next . 13 In the Wh at do yo u wa nt t o c a ll t h is r ul e ? text box, type a name for this r[...]

  • Page 84

    Guarding against in trusion attempts Customiz e firewa ll rules 84 T o change an e xistin g firew a ll rule 1 In the G enera l Rules, Troj an Horse Ru les, or Prog ram Rules window, click Add . 2 Sel ect the ru le that you want to change . 3 Click Modify . See “Write a firewall rule” on page 81. 4 Follow the on-screen instructions to change any[...]

  • Page 85

    Guarding against intrusion attempt s Customiz e Intrusion Det ection 85 T o remov e a firewall rule 1 In the G enera l Rules, Troj an Horse Ru les, or Prog ram Rules window, click Add . 2 Select the rule that y ou want to r emove. 3 Click Re move . 4 W hen you are done removing rules, click OK . Reset firewall rules to the default settings Resettin[...]

  • Page 86

    Guarding against in trusion attempts Customiz e Intrusion Det ection 86 safe behavior, you can create an excl usion for the attack signat ure that matches the benign activity. w Each exclusion that you create leaves your co mputer vulnerable to attacks. Be very selective when excluding atta cks. Only exclude behavior that is always benign. T o e x [...]

  • Page 87

    Guarding against intrusion attempt s Customiz e Intrusion Det ection 87 4 In the Exclud ed Signatur es li st, selec t the attack signatur e that yo u want to monitor . 5 Click Include . 6 W hen you are d one including signa tures, click OK . Enable or disabl e AutoBlock When Norton Personal Firewa ll detect s an attack, it automatically blocks the [...]

  • Page 88

    Guarding against in trusion attempts Customiz e Intrusion Det ection 88 Exclude computers from AutoBlock If a computer you need to access is repeatedly placed in the AutoBlock list, you can exclude it fro m be ing blocked by AutoBlock. T o ex clude specific c omputers f rom Aut oBlock 1 Open Norton Personal Firewall. 2 In the Security Center, doubl[...]

  • Page 89

    Protecting your privacy Every time that you browse the Internet, computers and Web sites collect information about you. Some of this information comes fr om forms that you fill out and choices that you make. Other information comes from your browser , which automatically provides information about the Web page you last visited and the type of compu[...]

  • Page 90

    Protectin g your pr ivacy Identify privat e in forma tion to prot ect 90 Privacy Control lets you c reate a list o f information that you wa nt to rema in private. If someone attempts to se nd protected information over the Interne t, Nort on Per sonal Firewall warns them ab out t he sec urity r isk or blocks the co nnecti on . Privacy Control and [...]

  • Page 91

    Protecting your privacy Custo mi ze Privac y Cont rol 91 Modify or remove private information You can modify or remove private information at any time. T o modify or remove pr iv ate inf ormation 1 Start Norton Pe rsonal Firewall. 2 In the Security Center, double-click Pr ivacy Cont rol . 3 In the Pr ivacy Control window, cli ck Pri vate Informatio[...]

  • Page 92

    Protectin g your pr ivacy Customize Pr ivacy Control 92 T o set the Priv acy Leve l 1 Start Norton Pe rsonal Firewall. 2 Double-click Privacy C ontrol . 3 Move the slider to the Privac y L evel t hat you wa nt . Y o ur opti ons are : 4 Click OK . Adjust individual Privacy Control settings You can change the settings for Priv ate Information, Cookie[...]

  • Page 93

    Protecting your privacy Custo mi ze Privac y Cont rol 93 4 Select the Private Informa tion setting that y ou want . Y our options are : 5 Click OK . Chan ge the Cook ie Blocki ng sett in g Many Web sites store in fo rmation they collect in cookies placed on your hard disk. When you re turn to a site that has set a cookie on your computer , the We b[...]

  • Page 94

    Protectin g your pr ivacy Customize Pr ivacy Control 94 Enable or dis able Brows er Pr iv acy Browser Privacy prevents W eb site s from lea rning the type of browser that you are using, the Web site that you last visited, and other information about your browsing habits. Some Web sites that de pend on JavaScript may not work correctly if t hey cann[...]

  • Page 95

    Blocking Internet advertisements Many Web sites are using more aggres si ve techniques to draw attention to the ads on their page s. Some have be gun using larger, more prominent ads, while others rely on ad windows tha t appear wh en you enter or leave the site. Along with in creasing the amount of time that it t akes to display We b pages, some a[...]

  • Page 96

    Blocking Internet a dvertisements Enab le or d isabl e Ad Bloc ki ng 96 Blocking by location Every file on the Internet has a unique address or URL . Whe n you view a Web page, your computer connect s to a URL and displays the file that is stored there. If the page points to grap hics , audi o files, and other multimedia content, your browse r disp[...]

  • Page 97

    Blocking Internet advertisement s Enable or disabl e Popup Window Bl ocking 97 2 Double-click Ad Blocking . 3 Check or unchec k Turn on Ad Blocking . 4 Click OK . Enable or disable Popup Window Blocking Pop-up and pop-under ads are secondary windows that Web sites open when you visit or leave the sites. Pop-ups appear on top of th e current window,[...]

  • Page 98

    Blocking Internet a dvertisements Enab le or di sable F lash blo ck ing 98 Enable or disable Flash blocking When Ad Blocking is active , Norton Pe rsonal Firewall automatically blo cks all Flash animations that have the sam e dimens ions as co mmon ads. Norton Personal Firewall can also block all Flash content. This is useful if you have a slow con[...]

  • Page 99

    Blocking Internet advertisement s Use te xt strings t o identify ads to block or pe rmit 99 3 In the Security Center, double-click Ad Blockin g . 4 In the Ad Blo cking window, ensure that En able Ad Blo cking is che cke d . 5 Click Open the Ad Trashcan . T he Ad Trashcan window appears . 6 W ith the windows arranged so that you can see both the adv[...]

  • Page 100

    Blocking Internet a dvertisements Use te xt strings to iden tify ads to block or permit 100 Make sure that wha t you place in the (D efaults) block list isn't too general. For example, www by itself is not a go od string to block because almost every URL incl udes www. A strin g like www.slowads is more effective because it only blocks graphic[...]

  • Page 101

    Blocking Internet advertisement s Use te xt strings t o identify ads to block or pe rmit 101 4 On the Ad Blocking tab, clic k Add . 5 In the Ad d New HT ML String di alog b ox, selec t the act ion that you want to take. Y o ur options are: 6 Type an HTM L string to bl ock or p ermit . 7 Click OK . Modify or remove an Ad Blocking string If you later[...]

  • Page 102

    Blocking Internet a dvertisements Use te xt strings to iden tify ads to block or permit 102[...]

  • Page 103

    Monitoring Norton Personal Firewall Norton Personal Firewall maintain s re cords of every ingoing and outgoing Interne t conn ection and any actions that the pr ogram takes to protect your computer. You sh ould periodically review this information to spot potential problems. There are four sources of Norton P ersonal Firewall in formation: When rev[...]

  • Page 104

    Monitoring Nor ton Personal Firewall View the Status & Settings window 104 It is normal to see some denied acc ess attempts on a random basis (not all from the same IP addr ess, and not to a sequenc e of port numbers) . You may also see logged access attempts made du e to activity on your own computer such as connecting to an FTP server and sen[...]

  • Page 105

    Monitoring Nort on Personal Firewall Revie w detailed stat istics 105 Reset information in the Statistics window Norton Personal Firewall au tomatically c lears all of the statis tics in the Statistics window when you rest art Windows. You can also clear the statistics manually. Thi s helps you see if a configuration change affects the statistics. [...]

  • Page 106

    Monitoring Nor ton Personal Firewall Revie w detailed st atistics 106 T o re view de tailed st atistics 1 Open Norton Personal Firewall. 2 In the Security Center main window, click St atistics . 3 In the Sta tistics window, clic k Detailed Statist ics . Reset detailed statistics counters Reset the counters to clear all of the statistics and begin a[...]

  • Page 107

    Monitoring Nort on Personal Firewall View Norton Personal F ir ewall Logs 10 7 T o set the stat istics displa yed in the Det ailed S tat istics window 1 Open Norton Personal Firewall. 2 In the Security Center main window, click St atistics . 3 In the Sta tistics window, clic k Detailed Statistics . 4 In the Detailed Statistics window, on th e View [...]

  • Page 108

    Monitoring Nor ton Personal Firewall Vie w Norton P erson al Fi re wall L ogs 108 View the logs View the Norton Personal Firewall logs from the Statistics window. T o view the logs 1 Open Norton Personal Firewall. 2 Do one of the following: 2 In the Security Center, click Stati stics > View Log s . 2 In the Security Mon itor, on the Sel ect a Ta[...]

  • Page 109

    Monitoring Nort on Personal Firewall View Norton Personal F ir ewall Logs 109 Refresh the logs The logs automatically refresh when yo u move from log to log. To view network events occurring since you began v iewing the Log Viewer, you can manually refresh all the logs or an individu al log. T o ref re sh all lo gs at once 4 In the Log V iewer, rig[...]

  • Page 110

    Monitoring Nor ton Personal Firewall Vie w Norton P erson al Fi re wall L ogs 110 Change the size of the logs Norton Personal Firewall stores the infor mation for each lo g in a separate file. You can change the s ize of log file s to m anage the amoun t of hard dis k space that they occupy. When the files reach their maximum sizes, new events over[...]

  • Page 111

    Troubleshooting Norton Personal Firewall The information in this ch apter will help you so lve the most frequently encountered problems. If you can’t fin d the solution to your problem here, there is a wea lth of info rmation on the Symant ec Web site. You can find updates, patches, online tutorials, Knowledge Base article s, and virus removal t [...]

  • Page 112

    Troubleshooting Norton Personal Firewall T rouble shoo t Nort on P erson al F ir ewa ll pr oblems 112 T o se arch the S ymant ec service and support Web site 1 On the left side of any W eb page in t he Syma ntec W e b site, c lick search . 2 Type a wor d or ph rase tha t best r epresent s the in forma tion for w hich you are looking . Use the follo[...]

  • Page 113

    Troubleshooting Nort on Personal Firewall T roubleshoot Nort on Personal F ire wall problems 113 See “Temporaril y disable N orton Personal Firewall” on page 47. If you need t o view the site, disable Norton Personal Fir ewall and try the Web site again. Keep in mind that when you disable Norton Personal Firewall, your computer may be vulnerabl[...]

  • Page 114

    Troubleshooting Norton Personal Firewall T rouble shoo t Nort on P erson al F ir ewa ll pr oblems 114 If your email program mainta ins copies of sent messages in its Sent or Out folder, you can reopen th e email messag e, remove the private information, and send the message again. Why doesn’t Norton Pers onal Firewall notify me before letting pro[...]

  • Page 115

    Troubleshooting Nort on Personal Firewall T roubleshoot Nort on Personal F ire wall problems 115 Some Internet service providers scan th e ports on users’ computers to ensure that they are keeping to thei r service agreements. Norton Personal Firewall might interpret this as a malicious port scan and stop communications with your cable system. If[...]

  • Page 116

    Troubleshooting Norton Personal Firewall T rouble shoo t Nort on P erson al F ir ewa ll pr oblems 116[...]

  • Page 117

    About the Internet The Internet is the interconnect ion of millions of computers throughout the world. It is comprised of the computer s and the connections that make it possible for any computer on the Internet to communicate with any other computer on the Internet. The Internet is analogous to a system of roads and highways. Th e superhighways of[...]

  • Page 118

    About t he Inte rnet How inf orma tion is tr ansmitte d over the Int ernet 118 exchanges (MAEs). There ar e regional highways pr ov ided by large ISPs and local streets provided by local ISPs. Like a system of roads and highways, th e Inter net provides multiple rou tes from one point to another. If one part of the I nternet has too much traffic, o[...]

  • Page 119

    About the Internet How inf orma tion is tr ansmitted ov er the Int ernet 119 The Internet is a packet switching network . Every communication is broken into packets by TCP (Transmission Control Protocol). Each packet contains the addresses of the sending and re ce iving computers a long with the information to be communicated. IP (Internet Protoco [...]

  • Page 120

    About t he Inte rnet How Web i nf orma tion is locat ed on the In ter net 120 About UDP UDP (User Datagram Pro tocol) is used for funct ions in which the reliability of TCP is not necessar y, such as broadcasting video to multiple computers at once. UDP doesn’t provide error correct ion or retransmission of lost packets. UDP is secondar y in impo[...]

  • Page 121

    About the Internet How We b in form ation is loc at ed on the Int ernet 121 Each URL maps to the IP address of the computer that stores the Web page. URLs are used beca use they are easie r to remember and type than IP addresses. Before your browser r equests a page, it asks a DNS (Dom ain Name System) server for the IP address of the Web site. IP [...]

  • Page 122

    About t he Inte rnet How ports identify progr a ms on servers 122 There is one particular URL th at identifi es your computer to itself, and that is localhost. If your computer has We b server software installed, you can type http://localhost and see your Web page. The IP address that corresponds to localhost is 127.0.0.1. How ports identify progra[...]

  • Page 123

    About the Internet How computers are iden tified on the Inte rnet 123 Well-known p ort s Following are some of the mo st common well-known ports . How computers are identified on the Internet Millions of computers are connected to the I nternet. When you are trying to identify co mputers, it is easier t o work with grou ps of com puters ra ther tha[...]

  • Page 124

    About t he Inte rnet How computers are iden tified on the Int ernet 124 A typical subnet mask looks like this: 255.255.255.0. The 255s indicate parts of the IP address that are the same for all computer s within the subnet, while the 0 indicates a part of the IP address that is different. Subnet masks are always used in conj unction with base IP ad[...]

  • Page 125

    Understanding Internet risks Norton Personal Firewall protects you fro m major risks that a re associated with the Internet. These risks incl ude the threat of network attack, malicious code in active content , exposure to inappropriate cont ent, exposure o f private information, and getting viruses from infected files. Risks from hackers Originall[...]

  • Page 126

    Understanding In ternet risks Risks from hack ers 126 1 Initial access T he hacker exploits a v ulnerability found during informa tion gathering and establishes an en try point into your computer . 1 Privilege escalation T he hack er gains access t o more pr ograms and serv ices on your computer . 1 Covering tracks T he hac ker hides or removes ev [...]

  • Page 127

    Understandi ng Internet risks Risks f rom h ack ers 127 Ini tial acces s The easiest way for a hacker to access a Windows computer is to use Microsoft networking. On many comp uters, Microsoft networking is enabled so that anyone on th e network can co nnect to it. Microsoft NetBIOS networ king uses th re e of the well-known ports. These ports are [...]

  • Page 128

    Understanding In ternet risks Risks from active cont ent 128 Other Trojan horse programs might reco rd all your keystr okes to capture passwords and other sensitive data. No rton Personal Fire wa ll blocks the ports t hat Remo te Acc ess Tr ojan ho rse pr ograms use t o commu nicate over the Internet . Covering tr acks When a hacker has gained as m[...]

  • Page 129

    Understandi ng Internet risks Risks from inappropriate cont ent and ac tivities 129 Risks from inappropriate content and activities There is a wealth of information on th e Internet th at is easily accessible to everyone. However, some topics are not suitable for all people. For example, most people consider pornographic and violent sites to be ina[...]

  • Page 130

    Understanding In ternet risks Risks to your privacy 130 You may want to prevent some users from sending private information over the Internet. No rton Personal Fi rewall can block users from accessing secure sites where they might be asked for personal information. Understanding cookies Cookies are messages sent to your browser by Web sites th at a[...]

  • Page 131

    Understandi ng Internet risks Risks f rom T rojan horses and viruses 131 Tracking Internet use Most browsers pass on informatio n that you might want to keep confidential. One item that your browse r normally passes to Web sites is the URL of the page from which you came . This informatio n is used by some Web sites to help you navigate throug h th[...]

  • Page 132

    Understanding In ternet risks The lik elihood of being attack ed 132 A zombie program is a dormant program secre tly installed on a computer. It can later be run remotely to aid in a collective attack on another computer. Zombie prog rams don ’t norm ally damage the computer on which they reside, but are used to attack other computers. A zombie p[...]

  • Page 133

    Gloss ary This glossary provides definitions of some common In ternet terms. active content Material on a Web page that changes wit h time or in response to user ac tion. Active content is implemented through ActiveX controls, Visual Basic Scripts, Java scripts, and Java applets in the HTML code that defines the page. ActiveX control A program that[...]

  • Page 134

    Glossary 134 connection A method of d ata ex change that allows a rel iable transfer of dat a between two comput ers. connection attempt The data transfe r that requests the opening of a connection. cookie A small data file that some Web sites place on yo ur hard disk while you’re viewing a Web page. Web servers can use cookies to store your per [...]

  • Page 135

    Glossary 135 email (electronic mail) A method of exchang ing messag es and file s with other people via computer networks. A popular protocol for sending emai l is SMTP (Simple Mail Transfer Protocol). Popular protocols for r eceiving email are POP3 (Post Office Protocol 3) and IMAP4 (Internet Message Access Proto col 4). Web-based email services u[...]

  • Page 136

    Glossary 136 IP address (Internet Protocol address) A 32-bit numeric identifier that uniquely identifies a computer on the Interne t. IP addresses are usually expressed as four groups of numbers, each ranging from 0 to 255, separated by periods. For example, 206.204.52.71. ISP (Internet service provider) A company that supplies I nternet access to [...]

  • Page 137

    Glossary 137 network address The portion of an IP address that is common to all computers on a par ticular network or subnet. operating system A program that ties the capabilities of computer hardware and software to input/output devices such as disks, keyboards , and mouse devices. outbound communication An attempt by your comput er to open a conn[...]

  • Page 138

    Glossary 138 port number A logical communications channel to be used by a particular TCP/IP applic ation. Each application has unique port numbers associated with it. By convention, some protocols use a well-known port number (for example, HTTP uses port 80), although this is configurable. port scan An attempt to gain access to a comput er by searc[...]

  • Page 139

    Glossary 139 TCP/IP (Transmission Control Protocol/ Internet Protocol) The standard family of pro tocols for communicatin g with Internet devices. threat A circumstance, event, or person with the potential to cau se harm to a system in the fo rm of destruction, disclosure, modifica tion of data, and/ or denial of serv ice. timeout A predetermined p[...]

  • Page 140

    Glossary 140[...]

  • Page 141

    Service and support solutions The Service & Support Web site at h ttp://service.symantec .com supports Symantec products. Customer Service he lps with nontechnical issues such as orders, upgrades, replacements, an d rebate s. Technic al Suppor t helps with technical issues such as instal ling, configuring, or troubleshooting Symantec products. [...]

  • Page 142

    Service and support solutions 142 For upgrade orders, visit the Symantec St ore at: http://www.symantecstore.com Technical support Symantec offers two technical suppor t options for help with installing, configuring, or troubl eshoo ting Syma ntec produ cts: 1 Online Service and Support Connect to the Symantec Se rvice & Support Web site at htt[...]

  • Page 143

    Service and support solutions 14 3 Worldwide service and support Technical support an d customer servic e solutions vary by country. For Symantec and Interna tional Partner locations out side of the United States, contact one o f the service and support offic es listed below, or connect to http://service.syman tec.com and select your re gion under [...]

  • Page 144

    Service and support solutions 144[...]

  • Page 145

    Inde x A access Alert Tracker 36 Block Traffic 36, 44 Help 36 LiveUpdate 36, 39 logs 39 Norton Personal Firewall 37 options 45 Program Scan 39 Security Check 42 Visual Tracking 43-44 active content 128 protection from 70 troubleshooting 113 See also ActiveX controls; Java applets ActiveX controls 113, 128 Ad Blocking 95-101 enabling and disabling 9[...]

  • Page 146

    Index 146 browser information 115 privacy 94 C CompuServe 56 computer blocking 87 emergency procedu res 11 requirements 19 computers names 65 specifying 64-66 connecting to the In ternet automat ically 58 context-se nsitive Help 49 Cookie Blocking 130 options 93 troubleshooting 113 cookies 93, 113, 130 credit card numbers 91 D definitions of techni[...]

  • Page 147

    Index 14 7 Internet Access Statistics contents 105-106 resetting 105 Internet Control Me ssage Protocol (ICMP) 119 Internet Group Membership Protocol (IGMP) 119 Internet -enabled applicati ons 78 Intrusion Detection 69-87 about 18, 70-71 configuring 85 Intrusion Detection service 54 IP addresses 65, 121 and subnet mask pair 123 finding 65 J Java ap[...]

  • Page 148

    Index 148 options ( continued ) protecting with password 32, 46 resetting pa ssword 47 P passwords options 32 ping scans 126 Popup Window Blocki ng, enabling and disabling 97 pop-up windows, blocking 95-101, 113 pornography 129 ports 122-123 scans 70, 126 well-known 123 printers, sharing 62 Privacy Control 89-94 and SSL 90 configuration 31 in insta[...]

  • Page 149

    Index 14 9 settings Norton Personal Firewall 72-85 Program Control 79 sockets 122 SSL (Secure Sockets Layer) and Privacy Control 90 statistics 105-107 detailed 105 Norton Personal Firewall 103-110 resetting 105 resetting detailed st atistics counters 106 viewing 104 statistics window 104 Status & Settings, checking 104 stealth po rts 126 subnet[...]

  • Page 150

    Index 150 Z zombie programs 71, 132 zones 62-64 adding computers to 63 Restricted 88 Trusted 71[...]

  • Page 151

    Norton™ Person al Fir ewall CD Rep la cement Fo rm FOR CD REPLACEMENT Please send me : ___ CD Replacement Name _________________ ____________ _________________ ____________ _________________ _____________ ________ Company Name _____________ _________________ ____________ _________________ ____________ _________________ Street Address ( No P .O. B[...]