420 As soon as ^p starts up, you're protected by default security settings chosen by the security professionals at Zone Labs.
430 ^p gives you four main lines of defense.
432 ^p gives you three main lines of defense.
440 Don't worry! Alerts don't necessarily mean you are under attack - they help you tailor your security to your individual needs. There are several types of alerts. The ones you're most likely to see are:
450 If you're on a home or business local network, and if you want to share files or printers over that network, use the Zone control to assign the network to your Trusted Zone.
460 In this example, MS Outlook is a program you know, and it makes sense that it needs Internet access to send and receive e-mail, so it's probably safe to click Yes. If you click No, Outlook won't be able to send or receive e-mail!
463 In this example, Microsoft Outlook is a program you know, and it makes sense that it needs Internet access to send and receive e-mail, so it's probably safe to click Yes. If you click No, Outlook won't be able to send or receive e-mail!
470 ^p offers two different protection levels for your computer, called Zones. This allows two "doors" into your computer - one that's locked, and one that those you trust can open with a key.\n\nThe Internet Zone is the locked door to your computer for those computers and Web sites you don't know or trust. When set to its default high setting (recommended), it makes your computer invisible to hackers!\n\nThe Local Zone allows those you trust to access your personal files and printers. These people have a key to access your computer. You can give anyone a key by entering their IP address into your Local Zone. The default (recommended) setting is medium.
480 As an added security measure, you may protect your settings with a password to ensure no one else can change them. Would you like to create a password?
490 If your computer is part of an ICS/NAT where multiple computers connect to the Internet through one "gateway" computer, it's quick and easy to set this up now. Simply install ^p on each computer, and then designate each computer as either a client or a gateway.
500 Congratulations on your choice to protect your information with the intelligently simple Internet security software from Zone Labs Inc. \n\nMore information can be found by pressing the help button or by visiting our website at www.zonelabs.com.\n\nTo view this tutorial at any time, click your Start menu, select Programs, and select ^p tutorial.
510 Immediately!
520 "The first thing you will notice..."
530 You'll see some alerts when you first start using ^p.
540 Network alerts are really a convenience tool - they let users on a home or business LAN configure sharing easily.
550 Program alerts occur when a program on your computer wants to access the Internet. Click Yes to grant access, or No to block it.
560 If you don't recognize the program name, it may be safe to allow access - or it may not. If you're not sure, just click More Info. Zone Labs' AlertAdvisor has information about many common programs and will help you decide whether it's safe to allow access.
570 The purpose of firewall alerts is to keep you informed - they tell you that ^p has protected you.\n\nClick OK to close the alert box. You're not letting any traffic in or out of your computer by doing this!
580 "Zones" are how ^p keeps track of the good, the bad and the unknown out on the Internet.
590 You're protected, even with the lock open! Use the Stop button and Internet Lock to heighten security in special situations.
600 The next few steps will tell you how to use alerts to manage your security.
610 If you're NOT on a home or business LAN, just click OK to secure your Internet connection.
620 Check here if you don't want to be asked about the same program again.
630 The answers you give to program alerts are stored in the Programs panel shown here.\nYou can change your answer at any time!
640 Open the dashboard by double-clicking the ZA icon from your system tray.
643 Open the dashboard by double-clicking the Integrity icon from your system tray.
650 Welcome to Zone Labs' award-winning program control. In a few moments, you will have more protection from hackers than a firewall alone could ever provide.
660 Next step: The Program Wizard will find your Web browser and browser components and automatically configure them for a secure, hassle-free Web surfing experience. Click Next to continue.
670 Congratulations! You are now set up for secure, hassle-free Web surfing.
680 Advanced step (optional): To pre-configure other programs for Internet access, add programs below. You may either set these programs to default settings as indicated or customize the settings.
690 Tell me why
700 Access rights: Programs may actively seek out and retrieve information that you have requested from the Internet.\n\nServer rights: Programs may passively listen for requests from the Internet to communicate with your computer.
710 Congratulations! You have configured programs for secure Internet access.
720 Any programs you did not configure here will prompt you for Internet access permission the first time you use them. For questions on how to configure these future programs, click the Alert Advisor button directly from the program alert prompt. Or, visit the Help files or product tutorial.
730 Tell me more
740 Configuration Wizard
750 Please checkmark your selection below.
760 Are you sure you want to quit the tutorial?\n\nIf you quit, the tutorial will close and ^p will load.\n\nTo continue, click Resume. To quit, press Exit.
770 Tutorial
780 &Resume
790 E&xit
800 Next
810 Finish
820 ^p - Getting Started
830 Choosing settings higher than the defaults may prevent resource sharing and impede some program functions!
840 Guards the "doors" to your computer, keeping hackers out.
850 Protects your programs and keeps hacker programs from using or damaging your computer.
860 "Quarantines" potentially dangerous files that arrive as e-mail attachments, the most common means of malware distribution.
870 Prevents Internet "cookies" from giving away information about you, and keeps advertisers from tracking your Internet use.
880 Protection
890 FIREWALL
900 PROGRAM
910 Control
920 E-MAIL
930 Protection
940 PRIVACY
950 Protection
960 Are you sure you want to quit the tutorial?\n\nTo continue, click Resume. To quit, press Exit.
970 Program alerts
980 Firewall alerts
990 Should I say YES?
1000 If you don't want to see firewall alerts, check "Don't show this dialog again." You're still protected, and the events are still logged for later reference.
1010 The Zone a computer or network is in helps ^p decide whether to allow traffic between it and your computer.
1020 What else do I need to know?
1030 That's all for now! ^p is designed to let you "set it - and forget it!"
1040 Need Help?
1050 Click the help icon on any panel of the control center. You'll immediately get help for the panel you're currently working in. Use the help index, table of contents, and search engine to quickly locate any information you need!
1060 Welcome to ^p \nIt's what's next in Internet security.
1070 Lets you control your family's web surfing by selecting from a wide variety of web site categories to block.
1080 WEB
1090 Filtering
1100 ^p gives you five main lines of defense.
1110 en
61440 Open
61441 Save As
61442 All Files (*.*)
61443 Untitled
61446 an unnamed file
61457 &Hide
61472 No error message is available.
61473 An unsupported operation was attempted.
61474 A required resource was unavailable.
61475 Out of memory.
61476 An unknown error has occurred.
61696 Invalid filename.
61697 Failed to open document.
61698 Failed to save document.
61699 Save changes to %1?
61700 Failed to create empty document.
61701 The file is too large to open.
61702 Could not start print job.
61703 Failed to launch help.
61704 Internal application error.
61705 Command failed.
61706 Insufficient memory to perform operation.
61707 System registry entries have been removed and the INI file (if any) was deleted.
61708 Not all of the system registry entries (or INI file) were removed.
61709 This program requires the file %s, which was not found on this system.
61710 This program is linked to the missing export %s in the file %s. This machine may have an incompatible version of %s.
61712 Please enter an integer.
61713 Please enter a number.
61714 Please enter an integer between %1 and %2.
61715 Please enter a number between %1 and %2.
61716 Please enter no more than %1 characters.
61717 Please select a button.
61718 Please enter an integer between 0 and 255.
61719 Please enter a positive integer.
61720 Please enter a date and/or time.
61721 Please enter a currency.
61728 Unexpected file format.
61729 %1\nCannot find this file.\nPlease verify that the correct path and file name are given.
61730 Destination disk drive is full.
61731 Unable to read from %1, it is opened by someone else.
61732 Unable to write to %1, it is read-only or opened by someone else.
61733 An unexpected error occurred while reading %1.
61734 An unexpected error occurred while writing %1.
61836 Unable to read write-only property.
61837 Unable to write read-only property.
61840 Unable to load mail system support.
61841 Mail system DLL is invalid.
61842 Send Mail failed to send message.
61856 No error occurred.
61857 An unknown error occurred while accessing %1.
61858 %1 was not found.
61859 %1 contains an invalid path.
61860 %1 could not be opened because there are too many open files.
61861 Access to %1 was denied.
61862 An invalid file handle was associated with %1.
61863 %1 could not be removed because it is the current directory.
61864 %1 could not be created because the directory is full.
61865 Seek failed on %1
61866 A hardware I/O error was reported while accessing %1.
61867 A sharing violation occurred while accessing %1.
61868 A locking violation occurred while accessing %1.
61869 Disk full while accessing %1.
61870 An attempt was made to access %1 past its end.
61872 No error occurred.
61873 An unknown error occurred while accessing %1.
61874 An attempt was made to write to the reading %1.
61875 An attempt was made to access %1 past its end.
61876 An attempt was made to read from the writing %1.