210 As soon as ^p starts up, you're protected by default security settings chosen by the security professionals at Computer Associates.
211 ^p gives you four main lines of defense.
212 Don't worry! Alerts don't necessarily mean you are under attack - they help you tailor your security to your individual needs. There are several types of alerts. The ones you're most likely to see are:
213 If you're on a home or business local network, and if you want to share files or printers over that network, use the Zone control to assign the network to your Trusted Zone.
214 In this example, MS Outlook is a program you know, and it makes sense that it needs Internet access to send and receive e-mail, so it's probably safe to click Yes. If you click No, Outlook won't be able to send or receive e-mail!
215 ^p offers two different protection levels for your computer, called Zones. This allows two "doors" into your computer - one that's locked, and one that those you trust can open with a key.\n\nThe Internet Zone is the locked door to your computer for those computers and Web sites you don't know or trust. When set to its default high setting (recommended), it makes your computer invisible to hackers!\n\nThe Local Zone allows those you trust to access your personal files and printers. These people have a key to access your computer. You can give anyone a key by entering their IP address into your Local Zone. The default (recommended) setting is medium.
216 As an added security measure, you may protect your settings with a password to ensure no one else can change them. Would you like to create a password?
217 If your computer is part of an ICS/NAT where multiple computers connect to the Internet through one "gateway" computer, it's quick and easy to set this up now. Simply install ^p on each computer, and then designate each computer as either a client or a gateway.
218 Congratulations on your choice to protect your information with the intelligently simple Internet security software from Computer Associates. \n\nMore information can be found by pressing the help button or by visiting our website at http://www.my-eTrust.com.\n\nTo view this tutorial at any time, click your Start menu, select Programs, and select ^p tutorial.
219 Immediately!
220 "The first thing you will notice..."
221 You'll see some alerts when you first start using ^p.
222 Network alerts are really a convenience tool - they let users on a home or business LAN configure sharing easily.
223 Program alerts occur when a program on your computer wants to access the Internet. Click Yes to grant access, or No to block it.
224 If you don't recognize the program name, it may be safe to allow access - or it may not. If you're not sure, you can click 'No', if you then find that you do want the program to have access then please open EZ Firewall and select Firewall | Zones
225 The purpose of firewall alerts is to keep you informed - they tell you that ^p has protected you.\n\nClick OK to close the alert box. You're not letting any traffic in or out of your computer by doing this!
226 "Zones" are how ^p keeps track of the good, the bad and the unknown out on the Internet.
227 You're protected, even with the lock open! Use the Stop button and Internet Lock to heighten security in special situations.
228 ^p gives you three main lines of defense.
230 The next few steps will tell you how to use alerts to manage your security.
231 If you're NOT on a home or business LAN, just click OK to secure your Internet connection.
232 Check here if you don't want to be asked about the same program again.
233 The answers you give to program alerts are stored in the Programs panel shown here.\nYou can change your answer at any time!
234 Open the dashboard by double-clicking the EZ FW icon from your system tray.
235 It s easy to add trusted computers or networks into your Local Zone. Just click the advanced button in the Security panel.
236 Welcome to EZ Firewall's award-winning program control. In a few moments, you will have more protection from hackers than a firewall alone could ever provide.
237 Next step: The Program Wizard will find your Web browser and browser components and automatically configure them for a secure, hassle-free Web surfing experience. Click Next to continue.
239 Congratulations! You are now set up for secure, hassle-free Web surfing.
240 Advanced step (optional): To pre-configure other programs for Internet access, add programs below. You may either set these programs to default settings as indicated or customize the settings.
241 Tell me why
242 Access rights: Programs may actively seek out and retrieve information that you have requested from the Internet.\n\nServer rights: Programs may passively listen for requests from the Internet to communicate with your computer.
243 Congratulations! You have configured programs for secure Internet access.
244 Any programs you did not configure here will prompt you for Internet access permission the first time you use them. For questions on how to configure these future programs, click the Alert Advisor button directly from the program alert prompt. Or, visit the Help files or product tutorial.
245 Tell me more
246 Configuration Wizard
247 Please checkmark your selection below.
248 Are you sure you want to quit the tutorial?\n\nIf you quit, the tutorial will close and ^p will load.\n\nTo continue, click Resume. To quit, press Exit.
249 Tutorial
250 &Resume
251 E&xit
252 Next
253 Finish
254 ^p - Getting Started
255 Choosing settings higher than the defaults may prevent resource sharing and impede some program functions!
256 Guards the "doors" to your computer, keeping hackers out.
257 Protects your programs and keeps hacker programs from using or damaging your computer.
258 "Quarantines" potentially dangerous files that arrive as e-mail attachments, the most common means of malware distribution.
259 Prevents Internet "cookies" from giving away information about you, and keeps advertisers from tracking your Internet use.
260 Protection
261 FIREWALL
262 PROGRAM
263 Control
264 E-MAIL
265 Protection
266 PRIVACY
267 Protection
268 Are you sure you want to quit the tutorial?\n\nTo continue, click Resume. To quit, press Exit.
269 Program alerts
270 Firewall alerts
271 Should I say YES?
272 If you don't want to see firewall alerts, check "Don't show this dialog again." You're still protected, and the events are still logged for later reference.
273 The Zone a computer or network is in helps ^p decide whether to allow traffic between it and your computer.
274 What else do I need to know?
275 That's all for now! ^p is designed to let you "set it - and forget it!"
276 Need Help?
277 Click the help icon on any panel of the control center. You'll immediately get help for the panel you're currently working in. Use the help index, table of contents, and search engine to quickly locate any information you need!
278 Welcome to ^p \nIt's what's next in Internet security.
279 Lets you control your family's web surfing by selecting from a wide variety of web site categories to block.
280 WEB
281 Filtering
282 ^p gives you five main lines of defense.
61440 Open
61441 Save As
61442 All Files (*.*)
61443 Untitled
61446 an unnamed file
61457 &Hide
61472 No error message is available.
61473 An unsupported operation was attempted.
61474 A required resource was unavailable.
61475 Out of memory.
61476 An unknown error has occurred.
61696 Invalid filename.
61697 Failed to open document.
61698 Failed to save document.
61699 Save changes to %1?
61700 Failed to create empty document.
61701 The file is too large to open.
61702 Could not start print job.
61703 Failed to launch help.
61704 Internal application error.
61705 Command failed.
61706 Insufficient memory to perform operation.
61707 System registry entries have been removed and the INI file (if any) was deleted.
61708 Not all of the system registry entries (or INI file) were removed.
61709 This program requires the file %s, which was not found on this system.
61710 This program is linked to the missing export %s in the file %s. This machine may have an incompatible version of %s.
61712 Please enter an integer.
61713 Please enter a number.
61714 Please enter an integer between %1 and %2.
61715 Please enter a number between %1 and %2.
61716 Please enter no more than %1 characters.
61717 Please select a button.
61718 Please enter an integer between 0 and 255.
61719 Please enter a positive integer.
61720 Please enter a date and/or time.
61721 Please enter a currency.
61728 Unexpected file format.
61729 %1\nCannot find this file.\nPlease verify that the correct path and file name are given.
61730 Destination disk drive is full.
61731 Unable to read from %1, it is opened by someone else.
61732 Unable to write to %1, it is read-only or opened by someone else.
61733 An unexpected error occurred while reading %1.
61734 An unexpected error occurred while writing %1.
61836 Unable to read write-only property.
61837 Unable to write read-only property.
61840 Unable to load mail system support.
61841 Mail system DLL is invalid.
61842 Send Mail failed to send message.
61856 No error occurred.
61857 An unknown error occurred while accessing %1.
61858 %1 was not found.
61859 %1 contains an invalid path.
61860 %1 could not be opened because there are too many open files.
61861 Access to %1 was denied.
61862 An invalid file handle was associated with %1.
61863 %1 could not be removed because it is the current directory.
61864 %1 could not be created because the directory is full.
61865 Seek failed on %1
61866 A hardware I/O error was reported while accessing %1.
61867 A sharing violation occurred while accessing %1.
61868 A locking violation occurred while accessing %1.
61869 Disk full while accessing %1.
61870 An attempt was made to access %1 past its end.
61872 No error occurred.
61873 An unknown error occurred while accessing %1.
61874 An attempt was made to write to the reading %1.
61875 An attempt was made to access %1 past its end.
61876 An attempt was made to read from the writing %1.