. McAfee UnInstaller User’s Guide Version 6.0.
License Grant. Subject to the payment of the applicable license fees, and subject to the terms and conditions of this Agreement, McAfee hereby grants to you a non-exclusive, non-transferable right to use one copy of the specified version of the Software and the accompanying documentation (the 'Documentation').
Software, you are entitled to download one (1) revision or upgrade to the Software when and as McAfee publishes it via its electronic bulletin board system, website or through other online services. After the specified time period, you have no further rights to receive any revisions or upgrades without purchase of a new license or annual upgrade plan to the Software. Software is contained. You must return the defective media to McAfee at your expense with a copy of your receipt. This limited warranty is void if the defect has resulted from accident, abuse, or misapplication. Any replacement media will be warranted for the remainder of the original warranty period. CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR FOR ANY AND ALL OTHER DAMAGES OR LOSSES.
IN NO EVENT WILL MCAFEE BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE LIST PRICE MCAFEE CHARGES FOR A LICENSE TO THE SOFTWARE, EVEN IF MCAFEE SHALL HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. McAfee Customer Contact. If you have any questions concerning these terms and conditions, or if you would like to contact McAfee for any other reason, please call (408) 988-3832, fax (408) 970-9727, or write: McAfee Software, 3965 Freedom Circle, Santa Clara, California 95054. What is McAfee Guardian?. How to Contact McAfee.
McAfee training. Table of Contents McAfee UnInstaller.
Welcome to UnInstaller ™ UnInstaller can be used for many more purposes than simply uninstalling old applications. For example, UnInstaller can clean up junk files that have built up on your computer as you browsed the Internet, and it can do this cleanup automatically on a schedule that you specify. When using the PowerClean feature, click PowerClean Help on the Help menu. For information on new additions to UnInstaller, you can also open the Readme.txt file located in the UnInstaller folder on your computer to view additional information. McAfee UnInstaller. Installing UnInstaller The installation program on the UnInstaller CD lets you install the program easily on your computer.
Installation should start automatically when you put the CD in the CD-ROM drive. The information in the following paragraphs will help you install and start using UnInstaller. What happens when I install UnInstaller?. UnInstaller records changes that it has just made. After you delete or archive files or applications, UnInstaller records changes.
After you manually select a wizard from the main UnInstaller screen, UnInstaller records changes that the wizard makes. McAfee UnInstaller.
Installing UnInstaller What does the Interview do? As you install UnInstaller, you answer a few questions about how you use files on your computer, and whether you want to schedule some UnInstaller events. To run the interview again, click Customization Interview on the Options menu in the main UnInstaller screen. NOTE: Wizards are designed to be easy to understand and to use.
Each wizard screen tells you what you need to know to enter information or choose options. If you want to know more about a wizard, click Help. McAfee UnInstaller. Installing UnInstaller By default, SpaceMaker and Remove wizards create backup copies of files before they are deleted. Although you can turn off backup creation when you run the wizard, it is a good idea to make backups. Later, when you are sure that you do not want to undo any UnInstaller actions, you can delete the backup copy.
The SpaceMaker, BackTrack, and QuickClean wizards and the PowerClean feature all have Settings dialog box pages where you specify their default behavior, including the age that files must be before they can be deleted. McAfee UnInstaller. Installing UnInstaller You can change most option settings temporarily when you run a wizard, and you can open the Settings dialog box page for the wizard and make permanent changes to the default. The General page of the Settings dialog box Table 2-1 on page 10 provides a brief description of each Settings dialog box page and tells you where to find more information. What is McAfee Guardian?
You use McAfee Guardian to schedule the QuickClean wizard that keeps your computer free of junk files and to set up Installation Monitor so that it either does or does not run in the background as you work. Installing UnInstaller McAfee Guardian is the program that all McAfee Software applications use to manage scheduled and as-you-work events. To schedule an UnInstaller event: 1. Right-click the Guardian icon in the clock area of the Windows taskbar, and choose What’s Scheduled from the popup menu. Installing UnInstaller McAfee UnInstaller.
Freeing Disk Space Windows applications and the Internet can clutter your hard disk with large unused files that take up disk space. Set up and schedule the automatic QuickClean wizard to clean up these files at specified intervals, or use the SpaceMaker wizard to clean up more kinds of files. How do I schedule QuickClean to run at a specific time? Events for McAfee applications are managed by the McAfee Guardian.
Each McAfee application adds to the list of events that the Guardian can run at a scheduled time. McAfee UnInstaller. Freeing Disk Space To change the QuickClean schedule: 1. Right-click the red and white McAfee Guardian icon in the clock area of the taskbar, and then select What’s Scheduled on the menu. In the What’s Scheduled dialog box, select QuickClean and click Schedule. SpaceMaker tab in the Settings dialog box. Each time you run SpaceMaker you can change most defaults temporarily.
The one default that you cannot change when the wizard is running is the age that files must be before they can be deleted. McAfee UnInstaller. Managing Applications The UnInstaller wizards that manage applications are simple and extremely safe. They will not damage your computer or destroy data by removing important operating system files or files required by any application except the one you are removing, archiving, or moving. To use an UnInstaller wizard you must have enough free disk space on your computer for the wizard to work in and enough space to store any backup copies of files or applications that the wizard may make. If UnInstaller detects that an application has an uninstall program of its own, you will be given the choice to use the application’s uninstall program or the UnInstaller Remove wizard. To start the Remove wizard, click Remove in the UnInstaller window.
McAfee UnInstaller. Managing Applications Choose the Remove wizard to completely remove:.
An application that you no longer use. As you buy new programs, old programs become obsolete or no longer useful. The Remove wizard keeps your computer up-to-date by deleting all old applications and cleaning up the Registry and operating system settings associated with them.
The part of the Transport wizard that rebuilds the application. Any data files, spreadsheets, document files, and so forth, that you have chosen to include.
McAfee UnInstaller. Managing Applications To rebuild a transported application on a new computer: 1. If you created the Transport package on a removable disk, insert the disk that contains the package file. If you created the Transport package on a network drive, make sure that the computer where you want to build the transported application is connected to the network drive.
From your local computer to a drive on another computer. If you have more than one computer at your disposal, you can manage how you use the available disk space by moving applications between hard drives. From one folder to another. McAfee UnInstaller.
Managing Applications You can reorganize application folders on your computer by combining applications in subfolders of a single folder. For example, if you have several Adobe applications, you might move them into individual subfolders in a main Adobe folder. Moving an application does not change its position in the Windows Start menu Programs list. Settings dialog box and set BackTrack to monitor setup files before you insert the CD disc into the drive. How do I monitor installation of a single application? If you’d prefer to run BackTrack Monitor only when you are actually installing applications, follow these steps: McAfee UnInstaller.
Managing Applications 1. In the Windows taskbar, right-click the Guardian icon, point to UnInstaller, and click Launch Installation Monitor. (By default, the icon is located in the lower-right corner of your screen near the clock.) 2. In the dialog box that appears, click Browse to find and select the installation program that you want to monitor.
Total Uninstaller 6
The BackTrack wizard removes the application and returns Registry settings to the values that were in effect before the application was installed. The wizard displays a message telling you when it successfully completes the job.
Click Close to return to the main UnInstaller screen. McAfee UnInstaller. Restoring Information Restoring applications and files Removed applications and files that have been backed up by UnInstaller can be restored by the Restore wizard. The Restore wizard also restores archived applications.
Iobit Uninstaller 6
The Restore wizard does restore:. Archived applications. Removed applications that the Remove wizard backed up.
In the third Restore wizard screen you can choose:. How to replace files in restoration folders. You can choose to: Only replace older files with newer files.
McAfee UnInstaller. Restoring Information Always replace existing files. Never replace existing files. The default is “Only replace older files with newer files”. Whether to confirm restoring each file.
If you choose to confirm files as they are restored, you must click OK for each file in a message box. Master Log in all pages. To see information about a specific action, click Open. Then choose the action from the list that appears, and click OK. The information that appears depends on whether you are viewing Master Log totals, or have chosen a specific action report. McAfee UnInstaller. Restoring Information Action report logs display a complete list of files that were deleted or modified by each individual action.
These reports can be useful in tracking down old versions of files that were deleted but backed up, or were archived. If you only want to see what UnInstaller has done, you can review the list of actions displayed in the Reports window. However, if you want to keep a record of UnInstaller actions for later reference, you can print the report information or save it as a file. McAfee UnInstaller. Using PowerClean If you are an experienced computer user, you can use the PowerClean feature for custom file and Registry management.
Using the PowerClean feature you can view, move, copy, delete, and archive files from the UnInstaller default categories, which are usefully organized into groups of duplicate files, non-critical files, disconnected shortcuts, and so on. Creating custom file groups is described on page 36.
When you want to use PowerClean to manage files, clear the check next to Read-only mode on the PowerClean page of the Settings dialog box. Open the Settings dialog box by clicking Settings from the Options menu. McAfee UnInstaller.
Using PowerClean How do I work with the PowerClean feature? The PowerClean feature opens in a dialog box that works like the Windows Explorer. Like the Explorer window, it has a menu bar, a status bar, and a toolbar that you can customize. Each pane also has a shortcut menu that pops up when you right-click an item in the Cleanup Types or file list pane. Internet browser caches for future use, including.GIF and.JPG files. The Internet Documents category includes all.HTM and.HTML files found on your computer.
If you are developing Web-based information, these files should not be removed without careful examination. McAfee UnInstaller. Using PowerClean Table 6-1.
The PowerClean default file groups (Continued) Category Description Duplicates Duplicated files on your computer. By default, duplicate files must have the same file name, size, and date.
To define duplicate files simply as files that have the same file name, or the same file name and date, change the option setting in the Advanced page of the Options dialog box. Click OK to save the changes. What commands are on the PowerClean menus? All of the shortcut menu commands shown in Figure 6-1 on page 35, and other, less often used commands, are available from the menus in the menu bar. McAfee UnInstaller. Using PowerClean The menu bar categories and the commands that they contain are listed in Table 6-2. PowerClean menu commands This menu.
Contains these commands. File All of the file management commands on the popup menu as well as Print List, View Report, and Exit. Cleanup Tabs on the Options menu. What do the color codes mean?
The colored icon next to each file name in the PowerClean dialog box indicates the how important the file is to the operating system or to an installed application. McAfee UnInstaller. Using PowerClean In some cases, the color code is determined by your default settings. For example, if you specify that files of a specific type in a specific location should never be deleted, those files are marked with a red circle. Internet, if you have such a folder on your computer. If you are using one of the most common Internet browsers, such as AOL, Internet Explorer, or Netscape Navigator, UnInstaller automatically finds the folder where the browser caches files that it downloads as you open a page on the Internet.
McAfee UnInstaller. Using PowerClean If you are using an unusual browser, click Cache Folders. To specify the folder where cached files are stored.
NOTE: For more information about the setting PowerClean options, click Help and click How do I set options? In the What do you want to know about PowerClean?. Using PowerClean McAfee UnInstaller.
About Windows 98 Windows 98 Applications and Files This appendix provides background information for computer users who are curious about how Windows 98 applications keep track of information, and how computer files are named and used. You don’t need to know the information in this appendix to use UnInstaller wizards, but if you are an inexperienced computer user, reading this appendix might give you the information you need to use the advanced features of the UnInstaller PowerClean feature. Occasionally, however, you might have an application that does not use the long file names. Then you will see a truncated version of the long file name, such as Gasmil1.xls. If you have many such applications, you might still prefer to use the eight-dot-three convention for file names. McAfee UnInstaller. About Windows 98 What are file name extensions?
The last three characters of a file name, the characters that follow the dot, are called the file name extension, or extension. Extensions can have more than three characters, but they usually have three or fewer characters because most current applications have historically used three characters to identify different kinds of files. To see a list of these applications and associated files, click the Registered Files group in the UnInstaller PowerClean dialog box. Using the PowerClean feature is described in “How do I work with the PowerClean feature?,” on page 35. McAfee UnInstaller.
About Windows 98 An application always has the.EXE extension. Table A-1 lists the extensions of files you might download from the Internet.
Extensions of files commonly downloaded from the Internet This extension. Indicates this kind of file.
ARC,.ARJ,.CAB, Compressed archive files.GZ,.LZH,.TAR. These examples of cookies are clearly useful to you, at least in some way. However, other sites might download cookies just to collect information about your Internet use. These cookies are clearly not useful to you at all. McAfee UnInstaller. About Windows 98 To block cookies selectively, so that only cookies you want use Guard Dog.
Sonic Backup Mypc Deluxe 6.0
To delete old cookies, open UnInstaller’s PowerClean feature and click Cookies in the Internet Files group. What are compressed files? Compressed files are files that have been recoded to remove extra space and use less disk space than the expanded, usable version of the file. About Windows 98 McAfee UnInstaller.
Product Support BEFORE YOU CONTACT McAfee Software for technical support, locate yourself near the computer with McAfee UnInstaller installed and verify the information listed below:. Have you sent in your product registration card?. Version of McAfee UnInstaller. Customer number if registered. We encourage you to make this your first stop for answers to frequently asked questions, for updates to McAfee software, and for access to McAfee news and virus information. Take advantage of the McAfee Product KnowledgeCenter—your free online product support center - 24 hours a day, 7 days a week (.
If the automated services do not have the answers you need, please contact McAfee at the following numbers Monday through Friday between 9:00 AM and 6:00 PM Pacific time for 30-day free support, and 24 hours a day - 7 days a week for Per Minute or Per Incident support. Product Support McAfee UnInstaller.
Index custom file groups, in PowerClean feature dialog box applications archiving monitoring installation of database, SmartLinks described moving to new location rebuilding transported defaults removing how set transporting list of Settings dialog box pages See also Settings dialog box. Archive wizard described deleted files, restoring restoring archived applications. Index file groups, in PowerClean feature dialog box McAfee Guardian. Files monitored installation, undoing associated, defined Move wizard autoexpanding compressed files described described when to use compressed, described cookies, deleting deleting manually deleting unused by using wizards options, setting. See Settings dialog box. Index Reports dialog box described tab panes, in PowerClean feature dialog box tab pages described Transport wizard viewing event details described Restore wizard rebuilding transported applications described when to use restoring archived applications restoring deleted files restoring undo deleted application installation of application if monitored deleted files transported applications.
Index User’s Guide.
Thank you for choosing this McAfee product. This document contains important information about the current release. We strongly recommend that you read the entire document. Important We do not support the automatic upgrade of a pre-release software version. Download game pc ringan offline. To upgrade to a production release of the software, you must first uninstall the existing version.
We do support the automatic upgrade of version 5.2.x and more recent released versions of the software. To upgrade an earlier released version of the software, you must first uninstall the existing version.
You can install the new version using the download URL sent to you by your service provider or from. Support for Microsoft Windows 8 and Internet Explorer 10 ◦ This version of the product installs and runs on computers running Microsoft Windows 8. ◦ All SecurityCenter features are accessible by using version 10 of the Microsoft Internet Explorer browser. Improved installation process — Improved features and new options provide a smoother installation experience and greater flexibility. ◦ More incompatible products are detected automatically. ◦ Initial installation installs only the client software. When installation is complete, the software downloads the detection definition (DAT) files in the background.
This allows users to get back to work without having to wait for a lengthy download to complete. Support for more browsers added to the browser protection service — The browser protection service now supports the Google Chrome browser and 64-bit browsers. New colors added to the browser protection service's site safety rating system — A new version of McAfee ® SiteAdvisor ® Enterprise has been integrated into the browser protection service. On client computers, the SiteAdvisor button uses additional colors: ◦ Blue: internal sites and private IP addresses, for which no rating information is available.
◦ Orange: communication problems, with easy access to basic connectivity tests. ◦ Black: phishing sites and sites prohibited by policy. ◦ White: sites authorized by policy.
◦ Silver: browser protection service disabled by policy. Process scans are disabled during DAT updates by default — Administrators can specify whether to scan the processes running on client computers when they finish downloading new DAT files and uploading their detection information. By default, this option is disabled. The standalone installation agent is no longer available — To install the client software on computers where the user does not have local administrative rights, the site administrator can use one of the advanced installation methods: silent installation (vssetup) or push installation. (See the installation guide for more information.) To perform a URL installation, the site administrator needs to log on to the client computer with administrative credentials.
On client computers running Windows XP or Windows Server 2003, we have corrected issues with Windows File Protection (WFP) that caused the operating system to incorrectly flag protected system files as modified. After installing or upgrading to version 6.0 Patch1, users should no longer see problems related to these issues, such as WFP errors, prompts to insert the operating system CD or activate Windows, or loss of network access. ( 843280, 843357, 839081, 846375). On client computers running Windows XP Pro, the browser protection service no longer blocks downloads from web-based emails. ( 823149, 808772). On client computers running Windows 8, a licensing issue is resolved that caused the browser protection service to be reported as unlicensed. ( 822080 ).
A security issue is resolved in the executable path for the browser protection service. Support for Microsoft Windows 8.1 and Windows Server 2012 R2 — This version of the product installs and runs on computers running Microsoft Windows 8.1 and Windows Server 2012 R2. New Secure Search feature added to the browser protection service — Secure Search provides heightened security during online searches performed with the Microsoft Internet Explorer browser. ◦ Site administrators can select policy options to specify which search engine to use for secure searches and to block access to risky sites in search results listings. ◦ After a site administrator configures Secure Search options, users need to do these things to be fully protected during searches: 1 In Internet Explorer, select McAfee Secure Search as the default search engine.
There are three ways to do this. Search Provider Default dialog box. Select the option Change to McAfee Secure Search. Internet Explorer usually displays this dialog box automatically on client computers after a site administrator sets up the Secure Search feature.
Internet Explorer URL/search box (where you type the URL for the site you want to visit) 1 Click the little triangle on the right-hand side of the search box. (It might be next to the magnifying glass icon.) 2 At the bottom of the listing of recent sites, click the McAfee logo. Internet Explorer Manage Add-ons pane Note These steps describe how to manage add-ons using version 9 of Internet Explorer. For instructions specific to other versions, see your browser's documentation. 1 From the Tools menu, select Internet options. 2 Click the General tab, then in the Search section of the dialog box, click Settings.
3 In the Manage Add-ons pane, under Add-on Types, select Search providers. 4 Select McAfee Secure Search from the list, click Close, then click OK. Troubleshooting issues are now corrected for the browser protection service on computers running Microsoft Windows 8.
During a network error state (indicated by the color orange), the Troubleshooting link inside a site safety balloon now correctly launches the troubleshooting tool. ( 880865, 880881 ). Closing the virus protection service's email on-demand scan dialog box no longer causes Microsoft Outlook to crash. ( 891545 ). Status information is correctly reported to and by the SecurityCenter now for computers with Active Directory canonical names that contain special XML characters (for example, &, ', and ').
( 897765 ). The notification message for uninstalling competitive products that appears in the web-based installation wizard is no longer truncated when the language is set to Dutch. Browser protection service. The browser protection service has added support for these browsers on client computers running Windows 7: ◦ Internet Explorer 10 ◦ Internet Explorer 11.
The process has been improved for removing the Secure Search feature's designated search provider from Internet Explorer versions 8, 9, 10, and 11. ( 940937 ). On systems running Windows 8.1, the color-coded site rating feature in the browser protection service displays the correct color when the Internet Explorer 11 window is maximized.
Document How to access Installation guide (for administrators) From the SecurityCenter, click the link on the Help & Support tab. Product guide (for administrators) From the SecurityCenter, click the link on the Help & Support tab. Release notes From the SecurityCenter, click the link on the Help & Support tab. Note Release notes are available for the most recent release of the client software and the most recent upgrade of the McAfee ® Security-as-a-Service platform and SecurityCenter features.
Push installation online Help During a push installation, click the help link in any dialog box. SaaS extension quick start guide SaaS extension troubleshooting guide From the SecurityCenter, click the link on the ePO Severs tab of the Utilities page. These short guides provide information on installing and using the McAfee Security-as-a-Service extension for the McAfee ® ePolicy Orchestrator ® software.