Symantec NORTON SYSTEMWORKS 2004 RETAIL (10109303) for PC

Add to My manuals
363 Pages

advertisement

Symantec NORTON SYSTEMWORKS 2004 RETAIL (10109303) for PC | Manualzz

322 Disk Editor

Lift data from a damaged hard disk

6 On the View menu, click As Text to switch to Text

View.

7 Do one of the following:

2

2

2

If the cluster that contains the string appears to be the first cluster in the file, record the starting cluster’s number and a name for the file on a piece of paper that is labeled Files To Recover. Mark the number and name as the starting cluster.

If the cluster that contains the string belongs to the file but does not appear to be the first cluster, record the cluster number on the same piece of paper next to the file name. Do not mark the number as the starting cluster.

If the cluster with the search string does not belong to the file that you are looking for, on the

Tools menu, click Find Again to continue the search. If you have not found any clusters from your file, try searching for a different text string.

Find the rest of the clusters

Now that you have found the starting cluster, you need to find the rest of the clusters in the file. Your options are:

If you found the starting cluster, file name, and file size using method one or method two in

“Extract clusters from a physical disk” on page 318

See “Method 1: Find the rest of the clusters with the file size”

on page 322.

.

If you used any other method

See “Method 2: Find the rest of the clusters without the file size”

on page 324.

.

Method 1: Find the rest of the clusters with the file size

With the file size, you can calculate the number of clusters that the file contains. Then you can locate and record the individual clusters that you later write out to a file.

See “Start Disk

Editor” on page 303.

Disk Editor

Lift data from a damaged hard disk

323

To find the rest of the clusters with the file size

1 Start Disk Editor.

2 On the Info menu, click Drive Info.

3 In the Drive Info dialog box, multiply the values for

Bytes Per Sector and Sectors Per Cluster.

The result is the size of each cluster in bytes.

4 Divide the file size by the cluster size.

5 Round off the value to the next integer value.

For example, if the file size is 100,000 bytes and your disk’s cluster size is 8,196 bytes, the file has 13 clusters (12.2 rounded up to 13).

6 On the Object menu, click 1st FAT.

If you cannot find the FAT or if it is very corrupt, continue to step 7.

EOF markers

7 Use the PageDown and Tab keys until the Cluster label on the status line matches the starting cluster number of the file that you want to recover.

When you find the starting cluster, its position on the screen (not Disk Editor’s status line) should display

<EOF>, which marks the ast cluster in the file or the number for the next cluster. If it is marked <EOF>, you have found the first and last cluster of the file.

You can write the cluster to disk. See “To write the clusters to disk” on page 326.

8 If the cluster label has the cluster number of the next cluster in the file, use the PageDown and Tab keys to move to that cluster and select it.

324 Disk Editor

Lift data from a damaged hard disk

Remember to use the Cluster label on the status line as the cluster number reference.

9 Record the number that is indicated by the Cluster label on the status line next to the file name on your

Files To Recover list.

Unless the file is composed of multiple cluster chains, the next cluster is usually immediately to the right of the current cluster. If this cluster position is marked with <EOF>, it is the last cluster of the file. You can

write the cluster to disk. See “To write the clusters to disk” on page 326.

10 Continue finding and recording clusters for the file until you find the <EOF> marker.

11 Compare the number of clusters that you recorded from the FAT with the number that you calculated earlier (by dividing the file size by the cluster size), then do one of the following:

2

2

If they are not the same, double-check your calculations or try this procedure again.

If they are the same, you can write the clusters to

disk. See “To write the clusters to disk” on page 326.

Method 2: Find the rest of the clusters without the file size

See “Start Disk

Editor” on page 303.

Unless the disk is very

fragmented

, the rest of the clusters of the file should be near and after the starting cluster. Locate the rest of the file by browsing near the starting cluster or search for text that appeared somewhere after the starting cluster. This procedure works best for text files.

To find the rest of the clusters without the file size

1 Start Disk Editor.

2 On the Object menu, click Cluster.

3 In the Select Cluster Range dialog box, in the Starting

Cluster text box, type the starting cluster number from your Files To Recover list, then press Enter.

Disk Editor displays the contents of the starting cluster in Hex View.

4 On the View menu, click As Text.

See “Start Disk

Editor” on page 303.

Disk Editor

Lift data from a damaged hard disk

325

5 Scroll to the next cluster using the PageDown and

DownArrow keys.

The cluster markers on the screen (not on the status line) differentiate cluster numbers.

6 When you find a cluster that belongs to the file, record the cluster number that is displayed next to the

Cluster label on the status line on your Files To

Recover list.

Record the number next to the name of the file to which the cluster belongs.

7 Using the data in the newest cluster to figure out what should be in the next cluster, continue browsing for clusters until you have found the expected number of clusters for the original file.

8 Do one of the following:

2

2

If you have found all of the clusters from the original file, write the clusters to a new location.

See “To write the clusters to disk” on page 326.

If you could not locate additional clusters near the starting cluster, continue the search by searching for text. See “To search for text on the disk” on page 325.

9 Press Home once.

Disk Editor returns to the starting cluster.

To search for text on the disk

1 Start Disk Editor.

2 On the Tools menu, click Find.

3 In the Enter Search Text dialog box, in the ASCII text box, type the text to search for, then select Find to begin the search.

4 When the search string is found, record the cluster number that contains the search string if the number belongs to the file on your Files To Recover list.

5 Record the number next to the name of the file to which the cluster belongs.

6 Start a new search for text that you expect to be in the next cluster or manually browse the next several clusters for the next cluster using the PageDown and

DownArrow keys.

326 Disk Editor

Repair cross-linked files

See “Start Disk

Editor” on page 303.

7 If no clusters are found, on the Tools menu, click

Find, then type a new search string.

8 Continue searching until you have reached the expected end of the file.

To write the clusters to disk

1 Start Disk Editor.

2 On the Object menu, click Cluster.

3 In the Select Cluster Range dialog box, in the Starting

Cluster and Ending Cluster text boxes, type the starting cluster number of the first file name from your Files To Recover list, then press Enter.

4 On the Tools menu, click Write Object To.

5 In the Write dialog box, select To A File, then press

Enter.

The Write Object To File dialog box appears.

6 Insert a blank floppy disk into drive A or drive B.

7 Type the drive letter of the drive that contains the blank floppy disk, followed by a file name for the file that was created with the clusters that you have found, then press Enter.

For example, A:MYFILE.DOC.

A confirmation dialog box appears that asks if you want to write the file out.

8 Click Yes.

The write progress screen appears for the duration of the write operation.

9 Repeat steps 2 through 7 for each cluster in your Files

To Recover list and when you get to step 7, use the same file name.

This causes a message box to appear, which tells you that the file already exists.

10 Press Enter to append the file.

Repair cross-linked files

When Norton Disk Doctor or ScanDisk examines a disk, it might report that two or more files are cross-linked.

When two or more (usually only two) files are cross-

Disk Editor

Repair cross-linked files

327

See “Check your disk with Norton

Disk Doctor” on page 202.

w

linked, they are sharing the same cluster or chain of clusters. The cross-linkage can take place anywhere along the cluster chain, not just on the first or last cluster.

Since each cluster can only belong to one file at a time, one of the cross-linked files is unusable until you eliminate the cross-linkage. Furthermore, one of the cross-linked files is almost always the real owner of the cross-linked clusters. Usually, you can recover the missing clusters for the other file as lost clusters and link them into the correct file.

First, you need to identify the files that are cross-linked and the clusters on which they are cross-linked.

To repair cross-linked files

4

Do one of the following:

2

See “To identify and recover cross-linked files with

Norton Disk Doctor” on page 327.

2

2

See “To examine the clusters to see where they belong” on page 330.

See “To link a _DD or CHK file back to the corrupt file to which it belonged” on page 330.

w

If you cannot access Windows or your computer will not

start, you can try using Emergency Disks. See “To identify cross-linked files with Norton Disk Doctor and

Emergency Disks” on page 328.

This procedure helps you identify matching parts of cross-linked files.

To identify and recover cross-linked files with Norton

Disk Doctor

1 In the Norton Disk Doctor main window, check the disk to diagnose, then click Diagnose.

2 Follow the on-screen instructions to continue.

Do not make any corrections to the disk yet.

3 When Norton Disk Doctor locates the cross-linked files, record their names.

328 Disk Editor

Repair cross-linked files

4 Copy the cross-linked files to another disk.

If a file is too big, you can copy it to another directory, though this is not recommended.

5 Verify whether the files that you copied (not the original file) are corrupt, then do one of the following:

2

For a data file, open it with the application that created it (or one that recognizes the type of data in the file).

For a program file, try running it.

2

6 Delete the cross-linked files from the original disk.

7 Copy the good files back to the same directory of the original disk.

8 Copy the corrupt files back to the same directory of the original disk.

9 In Norton Disk Doctor, check the drive to diagnose, then click Diagnose.

10 Follow the directions to continue and let Norton Disk

Doctor make any necessary corrections to the disk.

Norton Disk Doctor saves chains of lost clusters to the root directory as files with _DD extensions. For example, five lost cluster chains would be saved as

FILE0000._DD, FILE0001._DD, and so on to

FILE0004._DD. ScanDisk uses the same naming convention as Norton Disk Doctor, except the extension CHK is used instead of _DD.

11 Examine the clusters.

See “To examine the clusters to see where they belong” on page 330.

To identify cross-linked files with Norton Disk Doctor and Emergency Disks

1 Insert Emergency Disk 1 into drive A.

2 Turn on your computer and wait for the Norton

Utilities screen to appear.

3 Use the UpArrow and DownArrow keys to select

Norton Disk Doctor, then press Enter.

4 In the Norton Disk Doctor main window, press Enter to diagnose the disk.

5 In the Select Drives To Diagnose dialog box, select the drive to diagnose, then press Enter.

Disk Editor

Repair cross-linked files

329

w

6 Follow the on-screen instructions to continue.

Do not make any corrections to the disk yet.

7 When the cross-linked files are located, record their names.

8 Copy the cross-linked files to another disk.

If a file is too big, you can copy it to another directory, though this is not recommended.

9 Verify whether the files that you copied (not the originals) are corrupt, then do one of the following:

2

For a data file, open it with the application that created it (or one that recognizes the type of data in the file).

For a program file, try running it.

2

10 Delete the cross-linked files from the original disk.

11 Copy the good files back to the same directory of the original disk.

12 Copy the corrupt files back to the same directory of the original disk.

13 Turn off your computer.

14 Insert Emergency Disk 1 into drive A.

15 Turn on your computer and wait for the Norton

Utilities screen to appear.

16 Use the UpArrow and DownArrow keys to select

Norton Disk Doctor, then press Enter.

17 In the Norton Disk Doctor main window, click

Diagnose Disk, then press Enter.

18 In the Select Drives To Diagnose dialog box, select the drive to diagnose, then press Enter.

19 Follow the on-screen instructions to let Norton Disk

Doctor make any necessary corrections to the disk.

Norton Disk Doctor saves chains of lost clusters to the root directory as files with _DD extensions. For example, five lost cluster chains would be saved as

FILE0000._DD, FILE0001._DD, and so on to

FILE0004._DD. ScanDisk uses the same naming convention as Norton Disk Doctor, except the extension CHK is used instead of _DD.

330 Disk Editor

Repair cross-linked files

See “Start Disk

Editor” on page 303.

See “Start Disk

Editor” on page 303.

To examine the clusters to see where they belong

1 Start Disk Editor with the /W command-line option.

2 On the Object menu, click Drive.

3 In the Select The Disk You Wish To Edit dialog box, select the disk that contains the _DD or CHK files using the UpArrow and DownArrow keys, then press

Enter.

The root directory of the disk displays in Directory

View. You may not see the _DD or CHK file in the directory listing immediately.

4 Use the UpArrow and DownArrow keys to locate the files.

Use the PageUp and PageDown keys to scroll a screen at a time.

5 Select a _DD or CHK file, then press Enter.

The contents of the file appear in Hex View.

6 If the file is a text file, on the View menu, click

As

Text.

7 If you know which corrupt file the data belongs to, do one of the following:

2

On the Link menu, click Directory to return to the root directory.

Select another _DD or CHK file.

2

8 Record the file name, file size, and starting cluster number of the _DD or CHK file on a piece of paper.

The starting cluster number for each _DD or CHK file is in the Cluster field on the same line as the _DD or

CHK file name.

9 Repeat steps 5 through 8 for each of the _DD or CHK files in your root directory.

To link a _DD or CHK file back to the corrupt file to which it belonged

1 Start Disk Editor with the /W command-line option.

2 On the Object menu, click Directory.

3 In the Change Directory dialog box, select the directory that contains the corrupt file, then press

Enter.

The directory appears.

Disk Editor

Repair cross-linked files

331

See “Check your disk with Norton

Disk Doctor” on page 202.

4 Select the corrupt file, then press Enter.

The file is displayed in Hex View.

5 Scroll through the file until you notice a discontinuity.

6 Note the cluster that the cursor is in by using the value in the status bar, then press Enter to return to the directory.

7 Add the size of the _DD or CHK file to the size of the corrupt file and, in the Size text box, type the total for the corrupt file.

8 Press Ctrl+W to write the changes, then click Write.

9 Press Ctrl+T to view the cluster chain for the file.

10 Select the cluster that is noted on the status line in step 6 and note its value.

11 Type the cluster number that you recorded on paper for the _DD or CHK file here, then press Ctrl+W.

12 Make sure that Synchronize FATs is checked in the dialog box, then click Write.

13 In the Rescan dialog box, click Cancel.

14 Move the cursor to the cluster for the _DD or CHK file in the current view.

15 Use the Tab and DownArrow keys to scroll through the cluster chain for this file until you reach <EOF>.

16 Change <EOF> to the value that was noted in step 10.

17 Press Ctrl+W, then press Enter.

18 In the Rescan dialog box, on the Object menu, click

Directory.

19 In the Change Directory dialog box, select the root directory, then press Enter.

20 Move to the Name field of the _DD or CHK file, then press F2 to display the Hexadecimal view.

21 Without moving the cursor, type

E5

22 Press Ctrl+W to write the change, then click Write.

The files should now be fully recovered.

23 Open Norton Disk Doctor and diagnose the affected drive to validate the corrections that you made.

332 Disk Editor

Repair cross-linked files

Service and support solutions

The Service & Support Web site at http://service.symantec.com supports Symantec products. Customer Service helps with nontechnical issues such as orders, upgrades, replacements, and rebates. Technical Support helps with technical issues such as installing, configuring, or troubleshooting

Symantec products.

Methods of technical support and customer service can vary by region. For information on support offerings in your region, check the appropriate Web site listed in the sections that follow.

If you received this product when you purchased your computer, your computer manufacturer may be responsible for providing your support.

Customer service

The Service & Support Web site at http://service.symantec.com tells you how to:

1

1

1

1

1

1

1

1

Subscribe to Symantec newsletters.

Locate resellers and consultants in your area.

Replace defective CD-ROMs and manuals.

Update your product registration.

Find out about orders, returns, or a rebate status.

Access Customer Service FAQs.

Post a question to a Customer Service representative.

Obtain product information, literature, or trialware.

334 Service and support solutions

Technical support

For upgrade orders, visit the Symantec Store at: http://www.symantecstore.com

Technical support

Symantec offers two technical support options for help with installing, configuring, or troubleshooting Symantec products:

1

1

Online Service and Support

Connect to the Symantec Service & Support Web site at http://service.symantec.com, select your user type, and then select your product and version. You can access hot topics, Knowledge Base articles, tutorials, contact options, and more. You can also post a question to an online Technical Support representative.

PriorityCare telephone support

This fee-based (in most areas) telephone support is available to all registered customers. Find the phone number for your product at the Service & Support

Web site. You’ll be led through the online options first, and then to the telephone contact options.

Support for old and discontinued versions

When Symantec announces that a product will no longer be marketed or sold, telephone support is discontinued

60 days later. Technical information may still be available through the Service & Support Web site at: http://service.symantec.com

Subscription policy

If your Symantec product includes virus, firewall, or Web content protection, you may be entitled to receive updates via LiveUpdate. Subscription length varies by

Symantec product.

After your initial subscription ends, you must renew it before you can update your virus, firewall, or Web

Service and support solutions

Worldwide service and support

335 content protection. Without these updates, you will be vulnerable to attacks.

When you run LiveUpdate near the end of your subscription period, you are prompted to subscribe for a nominal charge. Simply follow the instructions on the screen.

Worldwide service and support

Technical support and customer service solutions vary by country. For Symantec and International Partner locations outside of the United States, contact one of the service and support offices listed below, or connect to http://service.symantec.com and select your region under Global Service and Support.

336 Service and support solutions

Worldwide service and support

Service and support offices

North America

Symantec Corporation

555 International Way

Springfield, OR 97477

U.S.A.

Australia and New Zealand

Symantec Australia

Level 2, 1 Julius Avenue

North Ryde, NSW 2113

Sydney

Australia http://www.symantec.com/ http://www.symantec.com/region/reg_ap/

+61 (2) 8879-1000

Fax: +61 (2) 8879-1001

Europe, Middle East, and Africa

Symantec Authorized Service Center

Postbus 1029

3600 BA Maarssen

The Netherlands http://www.symantec.com/region/reg_eu/

+353 (1) 811 8032

Latin America

Symantec Brasil

Market Place Tower

Av. Dr. Chucri Zaidan, 920

12° andar

São Paulo - SP

CEP: 04583-904

Brasil, SA

Portuguese: http://www.service.symantec.com/br

Spanish: http://www.service.symantec.com/mx

Brazil: +55 (11) 5189-6300

Mexico: +52 55 5322 3681 (Mexico DF)

01 800 711 8443 (Interior)

Argentina: +54 (11) 5382-3802

June 3, 2003

Glossary

access privileges

ActiveSync

ActiveX alert alias

AppleTalk attack signature beam

The types of operations that a user can perform on a system resource. For example, a user can have the ability to access a certain directory and open, modify, or delete its contents.

The synchronization software for Microsoft Windowsbased Pocket PCs.

A method of embedding interactive programs into

Web pages. The programs, which are called controls, run when you view the page.

A message that appears to signal that an error has occurred or that there is a task that requires immediate attention, such as a system crash or a

Virus Alert.

A shortcut icon that points to an original object such as a file, folder, or disk.

A protocol that is used by some network devices such as printers and servers to communicate.

A data pattern that is characteristic of an Internet attack. Intrusion Detection uses attack signatures to distinguish attacks from legitimate traffic.

To transfer certain programs and data between two handheld devices using built-in infrared technology.

338 Glossary

boot record bootable disk cache cache file compressed file connection-based protocol connectionless protocol cookie

A sector at the start of a disk that describes the disk

(sector size, cluster size, and so on). On startup disks, the boot record also has a program that loads the operating system.

A disk that can be used to start a computer.

A location on your disk in which data is stored for reuse. A Web browser cache stores Web pages and files (such as graphics) as you view them.

A file that is used to improve the performance of

Windows.

A file whose content has been made smaller so that the resulting data occupies less physical space on the disk.

A protocol that requires a connection before information packets are transmitted.

A protocol that sends a transmission to a destination address on a network without establishing a connection.

A file that some Web servers put on your disk when you view pages from those servers. Cookies store preferences, create online shopping carts, and identify repeat visitors.

denial-of-service attack

A user or program that takes up all of the system resources by launching a multitude of requests, leaving no resources, and thereby denying service to other users.

DHCP (Dynamic Host

Configuration

Protocol)

A TCP/IP protocol that assigns a temporary IP address to each device on a network. DSL and cable routers use DHCP to allow multiple computers to share a single Internet connection.

dial-up

A connection in which a computer calls a server and operates as a local workstation on the network.

Glossary 339

DNS (Domain Name

System)

The naming system used on the Internet. DNS translates domain names (such as www.symantec.com) into IP addresses that computers understand (such as 206.204.212.71).

DNS server (Domain

Name System server)

A computer that maps domain names to IP addresses.

When you visit www.symantec.com, your computer contacts a DNS server that translates the domain name into an IP address (206.204.212.71).

domain

DOS window

The common Internet address for a single company or organization (such as symantec.com). See also host name.

A method of accessing the MS-DOS operating system to execute DOS programs through the Windows graphical environment.

download driver encryption

Ethernet executable file

To transfer a copy of a file or program from the

Internet, a server, or computer system to another server or computer.

Software instructions for interpreting commands for transfer to and from peripheral devices and a computer.

Encoding data in such a way that only a person with the correct password or cryptographic key can read it.

This prevents unauthorized users from viewing or tampering with the data.

A common method of networking computers in a LAN

(local area network). Ethernet cables, which look like oversized phone cables, carry data at 10M/100M/1G bps.

A file containing program code that can be run.

Generally includes any file that is a program, extension, or system files whose names end with .bat,

.exe, or .com.

340 Glossary

extension

FAT (file allocation table) file type

Finder firewall rule fragmented fragmented IP packet

FTP (File Transfer

Protocol) hidden attribute host name

The three-letter ending on a file name that associates the file with an activity or program. Examples include

.txt (text) and .exe (executable program).

A system table (used primarily by DOS and Windows

9x/Me) that organizes the exact location of the files on the hard drive.

A code that associates the file with a program or activity, often appearing as the file name extension, such as .txt or .jpeg.

The program that manages your Macintosh disk and file activity and display.

Parameters that define how a firewall reacts to specific data or network communications. A firewall rule usually contains a data pattern and an action to take if the pattern is found.

When the data that makes up a file is stored in noncontiguous clusters across a disk. A fragmented file takes longer to read from the disk than an unfragmented file.

An IP packet that has been split into parts. Packets are fragmented if they exceed a network's maximum packet size, but malicious users also fragment them to hide Internet attacks.

An application protocol used for transferring files between computers over TCP/IP networks such as the Internet.

A file attribute that makes files harder to access and more difficult to delete than other files. It also prevents them from appearing in a DOS or Windows directory list.

The name by which most users refer to a Web site. For example, www.symantec.com is the host name for the

Symantec Web site. Host names are translated to IP addresses by the DNS.

Glossary 341

HotSync

The synchronization software for Palm OS handheld devices.

The language used to create Web pages.

HTML (Hypertext

Markup Language)

ICMP (Internet

Control Message

Protocol)

An extension to the basic Internet Protocol (IP) that provides feedback about network problems.

IGMP (Internet

Group Management

Protocol)

An extension to the basic Internet Protocol (IP) that is used to broadcast multimedia over the Internet.

IMAP4 (Internet

Message Access

Protocol version 4) infrared (IR) port

One of the two most popular protocols for receiving email. IMAP makes messages available to read and manage without downloading them to your computer.

A communication port on a handheld device for interfacing with an infrared-capable device. Infrared ports do not use cables.

IP (Internet

Protocol)

The protocol that underlies most Internet traffic. IP determines how data flows from one computer to another. Computers on the Internet have IP addresses that uniquely identify them.

IP address (Internet

Protocol address)

A numeric identifier that uniquely identifies a computer on the Internet. IP addresses are usually shown as four groups of numbers separated by periods. For example, 206.204.52.71.

ISP (Internet service provider)

A company that supplies Internet access to individuals and companies. Most ISPs offer additional

Internet connectivity services, such as Web site hosting.

Java

A programming language used to create small programs called applets. Java applets can be used to create interactive content on Web pages.

342 Glossary

JavaScript macro

NAT (network address translation)

A method of mapping private IP addresses to a single public IP address. NAT allows multiple computers to share a single public IP address. Most DSL and cable routers support NAT.

network address

NTFS (NTFS file system)

The portion of an IP address that is shared by all computers on a network or subnet. For example,

10.0.1.1 and 10.0.1.8 are part of the network address

10.0.1.0.

A system table (used primarily by Windows 2000/

XP) that organizes the exact location of all the files on the hard drive.

packet

A scripting language used to enhance Web pages.

Most sites use JavaScript to add simple interactivity to pages, but some use it to open pop-up ads and reset visitors' homepages.

A simple software program that can be started by a specific keystroke or a series of keystrokes. Macros can be used to automate repetitive tasks.

partition

POP3 (Post Office

Protocol version 3) port

The basic unit of data on the Internet. Along with the data, each packet includes a header that describes the packet's destination and how the data should be processed.

A portion of a disk that is prepared and set aside by a special disk utility to function as a separate disk.

One of the two most popular protocols for receiving email. POP3 requires that you download messages to read them.

A connection between two computers. TCP/IP and

UDP use ports to indicate the type of server program that should handle a connection. Each port is identified by a number.

Glossary 343

port number

PPP (Point-to-Point

Protocol)

A protocol for communication between two computers using a dial-up connection. PPP provides error-checking features.

protocol

A number used to identify a particular Internet service. Internet packets include the port number to help recipient computers decide which program should handle the data.

proxy

A set of rules governing the communication and transfer of data between computers. Examples of protocols include HTTP and FTP.

A computer or program that redirects incoming and outgoing traffic between computers or networks.

Proxies are often used to protect computers and networks from outside threats.

registry removable media router script service

A category of data stored in the Windows registry that describes user preferences, hardware settings, and other configuration information. Registry data is accessed using registry keys.

Disks that can be removed, as opposed to those that cannot. Some examples of removable media are floppy disks, CDs, DVDs, and Zip disks.

A device that forwards information between computers and networks. Routers are used to manage the paths that data takes over a network. Many cable and DSL modems include routers.

A program, written in a scripting language such as

VBScript or JavaScript, that consists of a set of instructions that can run without user interaction.

General term for the process of offering information access to other computers. Common services include

Web service and FTP service. Computers offering services are called servers.

344 Glossary

SSL (Secure Sockets

Layer) subnet subnet mask synchronize

A protocol for secure online communication.

Messages sent using SSL are encrypted to prevent unauthorized viewing. SSL is often used to protect financial information.

A local area network that is part of a larger intranet or the Internet.

A code, in the form of an IP address, that computers use to determine which part of an IP address identifies the subnet and which part identifies an individual computer on that subnet.

The process by which a handheld device and computer compare files to ensure that they contain the same data.

TCP/IP

(Transmission

Control Protocol/

Internet Protocol) threat

Standard protocols used for most Internet communication. TCP establishes connections between computers and verifies that data is properly received. IP determines how the data is routed.

A program with the potential to cause damage to a computer by destruction, disclosure, modification of data, or denial of service.

Trojan horse

UDP (User Datagram

Protocol)

A protocol commonly used for streaming media.

Unlike TCP, UDP does not establish a connection before sending data and it does not verify that the data is properly received.

virus definition

A program containing malicious code that is disguised as or hiding in something benign, such as a game or utility.

Virus information that an antivirus program uses to identify and alert you to the presence of a specific virus.

Glossary 345

wildcard characters

Special characters (like *, $, and ?) that act as placeholders for one or more characters. Wildcards let you match several items with a single specification.

worm

A program that replicates without infecting other programs. Some worms spread by copying themselves from disk to disk, while others replicate only in memory to slow a computer down.

346 Glossary

Index

A

accessing

Norton SystemWorks 61

Norton Tray Manager tools 63

options, Fast & Safe Cleanup 114

shortcut menu tools 63

System Information 250

UnErase Wizard 218-219

activation 30, 60

and registration of software 50

key 47 window 47

ActiveX controls

and Internet Uninstall 266 and Windows 98 266

deleting 267

Activity Log

checking 80 viewing 80

adding files to Quarantine 192

Adobe Acrobat Reader

installing 90 using to view PDF 90

Advanced Options, One Button

Checkup 96, 103

advanced recovery procedures recovering

data from damaged disks 322-326

lost subdirectories 307-314

unbootable hard disk 305-307 repairing cross-linked files 305

starting Disk Editor 303-304

Advanced schedule 102

alarms

Norton System Doctor 199

Norton Utilities 198

alerts

Inoculation 191

Norton CleanSweep 270

Worm Blocking 190

applications

backing up 255

uninstalling 253-260

at-risk files

about 185

excluding 187

Automatic LiveUpdate 118, 170

Auto-Protect

about 71 disabling 69, 71, 83

enabling 69, 71, 175

failure to load on startup 295

functions 37

options 117

348 Index

B

backing up

files before repair 119

Norton Password Manager

data 161, 162

Backup Wizard 34, 255, 269

backups

deleting unwanted 270

files, Norton CleanSweep Backup

Wizard 34

Norton CleanSweep reminder 113

Norton Password Manager 162

Bloodhound technology

about 38

options 117

Boot menu

booting from floppy disk 145

booting from hard disk 144

booting

Auto-Protect failure to load 295

changing boot sequence 278 floppy disk drive fails 278

Rescue Disks fail 277

to revert a hard disk 144

C

cache

excluding from Web Cleanup 136

files, removing 263

CD-based utilities

Fast & Safe 65

Norton Disk Doctor 65

Norton WinDoctor 65

UnErase Wizard (Windows 98/

Me) 65

Wipe Info 65

CD-ROM

CD-based utilities 20

drive, starting from 15

changing

Norton SystemWorks settings 96

scan schedules 182

checking

disks, with Norton Disk

Doctor 202

for recoverable files with

UnErase 219

version number 59

Windows problems, with Norton

color

WinDoctor 207

in Speed Disk optimization map 232

used by Safety Sweep 254

common recovery procedures

corrupt registry files 291-294

details 282-293

computer

correcting setup data 286-287

emergency procedures 13

information, viewing 249

computer history

Norton GoBack, clearing 145 reverting 145

connecting to the Internet automatically 170

Connection Keep Alive

about 137 enabling and disabling 137

features 36

ISP support 137

settings 138 viewing status 138

Windows system tray icon 138

cookies

consequences of removing 264

deleting 131, 132, 264

excluding from Web Cleanup 136

managing 263-264

Index 349 creating

custom virus scans 178

Emergency Disks 25

Rescue Disks 82

Csinject messages 300

custom scans

creating 178

deleting 180

deleting schedule 183

running 179

scheduling 180, 182

using 178

customizing installation

Norton GoBack 55

Norton SystemWorks 48

Norton CleanSweep 110-115

Norton System Doctor 109

Norton SystemWorks 104-107

D

data

eliminating permanently 243-247

forms, and Norton Password

Manager 159

recovering erased 215

dates, as Norton GoBack safe points 142

default options 120

definitions of technical terms 89

defragmentation, versus optimization 224

deleting

ActiveX controls 267

cache files 132

cookies 131

custom scans 180

infected files 189

Internet browser cache 263

Internet browser plug-ins 265

Internet cookies 263-264

deleting (continued)

Internet temporary files 132

scan schedules 183

description of product features 29

dial-up connections, maintaining with Connection Keep Alive 137

directories

finding lost 312

recovering lost

subdirectories 307-314

recovery process 313

structure diagram 308

disabling

Automatic LiveUpdate 171

Auto-Protect 69, 71

Connection Keep Alive 137

Norton CleanSweep 70

Norton GoBack 146

Norton Password Manager 73,

158

Safety Sweep 112

Smart Sweep/Internet Sweep 112

Disk Druid partitions 201

Disk Editor

about 282

directory cluster location 310

for expert users 19

starting 303-304

disks

analyzing 233

checking with Norton Disk

Doctor 202

clusters, locating 310

configuring 281

customizing optimization 235

directory recovery process 313

emergency repairs 20

errors 200

finding lost directories 312

finding readable sectors 311

fixing problems 202

initial optimization 226

350 Index disks (continued)

manually scanning 176

Norton GoBack safe points 142

performance 222

protecting 175

recovering unbootable 305-307

recovery methods 309

reverting with Norton

GoBack 141

salvaging data from damaged 322-326

scanning for viruses 176

sectors, finding 311

space

for file expansion 232

freed by optimization 224

viewing space allocation 113

displaying the Norton AntiVirus toolbar 68

domain names

excluding from Web Cleanup 135

using with Connection Keep

Alive 139

DOS

Disk Editor program 303

recovery procedures 303-331

common 282-293

preparation 283

startup 282-294

recovery tools 33, 282

DOS-based programs

Disk Editor 282

Norton Disk Doctor 282

UnErase 282

UnFormat 282

drive A

boot sequence 278

using for Emergency Disks 25

using for Rescue Disks 84, 88

E

electronic newsletter 92

email

encrypted 43 messages, encrypted, and virus protection 43

options 118

programs not supported by Norton

AntiVirus 43

programs supported by Norton

AntiVirus 42

protection 118

supported programs 43

Emergency Disks

creating 25

unbootable hard disk recovery 306

using 26

emergency recovery procedures

damaged disks 20

details 303

follow-up 22-24

introduction 13

system crash 16

unrecoverable files 19

enabling

Automatic LiveUpdate 168

Auto-Protect 69, 71

Connection Keep Alive 137

Norton CleanSweep 69

Norton Password Manager 158

Office Plug-in 119

Safety Sweep 112

Smart Sweep/Internet Sweep 112

erased files

overwritten by other applications 215

recovery procedure 217-219

errors

disk 200

repairing with One Button

Checkup 75

Index 351 errors (continued)

Windows 200

excluding at-risk files 185, 187

Express mode for LiveUpdate 168

Extra Features

Norton SystemWorks 65

Process Viewer 66

Symantec Security Check 66

Symantec Web 31, 66

F

FAQs. See frequently asked questions

Fast & Safe Cleanup

about 34

options 114

running from CD 20, 65

scheduling 115 settings 115

features

automatic program updates 39

Connection Keep Alive 36

credit card wizard 39

Information Wizard 50

Norton AntiVirus 37

Norton GoBack 40

Norton Password Manager 39 password strength assistant 39

Web Cleanup 31, 36

Windows system tray icon 39

file extensions

of infected files 193

unusual 296

files

adding to Quarantine 192

and Norton Protection 215

backed up by Norton

CleanSweep 34

cache, removing 263

color indicators, Safety

Sweep 254

fragmentation 223-225

files (continued)

Internet cookies,

deleting 263-264

Internet, cleaning 34

missing, emergency recovery 18

Most Fragmented list 233

Norton GoBack binary 55

placement during optimization 224, 236

preventing fragmentation 233

recoverable 219

recovering 217-219 using the installation CD 217

registry, recovering 291-294

reinfected after virus removal 296

removing 253

repairing cross-linked 305

restoring from Norton

CleanSweep backup 271

security considerations 244

space for expansion 232

unrecoverable, recovering 19

unwanted, removing 18

viewing with Web Cleanup 132

fixing

disk problems 202

Windows problems 207-208

floppy drives, unable to boot from 278

folders

scanning for viruses 177

viewing usage in Norton

CleanSweep 113

Form Assistant 161

fragmentation

analysis 233

calculation formula 221

reducing for specific files 233

frequently asked questions

Norton CleanSweep 299-300

Norton Password Manager 301

352 Index frequently asked questions (continued)

Norton Utilities 281

full system scans 177

G

glossary 89

GoBack. See Norton GoBack

green indicator, in Norton

CleanSweep 254

H

hard disks

checking with Norton Disk

Doctor 202

configuring 281

errors 200

repairing 202

hardware

diagnosing problems 283-286

disk check 202

Help

Norton SystemWorks Help &

Support menu 63

online 89 window and dialog box 89

hexadecimal values, in Wipe

Info 244

hide Norton GoBack icon 147

history

cleared when Norton GoBack is disabled 146

Norton GoBack, clearing 145

One Button Checkup 77

Home button, Norton

SystemWorks 62

I

ignoring files 189

Image 33

image files, graphics deleted by Web

Cleanup 132

improving performance 221-241

infected files

cannot repair 297

reinfected 296

Information Wizard 50

Inoculation

alerts 191

options 119

responding to alerts 191

installation

customizing 47, 48

if problems are found 14

Norton GoBack 54

Norton SystemWorks 45

post-installation tasks, about 51

preparation 44

products on CD 53

your product, with a virus 14

instant messenger

options 118

scanning transferred files 175

virus protection 38, 44

Interactive mode for LiveUpdate 168

Internet

clutter 34

cookies 263-264 deleting browser cache 263

excluding history from Web

Cleanup 136

files, cleaning 131

forms, filling with Quick Fill 160

history files, deleting 132

Knowledge Base articles 275

logons and Norton Password

Manager 161

options 117

removing unnecessary files 34

sites, remembered by Norton

Password Manager 163

Index 353

Internet (continued)

Symantec service and support

Web site 275

Symantec Web sites 91

Uninstall 262

Internet Uninstall

about 262

vs ActiveX Cleanup 266

italicized terms 89

L

Linux FDISK 201

LiveReg, uninstalled 56

LiveUpdate

button, Norton SystemWorks main window 62

Interactive and Express modes 168

options 118

procedure 167

uninstalled 56

Log Viewer

contents 80 monitoring activities in 80

logon forms

about 159 recognized by Norton Password

Manager 159

logs

Norton CleanSweep Master

Log 113

Norton WinDoctor 208

Smart Sweep/Internet Sweep 112

M

main window

LiveUpdate button 62

Norton SystemWorks 62

Master Log, Norton CleanSweep

specifying location 113 viewing 113

memory-resident programs 63

Miscellaneous options 118, 119

Most Fragmented files list 233

N

new features in Norton AntiVirus 37

newsletters 92

Norton AntiVirus

Auto-Protect 37

Bloodhound technology 38

customizing 116

disabling Auto-Protect 69 enabling Auto-Protect 69

starting from the main window 67 starting from the Windows

Explorer toolbar 67 starting from the Windows system tray 67

virus protection 37 virus protection updates 37

Windows desktop shortcut 64

Norton AntiVirus Quarantine

See also Quarantine files removed during uninstallation 56

infected files in 188

options 192 restoring items 192

Norton CleanSweep

backup alerts 270

Backup Wizard 34

Backup/Restore options 113

disabling 70

enabling 69 enabling and disabling Smart

Sweep/Internet Sweep 69

Fast & Safe Cleanup 34

Fast Analysis option 112

features 34

options 69, 110-115

354 Index

Norton CleanSweep (continued)

Restore Wizard 34

options 113

restoring files from backup 271

Smart Sweep/Internet Sweep 34

SmartSweep troubleshooting 300

troubleshooting 299

Uninstall Wizard options 113

uninstalling components 258

Norton Disk Doctor

about 32, 200

disk check 202

DOS version 282

DOS-based program 201

emergency repairs 20

finding and fixing disk problems 202

NTFS partitions 197

running from CD 20, 65

Norton File Compare 33

Norton GoBack

accessing 143

and Wipe Info 243

bin file 55

Boot menu 144

booting from floppy disks 145 clearing history 145

Custom Install 53

disable from Boot Menu 146 disabling 146

Easy Install 53

enabling 146

features 40, 141

icon, Windows system tray 147

installing 54

logging safe points 142

reverting process 141

system requirements 44

uninstalling 57

when to revert disks 142

Norton Optimization Wizard 32, 239

Norton Password Manager

accessing 156

and Internet forms 159 automatic form filling 159

automatic program updates 39 credit card wizard 39

disabling 73

enabling 158

features 39

filling forms

manually 161

with Quick Fill 160

frequently asked questions 301

Internet passwords 151

main window 156, 157

managing information 161

master passwords 150

options 123

password strength feature 39

profiles 163 recorded sites 163 remembered sites 163

security levels 160

security of passwords 161

starting 156

strong passwords 151

tasks 159

troubleshooting 301

Web form recognition 159

Windows system tray icon 39

Norton Protection 35, 215

Norton Registry Tracker 33

Norton System Doctor

about 32, 197, 200

alarms 199

enabling and disabling 70

features 199 sensors 199

starting with Windows 110

startup options 109

when to use 200

Index 355

Norton SystemWorks

CD-based utilities 20, 65

custom installation 47

Extra Features 31, 65

general options 106

Help & Support menu 63

installation 47

main window features 62

memory-resident programs 63

Norton CleanSweep 34

Norton GoBack 40

Norton System Doctor 70, 109

Norton Tray Manager 63

Norton Utilities 32

One Button Checkup 31

Options button, main window 63

options, Norton CleanSweep 69

Rescue button 63 shortcuts 63

starting 61

Symantec Security Check 31

Symantec Web 66

system requirements 42

uninstalling 56

Norton SystemWorks features

Connection Keep Alive 36

Symantec Web 31

Tech24.com 31

Web Cleanup 31, 36

Norton Tray Manager

about 63

Connection Keep Alive icon 137,

138

Norton CleanSweep icons 69

Windows system tray, icons 63

Norton Utilities

CD-based utilities 20

DOS recovery

procedures 303-331

tools 33

DOS-based programs 282

Image 33

Norton Utilities (continued)

Norton Disk Doctor 32

Norton File Compare 33

Norton Optimization Wizard 32

Norton Protection 35

Norton Registry Tracker 33

Norton System Doctor 32

Norton WinDoctor 32

Recycle Bin protection 35

Speed Disk 32

System Information 33, 250

tools 32

UnErase Wizard 35

Wipe Info 35

Norton WinDoctor

about 32, 201

finding and fixing

problems 207-213

logs 208

running from CD 20, 65

NTFS

and DOS-based programs 16

support in Norton Disk

Doctor 197

O

OBC_WHEN_TO_USE 200

Office Plug-in

enabling 119

status 78

One Button Checkup

about 31

advanced schedule 102

multiple schedules 101

Repair History 77, 96, 103

scanning tools 74

scheduling wizard 97

starting 75

undoing repairs 77

viewing repair details 75

when to use 200

356 Index online

Help 89

Virus Encyclopedia 194

operating systems, multiple 277

optimization

analysis 233

by fragmentation threshold 237

capabilities of Norton Speed

Disk 221

customizing each drive 235, 239

file placement 227

free space consolidation 224

initial running time 225

registry 237 scheduling 237

settings 235

swap files 237

using One Button Checkup 74

versus defragmentation 224

optimization map view

color coding 231-232

file identification 227

options

about 95

Auto-Protect

Advanced 117

Bloodhound 117

Exclusions 117

button, Norton SystemWorks main window 63

categories 116

changing 116, 119

Connection Keep Alive 138

customizing 116

email

Advanced 118 scanning 118

Fast & Safe Cleanup 114

Inoculation 119

instant messenger 118

Internet 117

LiveUpdate 118

options (continued)

Manual Scan

Bloodhound 117

Exclusions 117

Miscellaneous 118, 119

Norton CleanSweep 110-115

Backup/Restore 113

Fast & Safe Cleanup 115

Restore Wizard 113

Safety Sweep 112

Smart Sweep/Internet

Sweep 112

Uninstall Wizard 113

Norton CleanSweep Fast

Analysis 112

Norton CleanSweep Safety

Sweep 112

Norton Password Manager 123

Norton System Doctor 70, 109

Norton SystemWorks 104,

104-107

Norton Utilities 108

One Button Checkup, Repair

History 96, 103

Other 118

password protection in Norton

AntiVirus 38

resetting defaults 120

Speed Disk 235-239

Threat Categories 119

Wipe Info 122, 245

Worm Blocking 118

Other options 118

P

password protection option 119

passwords

backing up 161 filling manually with Norton

Password Manager 161

for recorded sites 163

Index 357 passwords (continued)

Internet, and Norton Password

Manager 151

master, in Norton Password

Manager 150

strong, characteristics 151

using with Norton Password

Manager 159

performance

affected by fragmentation 223

improving 253

pinging with Connection Keep

Alive 139

plug-ins, deleting 265

post-installation tasks

about 50, 51

Readme file 52

Pre-Install Scanner 46

preparing

for emergencies 23

to install 44

problem solving

disk problems 20, 202

System Information 250

Windows 207-208

with One Button Checkup 74, 75

problems

fixing with Norton

WinDoctor 200

troubleshooting Norton

AntiVirus 295

troubleshooting Rescue

Disks 277

Process Viewer 66

product key 30

profiles

Norton Password Manager 163

setting up 152

program

patches 165 updates 165

programs

ActiveX, deleting 262

backing up 255, 269

DOS-based 282

Internet, uninstalling 262

restarting 281

uninstalling 253-260

protection

maximum 175

system scans 177

updating automatically 170

protection updates defined 166

Q

Quarantine

See also Norton AntiVirus

Quarantine

actions in 192 adding files to 192 files in 192

files removed during uninstallation 56

Quick Fill 160

R

Readme file 90

reading 52

recovering

common procedures 282-293

corrupt registry files 291-294

emergency procedures 19

lost subdirectories 307-314

operating system files 290-291

startup data 282-294

unbootable hard disk 305-307

recovery

methods 309

procedures 303-331

Recycle Bin

files deleted by Fast & Safe

Cleanup 34

358 Index

Recycle Bin (continued) options

Fast & Safe Cleanup 115

Norton Protection 108

protected by Norton

Protection 35, 215

red indicator, in Norton

CleanSweep 254, 299

registering your software 50

registry

optimization 237

recovering corrupt 291-292

reminders, Norton CleanSweep backups 113

removing

See also uninstalling unused files and programs 253

unwanted programs 255

Repair History

Norton WinDoctor 207

One Button Checkup 77

Repair Wizard 186

repairing

cross-linked files 305

disk problems 20

general hardware

problems 283-286

infected files

in Windows 2000/XP 189

in Windows 98/98SE/Me 188

viruses 37

with One Button Checkup 74

repairs

exporting, One Button

Checkup 77 undoing in One Button

Checkup 77

viewing, One Button Checkup 75

reports

Norton CleanSweep Master

Log 113

System Information 249

Rescue Disks

button, main window 63

creating 82

creating folder on hard disk 83 disabling Auto-Protect 83

failure to start from 277

hard disk recovery 305

not current 87

supported platforms 82

testing 85

troubleshooting 277

updating 85

using 87

restarting

in DOS 17, 18

Windows in safe mode 295

Restore Wizard 34, 255, 270

restoring

items in Quarantine 192

Norton Password Manager data 162

system

with Inoculation 119

with Rescue Disks 87

reverting, using Norton GoBack 141,

142, 144

S

safe mode 295

safe points

erased by other programs 142 logged by Norton GoBack 142 used to revert disks 142

Safety Sweep

color indicators 254

disabling to remove cookies 264

enabling and disabling 112, 253

using 254

scan summary 186

scanning

automatically 180

before installation 46

Index 359 scanning (continued)

email messages 118

entire computer 177

files at startup 119

for Windows problems 207

individual elements 177

problems found during 178

with One Button Checkup 74

scans

creating custom 178

deleting custom 180

file 177 floppy disk 177 folder 177 full system 177 hard drive 177 removable drive 177

running custom 179

using custom 178

scenarios

correcting computer setup data 286-287

recovering

corrupt registry files 292-294

data from damaged disks 322-326

lost subdirectories from corrupt directory 314

operating system

files 290-291

startup data 287-290

unbootable hard disk 307

repairing

cross-linked files 330

general hardware

problems 285-286

scheduling

custom scans 180

Fast & Safe Cleanup 115

multiple schedules

for a scan 181

for One Button Checkup 101

scheduling (continued)

optimization 237

virus scans 180

Secure Sockets Layer (SSL) connections 43

security

of Norton Password Manager encryption 161

with strong passwords 151

security levels

changing 128

Norton Password Manager 160

Security Response Web page 92

security risks 37

finding 185

sensors 23

Norton System Doctor 199

Service and Support 333

settings

Connection Keep Alive 138

Norton CleanSweep 69

One Button Checkup Repair

History 96, 103

Setup program, changing boot drive sequence 278

shortcuts

Norton AntiVirus 64

Norton SystemWorks 63

Smart Sweep/Internet Sweep 70

Windows desktop 63

Wipe Info 64

show Norton GoBack icon 147

Smart Sweep/Internet Sweep 34

and Uninstall Wizard 255

enabling and disabling 69, 112

logs 112

monitoring 255

options 112

software

backing up 255

uninstalling 253-260

360 Index

Speed Disk

about 32

Auto Threshold 237

custom disk optimization 235 drive options 235-239

optimization 222

on Windows 2000/XP 228

on Windows 98/Me 230

options 235-240

start utilities from CD 65

starting

can’t start your computer 14

from floppy disk, Norton

GoBack 145

from the CD-ROM drive 15

Norton AntiVirus 67

Norton Password Manager 149

Norton SystemWorks 61

from Norton Tray Manager 63

from Start menu 61

virus preventing computer from 87

startup

alert about virus protection 119

Auto-Protect failure to load 295

changing boot sequence 278

emergency procedures 16

floppy disk drive fails 278

floppy disks and Norton

GoBack 145

Norton GoBack Revert menu 143

Rescue Disks fail 277

scanning files at 119

startup recovery procedures

correcting computer setup

data 286-287

emergency 16

recovering

operating system

files 290-291

startup data 287-290

startup recovery procedures (continued)

repairing general hardware

problems 283-286

submitting files to Symantec 192

subscription to product updates 172

summary of product features 29

Symantec Pre-Install Scanner 14

Symantec Security Check extra feature 31, 66

Symantec Security Response

newsletter 92

Web page 68

Web site 92

Symantec service and support Web site 275

Symantec Web

accessing 66

features 31

Symantec Security Check 31

Tech24.com 31

Symantec Web sites 91

connecting to 68

look up viruses 194

system

correcting setup data 286-287

crash 16

System Information 33, 249

accessing 250

Windows desktop shortcuts 64

system requirements

Norton GoBack 44

Norton SystemWorks 42

system See computer

system status, checking 78

system tray icons. See Windows

system tray

T

Tech24.com 31, 66

Technical Support 91, 333

Index 361 threats

categories of 119

expanded detection of 37

found by manual scan 185

malicious 71

timeout protection 176

toolbar, displaying Norton AntiVirus from 68

Trojan horses, found during a scan 186

troubleshooting 275

Csinject files 300

Norton AntiVirus 295

Norton CleanSweep 299, 299-300

Norton Password Manager 301

Norton SystemWorks 280

Norton Utilities 281

recovering erased files 215-219

Rescue Disks 277

uninstalling (continued)

with Norton CleanSweep 258

unknown viruses 38

updating

automatically, with Live

Update 170

Rescue Disks 85

URLs, saving from Web Cleanup 135

User’s Guide PDFs

on CD 90

opening 91

utilities

DOS-based 17

starting from CD 20

U

UnErase

DOS version 282

on Emergency Disks 17

UnErase Wizard 35

accessing 218-219

and Windows 2000/XP 216 features 216

running from CD 20, 65

UnFormat DOS utility 282

Uninstall Wizard 256

uninstalling

ActiveX controls 262 browser plug-ins 262

Norton GoBack 57

Norton SystemWorks 56

other antivirus programs 44 previous versions of Norton

SystemWorks 44

programs 253-260, 262

programs downloaded from the

Internet 262

V

version number, checking 59

viewing

disk space allocation 113

Master Log, Norton

CleanSweep 113

System Information 250

virus alert options 188

Virus Encyclopedia 68, 92

virus protection

alerts 119

system scans 177

updates 37

virus repair

in Windows 2000/XP 189

in Windows 98/98SE/Me 188

viruses

about 37 automatic protection 37

emergency preparations 23

found by Auto-Protect 188

found during a scan 186

looking up on the Symantec Web site 194

submitting to Symantec 192

unknown 38

viewing descriptions 194

362 Index

W

Web

forms recognized by Norton

Password Manager 159

forms, filling with Quick Fill 160

sites, Symantec 91, 275

Web Cleanup

about 31, 131

excluding files from cleanup 136

features 36

file viewer 132

options 136

saving URLs 135

Web sites

remembered by Norton Password

Manager 163

Symantec Web 66

Web Tools

Connection Keep Alive 36

using 131-140

Web Cleanup 36

WIN.INI file, uninstalling components 258

Windows

desktop shortcuts 63

errors 200

finding and fixing problems 207

safe mode 295

system tray icon 72

Windows 2000

and UnErase Wizard 216

Wipe Info

options 122, 245

procedure 247

Windows 98

and ActiveX controls 266

and Norton Protection 216

disk fragmentation estimates 222

disk optimization 226

Norton Disk Doctor options 202

Norton Disk Doctor Undo file 203

recovering erased files 218

Windows 98 (continued)

starting utilities from CD 65

system requirements 41

Windows desktop shortcuts

Norton AntiVirus 64

System Info 64

Wipe Info 64

Windows Explorer toolbar, displaying

Norton AntiVirus 67

Windows system tray

Auto-Protect icon 69

Connection Keep Alive icon 137

Norton CleanSweep icon 69

Norton Password Manager icon 73

Norton Tray Manager 63

Windows XP

and UnErase Wizard 216

System Restore after Wipe

Info 243

Wipe Info

options 122, 245

procedure 247

Wipe Info

and Norton GoBack 243 and Windows Me/XP System

Restore 243

characters used to wipe 244

features 35

Government Wipe 244

on Windows 2000/XP 247

on Windows 98/Me 243

options 122, 245

procedures 243-247

running from CD 20, 65

Windows desktop shortcuts 64

wizards

Backup Wizard 255, 269

Information Wizard 50

Norton Optimization Wizard 239

Norton Password Manager Setup

Wizard 152

wizards (continued)

Repair Wizard 186

Restore Wizard 255, 270

UnErase Wizard 216

Uninstall Wizard 256

Worm Blocking

monitoring by 175

Norton AntiVirus 38

options 118

threats found by 190

worms

found by Worm Blocking 190

found during a scan 186

guarding against 71

in email messages 118, 190

in Microsoft Office documents 78

Y

yellow indicator, in Norton

CleanSweep 254

Index 363

advertisement

Related manuals

advertisement

Table of contents