Norton Internet Security™
2008
README.TXT
********************************************************************************
********************************************************************************
Copyright © 2007 Symantec Corporation.
All rights reserved. Symantec and the Symantec Logo are trademarks or
registered trademarks of Symantec Corporation or its affiliates in the U.S. and
other countries. Other names may be trademarks of their respective owners.
The Licensed Software and Documentation
are deemed to be “commercial computer software” and “commercial computer
software documentation” as defined in FAR Sections 12.212 and DFARS Section
227.7202.
********************************************************************************
---------------------------------------------------------
Contents:
---------------------------------------------------------
- What's New in Norton Internet
Security 2008
- System Requirements
- Unblocking applications that have
been blocked by the Norton Internet Security Firewall
- Installation on removable drives,
FireWire drives, etc.
- Installation on multi-boot systems
- Installation on computers running
server services
- Order of installation for Symantec
products
- Uninstalling Norton Internet Security
- Upgrading operating systems after
installing Norton Internet Security
- Browser Compatibility
- ICU License
- Adding computers to Trust Control
- Documentation Addendum: Spanish
Language Support
- Third Party Acknowledgements
--------------------------------------------------------------------
What's New in Norton Internet Security 2008
--------------------------------------------------------------------
- Support for Microsoft Vista.
- Support for 64bit processors on
Microsoft Vista.
- New look: Norton Internet Security
2008 features a new user interface that makes it easier to perform tasks,
configure settings, and get help.
- New Feature: Integrated network
mapping provides a view of your home network.
- Fewer Alerts: When your computer is
in a protected state, the Personal Firewall makes decisions about allowing and
blocking communications to and from your computer. This automatic decision
making process minimizes the number of notifications and dialog boxes that ask
you what to do when a network event occurs.
- Trust Control: Detects when your
computer connects to a new network. You can then allow or block
connections from computers that are connected to that network.
- Security History: Security History
lets you monitor the security tasks that your
product performs in the background. In addition, alerts that you have received
can be reviewed at any time in Security History. This means that if you cannot
review an alert when you receive it, you can review it later in Security
History. In addition, you can manage quarantined items in Security History.
- Support for IPv6
- Performance Improvements: Network
throughput performance, Boot time performance, memory usage, and user interface
performance have all been improved.
- Installation tasks have been
streamlined.
--------------------------------------------------------------------
System Requirements
--------------------------------------------------------------------
- Windows XP SP2 or Media Center
Edition 2005
- Windows Vista**
Home/Ultimate/Business/Starter Edition on 32 or 64 bit processors
256 MB of RAM Minimum**
300 MHz or higher processor**
Note: Norton Internet Security 2008
cannot be installed on Windows 98, Windows 98SE, Windows ME, Windows 2000,
Windows XP SP0, Windows XP SP1, Windows XP 64bit.
Supported Instant Messenger Clients
-AOL® version 4.7 & 5.x
-Yahoo!®
Instant Messenger 5.x, 6.x or 9.x
-MSN® Messenger 6.0 and later
Email Client support
-Email scanning for viruses is
supported for most standard POP3 and SMTP compatible email clients
** Must meet minimum Windows Vista
operating system requirements (http://support.microsoft.com/kb/919183)
--------------------------------------------------------------------
Allowing applications that have been
blocked by the Norton Internet Security Firewall
--------------------------------------------------------------------
Norton Internet Security 2008 is
designed to automatically determine if Internet traffic should be permitted on
a per-application basis. In rare cases Norton Internet Security
may block a legitimate application.
If you encounter an issue accessing the
Internet with an application after installing Norton Internet Security 2008,
you can investigate and unblock blocked applications in the new Security
History window.
Note: You should allow a blocked
application only if you are certain that the
application
is legitimate.
To allow an application that has been
blocked:
1. In the main Norton Internet Security
window, on the left side, under Quick Tasks, click View History.
2. In Security History, in the Select
View drop-down list, click Firewall-Traffic.
3. Click any event that may correspond
to the connectivity issue you are
having, and then click More Details.
4. Review the details of the event.
5. In the Actions section,
in the Select drop-down list, click Allow.
6. Click Apply.
--------------------------------------------------------------------
Installation on removable drives,
FireWire drives, etc.
--------------------------------------------------------------------
This product should not be installed on
any type of storage media that may be inaccessible at times. This includes
network drives, removable drives, hot-swappable drives, and USB and FireWire
(IEEE 1394) drives that may be disconnected.
--------------------------------------------------------------------
Installation on multi-boot computers
--------------------------------------------------------------------
Norton Internet Security cannot be used
on computers that have more than one operating system (such as Windows 98 and
Windows 2000) installed on the same primary partition.
--------------------------------------------------------------------
Installation on computers running
server services
--------------------------------------------------------------------
Symantec does not support running any
version of Norton Internet Security server
editions of Windows 2000 or Windows Server 2003.
--------------------------------------------------------------------
Order of installation for Symantec
products
--------------------------------------------------------------------
The following products integrate with
one another and use shared components: Norton Internet Security
, Norton SystemWorks
If you need to install two or more of
these products from different product release years, install them in
chronological order. For example, first install Norton SystemWorks
2005, and then install Norton Internet Security 2008. If Norton Internet
Security 2008 is already installed on your computer, you should uninstall it,
install Norton SystemWorks 2005, and then re-install
Norton Internet Security 2008.
--------------------------------------------------------------------
Uninstalling Norton Internet Security
--------------------------------------------------------------------
If you need to uninstall, do not use
installation-monitoring products such as Norton CleanSweep.
Norton Internet Security includes an uninstaller that is specifically designed
to uninstall Norton Internet Security.
To access the uninstaller, use The
Add/Remove Programs option from the Windows Control Panel.
--------------------------------------------------------------------
Upgrading operating systems after
installing Norton Internet Security
--------------------------------------------------------------------
If you upgrade your operating system
after Norton Internet Security is installed, you may encounter problems.
Please run Symantec’s LiveUpdate to update Norton
Internet Security prior to upgrading your operating system.
If you have already upgraded your
operating system and you are encountering problems that LiveUpdate
does not fix, you should uninstall and then re-install Norton Internet
Security.
--------------------------------------------------------------------
Browser compatibility
--------------------------------------------------------------------
-Internet Explorer 6.0 or higher /
Mozilla Firefox 2.0 or higher, is required to display the product's user
interface. (pre-release versions are not supported)
-Norton Internet Security is typically
compatible with any web browser. Certain features, such as Phishing
Protection, were designed to integrate with
Internet Explorer, and they are only available when used with Internet
Explorer.
--------------------------------------------------------------------
ICU License
--------------------------------------------------------------------
ICU License - ICU 1.8.1 and later
COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1995-2003 International Business
Machines Corporation and others All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the "Software"), to
deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, and/or sell copies of
the Software, and to permit persons to whom the Software is furnished to do so,
provided that the above copyright notice(s) and this permission notice appear
in all copies of the Software and that both the above copyright notice(s) and
this permission notice appear in supporting documentation. THE SOFTWARE IS
PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL
THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY
CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Except as contained in this
notice, the name of a copyright holder shall not be used in advertising or
otherwise to promote the sale, use or other dealings in this Software without
prior written authorization of the copyright holder.
All trademarks and registered
trademarks mentioned herein are the property of their respective owners.
--------------------------------------------------------------------
Adding computers to Trust Control
--------------------------------------------------------------------
Trust Control detects when your
computer connects to a network. You can then allow or block connections from
computers that are connected to that network.
You can allow connections from
individual computers by using the Add button on the Trusted
tab page of the Personal Firewall Trust Control options.
To allow connections from individual
computers:
1. At the left of the main window, in
the Network Status section, Click "Configure" button.
2. In the "Network Security
Overview" page will be displayed. Once you are finished reading the
features, Click "Close" button.
3. You will see the Network Security
Map page with PCs connected to your network including your own "MY
PC". Click on any "Unknown"
PC Icon to see the device details and Click on "Trust Level" text
link.
4. In the "Edit Trust Level"
window, select the trust level you want to set by clicking on the radio button
next to the trust level you desire. Then click "OK" button when
finished.
5. Repeat Steps 3 and 4 to set trust
level for other PCs.
6. If you are finished, click
"Close".
--------------------------------------------------------------------
Documentation Addendum: Spanish
Language Support
--------------------------------------------------------------------
The service and support Web site
address in the user guide is incorrect. The correct address is http://www.symantec.com/region/mx/techsupp/.
=================================================================
Third Party Acknowledgements
=================================================================
Certain third-party software may be
distributed, embedded, or bundled with this Symantec product or recommended for
use in conjunction with the installation and operation of this Symantec
product. Such third-party software is separately licensed by its
copyright holder. Please see the Third-Party Legal Notice Appendix or Third
Party Legal Notice ReadMe File or the applicable ReadMe file accompanying this
Symantec product for the licenses that govern the use of the third-party
software and for proprietary notices of the copyright holders.
--------------------------------------------------------------------
Boost v1.34.0
--------------------------------------------------------------------
Portions of this Symantec product
contain components from Boost.org: Boost v1.34.0. Copyright © Beman Dawes, David Abrahams, 1998-2003. All rights
reserved. Copyright Rene Rivera 2004-2005. All rights reserved. This component
is made available under the Boost Software License, a copy of which is provided
herein.
Boost Software License - Version 1.0 -
August 17th, 2003
Permission is hereby granted, free of
charge, to any person or organization obtaining a copy of the software and
accompanying documentation covered by this license (the "Software")
to use, reproduce, display, distribute, execute, and transmit the Software, and
to prepare derivative works of the Software, and to permit third-parties to
whom the Software is furnished to do so, all subject to the following:
The copyright notices in the Software
and this entire statement, including the above license grant, this restriction
and the following disclaimer, must be included in all copies of the Software,
in whole or in part, and all derivative works of the Software, unless such
copies or derivative works are solely in the form of machine-executable object
code generated by a source language processor.
THE SOFTWARE IS PROVIDED "AS
IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE,
TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING
THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR
THE USE OR OTHER DEALINGS IN THE SOFTWARE.
--------------------------------------------------------------------
Crypto++® Library v5.2.10
--------------------------------------------------------------------
Portions of this Symantec product
contain components from Eskimo.com: Crypto++® library
v5.2.10. Compilation Copyright © 1995-2003 by Wei Dai.
All rights reserved. This component is made available under the Crypto++
License Agreement, a copy of which is provided herein.
Crypto++ License Agreement
Compilation Copyright
(c) 1995-2003 by Wei Dai.
All rights reserved. This copyright applies only to this software distribution
package as a compilation, and does not imply a copyright on any particular file
in the package.
The following files are copyrighted by
their respective original authors, and their use is subject to additional licenses
included in these files.
mars.cpp - Copyright
1998 Brian Gladman.
All other files in this compilation are
placed in the public domain by Wei Dai and other contributors.
I would like to thank the following
authors for placing their works into the public domain:
Joan Daemen -
3way.cpp
Leonard Janke
- cast.cpp, seal.cpp
Steve Reid - cast.cpp
Phil Karn -
des.cpp
Michael Paul Johnson - diamond.cpp
Andrew M. Kuchling
- md2.cpp, md4.cpp
Colin Plumb - md5.cpp, md5mac.cpp
Seal Woods - rc6.cpp
Chris Morgan - rijndael.cpp
Paulo Baretto
- rijndael.cpp, skipjack.cpp, square.cpp
Richard De Moliner
- safer.cpp
Matthew Skala
- twofish.cpp
Permission to use, copy, modify, and
distribute this compilation for any purpose, including commercial applications,
is hereby granted without fee, subject to the following restrictions:
1. Any copy or modification of this
compilation in any form, except in object code form as part of an application software, must include the above copyright
notice and this license.
2. Users of this software agree that
any modification or extension they provide to Wei Dai will be considered public
domain and not copyrighted unless it includes an explicit copyright notice.
3. Wei Dai makes no warranty or
representation that the operation of the software in this compilation will be
error-free, and Wei Dai is under no obligation to provide any services, by way
of maintenance, update, or otherwise. THE SOFTWARE AND ANY DOCUMENTATION
ARE PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. IN NO EVENT WILL WEI DAI OR ANY OTHER CONTRIBUTOR BE LIABLE FOR DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
4. Users will not use Wei Dai or any
other contributor's name in any publicity or advertising, without prior written
consent in each case.
5. Export of this software from the
United States may require a specific license from the United States
Government. It is the responsibility of any person or organization
contemplating export to obtain such a license before exporting.
6. Certain parts of this software may
be protected by patents. It is the users' responsibility to obtain the
appropriate licenses before using those parts.
If this compilation is used in object
code form in an application software, acknowledgement
of the author is not required but would be appreciated. The contribution of any
useful modifications or extensions to Wei Dai is not required but would also be
appreciated.
--------------------------------------------------------------------
lib bzip v1.0.3
--------------------------------------------------------------------
Portions of this Symantec product
contain components from bzip.org: lib bzip
v1.0.3. Copyright © 1996-2005 Julian R Seward. All rights reserved.
This component is made available under the Bzip
BSD-Like License, a copy of which is provided herein.
Bzip BSD-Like License
This program, "bzip2", the
associated library "libbzip2", and all documentation, are copyright
(C) 1996-2005 Julian R Seward. All rights reserved.
Redistribution and use in source and
binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must
retain the above copyright notice, this list of
conditions and the following disclaimer.
2. The origin of this software must not
be misrepresented; you must not claim that you wrote the original
software. If you use this software in a product, an acknowledgment in the
product documentation would be appreciated but is not required.
3. Altered source versions must be
plainly marked as such, and must not be misrepresented as being the original
software.
4. The name of the author may not be
used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR
``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Julian Seward,
Cambridge, UK.
jseward@acm.org
bzip2/libbzip2 version 1.0.3 of 15 February 2005
-------------------------------------------------------------------
Terra Informatica
--------------------------------------------------------------------
Portions of this product contain code
licensed from Terra Informatica Software Inc., which
software is based in part on the work of the Independent JPEG Group.
This software makes use of CxImage version 5.99c
This software makes use of libpng version 1.2.6[ 1]