home *** CD-ROM | disk | FTP | other *** search
INI File | 2003-10-21 | 4.8 KB | 93 lines |
- [Am I Under Attack?]
- Help - The System Tray Icon is Flashing | Help_-_The_System_Tray_Icon_is_Flashing.htm
-
- [Configuring Advanced Rules for Security]
- Setting up Advanced Rules | Setting_up_Advanced_Rules.htm
- Overview of Creating Advanced Rules | Overview_of_Creating_Advanced_Rules.htm
- Advanced Rules: Provide a Name, Specify Allow or Block | Advanced_Rules__Provide_a_Name,_Specify_Allow_or_Block.htm
- Advanced Rules: Specify a Source | Advanced_Rules__Specify_a_Source.htm
- Advanced Rules: Specify Ports and Protocols | Advanced_Rules__Specify_Ports_and_Protocols.htm
- Advanced Rules: Define a Schedule | Advanced_Rules__Define_a_Schedule.htm
- Advanced Rules: Specifying Applications | Advanced_Rules__Specifying_Applications.htm
-
- [Getting Around]
- Starting and Using the Software | Starting_and_Using_the_Software.htm
- Password Protecting Your Security Settings | Password_Protecting_Your_Security_Settings.htm
- Shortcut to the Software: the System Tray Icon | Shortcut_to_the_Software__the_System_Tray_Icon.htm
- Using the Main Console | Using_the_Main_Console.htm
- Using the Menus and the Toolbar | Using_the_Agent_Menus_and_Toolbar_in_Client_Control_Mode.htm
- What is this Pop-Up Window About? | What_is_this_Pop-Up_Window_About.htm
-
- [Monitoring Your System: Logs]
- Understanding Logs | Understanding_Logs.htm
- Exporting Logs | Exporting_Logs.htm
- Viewing Logs | Viewing_Logs.htm
- Viewing the Security Log | Viewing_the_Security_Log.htm
- Viewing the Traffic Log | Viewing_the_Traffic_Log.htm
- Viewing the Packet Log | Viewing_the_Packet_Log.htm
- Viewing the System Log | Viewing_the_System_Log.htm
- Back Tracing Logged Events | Back_Tracing_Logged_Events.htm
-
- [More About Default Values]
- Defaults: A Summary of Rules and Settings | Agent_Defaults__A_Summary_of_Rules_and_Settings.htm
-
- [Protecting Your System]
- How to Set Permissions by Application | How_to_Set_Permissions_by_Application.htm
- How to Change Configuration Options | How_to_Change_Configuration_Options.htm
- Setting up Advanced Rules | Setting_up_Advanced_Rules.htm
-
- [Receiving and Installing the Software]
- Receiving the Software | Receiving_the_Software.htm
- Installing the Software | Installing_the_Software.htm
- Upgrading Sygate Personal Firewall | Upgrading_Sygate_Personal_Firewall.htm
- Registering Sygate Personal Firewall | Registering_Sygate_Personal_Firewall.htm
- Uninstalling the Software | Uninstalling_the_Software.htm
-
- [Setting Up Protection Based on Application]
- How to Set Permissions by Application | How_to_Set_Permissions_by_Application.htm
- Reviewing and Changing the Permission Status of an Application | Reviewing_and_Changing_the_Permission_Status_of_an_Application.htm
-
- [Setting Up Protection by Configuration Changes]
- How to Change Configuration Options | How_to_Change_Configuration_Options.htm
- Review of General Configuration Options | Review_of_General_Configuration_Options.htm
- Sharing Files and Folders | Sharing_Files_and_Folders.htm
- Setting Detailed Security Options | Setting_Detailed_Security_Options.htm
- Setting Up Email Notification of Security Events | Setting_Up_Email_Notification_of_Security_Events.htm
- Updating Your Security | Updating_Your_Security.htm
- Logging Security Events on Your System | Logging_Security_Events_on_Your_System.htm
-
- [Test Your System's Vulnerability]
- Using Sygate's Online Services | Using_Sygate_s_Online_Services.htm
- Performing a Quick Scan | Performing_a_Quick_Scan.htm
- Performing a Stealth Scan | performing_a_stealth_scan.htm
- Performing a Trojan Scan | performing_a_trojan_scan.htm
- Performing a TCP Scan | performing_a_tcp_scan.htm
- Performing a UDP Scan | performing_a_udp_scan.htm
- Performing an ICMP Scan | performing_an_icmp_scan.htm
-
- [The Software in Context]
- Introduction | Introduction.htm
- How Firewalls Work | How_Firewalls_Work.htm
- What Does the Software Do? | What_Does_the_Software_Do_.htm
- Agent Defaults: an Introduction | Agent_Defaults__an_Introduction.htm
-
- [Troubleshooting]
- Troubleshooting Sygate Personal Firewall | Troubleshooting_Sygate_Personal_Firewall.htm
- Firewall Configuration, Usage, and Software Expiration | Firewall_Configuration,_Usage,_and_Software_Expiration.htm
- Firewall Protection Against Attacks, Viruses, Trojans | Firewall_Protection_Against_Attacks,_Viruses,_Trojans.htm
- Firewall and Internet Connection Sharing, VPNs, and Networking | Firewall_and_Internet_Connection_Sharing,_VPNs,_and_Networking.htm
-
- [Understanding Pop-Up Messages]
- What is this Pop-Up Window About? | What_is_this_Pop-Up_Window_About.htm
- Why Did I Get a Pop-Up Message? | Why_Did_I_Get_a_Pop-Up_Message_.htm
- Why Did I get a Security Notification? | Why_did_I_get_a_Security_Notification_.htm
-
- [Welcome]
- Welcome to Online Help | Welcome_to_Online_Help.htm
- What's New | What_s_New.htm
- Related Documentation | Related_Documentation.htm
- Intended Audience | Intended_Audience.htm
- Technical Support | Technical_Support.htm
-
-
-