Norton Internet Security™ 2008                                       README.TXT

********************************************************************************

********************************************************************************

Copyright © 2007 Symantec Corporation. All rights reserved.  Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

 

The Licensed Software and Documentation are deemed to be “commercial computer software” and “commercial computer software documentation” as defined in FAR Sections 12.212 and DFARS Section 227.7202.

********************************************************************************

 

---------------------------------------------------------

Contents:

---------------------------------------------------------

 

- What's New in Norton Internet Security 2008

 

- System Requirements

 

- Unblocking applications that have been blocked by the Norton Internet Security Firewall

 

- Installation on removable drives, FireWire drives, etc.

 

- Installation on multi-boot systems

 

- Installation on computers running server services

 

- Order of installation for Symantec products

 

- Uninstalling Norton Internet Security

 

- Upgrading operating systems after installing Norton Internet Security

 

- Browser Compatibility

 

- ICU License

 

- Adding computers to Trust Control

 

- Documentation Addendum: Spanish Language Support

 

- Third Party Acknowledgements

 

--------------------------------------------------------------------

What's New in Norton Internet Security 2008

--------------------------------------------------------------------

 

- Support for Microsoft Vista.

 

- Support for 64bit processors on Microsoft Vista.

 

- New look: Norton Internet Security 2008 features a new user interface that makes it easier to perform tasks, configure settings, and get help.

 

- New Feature: Integrated network mapping provides a view of your home network.

 

- Fewer Alerts: When your computer is in a protected state, the Personal Firewall makes decisions about allowing and blocking communications to and from your computer. This automatic decision making process minimizes the number of notifications and dialog boxes that ask you what to do when a network event occurs.

 

- Trust Control: Detects when your computer connects to a new network.  You can then allow or block connections from computers that are connected to that network.

 

- Security History: Security History lets you monitor the security tasks  that your product performs in the background. In addition, alerts that you have received can be reviewed at any time in Security History. This means that if you cannot review an alert when you receive it, you can review it later in Security History. In addition, you can manage quarantined items in Security History.

 

- Support for IPv6

 

- Performance Improvements: Network throughput performance, Boot time performance, memory usage, and user interface performance have all been improved.

 

- Installation tasks have been streamlined.

 

--------------------------------------------------------------------

System Requirements

--------------------------------------------------------------------

 

- Windows XP SP2 or Media Center Edition 2005

- Windows Vista** Home/Ultimate/Business/Starter Edition on 32 or 64 bit processors

 

256 MB of RAM Minimum**

300 MHz or higher processor**

 

Note: Norton Internet Security 2008 cannot be installed on Windows 98, Windows 98SE, Windows ME, Windows 2000, Windows XP SP0, Windows XP SP1, Windows XP 64bit.

 

 

Supported Instant Messenger Clients

-AOL® version 4.7 & 5.x

-Yahoo!® Instant Messenger 5.x, 6.x or 9.x

-MSN® Messenger 6.0 and later

 

 

Email Client support

-Email scanning for viruses is supported for most standard POP3 and SMTP compatible email clients

 

** Must meet minimum Windows Vista operating system requirements (http://support.microsoft.com/kb/919183)                      

--------------------------------------------------------------------

Allowing applications that have been blocked by the Norton Internet Security Firewall

--------------------------------------------------------------------

 

Norton Internet Security 2008 is designed to automatically determine if Internet traffic should be permitted on a per-application basis.  In rare cases Norton Internet Security  may block a legitimate application. 

 

If you encounter an issue accessing the Internet with an application after installing Norton Internet Security 2008, you can investigate and unblock blocked applications in the new Security History window. 

 

Note: You should allow a blocked application only if you are certain that the application

is legitimate.

 

To allow an application that has been blocked:

 

1. In the main Norton Internet Security window, on the left side, under Quick Tasks, click View History.

2. In Security History, in the Select View drop-down list, click Firewall-Traffic.

3. Click any event that may correspond to the connectivity issue you are

having, and then click More Details.

4. Review the details of the event.

5. In the Actions section, in the Select drop-down list, click Allow.

6. Click Apply.

 

--------------------------------------------------------------------

Installation on removable drives, FireWire drives, etc.

--------------------------------------------------------------------

 

This product should not be installed on any type of storage media that may be inaccessible at times. This includes network drives, removable drives, hot-swappable drives, and USB and FireWire (IEEE 1394) drives that may be disconnected.

 

--------------------------------------------------------------------

Installation on multi-boot computers

--------------------------------------------------------------------

 

Norton Internet Security cannot be used on computers that have more than one operating system (such as Windows 98 and Windows 2000) installed on the same primary partition.

 

--------------------------------------------------------------------

Installation on computers running server services

--------------------------------------------------------------------

 

Symantec does not support running any version of Norton Internet Security  server editions of Windows 2000 or Windows Server 2003.

 

--------------------------------------------------------------------

Order of installation for Symantec products

--------------------------------------------------------------------

 

The following products integrate with one another and use shared components: Norton Internet Security , Norton SystemWorks

 

If you need to install two or more of these products from different product release years, install them in chronological order. For example, first install Norton SystemWorks 2005, and then install Norton Internet Security 2008. If Norton Internet Security 2008 is already installed on your computer, you should uninstall it, install Norton SystemWorks 2005, and then re-install Norton Internet Security 2008.

 

--------------------------------------------------------------------

Uninstalling Norton Internet Security

--------------------------------------------------------------------

 

If you need to uninstall, do not use installation-monitoring products such as Norton CleanSweep.  Norton Internet Security includes an uninstaller that is specifically designed to uninstall Norton Internet Security.

 

To access the uninstaller, use The Add/Remove Programs option from the Windows Control Panel.

 

--------------------------------------------------------------------

Upgrading operating systems after installing Norton Internet Security

--------------------------------------------------------------------

 

If you upgrade your operating system after Norton Internet Security is installed, you may encounter problems.  Please run Symantec’s LiveUpdate to update Norton Internet Security prior to upgrading your operating system. 

 

If you have already upgraded your operating system and you are encountering problems that LiveUpdate does not fix, you should uninstall and then re-install Norton Internet Security.

 

--------------------------------------------------------------------

Browser compatibility

--------------------------------------------------------------------

 

-Internet Explorer 6.0 or higher / Mozilla Firefox 2.0 or higher, is required to display the product's user interface. (pre-release versions are not supported)

 

 

-Norton Internet Security is typically compatible with any web browser.  Certain features, such as Phishing Protection, were designed to integrate  with Internet Explorer, and they are only available when used with Internet Explorer.

 

--------------------------------------------------------------------

ICU License

--------------------------------------------------------------------

 

ICU License - ICU 1.8.1 and later COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1995-2003 International Business Machines Corporation and others All rights reserved. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies of the Software and that both the above copyright notice(s) and this permission notice appear in supporting documentation. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder.

 

All trademarks and registered trademarks mentioned herein are the property of their respective owners.

 

--------------------------------------------------------------------

Adding computers to Trust Control

--------------------------------------------------------------------

 

Trust Control detects when your computer connects to a network. You can then allow or block connections from computers that are connected to that network.

 

You can allow connections from individual computers by using the Add button on the Trusted tab page of the Personal Firewall Trust Control options.

 

To allow connections from individual computers:

 

1. At the left of the main window, in the Network Status section, Click "Configure" button.

 

2. In the "Network Security Overview" page will be displayed. Once you are finished reading the features, Click "Close" button.

 

3. You will see the Network Security Map page with PCs connected to your network including your own "MY PC".  Click on any  "Unknown" PC Icon to see the device details and Click on "Trust Level" text link.

 

4. In the "Edit Trust Level" window, select the trust level you want to set by clicking on the radio button next to the trust level you desire. Then click "OK" button when finished.

 

5. Repeat Steps 3 and 4 to set trust level for other PCs.

 

6. If you are finished, click "Close".

 

--------------------------------------------------------------------

Documentation Addendum: Spanish Language Support

--------------------------------------------------------------------

 

The service and support Web site address in the user guide is incorrect. The correct address is http://www.symantec.com/region/mx/techsupp/.

 

=================================================================

Third Party Acknowledgements

=================================================================

 

Certain third-party software may be distributed, embedded, or bundled with this Symantec product or recommended for use in conjunction with the installation and operation of this Symantec product.  Such third-party software is separately licensed by its copyright holder. Please see the Third-Party Legal Notice Appendix or Third Party Legal Notice ReadMe File or the applicable ReadMe file accompanying this Symantec product for the licenses that govern the use of the third-party software and for proprietary notices of the copyright holders. 

 

--------------------------------------------------------------------

Boost v1.34.0

--------------------------------------------------------------------

Portions of this Symantec product contain components from Boost.org: Boost v1.34.0. Copyright © Beman Dawes, David Abrahams, 1998-2003. All rights reserved. Copyright Rene Rivera 2004-2005. All rights reserved. This component is made available under the Boost Software License, a copy of which is provided herein.

 

Boost Software License - Version 1.0 - August 17th, 2003

 

Permission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and accompanying documentation covered by this license (the "Software") to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following:

 

The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solely in the form of machine-executable object code generated by a source language processor.

 

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

 

--------------------------------------------------------------------

Crypto++® Library v5.2.10

--------------------------------------------------------------------

Portions of this Symantec product contain components from Eskimo.com: Crypto++®  library v5.2.10.  Compilation Copyright © 1995-2003 by Wei Dai.  All rights reserved. This component is made available under the Crypto++ License Agreement, a copy of which is provided herein.

 

Crypto++ License Agreement

 

Compilation Copyright (c) 1995-2003 by Wei Dai.  All rights reserved. This copyright applies only to this software distribution package as a compilation, and does not imply a copyright on any particular file in the package.

 

The following files are copyrighted by their respective original authors, and their use is subject to additional licenses included in these files.

 

mars.cpp - Copyright 1998 Brian Gladman.

 

All other files in this compilation are placed in the public domain by Wei Dai and other contributors.

 

I would like to thank the following authors for placing their works into the public domain:

 

Joan Daemen - 3way.cpp

Leonard Janke - cast.cpp, seal.cpp

Steve Reid - cast.cpp

Phil Karn - des.cpp

Michael Paul Johnson - diamond.cpp

Andrew M. Kuchling - md2.cpp, md4.cpp

Colin Plumb - md5.cpp, md5mac.cpp

Seal Woods - rc6.cpp

Chris Morgan - rijndael.cpp

Paulo Baretto - rijndael.cpp, skipjack.cpp, square.cpp

Richard De Moliner - safer.cpp

Matthew Skala - twofish.cpp

 

Permission to use, copy, modify, and distribute this compilation for any purpose, including commercial applications, is hereby granted without fee, subject to the following restrictions:

 

1. Any copy or modification of this compilation in any form, except in object code form as part of an application software, must include the above copyright notice and this license.

 

2. Users of this software agree that any modification or extension they provide to Wei Dai will be considered public domain and not copyrighted unless it includes an explicit copyright notice.

 

3. Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error-free, and Wei Dai is under no obligation to provide any services, by way of maintenance, update, or otherwise.  THE SOFTWARE AND ANY DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL WEI DAI OR ANY OTHER CONTRIBUTOR BE LIABLE FOR DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

 

4. Users will not use Wei Dai or any other contributor's name in any publicity or advertising, without prior written consent in each case.

 

5. Export of this software from the United States may require a specific license from the United States Government.  It is the responsibility of any person or organization contemplating export to obtain such a license before exporting.

 

6. Certain parts of this software may be protected by patents.  It is the users' responsibility to obtain the appropriate licenses before using those parts.

 

If this compilation is used in object code form in an application software, acknowledgement of the author is not required but would be appreciated. The contribution of any useful modifications or extensions to Wei Dai is not required but would also be appreciated.

 

--------------------------------------------------------------------

lib bzip v1.0.3

--------------------------------------------------------------------

 

Portions of this Symantec product contain components from bzip.org: lib bzip v1.0.3.  Copyright © 1996-2005 Julian R Seward.  All rights reserved. This component is made available under the Bzip BSD-Like License, a copy of which is provided herein.

 

Bzip BSD-Like License

 

This program, "bzip2", the associated library "libbzip2", and all documentation, are copyright (C) 1996-2005 Julian R Seward.  All rights reserved.

 

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

 

1. Redistributions of source code must retain the above copyright  notice, this list of conditions and the following disclaimer.

 

2. The origin of this software must not be misrepresented; you must not claim that you wrote the original software.  If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.

 

3. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.

 

4. The name of the author may not be used to endorse or promote  products derived from this software without specific prior written permission.

 

THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY  AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR  BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL  DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;  LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

 

Julian Seward, Cambridge, UK.

jseward@acm.org

bzip2/libbzip2 version 1.0.3 of 15 February 2005

 

-------------------------------------------------------------------

Terra Informatica

--------------------------------------------------------------------

 

Portions of this product contain code licensed from Terra Informatica Software Inc., which software is based in part on the work of the Independent JPEG Group.

 

This software makes use of CxImage version 5.99c

This software makes use of libpng version 1.2.6[ 1]