Helpnorton Ghost™

Total Page:16

File Type:pdf, Size:1020Kb

Helpnorton Ghost™ Norton Ghost™ Norton Ghost 12.0 사용자 설명서 이 책자에서 설명하는 소프트웨어는 라이센스 계약 하에 공급되며 계약 조건에 따라서만 사용할 수 있습니다. 문서 버전 7.0 사용권에 대한 고지 사항 Copyright © 2007 Symantec Corporation. All rights reserved. 정부 취득: 상업용 소프트웨어 - 정부 사용자는 표준 라이센스 조항 및 조건의 적용 대상입니다. Symantec, Symantec 로고, Norton, LiveUpdate, Symantec pcAnywhere, Symantec Backup Exec, Symantec NetBackup 및 Symantec Backup Exec Restore Anyware는 미국 및 다른 국가에서 Symantec Corporation 또는 그 자회사의 상표 또는 등록 상표입니다. 기타 이름은 해당 소유자의 상표일 수 있습 니다. Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, .NET 및 Windows 로고는 미국 및 기타 국가에서 Microsoft Corporation의 등록 상표 또는 상표입니다. VeriSign®은 Verisign, Inc.의 등록 상 표입니다. Gear Software는 GlobalSpec, Inc의 등록 상표입니다. Google 및 Google 데스크톱은 Google Inc.의 상표입니다. Maxtor OneTouch는 Maxtor Corporation의 등록 상표입니다. 이 문서에 설명되어 있는 제품은 사용, 복사, 배포 및 디컴파일/리버스엔지니어링을 제한하는 라이센 스 하에 배포됩니다. 이 문서 중 어떤 부분도 Symantec Corporation 및 해당 라이센스 제공자의 사전 서면 승인 없이는 어떤 방식으로도, 어떤 형태로도, 복제될 수 없습니다. 문서는 "있는 그대로" 제공되며, 상품성, 특정 목적 적합성 또는 비침해성에 대한 묵시적 보증을 비롯 하여 어떠한 명시적 또는 묵시적인 조건, 진술 및 보증도, 이러한 조건, 진술 및 보증의 배제가 법적으 로 무효가 아닌 한, 배제됩니다. Symantec Corporation은 이 문서의 제공, 성능 또는 사용과 관련되는 우발적 손해 또는 결과적 손해에 대해 책임을 지지 않습니다. 이 문서에 포함된 정보는 예고 없이 변 경될 수 있습니다. 라이센스가 부여된 소프트웨어 및 문서는 FAR 섹션 12.212 및 DFARS 섹션 227.7202에 정의된 대로 "상업용 컴퓨터 소프트웨어" 및 "상업용 컴퓨터 소프트웨어 문서"로 간주됩니다. 시만텍코리아(주) 서울특별시 강남구 역삼1동 737 강남파이낸스센터 28층 (135-984) http://www.symantec.co.kr 목차 1장 Norton Ghost™ 설치 설치 준비 ....................................................................................... 9 시스템 요구 사항 ........................................................................ 9 지원되는 파일 시스템 및 이동식 미디어 .......................................... 10 제공되지 않는 기능 ................................................................... 11 Norton Ghost 12.0 설치 .................................................................... 12 설치 완료 ............................................................................... 13 Norton Ghost 나중에 활성화 ........................................................ 14 첫 번째 백업 설정 ............................................................................ 15 시스템 복구 확인 정보 ...................................................................... 15 Symantec Recovery Disk 테스트 .................................................... 15 드라이버 유효성 검사 실패의 경우 ................................................. 16 사용자 정의 Symantec Recovery Disk CD 생성 ......................................... 16 Norton Ghost 12.0 시작 .................................................................... 17 Norton Ghost 기본 옵션 설정 ............................................................. 18 기본 백업 대상 선택 .................................................................. 19 백업이 시스템 성능에 미치는 영향 조정 ........................................... 20 기본 트레이 아이콘 설정 조정 ...................................................... 21 파일 유형 관리 ........................................................................ 22 Norton Ghost 메시지 로그 ........................................................... 24 제품(이벤트) 메시지에 대한 이메일 알림 실행 ................................... 25 Norton Ghost 업데이트 .................................................................... 26 제품 제거 ..................................................................................... 27 2장 Norton Ghost™ 소개 Norton Ghost 12.0 정보 .................................................................... 29 Norton Ghost의 새 기능 ................................................................... 30 주요 제품 구성 요소 ......................................................................... 31 Norton Ghost 사용 방법 .................................................................... 32 자세한 내용 .................................................................................. 33 3장 백업 권장 사례 백업 권장 사례 .............................................................................. 35 백업 정보 ............................................................................... 35 4 목차 백업 전 고려 사항 ...................................................................... 36 백업 중 고려 사항 ...................................................................... 37 백업 완료 시 고려 사항 ............................................................... 37 백업에 관련한 추가 팁 ...................................................................... 38 4장 데이터 백업 데이터 백업 정보 ............................................................................ 42 듀얼 부팅 시스템 백업 정보 ............................................................... 42 백업 유형 선택 ............................................................................... 43 드라이브 기반 백업 정의 .................................................................. 43 단일 백업 실행 ......................................................................... 48 드라이브 기반 백업에서 제외되는 파일 ........................................... 50 네트워크 인증 정보 ................................................................... 50 백업 도중 명령 파일 실행 ............................................................ 51 파일 및 폴더 백업 정의 ..................................................................... 53 파일 및 폴더 백업에서 기본적으로 제외되는 폴더 .............................. 55 백업을 정의한 후 ............................................................................ 55 기존 백업 즉시 실행 ........................................................................ 55 옵션을 사용하여 백업 실행 .......................................................... 56 백업 성공 확인 .............................................................................. 57 이벤트로 실행되는 백업 실행 ............................................................. 58 백업 대상 선택 .............................................................................. 59 드라이브 기반 백업의 압축 수준 설정 ................................................... 60 드라이브 기반 백업을 위한 고급 옵션 설정 ............................................. 61 고급 백업 옵션 편집 ................................................................... 62 복구 지점 암호화 정보 ............................................................... 62 생성 후 복구 지점 검사 ............................................................... 63 백업 진행률 보기 ...................................................................... 64 백업 속도 조정 .............................................................................. 64 백업 예약 편집 .............................................................................. 65 백업 설정 편집 ............................................................................... 65 백업 작업 실행 중지 ........................................................................ 65 시스템을 백업할 수 있는 사용자 추가 ................................................... 66 백업 또는 복구 작업 중지 .................................................................. 66 백업 작업 삭제 .............................................................................. 67 시스템의 하드 디스크 다시 검사 .......................................................... 67 SNMP 트랩을 전송하도록 Norton Ghost 설정 .......................................... 67 Norton Ghost 관리 정보 데이터베이스(MIB) 정보 .............................. 68 고급 페이지 사용 ............................................................................ 68 목차 5 5장 사용자 시스템에서 원격 시스템 백업 사용자 시스템에서 다른 시스템 백업 .................................................... 71 시스템 목록에 시스템 추가 ................................................................ 72 에이전트 배포 ................................................................................ 73 Norton Ghost 12.0 에이전트 사용 ........................................................ 75 Windows 서비스를 통한 에이전트 관리 ................................................. 76 서비스 사용에 대한 권장 사례 ............................................................ 76 서비스 열기 ............................................................................ 77 에이전트 서비스 시작 또는 중지 .................................................... 78 에이전트 시작 실패 시 복구 작업 설정 ............................................. 79 Norton Ghost 12.0 에이전트 종속성 보기 ......................................... 80 Norton Ghost에 대한 액세스 제어 ....................................................... 80 다른 사용자 권한으로 Norton Ghost 실행 ......................................... 82 6장 백업 상태 모니터링 백업 모니터링 정보 ......................................................................... 85 홈 페이지에서 백업 보호 모니터링 ...................................................... 85 상태 페이지에서 백업 보호 모니터링 ................................................... 86 상태 보고 사용자 정의 ...................................................................... 89 드라이브 세부 사항 보기 ................................................................... 90 드라이브의 보호 수준 향상 ................................................................ 91 7장 복구 지점의 컨텐트 탐색 복구 지점 탐색 .............................................................................. 93 Windows 탐색기를 통해 복구 지점 탐색 ................................................ 94 Windows 탐색기에서 복구 지점 마운트 ........................................... 94 복구 지점 안의 파일 열기 .................................................................. 95 검색 엔진 사용 ............................................................................... 96 복구 지점 드라이브 마운트 해제 ......................................................... 96 복구 지점의 드라이브 등록 정보 보기 ................................................... 97 8장 백업 대상 관리 백업 대상 ..................................................................................... 99 데이터 백업 작동 방식 ...................................................................... 99 드라이브 기반 백업 .................................................................. 100 파일 및 폴더 백업 정보 .............................................................. 100 복구 지점 관리 ............................................................................. 101 이전 복구 지점 정리 ................................................................. 101 복구 지점 세트 삭제 ................................................................
Recommended publications
  • Norton Antivirus Product Manual
    NortonTM AntiVirus Product Manual Care for our Environment; ‘It's the right thing to do.’ Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials. Norton AntiVirus™ Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 21.4 Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Portions of this product Copyright 1996-2011 Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
    [Show full text]
  • Norton™ 360: Product Manual
    Norton™ 360 Product Manual Norton™ 360 Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 22.20.1 Copyright © 2020 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, Norton Secured Logo, LifeLock, and the LockMan Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U. S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services.
    [Show full text]
  • Norton™ Security: Producthandleiding
    Norton™ Security Producthandleiding Norton™ Security Producthandleiding De software die in deze handleiding wordt beschreven, wordt geleverd met een licentieovereenkomst en mag alleen worden gebruikt in overeenstemming met de voorwaarden in deze overeenkomst. Documentatieversie 22.17 Copyright © 2019 Symantec Corporation. Alle rechten voorbehouden. Symantec, het Symantec-logo, het keurmerkvinkje, Norton en Norton by Symantec, het Norton Secured-logo, LifeLock en het LockMan-logo zijn handelsmerken of gedeponeerde handelsmerken van Symantec Corporation of haar dochterondernemingen in de Verenigde Staten en andere landen. Andere namen kunnen handelsmerken zijn van hun respectieve eigenaars. Het product dat in dit document wordt beschreven, wordt gedistribueerd onder licenties waarmee het gebruik, het kopiëren, het distribueren en het decompileren/toepassen van reverse-engineering ervan wordt beperkt. Geen enkel deel van dit document mag worden gereproduceerd in enige vorm op enige wijze zonder voorafgaande schriftelijke toestemming van Symantec Corporation en zijn eventuele licentiegevers. DE DOCUMENTATIE WORDT GELEVERD 'ZOALS DEZE IS' EN ALLE EXPLICIETE OF IMPLICIETE VOORWAARDEN, REPRESENTATIES EN GARANTIES, WAARONDER IMPLICIETE GARANTIES VAN VERKOOPBAARHEID, GESCHIKTHEID VOOR EEN BEPAALD DOEL OF NIET-SCHENDING WORDEN AFGEWEZEN, TENZIJ DERGELIJKE DISCLAIMERS NIET WETTELIJK ZIJN TOEGESTAAN. SYMANTEC CORPORATION IS NIET AANSPRAKELIJK VOOR INCIDENTELE OF GEVOLGSCHADE IN VERBAND MET DE VERSTREKKING, PRESTATIES OF HET GEBRUIK VAN DEZE DOCUMENTATIE.
    [Show full text]
  • Norton 360 with Lifelock
    Norton™ AntiVirus Plus Norton™ 360 Norton™ 360 with LifeLock™ Norton™ 360 for Gamers User Manual Norton™ 360 with LifeLock™ User Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright © 2021 NortonLifeLock Inc. All rights reserved. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of NortonLifeLock Inc. and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. NORTONLIFELOCK INC. SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by NortonLifeLock as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S.
    [Show full text]
  • User Guide.Nsr 2
    Norton Save and Restore Norton Save and Restore User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 7.0 Legal Notice Copyright © 2007 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Symantec, the Symantec Logo, Norton, LiveUpdate, and Symantec pcAnywhere are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Microsoft, Windows, Windows NT, Windows Vista, MS-DOS, .NET, and the Windows logo are registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. VeriSign® is a registered trademark of Verisign, Inc. Gear Software is a registered trademark of GlobalSpec, Inc. Maxtor OneTouch is a trademark of Maxtor Corporation The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION.
    [Show full text]
  • Aptiva Reference Guide
    Aptiva Reference Guide Aptiva Reference Guide IBM Note Before using this information and the product it supports, be sure to read the general information under Appendix C, “Product warranties and notices” on page 137. First Edition (December 1999) The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time. This publication was developed for products and services offered in the United States of America. IBM may not offer the products, services, or features discussed in this document in other countries, and the information is subject to change without notice. Consult your local IBM representative for information on the products, services, and features available in your area. Requests for technical information about IBM products should be made to your IBM reseller or IBM marketing representative. Contents Safety information . vii Caution and danger conventions used in the book ........... vii Installation . vii Continued protection against electrical shock .............
    [Show full text]
  • Norton™ Security
    Norton™ Security Termékismertető Norton™ Security – Termékismertető A kézikönyvben leírt szoftverre licencszerződés vonatkozik. A szoftvert csak a licencszerződésben meghatározott feltételeknek megfelelően lehet használni. Dokumentáció verziószáma: 22.17 Szerzői jog © 2019 Symantec Corporation. Minden jog fenntartva. A Symantec név, a Symantec embléma, a Checkmark embléma, a Norton és a Norton by Symantec, a Norton Secured embléma, a LifeLock és LockMan embléma a Symantec Corporation vagy leányvállalatainak védjegye vagy bejegyzett védjegye az Amerikai Egyesült Államokban és más országokban. Az egyéb nevek a megfelelő tulajdonosok védjegyei lehetnek. A dokumentumban említett termék forgalmazása a használatot, másolást, terjesztést, valamint visszafordítást vagy visszafejtést korlátozó licencek alapján történik. A dokumentum részének vagy egészének bármilyen formában történő másolása a Symantec Corporation, illetve a licencadók előzetes írásos meghatalmazása nélkül tilos. A DOKUMENTÁCIÓ JELEN ÁLLAPOTÁBAN KERÜL NYILVÁNOSSÁGRA. MINDENFAJTA KIFEJEZETT VAGY VÉLELMEZETT FELTÉTEL, SZERZŐDÉSTÉTEL ÉS GARANCIA, BELEÉRTVE A FORGALMAZHATÓSÁGRA, ADOTT CÉLRA VALÓ ALKALMASSÁGRA ÉS FELHASZNÁLHATÓSÁGRA VONATKOZÓ VÉLELMEZETT GARANCIÁT IS, A JOGSZABÁLYOK ÁLTAL MEGENGEDETT MÉRTÉKIG KIZÁRÁSRA KERÜL. A SYMANTEC CORPORATION NEM TEKINTHETŐ FELELŐSNEK A NYÚJTOTT TELJESÍTMÉNNYEL ÉS A FELHASZNÁLÁSSAL KAPCSOLATOS, ELŐRE NEM LÁTHATÓ VAGY KÖVETKEZMÉNYES KÁROKÉRT. A DOKUMENTUMBAN KÖZÖLT INFORMÁCIÓK ELŐZETES ÉRTESÍTÉS NÉLKÜL MEGVÁLTOZHATNAK. A FAR 12.212 értelmében a
    [Show full text]
  • Norton 360TM
    Norton 360TM Manuel du produit Prenons soin de notre environnement. Nous avons décidé de supprimer la couverture de ce manuel afin de réduire l'empreinte écologique de nos produits. Ce manuel est constitué à partir de matériaux recyclés. Manuel du produit Norton 360™ Le logiciel décrit dans ce manuel est fourni dans le cadre d'un contrat de licence et ne peut être utilisé qu'en accord avec les conditions de ce contrat. Documentation version 21.0 Copyright © 2013 Symantec Corporation. Tous droits réservés. Symantec, le logo Symantec, LiveUpdate, Norton 360 et Norton sont des marques commerciales ou déposées de Symantec Corporation ou de ses sociétés affiliées aux Etats-Unis et dans d'autres pays. Copyright sur les parties de ce produit 1996-2011 Glyph & Cog, LLC. Les autres noms peuvent être des marques de leurs détenteurs respectifs. Le produit décrit dans ce document est distribué aux termes d'une licence limitant son utilisation, sa copie, sa distribution et sa décompilation/ingénierie inverse. Ce document ne peut, en tout ou partie, être reproduit sous aucune forme et par aucun moyen sans l'autorisation préalable écrite de Symantec Corporation et de ses concédants éventuels. LA DOCUMENTATION EST FOURNIE "EN L'ETAT" ET TOUTE GARANTIE OU CONDITION D'AUCUNE SORTE, EXPRESSE OU IMPLICITE, Y COMPRIS, SANS QUE CELA SOIT LIMITATIF, LES GARANTIES OU CONDITIONS IMPLICITES DE QUALITE MARCHANDE, D'ADEQUATION A UN USAGE PARTICULIER OU DE RESPECT DES DROITS DE PROPRIETE INTELLECTUELLE EST REFUTEE, EXCEPTÉ DANS LA MESURE OÙ DE TELLES EXCLUSIONS SERAIENT TENUES POUR LEGALEMENT NON VALIDES. SYMANTEC CORPORATION NE PEUT ETRE TENUE POUR RESPONSABLE DES DOMMAGES DIRECTS OU INDIRECTS RELATIFS AU CONTENU OU A L'UTILISATION DE LA PRESENTE DOCUMENTATION.
    [Show full text]
  • As Macworld's
    POWER MAC G4 FIASCO APPLE’S GIGA FLIP-FLOP MORE NEWS INSIDE… MACWORLD MORE NEWS, MORE REVIEWS DECEMBER 1999 NEWTESTED • FIREWIRE iMACS • MID-SIZE STORAGE OS SCREENS • MAC 9 • EXPERT TIPS Macworldwww.macworld.co.uk iBook Tested! Hot FireWire Super-fast hard drives New screens Mid-size monitor tests Text tricks Professional type tips XPress online Turn print into Web New design, new features iMovie, FireWire, DVD, AirPort, Special Edition DECEMBER 1999 £4.99 read me first Simon Jary, editor-in-chief y name is Simon Jary, and I’m an Apple-holic. I know it’s bad for me, Mac marketing my friends and my family. And it’s bad for you, too, my readers. Sad budgets to safer M to say, but this month Apple is nearly all bad news. Since I pleaded fields? FIRST THERE WAS (Macworld, August 1999) with the Mac maker to get its planned Apple Expo We have also 2000 absolutely right this time (“Apple simply cannot afford to let us down received hundreds THE iMAC, NOW again” were my exact words) and after three years of failing to turn up despite of emails from 78 promises, Apple has gone and done it again. Like a repeatedly battered Macworld readers. spouse, we stand bloody and rather shocked that we didn’t see it coming. Every other THERE’S THE iMAC DV How stupid we were to again believe Apple’s word. Stupid, stupid, stupid. email the word Promises are promises. But then there are Apple promises.When Apple “disgusted”. And the – FASTER, REFINED AND pulled out of Expo 98 (for the second time, mind), it had a point to prove rest were really angry.
    [Show full text]
  • NAV User Guide.Book
    User’s Guide Norton AntiVirus™ for Macintosh® User’s Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 8.0 Copyright Notice Copyright 2001 Symantec Corporation. Portions of this software are Copyright 1990-2000 Aladdin Systems, Inc. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, Peter Norton Group, 20330 Stevens Creek Boulevard, Cupertino, CA 95014. Trademarks Symantec, the Symantec logo, Norton AntiVirus for Macintosh, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Mac and Mac OS are trademarks of Apple Computer, Inc. Other brands and product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 10987654321 SYMANTEC LICENSE AND WARRANTY IMPORTANT: PLEASE READ THE TERMS AND translate, make any attempt to discover the source code of CONDITIONS OF THIS LICENSE AGREEMENT the Software, or create derivative works from the Software; CAREFULLY BEFORE USING THE SOFTWARE.
    [Show full text]
  • دليل المنتج Norton™ Antivirus دليل المنتج
    Norton™ AntiVirus دليل المنتج Norton™ AntiVirus دليل المنتج يتم تقديم البرنامج الوارد ذكره في هذا الكتاب بموجب اتفاقية ترخيص وﻻ يجوز استخدامه إﻻ وفقًا لبنود اﻻتفاقية. إصدار الوثائق 22.20.1 حقوق النشر 2020 © محفوظة لشركة Symantec Corporation. جميع الحقوق محفوظة. تعد كل من Symantec وشعار Symantec وشعار عﻻمة اﻻختيار وNorton وNorton المقدم من شركة Symantec وشعار Norton Secured وLifeLock وشعار LockMan عﻻمات تجارية أو عﻻمات تجارية مسجلة لشركة Symantec Corporation أو الشركات التابعة لها في الوﻻيات المتحدة اﻷمريكية والدول اﻷخرى. وقد تكون اﻷسماء اﻷخرى عﻻمات تجارية خاصة بمالكيها. يتم توزيع المنتج الموضح في هذا المستند بموجب تراخيص تقيد حق استخدامه ونسخه وتوزيعه وإلغاء ترجمته/إجراء الهندسة العكسية عليه. ﻻ يجوز إعادة إنتاج أي جزء من هذا المستند بأي شكل وبأي وسيلةٍ كانت دون تصريح خطي مسبق من شركة Symantec Corporation وجهات منح الترخيص التابعة لها، إن وجدت. تُقدم الوثائق "كما هي" مع إنكار كل الشروط والتخويﻻت والضمانات الصريحة أو الضمنية، ومنها أي ضمان ضمني لصﻻحية العرض في السوق أو المﻻئمة لغرض معين أو عدم اﻻنتهاك، فيما عدا الحاﻻت التي يكون فيها هذا اﻹنكار غير سارٍ قانونيًا. لن تكون شركة SYMANTEC CORPORATION مسؤولة قانونيًا عن اﻷضرار العرضية أو الﻻحقة التي تتعلق بتجهيز أو أداء أو استخدام هذه الوثائق. المعلومات الواردة في هذه الوثائق عرضة للتغيير بدون إشعار. تعتبر البرامج والمستندات المرخّصة برامج حاسوب تجارية كما هو محدد في قانون اﻻمتﻻك الفيدرالي FAR 12.212، وتخضع لحقوق مقيدة كما هو محدد في FAR القسم 19-52.227 "برامج الحاسوب التجارية - الحقوق المقيدة" وملحق قوانين اﻻمتﻻك الدفاعية الفيدرالية DFARS 227.7202، "برامج الكمبيوتر التجارية ومستندات برامج الكمبيوتر التجارية"، حسب اﻻقتضاء وأي لوائح تالية، سواء قدمت من قبل Symantec كخدمات في أماكن العمل أو خدمات مستضافة.
    [Show full text]
  • Norton Security Scan .Exe Download
    Norton security scan .exe download click here to download Norton Security Scan is a free tool that scans your computer for virus, malware, spyware, and other threats. Download Norton Security Scan now and protect. Download Norton Security Scan for Windows now from Softonic: % safe and virus free. More than 40 Version: ; Size: MB; Filename: www.doorway.ru Try the all-new Norton Security Deluxe – all the features of Norton Internet Security and more. We took everything you loved about Norton Internet Security, and added better protection. Download the day free trial - complete security and antivirus suite. Download Norton Security free trial software, the best free antivirus tool available, from the official Norton site. Speedier scans: Norton Security scans are some of the fastest we've seen this year, an improvement over last year's Norton Quick scans. Norton Security Scan, free download. Free version of Symantec's antivirus scanner Norton. Review of Norton Security Scan with a star rating. Neither my wife nor I have knowingly downloaded or installed this. on my wife's computer (Vista Home Premium), I discovered Norton Security Scan. Actually, I'm not even sure that www.doorway.ru is the program at fault. Norton AntiVirus or Norton Security might alert you that a file or folder like the Downloads folder that commonly collects new files (which could. Use Norton Security Scan to determine if your system has been infected with viruses, malware, spyware, or other threats. Newly added — the Cookie Manager. Norton Security Scan is a legitimate program published by Symantec Corporation. distributed by websites such as www.doorway.ru and www.doorway.ru a file titled www.doorway.ru that is used to install SymCCIS.
    [Show full text]