  Release Notes for VirusScan Command Line v4.5
           Anti-Virus Software (4054)
  Copyright (c) 1992-1999 Networks Associates
     Technology, Inc. All Rights Reserved.

Product Release Date: December 1, 1999
Engine Version Shipped with This Product: 4.0.50

Thank you for using VirusScan Command Line anti-
virus software. This Read Me file contains
important information regarding this release.
Network Associates strongly recommends that you
read the entire document.

Network Associates welcomes your comments and
suggestions. Please use the information
provided in this file to contact Customer
Care, technical support, or the documentation
team for this product.

___________________
WHAT'S IN THIS FILE

- AV1  About the VirusScan Command Line Software
- NF1  New Features
- DC1  Documentation
- IN1  Installation
       - IN2  Using a Setup Feature to Install
              VirusScan Command Line Software
       - IN3  Copying VirusScan Command Line Files
              to Your Hard Disk
       - IN4  Primary Program Files
       - IN5  Testing Your Installation
       - IN6  Removing the VirusScan Command Line
              Software
- KN1  Known Issues
- FQ1  Frequently Asked Questions
- NA1  Contacting Network Associates
       - NA2  Download Support
       - NA3  For Product Upgrades
       - NA4  For Reporting Problems
       - NA5  For On-Site Training Information
       - NA6  Network Associates Beta Site
       - NA7  AVERT Anti-Virus Research Site
- YC1  Statement of Year 2000 Compliance
- CT1  Copyright and Trademark Attributions
       - CT2  Trademarks
       - CT3  License Agreement

NOTE:  A unique identifying code precedes
       each heading in this file. To jump to
       a particular heading within the file,
       copy the three-character code--NA1,
       for example--from the list above into
       your text editor's Find dialog box, or
       equivalent, then search for the
       identifying code to move directly to
       that heading.


           **** IMPORTANT NOTE ****

This release of the VirusScan Command Line
software functions ONLY with the 40XX .DAT
file series. You CANNOT use the VirusScan
Command Line software with .DAT file versions
from the 30XX, the 97XX or the 98XX series,
nor may you use the .DAT files included in
this release with 2.x or 3.x versions of the
VirusScan Command Line software.

                    *****

_______________________________________________
AV1 - ABOUT THE VIRUSSCAN COMMAND LINE SOFTWARE

The VirusScan Command Line software consists of
a principal executable file, SCAN.EXE, and two
modular files, SCANPM.EXE and SCAN86.EXE, which
allow the software to adapt intelligently and
dynamically to the environment in which you run
it.

Network Associates distributes two versions of
the VirusScan Command Line package: one version
comes with a Setup feature, a batch file that
installs the program files for you; the other
version consists only of the program files.
You can copy this version directly to your hard
disk. The first version also comes with the
VShield TSR, which provides continuous
background scanning protection for computers
running in DOS and Windows 3.1x environments.

To start the VirusScan Command Line software,
you need only run SCAN.EXE, together with any
options you want to use to configure your scan
operation. As it starts, SCAN.EXE examines your
environment to see what resources your computer
has available. If your computer is running in a
32-bit environment, SCAN.EXE handles the scan
operation itself. If you are running in a 16-bit
environment with sufficient extended (XMS)
memory, SCAN.EXE hands the scan task to
SCANPM.EXE for execution. Otherwise, SCAN.EXE
will call SCAN86.EXE to perform the scan
operation.

__________________
NF1 - NEW FEATURES

*  Enhanced PowerPoint .PPT file cleaning

   The VirusScan Command Line application can now
   clean viruses both from infected Microsoft
   PowerPoint .PPT files and from any files
   embedded within .PPT files, including infected
   Microsoft Word documents and Microsoft Excel
   spreadsheets.

*  Windows 32-bit virus detection in memory

   The VirusScan Command Line application can now
   detect and remove resident viruses written for
   a Windows 32-bit environment from your system
   memory.

*  Detection for encoded archive files

   A new /MIME option tells the VirusScan Command
   Line application to detect infections within
   archives converted to UUEncode, XXEncode,
   Base64, and BinHex formats. To enable detection
   for these archive types, you must run the
   engine with the /MIME option.

*  Detection and cleaning for files that have no
   extensions

   The VirusScan Command Line application can detect
   and remove macro viruses and viruses that infect
   OLE objects from files whose names do not have
   extensions. This means, for example, that the
   engine will find and remove an infecting virus
   within a Microsoft Word file named DOCUMENT
   instead of DOCUMENT.DOC.

*  Enhanced .ZIP file cleaning

   The VirusScan Command Line application can now
   clean self-extracting WinZip archive files.

*  Complete file scanning

   You can now run the scan engine with either the
   /CLEAN or the /REPAIR options in order to scan
   every single file on your system. A periodic
   "clean up" scan operation of this type ensures
   that viruses don't sneak onto your system through
   renamed or extensionless files.

___________________
DC1 - DOCUMENTATION

Network Associates provides each of its products
with an extensive set of documentation, which
usually consists of one or more product guides
saved in Adobe Acrobat Portable Document Format
(.PDF), and an online help system, whose form
can vary, depending on the platform on which the
product runs.

Acrobat .PDF files are flexible online documents
that contain hyperlinks, outlines and other aids
for easy navigation and information retrieval.
You can also install an Acrobat plug-in file
that allows you to read .PDF documents from
within your web browser while online. Copies
of the product documentation come with the
product CD-ROM or are available on the Network
Associates website at:

ftp://ftp.nai.com/pub/manuals/total_virus_defense

A copy of the latest version of the free Acrobat
Reader also comes with the product CD-ROM, or
you can download the latest English-language
version from the Network Associates FTP site at:

ftp://ftp.nai.com/pub/manuals/acrobat_reader

To download other Acrobat Reader versions, visit
the Adobe website at:

http://www.adobe.com/prodindex/acrobat/readstep.html

IMPORTANT: Most Network Associates TVD product
           documentation produced during and
           after September 1999 requires the
           use of Adobe Acrobat Reader v4.0.
           Exceptions include documentation for
           products that run on Windows 3.1x
           systems and products that run on
           OS/2 systems. The most current
           Acrobat Reader versions available
           for these platforms are v3.x
           versions.

Most Network Associates products can include a
documentation set drawn from these components:

NOTE: Not all products will include all listed
      documents. Consult the User's Guide or
      Administrator's Guide that comes with
      your product for a complete list.

 * A Getting Started Guide. This guide
   introduces the product, provides installation
   instructions, outlines product features, and
   provides a brief overview. In many cases, a
   printed version of this guide will also
   accompany the product CD-ROM. For many
   products you can also download an online
   version from the Network Associates FTP site
   in Adobe Acrobat .PDF format.

 * A User's Guide. Network Associates User's
   Guides document all product functions
   extensively, and discuss how best to use
   your Network Associates product to accomplish
   your tasks. An Adobe Acrobat .PDF version of
   the document is stored on the product CD-ROM.
   You can also download a copy in .PDF format
   from the Network Associates FTP site.

 * An Administrator's Guide. Administrator's
   Guides describe how to deploy, maintain and
   administer Network Associates server-based
   products in a networked environment. An
   Adobe Acrobat .PDF version of the document
   is stored on the product CD-ROM. You can
   also download a copy in .PDF format from
   the Network Associates FTP site.

 * Specialized guides. These can include
   reference guides, deployment guides,
   configuration guides, vulnerability guides
   for intrusion detection software, and other
   product-specific documentation.

 * An online help system. Online help gives you
   quick access to hints and tips about how to
   use your Network Associates software. The
   format of the online help system for the
   product will vary, depending on which
   platform or operating system you use to run
   your Network Associates product. In most
   cases, the software will display a Help menu
   item or link that you can use to start the
   system.

   Some products might also include context-
   sensitive online help. To see brief,
   descriptive help topics for buttons, lists
   or other elements within dialog boxes, right
   click each item, then click the What's This?
   menu item that appears. This type of help
   appears only in products that run on Windows
   systems.

 * A LICENSE.TXT file. This file outlines the
   terms of your license to use your Network
   Associates product. Read it carefully. If
   you install the Network Associates product,
   you agree to the license terms.

 * This README.TXT file. This file describes
   last-minute additions or changes to the
   documentation, lists any known behavior or
   other issues with the product release,
   and often supplements the Acrobat .PDF
   guides by outlining new product features
   in incremental product updates.

To comment, ask about, or suggest improvements
to Network Associates anti-virus product
documentation, send e-mail to:

tvd_documentation@nai.com

To get answers to your technical support
questions, send messages to:

techsupport@mcafee.com

To ask about your eligibility for updates and
upgrades, check your registration, or ask
general questions related to Network Associates
software, send messages to:

custcare@nai.com

__________________
IN1 - INSTALLATION

* IN2 - USING A SETUP FEATURE TO INSTALL VIRUSSCAN
  COMMAND LINE SOFTWARE *

To install the VirusScan Command Line software
that includes a Setup feature, follow these
steps:

1.  Prepare the VirusScan Command Line program
    files.

    If you plan to download your copy of the
    application, first create a temporary
    directory on your hard disk, then download
    the VirusScan Command Line archive to that
    directory. Next, extract the VirusScan
    software installation files from the
    archive. You can obtain one of the
    utilities necessary to extract the files
    from most online services.

    If your copy of the VirusScan Command Line
    software came on CD-ROM, insert the disc
    into your CD-ROM drive.

2.  Change to the directory you created, or
    change to the directory on the CD-ROM that
    contains the VirusScan Command Line
    program files.

3.  Type INSTALL at the command line to start
    the installation batch file.

    A welcome dialog box appears. Type N to
    move to the next dialog box.

4.  If you are installing the VirusScan
    Command Line software from within an
    MS-DOS Prompt or Command-Line Prompt
    window, the installation batch file will
    ask you whether you want to install the
    VShield scanner. Type Y to install the
    scanner, or type N to skip this program.

    NOTE: This version of the VShield on-access
          that comes with the VirusScan Command
          Line application is a terminate-and-
          stay-resident (TSR) program for 16-bit
          environments. It will NOT function in
          a 32-bit environment--do not install
          it if you are running in one of these
          environments.

          A separate VShield VxD scanner comes
          with the VirusScan product version
          that runs on each of these respective
          platforms.

5.  Specify an installation directory for the
    VirusScan Command Line software and its
    associated files. By default, the
    installation directory is:

    C:\NETA\SCAN

    To accept this directory designation, press
    TAB to move to the Next button, then type N
    to continue. Otherwise, press the Backspace
    key on your keyboard to delete the
    designated path, then type the new path you
    want in the space provided. Press TAB to
    move to the Next button, then type N to
    continue.

6.  The installation batch file will offer to
    create the directory you specified, if the
    directory does not exist. Type Y to allow
    it to do so.

    The installation utility will then copy the
    VirusScan Command Line software to your
    hard disk.

7.  When it has finished, the installer will ask
    you whether you want it to modify your
    AUTOEXEC.BAT file so that VShield starts as
    soon as your computer does. Type Y to allow
    this modification, or type N to skip this
    modification.

    You can start the VShield scanner at a later
    time by changing to the VirusScan Command
    Line program directory, then typing VSHIELD
    at the command line, together with any
    scanning options you want to use. Consult
    the VirusScan Command Line User's Guide
    for details.

8.  After it finishes copying files and
    performing other modifications you
    authorized, the installation utility
    will offer to scan your system for viruses
    immediately.

    To have the VirusScan scanner examine only
    your system files, type S. To have VirusScan
    examine all hard disks on your system, type
    F. To skip the scan operation altogether,
    type C.

* IN3 - COPYING VIRUSSCAN COMMAND LINE FILES TO YOUR
  HARD DISK *

Network Associates also makes available a
VirusScan Command Line software package that
does not have an installation utility. This
package does not include the VShield on-access
scanner.

To copy the VirusScan Command Line version that
does not have an included installation utility
to your hard disk, follow these steps:

1.  Make a directory for the VirusScan software
    on your hard disk.

2.  Copy the VirusScan Command Line files to
    that directory.

3.  Use any DOS text editor to open your
    AUTOEXEC.BAT file, then add the directory
    you just created to the path statement in
    that file. To learn how to edit your
    AUTOEXEC.BAT file, consult your DOS
    documentation.


* IN4 - PRIMARY PROGRAM FILES *

Files located in the installation directory:
============================================

     AVPARAM.DLL = VirusScan 32-bit/16-bit
                    support file
    BOOTSCAN.EXE = Scanner for boot disk
       CLEAN.DAT = Virus clean definition data
     EMCLEAN.DAT = Virus definition data for
                    boot disk
     EMNAMES.DAT = Virus definition data for
                    boot disk
      EMSCAN.DAT = Virus definition data for
                    boot disk
     LICENSE.DAT = License information for use
                    by VirusScan Command Line
    MCSCAN16.DLL = 16-bit scanning engine
    MCSCAN32.DLL = 32-bit scanning engine
      MCTOOL.EXE = Scanning support file
    MESSAGES.DAT = Message contents file for use
                    with VirusScan Command Line
       NAMES.DAT = Virus names definition data
     PACKING.LST = Packing list
      README.1ST = Network Associates license
                    document
                    program
    RESELLER.TXT = Network Associates authorized
                    resellers
     RWABS16.DLL = VirusScan 32-bit/16-bit
                    support file
     RWABS32.DLL = VirusScan 32-bit/16-bit
                    support file
        SCAN.DAT = Virus detection data
        SCAN.EXE = VirusScan Command Line
                    program for 32-bit
                    environments
      SCANPM.EXE = VirusScan Command Line
                    program for protected mode
                    environments
    VALIDATE.EXE = Authenticity validation
     VSHIELD.EXE = Terminate-and-stay-resident
                    scanner included with the
                    VirusScan Command Line
                    application that has a
                    Setup utility
      README.TXT = This document


* IN5 - TESTING YOUR INSTALLATION *

The EICAR Standard AntiVirus Test File is a
combined effort by anti-virus vendors
throughout the world to implement one
standard by which customers can verify their
anti-virus installations.

To test your installation, copy the following
line into its own file, then save the file
with the name EICAR.COM.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

The file size will be 68 or 70 bytes.

Next, start your anti-virus software and allow
it to scan the directory that contains
EICAR.COM. When your software scans this file,
it will report finding the EICAR test file.

Note that this file is NOT A VIRUS. Delete the file
when you have finished testing your installation to
avoid alarming unsuspecting users.


* IN6 - REMOVING THE VIRUSSCAN COMMAND LINE
  SOFTWARE *
To remove the VirusScan Command Line software
from your hard disk, follow these steps:

1.  If you have the VShield scanner running on
    your computer, first remove it from memory
    by typing VSHIELD /REMOVE at the command
    prompt.

    If you see an error message that tells you
    that you cannot remove the VShield scanner
    from memory, use any text editor to open
    your AUTOEXEC.BAT file, then remove all
    lines that refer to the VShield scanner.
    Next, reboot your computer. The VShield
    scanner will not load and will not remain
    in memory.

    NOTE: If you remove VirusScan files from
          your hard disk before you remove the
          VShield scanner from memory, you'll
          see an error message that will remain
          until you remove the VShield scanner
          from memory or restart your computer.

2.  Change to the VirusScan Command Line
    program directory, then delete all
    VirusScan files from your hard disk.
    A list of files installed for the VirusScan
    Command Line software appears earlier in
    this file.

__________________
KN1 - KNOWN ISSUES

1.  The VirusScan Command Line scanner opens
    and expands .ZIP files to look inside them
    for viruses. It will correctly detect any
    infected files within the .ZIP file and
    will correctly remove any viruses it finds,
    but it will NOT compress the .ZIP file
    again.

2.  To preserve the last access dates for files
    on Novell NetWare servers when you run the
    VirusScan application from a Windows
    workstation, you must run SCAN.EXE with the
    /PLAD option. The /PLAD option, in turn,
    requires that you have the file MCTOOL.EXE
    installed in your VirusScan Command Line
    program directory.

2.  The VirusScan software does not delete or
    move infected objects detected within
    Microsoft Office binder files.

3.  The Virus List appears with incorrectly
    formatted text if you run SCAN.EXE with
    the /VIRLIST option.

4.  Because Windows NT includes security
    features that protect your system from
    unauthorized tampering, the VirusScan
    Command Line software cannot scan certain
    files on your system. These files include
    PAGEFILE.SYS, registry hive files, and user
    profiles. When VirusScan tries to scan
    these files, your system will beep and
    display a Read Access Denied error message.
    This message is not critical and does not
    affect how your system functions.

5.  The VirusScan Command Line software cannot
    scan the boot sectors or the Master Boot
    Record on Windows NT systems unless you
    have administrative rights. To use the
    VirusScan software to scan these areas,
    you must log in as a user who has
    administrative rights.

6.  The VirusScan software will detect and
    remove the XF/SIC.A virus from infected
    Microsoft Excel documents. If you later
    use Excel 97 to open a file from which
    the VirusScan software has removed this
    virus, Excel will tell you that it cannot
    find a particular worksheet within the
    file at a particular cell reference. It
    will also tell you that continuing could
    damage your worksheet and ask you whether
    you want to cancel your request to open
    the file. The worksheet name it mentions
    will vary.

    You may safely open the worksheet. Click
    No in the confirmation dialog box to
    continue.

    To prevent the message from reappearing,
    open the document in Excel, then click
    the Insert menu, point to Name, then
    choose Define. In the dialog box that
    appears, delete the entries Auto_Open
    and Auto_Close. Save and close the file
    normally.

7.  If you use a computer with an Intel 8086
    or 8088 processor running in real mode,
    your system might not have sufficient
    memory to run SCAN86.EXE.

8.  SCAN.EXE calls SCANPM.EXE to perform a
    scan operation only if you have HIMEM.SYS
    active on your system. If you do not,
    SCAN.EXE will assume that you do not have
    sufficient extended memory to run
    SCANPM.EXE. If this happens, you may still
    run SCANPM.EXE from the command line
    yourself, together with any options you
    want to use. If you run SCANPM.EXE from
    a Windows NT system, you must be sure to
    allocate sufficient extended memory to the
    DOS partition you run.

9.  If you have more than 25 infected files on
    your computer, using the /CLEANDOCALL
    option will not remove all of the viruses
    from your infected files. As a workaround
    for this problem, add the /CLEAN option
    after /CLEANDOCALL on the same command
    line. To do so, type this line at the
    command line:

    scan /cleandocall /clean

10. The VirusScan Command Line application includes
    Trojan horse file detection that allows it to
    shut down harmful Trojan horse processes and
    remove all traces of the harmful software from
    your computer. To enable support for
    this function on Windows NT systems, you must
    also have two separate dynamic link library
    (.DLL) files, PSAPI.DLL and VDMDBG.DLL,
    installed in the \WINNT\System32 folder on
    your system.

    NOTE: These files do NOT come with the VirusScan
          Command Line package. If they do not exist
          on your system, you must install them from
          your Windows NT distribution disc.

________________________________
FQ1 - FREQUENTLY ASKED QUESTIONS

Regularly updated lists of frequently asked
questions about Network Associates products
also are available on the Network Associates
website and on CompuServe and America Online.

Q:  How do I enable the Centralized Alerting
    and Reporting option?

A:  The VirusScan Command Line software now
    supports Centralized Alerting and
    Reporting to remote NetWare or Windows NT
    servers running NetShield* for Windows NT
    software v2.5.3 and later, or NetShield
    for NetWare software* v2.3.3 and later.
    To configure this option on your VirusScan
    client, run SCAN.EXE with the /ALERTPATH
    <directory> option, where <directory> is
    the path to the remote NetWare volume or
    Windows NT directory. From this directory,
    the NetShield module can broadcast or
    compile the alerts and reports according
    to its established configuration.

    NOTE: The client must have write access
          to <directory> and the directory
          must contain the CENTALRT.TXT file
          that comes with the NetShield
          application.

    To send a complete alert file that
    identifies the infected system and its
    user, establish the following environment
    variables or add them to the AUTOEXEC.BAT
    file.

      Set COMPUTERNAME=<name of computer>
      Set USERNAME=<user name>

    The VirusScan software sends an .alr text
    file to the server when it detects an
    infected file. When the server receives
    the alert file, the NetShield for Windows NT
    software or NetShield for NetWare software
    will send an alert message to an
    administrator and to other appropriate
    recipients, if any.


Q:  How can I scan my Zip drive?

A:  If you cannot scan a Zip disk cartridge, run
    SCAN.EXE with the /NODDA switch. To do so,
    type this line at the command prompt:

    SCAN X: /NODDA

    Here, X: is the letter that corresponds to
    your Zip drive.


Q:  How can I run the VirusScan Command Line
    software from a NetWare login script
    without running out of memory?

A:  Follow these steps:

    1.  Rename LOGIN.EXE to LOGIN1.EXE, then
        remove any references to the VirusScan
        software from the file.

    2.  Create a batch file named LOGIN.BAT.

    3.  Use the first line of the batch file
        to run the VirusScan software with
        whatever options you want to include.

    4.  Use the second line of the batch file
        to run LOGIN1.EXE.

    These steps prevent LOGIN.EXE and SCAN.EXE
    from loading into memory at the same time,
    which allows the VirusScan Command Line
    software to run before your computer tries
    to get access to the network. Your login
    script should then run without
    complications.


Q:  I tried running SCAN.EXE with the /PLAD
    option so that I could preserve the
    access dates on a Novell NetWare server
    I back up regularly. But the access dates
    changed anyway. What happened?

A:  To implement the /PLAD function, the
    VirusScan application needs a file called
    MCTOOL.EXE in its program directory. This
    executable file does not have a user
    interface and is not something you can
    configure; rather, the application uses
    this file itself to implement the /PLAD
    option. Verify that the file exists in
    your VirusScan program directory, then
    run your scan operation again, with the
    /PLAD option.


Q:  Can I clean the Master Boot Record (MBR)
    on a hard disk formatted with the
    Windows NT file system (NTFS)?

A:  Yes. Follow these steps:

    1.  Start the computer with the NTFS
        partition from a virus-free DOS boot
        disk.

    2.  Start the VirusScan Command Line
        software with these options: /BOOT
        /CLEAN. Be sure to run the VirusScan
        software from a virus-free floppy disk.

    This cleans the NTFS Master Boot Record, but
    the VirusScan Command Line software cannot
    read the rest of the NTFS partition when you
    boot into a DOS environment. To scan the
    rest of the NTFS partition, reboot into
    Windows NT, then run the VirusScan Command
    Line software again. Consult the VirusScan
    Command Line User's Guide to learn how to
    create a boot disk with BOOTSCAN.EXE.


Q:  Can I update the VirusScan data files so
    that the software detects new viruses?

A:  Yes. If you have Internet access, you can
    download new virus definition (.DAT) files
    from the Network Associates website or
    from other online services. To download
    data files from the Network Associates
    website, follow these steps:

    1.  Back up your existing .DAT files, if you
        want to keep them.

    2.  Use a web browser to connect to the
        Network Associates website at
        http://www.nai.com.

    3.  Click the Download Updates Now link in
        the top right corner of the page.

    4.  Click the .DAT File Updates link beneath
        the Introduction heading at the left of
        the page.

    5.  Choose the correct file for your
        software, then click the link to
        download the correct files.

    6.  Network Associates stores .DAT files
        in a compressed form to reduce
        transmission time. Unzip the files
        into a temporary directory, unload
        the VShield TSR scanner, if you
        have it running, then copy the new
        files to your existing VirusScan
        directory. Allow the new files to
        replace your old files.

    6.  Before you start any scan operations,
        shut down your computer, wait a few
        seconds, then turn it on again.

    NOTE: You will find references to self-
          installing .DAT files (XXXXUPDT.EXE)
          on the Network Associates website.
          You cannot use these self-installing
          .DAT files with the VirusScan Command
          Line software.


___________________________________
NA1 - CONTACTING NETWORK ASSOCIATES

On December 1, 1997, McAfee Associates merged
with Network General Corporation, Pretty Good
Privacy, Inc., and Helix Software, Inc. to form
Network Associates, Inc. The combined Company
subsequently acquired Dr Solomon's Software,
Trusted Information Systems, Magic Solutions,
and CyberMedia, Inc.

Network Associates continues to market and
support the product lines from each of the
former entities. You may direct all questions,
comments, or requests concerning the software
you purchased, your registration status, or
similar issues to the Network Associates
Customer Service department at the addresses or
phone numbers listed below.

Contact the Network Associates Customer Service
department at:

1.  Phone (972) 308-9960
    Monday-Friday, 6:00 A.M. - 6:00 P.M.
    Pacific time

2.  Fax (408) 970-9727
    24-hour, Group III Fax

3.  E-mail: custcare@nai.com

Send correspondence to any of the following
Network Associates locations:

     Network Associates Corporate Headquarters
     3965 Freedom Circle
     McCandless Towers
     Santa Clara, CA 95054

     Phone numbers for corporate-licensed
     customers:
     Phone: (972) 308-9960
     Fax:   (408) 970-9727

     Phone numbers for retail-licensed
     customers:
     Phone: (972) 855-7044
     Fax:   (408) 970-9727

Network Associates offices outside the United
States:

     Network Associates Australia
     Level 1, 500 Pacific Highway
     St. Leonards, NSW
     Sydney, Australia 2065
     Phone: 61-2-8425-4200
     Fax:   61-2-9439-5166

     Network Associates Austria
     Pulvermuehlstrasse 17
     Linz, Austria
     Postal Code A-4040
     Phone: 43-732-757-244
     Fax:   43-732-757-244-20

     Network Associates Belgique
     BDC Heyzel Esplanade, bote 43
     1020 Bruxelles
     Belgique
     Phone: 0032-2-478.10.29
     Fax:   0032-2-478.66.21

     Network Associates do Brasil
     Rua Geraldo Flausino Gomez 78
     Cj. - 51 Brooklin Novo - So Paulo
     SP - 04575-060 - Brasil
     Phone:  (55 11) 5505 1009
     Fax:    (55 11) 5505 1006

     Network Associates Canada
     139 Main Street, Suite 201
     Unionville, Ontario
     Canada L3R 2G6
     Phone: (905) 479-4189
     Fax:   (905) 479-4540

     Network Associates
     People's Republic of China
     New Century Office Tower, Room 1557
     No. 6 Southern Road Capitol Gym
     Beijing
     People's Republic of China 100044
     Phone: 86 10 6849-2650
     Fax:   86 10 6849-2069

     Network Associates Denmark
     Lautruphoej 1-3
     2750  Ballerup
     Danmark
     Phone: 45 70 277 277
     Fax:   45 44 209 910

     NA Network Associates Oy
     Mikonkatu 9, 5. krs.
     00100 Helsinki
     Finland
     Phone: 358 9 5270 70
     Fax:   358 9 5270 7100

     Network Associates France S.A.
     50 Rue de Londres
     75008 Paris
     France
     Phone: 33 1 44 908 737
     Fax:   33 1 45 227 554

     Network Associates GmbH
     Ohmstrae 1
     D-85716 Unterschleiheim
     Deutschland
     Phone: 49 (0)89/3707-0
     Fax:   49 (0)89/3707-1199

     Network Associates Hong Kong
     19th Floor, Matheson Centre
     3 Matheson Way
     Causeway Bay
     Hong Kong 63225
     Phone: 852-2832-9525
     Fax:   852-2832-9530

     Network Associates Srl
     Centro Direzionale Summit
     Palazzo D/1
     Via Brescia, 28
     20063 - Cernusco sul Naviglio (MI)
     ITALY
     Phone: 39 02 92 65 01
     Fax:   39 02 92 14 16 44

     Network Associates Japan, Inc.
     Toranomon 33 Mori Bldg.
     3-8-21 Toranomon Minato-ku
     Tokyo 105-0001 Japan
     Phone: 81 3 5408 0700
     Fax:   81 3 5408 0780

     Network Associates Latin America
     1200 South Pine Island Road, Suite 375
     Plantation, Florida 33324
     United States
     Phone: (954) 452-1721
     Fax:   (954) 236-8031

     Network Associates de Mexico
     Andres Bello No. 10, 4 Piso
     4th Floor
     Col. Polanco
     Mexico City, Mexico D.F. 11560
     Phone: (525) 282-9180
     Fax:   (525) 282-9183

     Network Associates International B.V.
     Gatwickstraat 25
     1043 GL Amsterdam
     The Netherlands
     Phone: 31 20 586 6100
     Fax:   31 20 586 6101

     Network Associates Portugal
     Av. da Liberdade, 114
     1269-046 Lisboa
     Portugal
     Phone:  351 1 340 4543
     Fax:    351 1 340 4575

     Net Tools Network Associates South Africa
     Bardev House, St. Andrews
     Meadowbrook Lane
     Epson Downs, P.O. Box 7062
     Bryanston, Johannesburg
     South Africa 2021
     Phone: 27 11 706-1629
     Fax:   27 11 706-1569

     Network Associates South East Asia
     78 Shenton Way
     #29-02
     Singapore 079120
     Phone: 65 222-7555
     Fax:   65 222-7555

     Network Associates Spain
     Orense 4, 4a Planta.
     Edificio Trieste
     28020 Madrid
     Spain
     Phone: 34 9141 88 500
     Fax:   34 9155 61 404

     Network Associates Sweden
     Datavgen 3A
     Box 596
     S-175 26 Jrflla
     Sweden
     Phone: 46 (0) 8 580 88 400
     Fax:   46 (0) 8 580 88 405

     Network Associates AG
     Baeulerwisenstrasse 3
     8152 Glattbrugg
     Switzerland
     Phone: 0041 1 808 99 66
     Fax:   0041 1 808 99 77

     Network Associates Taiwan
     Suite 6, 11F
     No. 188, Sec. 5
     Nan King E. Rd.
     Taipei, Taiwan, Republic of China
     Phone: 886-2-27-474-8800
     Fax:   886-2-27-635-5864

     Network Associates International Ltd.
     Minton Place, Victoria Street
     Windsor, Berkshire
     SL4 1EG
     United Kingdom
     Phone: 44 (0)1753 827 500
     Fax:   44 (0)1753 827 520


Or, you can receive online assistance through
any of the following resources:

 1.  Internet E-mail:

     techsupport@mcafee.com

 2.  Internet FTP:

     ftp://ftp.nai.com

 3.  World Wide Web:

     http://www.nai.com/asp_set/support/technical/intro.asp

 4.  America Online: keyword MCAFEE

 5.  CompuServe: GO NAI

To provide the answers you need quickly and
efficiently, the Network Associates technical
support staff needs some information about
your computer and your software. Please have
this information ready when you call:

 - Program name and version number
 - Computer brand and model
 - Any additional hardware or peripherals
   connected to your computer
 - Operating system type and version numbers
 - Network name, operating system, and version
 - Network card installed, where applicable
 - Modem manufacturer, model, and bits-per-
   second rate, where applicable
 - Relevant browsers or applications and their
   version numbers, where applicable
 - How to reproduce your problem: when it
   occurs, whether you can reproduce it
   regularly, and under what conditions
 - Information needed to contact you by voice,
   fax, or e-mail


* NA2 - DOWNLOAD SUPPORT *

To get help with navigating or downloading files
from the Network Associates website or FTP site,
call:

Corporate customers   (801) 492-2650
Retail customers      (801) 492-2600


* NA3 - FOR PRODUCT UPGRADES *

Network Associates has a worldwide range of
partnerships and reseller relationships with
hundreds of independent vendors, each of which
can provide you with consulting services, sales
advice, and product support for Network
Associates software. To find a reseller near
your location, see the RESELLER.TXT file
located on your product CD-ROM or installed on
your hard disk. For assistance in locating a
local reseller, you can also contact Network
Associates Customer Service.


* NA4 - FOR REPORTING PROBLEMS *

Network Associates prides itself on delivering
a high-quality product. If you find any
problems, please take a moment to review the
contents of this file. If the problem you've
encountered appears in the Known Issues section
of this README.TXT file, Network Associates is
already aware of the problem, and you need not
report it.

If you find any feature that does not appear to
function properly on your system, or if you
believe an application would benefit greatly
from enhancement, please contact Network
Associates or one of its resellers with your
suggestions or concerns.


* NA5 - FOR ON-SITE TRAINING INFORMATION *

Contact Network Associates Customer Service at
(800) 338-8754.


* NA6 - NETWORK ASSOCIATES BETA SITE *

To test pre-release software and obtain update
files, including virus definition (.DAT) files,
visit the Network Associates beta site at
http://beta.nai.com. You will have access to
Public Beta and External Test Areas. Your
feedback will make a difference.


* NA7 - AVERT ANTI-VIRUS RESEARCH SITE *

To see the latest information about emerging
virus threats, submit samples of potentially
infected files, and download updated scanning
engine files, EXTRA.DAT files, and similar
anti-virus software for testing, visit the
AVERT research site at:

          http://www.avertlabs.com

Network Associates also seeks and appreciates
general feedback.

_______________________________________
 YC1 - STATEMENT OF YEAR 2000 COMPLIANCE

To learn about Network Associates Year 2000
standards and testing models, and to see a
list of compliant Network Associates products,
visit the Network Associates website at:

          http://www.nai.com/y2k

For further information or questions, send an
e-mail message to: y2k@nai.com.

__________________________________________
CT1 - COPYRIGHT AND TRADEMARK ATTRIBUTIONS

Copyright (c) 1999 Networks Associates
Technology, Inc. All Rights Reserved. No part
of this publication may be reproduced,
transmitted, transcribed, stored in a
retrieval system, or translated into any
language in any form or by any means without
the written permission of Networks Associates
Technology, Inc., or its suppliers or affiliate
companies.

* CT2 - TRADEMARKS *

* ActiveHelp, Bomb Shelter, Building a World of
Trust, CipherLink, Clean-Up, Cloaking, CNX,
Compass 7, CyberCop, CyberMedia, Data Security
Letter, Discover, Distributed Sniffer System,
Dr Solomon's, Enterprise Secure Cast, First
Aid, ForceField, Gauntlet, GMT, GroupShield,
HelpDesk, Hunter, ISDN Tel/Scope, LM 1,
LANGuru, LeadingHelp Desk Technology, Magic
Solutions, MagicSpy, MagicTree, Magic
University, MagicWin, MagicWord, McAfee,
McAfee Associates, MoneyMagic, More Power To
You, Multimedia Cloaking, NetCrypto,
NetOctopus, NetRoom, NetScan, Net Shield,
NetShield, NetStalker, Net Tools, Network
Associates, Network General, Network Uptime!,
NetXRay, Nuts & Bolts, PC Medic, PCNotary,
PGP, PGP (Pretty Good Privacy), PocketScope,
Pop-Up, PowerTelnet, Pretty Good Privacy,
PrimeSupport, RecoverKey, RecoverKey-
International, ReportMagic, RingFence, Router
PM, Safe & Sound, SalesMagic, SecureCast,
Service Level Manager, ServiceMagic, Site
Meter, Sniffer, SniffMaster, SniffNet,
Stalker, Statistical Information Retrieval
(SIR), SupportMagic, Switch PM, TeleSniffer,
TIS, TMach, TMeg, Total Network Security,
Total Network Visibility, Total Service Desk,
Total Virus Defense, T-POD, Trusted Mach,
Trusted Mail, Uninstaller, Virex, Virex-PC,
Virus Forum, ViruScan, VirusScan, VShield,
WebScan, WebShield, WebSniffer, WebStalker,
WebWall, and ZAC 2000 are registered
trademarks of Network Associates and/or its
affiliates in the US and/or other countries.
All other registered and unregistered
trademarks in this document are the sole
property of their respective owners.

* CT3 - LICENSE AGREEMENT *

NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR
LICENSE TO USE THE SOFTWARE THAT THIS DOCUMENTATION
DESCRIBES, CONSULT THE LICENSE.TXT, README.1ST, OR
OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR
SOFTWARE, EITHER AS A TEXT FILE OR AS PART OF THE
SOFTWARE PACKAGING. IF YOU DO NOT AGREE TO ALL OF
THE TERMS SET FORTH THEREIN, DO NOT INSTALL THE
SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT
TO THE PLACE OF PURCHASE FOR A FULL REFUND.
