Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 6

********************************************************************************

Norton Internet Security 2007.2 README.TXT


********************************************************************************
********************************************************************************
Copyright © 2006 Symantec Corporation. All rights reserved. Symantec and the
Symantec Logo are trademarks or registered trademarks of Symantec Corporation or
its affiliates in the U.S. and other countries. Other names may be trademarks of
their respective owners.
The Licensed Software and Documentation are deemed to be commercial computer
software and commercial computer software documentation as defined in FAR
Sections 12.212 and DFARS Section 227.7202.
********************************************************************************
---------------------------------------------------------
Contents:
---------------------------------------------------------
- What's New in Norton Internet Security 2007.2
- System Requirements
- Unblocking applications that have been blocked by the Norton Internet Security
Firewall
- Installation on removable drives, FireWire drives, etc.
- Installation on multi-boot systems
- Installation on computers running server services
- Order of installation for Symantec products
- Uninstalling Norton Internet Security
- Upgrading operating systems after installing Norton Internet Security
- Browser Compatibility
- ICU License
- Documentation Addendum: Adding computers to Trust Control
- Documentation Addendum: Spanish Language Support
- Other Third Party Acknowledgements

--------------------------------------------------------------------
What's New in Norton Internet Security 2007.2
--------------------------------------------------------------------
- Support for Vista.
- Support for 64bit processors
- New look: Norton Internet Security 2007.2 features a new user interface
that makes it easier to perform tasks, configure settings, and get help.
- Fewer Alerts: When your computer is in a protected state, the Personal
Firewall makes decisions about allowing and blocking communications to and from
your computer. This automatic decision making process minimizes the number of
notifications and dialog boxes that ask you what to do when a network event
occurs.
- Trust Control: Detects when your computer connects to a new network.
You can then allow or block connections from computers that are connected
to that network.
- Security History: Security History lets you monitor the security tasks
that your product performs in the background. In addition, alerts that you
have received can be reviewed at any time in Security History. This means
that if you cannot review an alert when you receive it, you can review it
later in Security History. In addition, you can manage quarantined items in
Security History.
- Support for IPv6
- Performance Improvements: Network throughput performance, Boot time
performance, memory usage, and user interface performance have all been improved
.
- Installation tasks have been streamlined.

--------------------------------------------------------------------
System Requirements
--------------------------------------------------------------------
- Windows Vista Home/Professional Edition & Windows XP
256 MB of RAM Minimum
300 MHz or higher processor
** Note: Norton Internet Security 2007.2 cannot be installed on Windows 98,
Windows 98SE, Windows ME or Windows 2000.

Internet Messenger Client support


-AOL® For Vista
-MSN® For Vista
-Windows® Messenger for Vista
Email Client support
-Email scanning for viruses is supported for
most standard POP3 and SMTP compatible email clients

--------------------------------------------------------------------
Allowing applications that have been blocked by the Norton Internet Security Fir
ewall
--------------------------------------------------------------------
Norton Internet Security 2007.2 is designed to automatically determine if Intern
et traffic
should be permitted on a per-application basis. In rare cases Norton Internet S
ecurity
may block a legitimate application.
If you encounter an issue accessing the Internet with an application after insta
lling
Norton Internet Security 2007.2, you can investigate and unblock blocked applica
tions in
the new Security History window.
Note: You should allow a blocked application only if you are certain that the ap
plication
is legitimate.
To allow an application that has been blocked:
1. In the main Norton Internet Security window, on the left side, under Quick Ta
sks,
click View History.
2. In Security History, in the Select View drop-down list, click Firewall-Traffi
c.
3. Click any event that may correspond to the connectivity issue you are
having, and then click More Details.
4. Review the details of the event.
5. In the Actions section, in the Select drop-down list, click Allow.
6. Click Apply.

--------------------------------------------------------------------
Installation on removable drives, FireWire drives, etc.
--------------------------------------------------------------------
This product should not be installed on any type of storage media that may be
inaccessible at times. This includes network drives, removable drives, hot-
swappable drives, and USB and FireWire (IEEE 1394) drives that may be
disconnected.

--------------------------------------------------------------------
Installation on multi-boot computers
--------------------------------------------------------------------
Norton Internet Security cannot be used on computers that have more than one
operating system (such as Windows 98 and Windows 2000) installed on the same
primary partition.

--------------------------------------------------------------------
Installation on computers running server services
--------------------------------------------------------------------
Symantec does not support running any version of Norton Internet Security
server editions of Windows 2000 or Windows Server 2003.

--------------------------------------------------------------------
Order of installation for Symantec products
--------------------------------------------------------------------
The following products integrate with one another and use shared components:
Norton Internet Security
Norton SystemWorks
If you need to install two or more of these products from different product
release years, install them in chronological order. For example, first install
Norton SystemWorks 2005, and then install Norton Internet Security 2007.2. If
Norton Internet Security 2007.2 is already installed on your computer, you shoul
d
uninstall it, install Norton SystemWorks 2005, and then re-install Norton
Internet Security 2007.2.
--------------------------------------------------------------------
Uninstalling Norton Internet Security
--------------------------------------------------------------------
If you need to uninstall, do not use installation-monitoring products
such as Norton CleanSweep. Norton Internet Security includes an
uninstaller that is specifically designed to uninstall Norton Internet Security.
To access the uninstaller, use The Add/Remove Programs option from the Windows
Control Panel.

--------------------------------------------------------------------
Upgrading operating systems after installing Norton Internet Security
--------------------------------------------------------------------
If you upgrade your operating system after Norton Internet Security is
installed, you may encounter problems. Please run Symantec s LiveUpdate
to update Norton Internet Security prior to upgrading your operating system.
If you have already upgraded your operating system and you are encountering
problems that LiveUpdate does not fix, you should uninstall and then
re-install Norton Internet Security.
--------------------------------------------------------------------
Browser compatibility
--------------------------------------------------------------------
-Internet Explorer 6.0 or later is required to display the product's user
interface.
-Norton Internet Security is typically compatible with any web browser.
Certain features, such as Phishing Protection, were designed to integrate
with Internet Explorer, and they are only available when used with Internet
Explorer.

--------------------------------------------------------------------
ICU License
--------------------------------------------------------------------
ICU License - ICU 1.8.1 and later COPYRIGHT AND PERMISSION NOTICE Copyright (c)
1995-2003 International Business Machines Corporation and others All rights
reserved. Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the "Software"), to
deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, and/or sell copies of
the Software, and to permit persons to whom the Software is furnished to do so,
provided that the above copyright notice(s) and this permission notice appear in
all copies of the Software and that both the above copyright notice(s) and this
permission notice appear in supporting documentation. THE SOFTWARE IS PROVIDED
"AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT
HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY
SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE. Except as contained in this notice, the name of a
copyright holder shall not be used in advertising or otherwise to promote the
sale, use or other dealings in this Software without prior written authorization
of the copyright holder.
All trademarks and registered trademarks mentioned herein are the property of
their respective owners.
--------------------------------------------------------------------
Documentation Addendum: Adding computers to Trust Control
--------------------------------------------------------------------
Trust Control detects when your computer connects to a network.
You can then allow or block connections from computers that are connected
to that network.
You can allow connections from individual computers by using the Add button
on the Trusted tab page of the Personal Firewall Trust Control options.
Note: This procedure is not included in the user guide or online Help.
To allow connections from individual computers:
1. At the top of the main window, click the Norton Internet Security tab.
2. Open the Settings bar.
3. Under Additional Options, click Internet Security and Firewall options.
4. In the Internet Security Options window, on the left side, click Trust Contro
l.
5. On the right side, click the Trusted tab.
6. On the Trusted tab, click Add.
7. In the Enter Trusted Computer dialog box, type the IP address of the computer
that you want to allow, and then click OK.
An IP address is a numeric identifier that uniquely identifies a computer on the
Internet.
IP addresses are usually shown as four groups of numbers separated by periods.
For example, 192.168.1.1. See "To find a computer's IP address," below.
8. In the Internet Security Options window, click OK.
--------------------------------------------------------------------
Documentation Addendum: Spanish Language Support
--------------------------------------------------------------------
The service and support Web site address in the user guide is incorrect.
The correct address is http://www.symantec.com/region/mx/techsupp/.

--------------------------------------------------------------------
Other Third Party Acknowledgements
--------------------------------------------------------------------
Portions of this product contain code licensed from Terra Informatica Software
Inc., which software is based in part on the work of the Independent JPEG
Group.
This software makes use of CxImage version 5.99c
This software makes use of libpng version 1.2.6[ 1]

You might also like