User manual SYMANTEC NORTON INTERNET SECURITY 2004

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual SYMANTEC NORTON INTERNET SECURITY 2004. We hope that this SYMANTEC NORTON INTERNET SECURITY 2004 user guide will be useful to you.


SYMANTEC NORTON INTERNET SECURITY 2004 : Download the complete user guide (4410 Ko)

Manual abstract: user guide SYMANTEC NORTON INTERNET SECURITY 2004

Detailed instructions for use are in the User's Guide.

[. . . ] User's Guide Norton Internet SecurityTM User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 7. 0 PN: 10103115 Copyright Notice Copyright © 2003 Symantec Corporation. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. [. . . ] 7 To see risks that this program could pose to your computer, click Show Details. 8 Click OK. Customize Program Control After using Norton Internet Security for a while, you may find that you need to change access settings for certain programs. To customize Program Control 1 In the main window, double-click Personal Firewall. 2 In the Personal Firewall window, on the Programs tab, select the Location you want to customize. 5 In the Program Control alert, select the access level you want this program to have. 6 Click OK. Guarding against intrusion attempts Customize firewall rules 113 Manually add a firewall rule While Program Control automatically creates most of the firewall rules that you need, you may want to add specific rules. Only experienced Internet users should create their own firewall rules. There are three sets of firewall rules you can customize: 1 1 1 General Rules Trojan Horse Rules Program Rules To add a General Rule 1 In the main window, double-click Personal Firewall. 2 In the Personal Firewall window, on the Advanced tab, click General. To add a Trojan Horse Rule 1 In the main window, double-click Personal Firewall. 2 In the Personal Firewall window, on the Advanced tab, click Trojan Horse. To add a Program Rule 1 In the main window, double-click Personal Firewall. 2 In the Personal Firewall window, on the Programs tab, in the list of programs, click Add. 3 In the Select a program window, select a program's executable file. 4 In the Program Control alert, on the What do you want to do menu, click Manually configure Internet access. 5 Follow the on-screen instructions. 114 Guarding against intrusion attempts Customize firewall rules Change an existing firewall rule You can change firewall rules if they are not functioning the way that you want. To change an existing firewall rule 1 In the General Rules, Trojan Horse Rules, or Program Rules window, select the rule that you want to change. If you have turned on Network Detector, select the Location that should use the modified rule. 2 Click Modify. 4 When you have finished changing rules, click OK. Change the order of firewall rules See "How firewall rules are processed" on page 109. Each list of firewall rules is processed from the top down. You can adjust how firewall rules are processed by changing their order. To change the order of a firewall rule 1 In the General Rules, Trojan Horse Rules, or Program Rules window, select the rule that you want to move. If you have turned on Network Detector, select the Location that should use the modified rule. 2 Do one of the following: 2 To process this rule before the rule above it, click Move Up. [. . . ] Internet packets include the port number to help recipient computers decide which program should handle the data. A protocol for communication between two computers using a dial-up connection. A set of rules governing the communication and transfer of data between computers. A computer or program that redirects incoming and outgoing traffic between computers or networks. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SYMANTEC NORTON INTERNET SECURITY 2004




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual SYMANTEC NORTON INTERNET SECURITY 2004 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.