Chapter 1 Installation

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 1 Installation Chapter1 Installation 1.1 System Requirements In order to run CahabaProperty, a PC with the following characteristics is required: • Microsoft Windows XP Professional, Home or Media Edition, Windows Server 2003 or Windows Vista • 512MB of RAM • 1.2 Gigabytes of available hard-disk space 1.2 Standard Edition Installation 1.2.1 New Installation 1.2.1.1 Server Software Installation CahabaProperty supports a networked environment. If you use CahabaProperty on a single machine, this machine is your server and contains you client software. If you are going to have multiple machines accessing CahabaProperty in a networked environment, you should first decide which machine will be the server. This is the machine where the databases will reside (and the machine from which backups of data will be requested). You will be able to use this machine (and other client machines) to enter data. You should install CahabaProperty on the server machine first. CD Installation: If you have a CD, on the server machine, insert the CD into a drive. The installation program should automatically start to run. If for some reason it does not, navigate to the directory where the installation program is located and double-click the setup.exe file. Download Installation: When you download the installation file from the CahabaCreek Web site, you are downloading a compressed copy of the CD image. You should SAVE this file before trying to run it. After the download has completed, navigate to the downloaded cproperty_standard_setup.exe file and double-click to run it (or if you now have a Run option, you may select Run). You will be asked where you want to decompress the CD image and what file to run after this has completed. The default is on your TEMP drive and to run the setup.exe file. It will then decompress the CD files and run the setup.exe for you automatically. When finished, you may create your own CD backup from this image if you wish, and delete the CDImage from your machine. If you are going to install client machines, we suggest you copy this image to a CD or removeable drive (such as a flash) to avoid having to download it again. Note You must be an administrator (use the administrator ID) or have administrator privileges to install CahabaProperty. User Guide CahabaProperty 1.0 1-1 Installation 1.2.1 New Installation After accepting the license, you will be asked if you want a Server or Client installation. Click the Server button and then click Next. Follow the on-screen instructions (accepting all the defaults if you do not care where the program is installed). Note CahabaProperty should not be installed to "Desktop" or "My Documents." If you change the default install location (c:\Program Files\CahabaCreek Software\CahabaProperty), then be sure to verify that you did not pick one of these locations. It is fine to install it to a folder on any of your hard drives. Do not install it to a removable drive (such as a flash drive) as this will cause your computer to have problems when the drive is not in the machine. At the end of the installation, you will be asked if you wish to restart the system. You cannot start to use CahabaProperty until the computer has been restarted. Be sure to close any applications that may be running so that you will not risk losing any data. IMPORTANT: Before continuing with the client installations, make sure that you know the Name (hostname) of the machine where you installed this server software. Your server installation will remind you of this name. You will be required to enter this when you install the client software. 1.2.1.2 Client Software Installation Client (Workstation) machines are computers where you may also wish to be able to enter data. These machines will use a network to communicate with the server machine where the data is located. You may install clients (Workstation installation) on multiple machines, but you should only install one server (Complete installation). 1-2 CahabaProperty 1.0 User Guide 1.2.1 New Installation Installation On the client machine(s) insert the CD into a drive (or navigate to the directory with the CD image). Note If you downloaded the installation file, it will be easier if you copy the CD image from the server machine to a CD or removeable drive after you downloaded. This will save you having to also download the CD image file onto the client machine (it is very large). If you inserted a CD, the installation should start up to run automatically. If for some reason it does not (or if you have downloaded the software from the CahabaCreek Web site), navigate to the directory where the installation program is located and double-click the setup.exe file. After accepting the license, you will be asked if you want a Server or Client installation. User Guide CahabaProperty 1.0 1-3 Installation 1.2.1 New Installation Click the Client button and then click Next. You will then be asked to provide the name of the machine where the server software was installed. Enter the server name in the Server Name text box and click the Next button. Follow the on-screen instructions (accepting all the defaults if you do not care where the program is installed). Note CahabaProperty should not be installed to "Desktop" or "My Documents." If you change the default install location (c:\Program Files\CahabaCreek Software\CahabaProperty), then be sure to verify that you did not pick one of these locations. It is fine to install it to a folder under "Program Files" or in a folder on any of your hard drives. Do not install it to a removable drive (such as a flash drive) as this will cause your computer to have problems when the drive is not in the machine. At the end of the installation, you will be asked if you wish to restart the system. You cannot start to use CahabaProperty until the computer has been restarted. Be sure to close any applications that may be running so that you will not risk losing any data. 1.2.1.3 Configuring Internet Security Software When you run the Network Version of CahabaProperty, you will likely need to configure your Network Security Software (Firewall and/or Anti-virus software) to allow CahabaProperty access to your local network. See section Section1.5, Configuring Network Security and/or Anti-Virus Programs before trying to run CahabaProperty. 1-4 CahabaProperty 1.0 User Guide 1.3 Updating CahabaProperty to a Newer Release Installation 1.3 Updating CahabaProperty to a Newer Release Customers with active support contracts, may update their copy to the latest release using CahabaProperty support page at the CahabaCreek web site. Go to http://www.cahabacreek.com and navigate to the CahabaProperty Support homepage. Select the Update CahabaProperty menu item and follow the directions. You will be given specific instructions for installing your update at the time that you request it. 1.4 Moving CahabaProperty to a Replacement Computer Moving CahabaProperty to a new computer is easy. For a Standard Edition where the new machine will replace the server, install CahabaProperty on the new computer. When CahabaProperty launches, simply restore the data from a backup that was done to external media (flash drive, CD or DVD) on your old machine. Section2.6, Backing Up and Restoring Data and Section1.2, Standard Edition Installation, provide detailed information on how to accomplish this. You should then uninstall CahabaProperty on the old machine. If you are replacing a client computer (or adding a new client computer), simply install the CahabaProperty client software on the new computer. Note If an additional computer is added to a networked environment (vs. replacing an existing computer), you should verify that you are not exceeding the number of computers for which you are licensed. 1.5 Configuring Network Security and/or Anti-Virus Programs Because CahabaProperty is a networked solution, it is possible that you will need to modify your Network Security configuration to run CahabaProperty. Some of the Network Security and Anti-virus software products today require that you explicitly allow (via configuration or reply to prompts) programs and/or network ports that may be used on the machine in an extra effort to avoid harmful virus programs from running and/or damaging your machine. Unfortunately, this some- times has the effect of restricting programs that you wish to use. CahabaProperty installs and uses windows services to support security, member and financial features of the product. These services use TCP/IP networking within the machine and/or across your local network (CahabaProperty does not access the Internet). Because CahabaProperty uses "services" and "network ports," some security software will block access and/or issue warnings asking if you wish to allow the program to run. Most of these software packages will "remember" if you say "Yes" the first time they ask, but some will either ask every time or explic- itly deny anything that has not been configured by you to run on the machine. These warnings (or silent refusal to allow network access) cause problems when you try to use CahabaProperty. The most common problems are a) not allowing the services to run or b) blocking access to the TCP/IP ports necessary for communica- tions. If you had to reply to a prompt asking if you wished to allow a program to run (or to access the network), then the software that posed that question requires configu- ration. All of the common network security and anti-virus software packages allow you to configure programs and/or ports that you wish to allow to run.
Recommended publications
  • The Evolution of Ransomware
    The evolution of ransomware SECURITY RESPONSE The evolution of ransomware Kevin Savage, Peter Coogan, Hon Lau Version 1.0 – August 6, 2015 Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today. CONTENTS OVERVIEW ..............................................................................3 Key information ......................................................................5 Types of ransomware .............................................................5 How ransomware has evolved ...............................................7 Targets for ransomware .......................................................13 Systems impacted by ransomware ......................................14 Ransomware: How it works ..................................................18 Ransom techniques ..............................................................27 How widespread is the problem of ransomware .................33 What does the future hold for ransomware? .......................37 Conclusion ............................................................................45 Appendix ..............................................................................47 Mitigation strategies ............................................................51 Symantec detections for common ransomware families 54 Resources .............................................................................56 OVERVIEW Never before in the history of human kind have people across the world been
    [Show full text]
  • Check Point Threat Intelligence Bulletin
    November 12-18, 2018 VS. CISCO IRON PORT YOUR CHECK POINT THREAT INTELLIGENCE REPORT TOP ATTACKS AND BREACHES Check Point researchers found that the Hades APT group, responsible for the infamous Olympic Destroyer attack during the 2018 Winter Olympic Games, has been carrying out a new wave of attacks in which more complex macros and a new dropper variant were distributed. Vision Direct, a European online supplier for contact lens, has been breached. Customer data has been compromised, including name, billing and email addresses, password, credit card number and CVV. A massive phishing campaign has been hitting banking users in Russia. The fraudulent emails pretend to originate from Central Bank of Russia, luring recipients to open the malicious attachment. tRat, a new modular malware, has been distributed by the TA505 APT group in a campaign using Word documents with malicious macros abusing the Norton Security brand, and by another campaign targeting commercial banking institutions. The infamous tech support scam has taken on a new form, leveraging the Facebook Sharer dialogue, a page typically used by website owners to invite users to share their content. A warning is urging users to call the regional Facebook support team, who will then connect to the victim’s computer remotely, install malware and/or try to sell them unnecessary products/services. City of York Council has reported the personal details of users of its mobile app, One Planet York, have been compromised. It is yet unclear if the details were gained by attacking end-users through the app, or by accessing York’s database.
    [Show full text]
  • A Glance Into the Eye Pyramid Technical Article V2
    A glance into the Eye Pyramid RĂZVAN OLTEANU Security Reasercher We keep you safe and we keep it simple. 01 Introduction On January 11, 2017 Italian news agency AGI, published a court order regarding cyber-attacks against high ranking Italian government members and Italian institutions. The attacks were conducted by two Italian brothers to get financial information that would help them gain an advantage when trading on financial markets. Overview The campaign was carried out over several years starting in 2008 and continuing into 2010, 2011, 2012 and 2014. The mechanism the brothers used to distribute their malware was simple; targeted spear-phishing emails aimed at victims who had already been selected. The emails con- tained a malware attachment, which once opened harvested information from the victims’ computers. This information consisted of pictures, documents, archives, presenta- tions, email contacts, email bodies, usernames, passwords, keystrokes, web pages content and databases. Technical details The malware was written in VisualBasic.net and was obfuscated twice using common obfuscators: Dotfuscator and Skater .NET which can be easily reversed. The malware stored its sensitive data – license keys, URLs and paths – by encrypting with the Triple DES algorithm using the MD5 of a provided password as key and SHA256 of the pass- word as initialization vector. A glance into the Eye Pyramid 01 02 Figure 1 Security applications To remain unnoticed, it tried to disable any security application installed on the victim’s computer. Targeted
    [Show full text]
  • Norton Antivirus Product Manual
    NortonTM AntiVirus Product Manual Care for our Environment; ‘It's the right thing to do.’ Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials. Norton AntiVirus™ Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 21.4 Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Portions of this product Copyright 1996-2011 Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
    [Show full text]
  • Features of Norton Mobile Security
    Norton Mobile Security User Guide DOWNLOAD AND INSTALL NORTON MOBILE SECURITY .................................................................. 1 ACTIVATE NORTON MOBILE SECURITY............................................................................................ 4 FEATURES OF NORTON MOBILE SECURITY ...................................................................................... 5 KEY FEATURES FOR IPHONES OR IPADS .......................................................................................... 7 SYSTEM REQUIREMENTS FOR NORTON MOBILE SECURITY ............................................................. 7 Download and install Norton Mobile Security You can directly download and install Norton Mobile Security on your mobile devices, or you can send an email with download instructions and access it on your mobile device. Select the device you are installing from: I am on a computEr and want to sEnd instructions to install Norton MobilE SEcurity to my devicE 1. Sign In to Norton. 2. If you are not signed in to Norton already, you are prompted to sign in. Type in your email address and password for Norton, and click Sign In. If you do not have a Norton account, click Create account, and complete the sign-up process. 3. In the Norton Setup window, move your mouse over Download Norton, and then click Send a Download Link. 4. Type an email address you can access on your device, and click the send icon . An email is sent to the email address with instructions to install the Norton product. Click DonE. 1 5. On the device where you want to install Norton, find and open the email that you received from "The Norton Team", and tap Download Now. The download link opens the Norton Setup page in your browser. 6. In the Norton Setup window, tap Download Now or Install. 7. You are redirected to the Norton Security and Antivirus page on the Google Play Store or App Store.
    [Show full text]
  • Norton-360.Pdf
    Norton™ 360 Product Manual Norton™ 360 Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 22.21.3 Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, Norton Secured Logo, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the U. S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of NortonLifeLock Inc. and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. NORTONLIFELOCK INC. SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by NortonLifeLock as on premises or hosted services.
    [Show full text]
  • Norton 360 User Guide on the CD Or the USB Drive in PDF Format
    User Guide See back cover for Quick Installation. We protect more people from more online threats than anyone in the world. Care for our Environment, ‘It's the right thing to do’. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. Norton 360™ User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 4.0 Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Norton, SONAR, LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360, and Norton SystemWorks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Windows is a trademark of Microsoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION.
    [Show full text]
  • Norton Ghost 10.0 User's Guide
    User’s Guide Norton Ghost User’s Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 10.0 PN: 10421093 Copyright Notice © 2005 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec, the Symantec logo, Norton Ghost, and Norton PartitionMagic are U.S. registered trademarks of Symantec Corporation SmartSector and LiveUpdate are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. IBM, OS/2, and OS/2 Warp are registered trademarks of International Business Machines Corporation. Maxtor OneTouch is a trademark of Maxtor Corporation. Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 Symantec Software License Agreement IMPORTANT: PLEASE READ THE TERMS AND disk of Your computer and retain the original CONDITIONS OF THIS LICENSE AGREEMENT for archival purposes; CAREFULLY BEFORE USING THE SOFTWARE.
    [Show full text]
  • David Gennarelli, Director, Investor Relations Good Afternoon And
    Q2 Fiscal 2005 Transcript David Gennarelli, Director, Investor Relations Good afternoon and thank you for joining us. With me today are John Thompson, Chairman of the Board, and CEO of Symantec and Greg Myers, Senior Vice President of Finance and CFO. In a moment, I will turn the call over to Greg. He will discuss our financial results for the fiscal second quarter, which ended October 1, 2004. He will also review the raised guidance for the December quarter and fiscal 2005 as outlined in the press release. John will then discuss highlights of our performance. This will be followed by a Q&A session. Today’s call is being recorded and will be available for replay on Symantec’s investor relations home page at symantec.com/invest. In addition to today’s press releases, a copy of our prepared remarks and supplemental financial information is also available on the IR website. Before we begin, I would like to remind everyone that some of the information discussed on this call, particularly our revenue and operating model targets for the coming quarter and fiscal year, contain forward-looking statements that involve risks and uncertainty. These statements are based on current expectations. Actual results may differ materially from those set forth in such statements. Additional information concerning factors that may cause actual results to differ is contained in the risk factor section of the Company’s previously filed form 10-Q. Lastly, in addition to reporting financial results in accordance with generally accepted accounting principles, or GAAP, Symantec reports non-GAAP financial results.
    [Show full text]
  • Norton Security Renewal with Product Key
    Norton Security Renewal With Product Key hang-glideactualizesDefeasible almostmarkedlySasha decani,sometimes and jangledthough electrolyzed herWestley vacancy. bredesany scarphs his impala recaptured mortify. spookily. Standford Eolithic is tarnishable: and conoid she Mickie So those tests because a subdomain on your pc or stolen due to prohibit sales tax shown is activated or key with the complete Can I chemistry a reach on my Norton automatic renewal? Now been deleted a security with? Why how I Renew Norton with a Product Key Norton 360. Windows lifetime license Hublife. Norton 360 Deluxe 50GB Cloud Backup 1 User 5 Devices. For the settings, ensure that define the renewal with staples canada for best deal targets and threats. DOCKET 50-23 NUCLEAR SHIP SAVANNAH P Operating license stage. How to heap and activate Norton with Norton antivirus product key. The Symantec Mobile Security Agent is used to enable protection and security for the. Renew my Norton products subscription with renewal code or product key Continue enjoying the Norton security you have them keep activating your subscription. Macs iOS Android devices A trial with product key code will be mailed to. Issues are caused. Click turn Off Your Norton product prompts you to manually renew the subscription when it expires next one More Norton Security Software and Services learn. Choose on renew move on your gadgets system considers things, norton security renewal with product key. Machine seems better the previous generation Norton Security Deluxe on a. Which Norton product is best? How much fix a Windows 10 activation key that doesn't work. Macs iOS Android devices A schedule with product key code will be mailed to excel select.
    [Show full text]
  • Norton™ Internet Security
    Norton™ Internet Security Product Manual Norton™ Internet Security Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 22.21.3 Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, Norton Secured Logo, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the U. S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of NortonLifeLock Inc. and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. NORTONLIFELOCK INC. SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by NortonLifeLock as on premises or hosted services.
    [Show full text]
  • Norton 360 with Lifelock
    Norton™ AntiVirus Plus Norton™ 360 Norton™ 360 with LifeLock™ Norton™ 360 for Gamers User Manual Norton™ 360 with LifeLock™ User Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright © 2021 NortonLifeLock Inc. All rights reserved. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of NortonLifeLock Inc. and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. NORTONLIFELOCK INC. SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by NortonLifeLock as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S.
    [Show full text]