home *** CD-ROM | disk | FTP | other *** search
/ PC World 2003 December / PCWorld_2003-12_cd.bin / Software / Topware / sygate / spf.exe / SPF.chm / spf55.brs < prev    next >
Encoding:
INI File  |  2003-10-21  |  4.8 KB  |  93 lines

  1. [Am I Under Attack?]
  2. Help - The System Tray Icon is Flashing | Help_-_The_System_Tray_Icon_is_Flashing.htm
  3.  
  4. [Configuring Advanced Rules for Security]
  5. Setting up Advanced Rules | Setting_up_Advanced_Rules.htm
  6. Overview of Creating Advanced Rules | Overview_of_Creating_Advanced_Rules.htm
  7. Advanced Rules: Provide a Name, Specify Allow or Block | Advanced_Rules__Provide_a_Name,_Specify_Allow_or_Block.htm
  8. Advanced Rules: Specify a Source | Advanced_Rules__Specify_a_Source.htm
  9. Advanced Rules: Specify Ports and Protocols | Advanced_Rules__Specify_Ports_and_Protocols.htm
  10. Advanced Rules: Define a Schedule | Advanced_Rules__Define_a_Schedule.htm
  11. Advanced Rules: Specifying Applications | Advanced_Rules__Specifying_Applications.htm
  12.  
  13. [Getting Around]
  14. Starting and Using the Software | Starting_and_Using_the_Software.htm
  15. Password Protecting Your Security Settings | Password_Protecting_Your_Security_Settings.htm
  16. Shortcut to the Software: the System Tray Icon | Shortcut_to_the_Software__the_System_Tray_Icon.htm
  17. Using the Main Console | Using_the_Main_Console.htm
  18. Using the Menus and the Toolbar | Using_the_Agent_Menus_and_Toolbar_in_Client_Control_Mode.htm
  19. What is this Pop-Up Window About? | What_is_this_Pop-Up_Window_About.htm
  20.  
  21. [Monitoring Your System: Logs]
  22. Understanding Logs | Understanding_Logs.htm
  23. Exporting Logs | Exporting_Logs.htm
  24. Viewing Logs | Viewing_Logs.htm
  25. Viewing the Security Log | Viewing_the_Security_Log.htm
  26. Viewing the Traffic Log | Viewing_the_Traffic_Log.htm
  27. Viewing the Packet Log | Viewing_the_Packet_Log.htm
  28. Viewing the System Log | Viewing_the_System_Log.htm
  29. Back Tracing Logged Events | Back_Tracing_Logged_Events.htm
  30.  
  31. [More About Default Values]
  32. Defaults: A Summary of Rules and Settings | Agent_Defaults__A_Summary_of_Rules_and_Settings.htm
  33.  
  34. [Protecting Your System]
  35. How to Set Permissions by Application | How_to_Set_Permissions_by_Application.htm
  36. How to Change Configuration Options | How_to_Change_Configuration_Options.htm
  37. Setting up Advanced Rules | Setting_up_Advanced_Rules.htm
  38.  
  39. [Receiving and Installing the Software]
  40. Receiving the Software | Receiving_the_Software.htm
  41. Installing the Software | Installing_the_Software.htm
  42. Upgrading Sygate Personal Firewall | Upgrading_Sygate_Personal_Firewall.htm
  43. Registering Sygate Personal Firewall | Registering_Sygate_Personal_Firewall.htm
  44. Uninstalling the Software | Uninstalling_the_Software.htm
  45.  
  46. [Setting Up Protection Based on Application]
  47. How to Set Permissions by Application | How_to_Set_Permissions_by_Application.htm
  48. Reviewing and Changing the Permission Status of an Application | Reviewing_and_Changing_the_Permission_Status_of_an_Application.htm
  49.  
  50. [Setting Up Protection by Configuration Changes]
  51. How to Change Configuration Options | How_to_Change_Configuration_Options.htm
  52. Review of General Configuration Options | Review_of_General_Configuration_Options.htm
  53. Sharing Files and Folders | Sharing_Files_and_Folders.htm
  54. Setting Detailed Security Options | Setting_Detailed_Security_Options.htm
  55. Setting Up Email Notification of Security Events | Setting_Up_Email_Notification_of_Security_Events.htm
  56. Updating Your Security | Updating_Your_Security.htm
  57. Logging Security Events on Your System | Logging_Security_Events_on_Your_System.htm
  58.  
  59. [Test Your System's Vulnerability]
  60. Using Sygate's Online Services | Using_Sygate_s_Online_Services.htm
  61. Performing a Quick Scan | Performing_a_Quick_Scan.htm
  62. Performing a Stealth Scan | performing_a_stealth_scan.htm
  63. Performing a Trojan Scan | performing_a_trojan_scan.htm
  64. Performing a TCP Scan | performing_a_tcp_scan.htm
  65. Performing a UDP Scan | performing_a_udp_scan.htm
  66. Performing an ICMP Scan | performing_an_icmp_scan.htm
  67.  
  68. [The Software in Context]
  69. Introduction | Introduction.htm
  70. How Firewalls Work | How_Firewalls_Work.htm
  71. What Does the Software Do? | What_Does_the_Software_Do_.htm
  72. Agent Defaults: an Introduction | Agent_Defaults__an_Introduction.htm
  73.  
  74. [Troubleshooting]
  75. Troubleshooting Sygate Personal Firewall | Troubleshooting_Sygate_Personal_Firewall.htm
  76. Firewall Configuration, Usage, and Software Expiration | Firewall_Configuration,_Usage,_and_Software_Expiration.htm
  77. Firewall Protection Against Attacks, Viruses, Trojans | Firewall_Protection_Against_Attacks,_Viruses,_Trojans.htm
  78. Firewall and Internet Connection Sharing, VPNs, and Networking | Firewall_and_Internet_Connection_Sharing,_VPNs,_and_Networking.htm
  79.  
  80. [Understanding Pop-Up Messages]
  81. What is this Pop-Up Window About? | What_is_this_Pop-Up_Window_About.htm
  82. Why Did I Get a Pop-Up Message? | Why_Did_I_Get_a_Pop-Up_Message_.htm
  83. Why Did I get a Security Notification? | Why_did_I_get_a_Security_Notification_.htm
  84.  
  85. [Welcome]
  86. Welcome to Online Help | Welcome_to_Online_Help.htm
  87. What's New | What_s_New.htm
  88. Related Documentation | Related_Documentation.htm
  89. Intended Audience | Intended_Audience.htm
  90. Technical Support | Technical_Support.htm
  91.  
  92.  
  93.