  Release Notes for McAfee(R) Anti-Phishing Filter
                 Technology Preview
           Copyright (C) 2005 McAfee, Inc.
                 All Rights Reserved


Thank you for using the Anti-Phishing Filter. This
file contains important information regarding this
technology preview. We strongly recommend that you
read the entire document.


__________________________________________________________
WHAT'S IN THIS FILE

-   About the Anti-Phishing Filter
-   Installation & System Requirements
-   Using and Configuring the Filter
-   Known Issues
-   Participating in the McAfee Beta Program
-   Contact Information
-   Copyright & Trademark Attributions
-   License & Patent Information


__________________________________________________________
ABOUT THE ANTI-PHISHING FILTER

This Anti-Phishing Filter preview introduces you to
the technology that McAfee is designing to combat
the growing problem of phishing attacks.

The filter runs silently as part of your Internet
Explorer and Windows Explorer programs. Each time
you attempt to connect to an Internet URL, the
filter compares the URL against information it holds
in a database of known (black) or suspected (gray)
phish sites and alerts you when it finds a match.

    NOTE:
    McAfee does not store information about the web
    sites that you visit.


__________________________________________________________
INSTALLATION AND SYSTEM REQUIREMENTS

SYSTEM REQUIREMENTS

You can install the McAfee Anti-Phishing Filter on
computers:

-   Running Microsoft Windows 32-bit operating
    systems (Windows NT, Windows 2000, Windows 2003 and 
    Windows XP).
-   Using Microsoft Internet Explorer 5 or above.


INSTALLATION STEPS

1.  To get the filter, connect to the following
    McAfee web site and download the file
    MAPFBHO.MSI to a location on your computer such
    as the desktop.

       http://www.mcafeesecurity.com/us/products/mcafee/antispam/category.htm

2.  Double-click the .MSI file to start the
    Installer.

3.  On the Welcome page, click Next to continue.

4.  The Installer asks if you want to continue with
    the installation; click Next to confirm.

5.  Click Finish to complete the installation
    process.


CHANGES TO THE COMPUTER

After the filter installs successfully, the
following changes occur to the computer:

-   The McAfee Anti-Phishing Filter appears in
    Internet Explorer under Tools | Managed
    Add-ons.
-   A McAfee Anti-Phishing Filter option appears
    in Internet Explorer under the Tools menu.
-   A .DLL file appears in the Windows Program Files
    folder:

       Program Files\McAfee\Anti-Phishing Filter\McAfeeAntiPhishingBHO.DLL

-   Each user who uses the tool finds that a
    MAPFDBF.DAT file is created in their Temp folder
    the first time that the filter runs.


UNINSTALLING THE FILTER

To remove the filter from the computer:

1.  Either double-click the MAPFBHO.MSI file or
    choose the Anti-Phishing Filter option from the
    Windows Add/Remove Programs feature.

2.  Click Remove.

3.  After the Installer removes the files, click
    Finish.

    The MAPFDBF.DAT file is not removed from each
    users Temp folder as part of the uninstallation
    process.

    NOTE:
    If you want to install a later version of the
    filter, each user must first remove the
    following entry from the Windows registry
    because the Installer does not remove it
    automatically:

    HKEY_CURRENT_USER\Software\McAfee\AntiPhish


__________________________________________________________
USING AND CONFIGURING THE FILTER

USING THE FILTER

Following installation, the filter runs silently as
part of your Internet Explorer and Windows Explorer
programs until you attempt to connect to a web site
that McAfee either knows is a phish site, or
suspects is a phish site.

URLs that we know are phish sites are categorized as
"black" sites and URLs that we suspect are phish
sites are categorized as "gray" sites.

When you type in the URL of a black site, the filter
redirects you to a McAfee-hosted web page that tells
you that we know the URL is a phish site and, by
default, will not allow you to continue.

When you type in the URL of a gray site, the filter
redirects you to another McAfee-hosted web page and
tells you that we suspect that the URL is a phish
site and offers you the chance to continue. If you
continue to that site, the site is accepted for that
Internet Explorer session. However, the next time
you open Internet Explorer, the URL will be blocked
again.


CONFIGURING THE FILTER

    By default, the filter automatically connects to
    McAfee as necessary to check for new
    configuration settings so you need do nothing
    further to it. However, there are two sets of
    options that you can change in its Configuration
    screen:

   -   Advanced Settings changes, for example, the
       update locations or the frequency of
       configuration updates.
   -   User Settings changes, for example, where the
       database installs or whether the user wishes
       to continue to sites identified as black or
       gray.

To configure the filter settings:

1.  Open Internet Explorer.

2.  From the Tools menu, choose McAfee
    Anti-Phishing Filter to see the Configuration
    screen.

3.  Deselect the Enable automatic configuration
    update mode checkbox to enable the
    configuration fields.

    TIP:
    Changes to the filters configuration settings
    may corrupt its performance. To return the
    filter to its original state, recheck the
    Enable automatic configuration update mode
    checkbox.



__________________________________________________________
KNOWN ISSUES

1.  The following registry key is not currently
    removed by the uninstallation process so you
    must remove it manually before you can install a
    newer version of the filter:

    HKEY_CURRENT_USER\Software\McAfee\AntiPhish


__________________________________________________________
PARTICIPATING IN THE MCAFEE BETA PROGRAM

To download new beta software or to read about the
latest beta information, visit the McAfee beta web
site located at:
       http://www.mcafeesecurity.com/us/downloads/beta/mcafeebetahome.htm

To submit beta feedback on any McAfee product, send
e-mail to:

       mcafee_beta@mcafee.com

McAfee is devoted to providing solutions based on
your input.


__________________________________________________________
CONTACT INFORMATION

Technical Support
    Direct support questions to the following e-mail
    address:
       mapf@mcafee.com


McAfee Beta Program
    Beta Web Site
       http://www.mcafeesecurity.com/us/downloads/beta/mcafeebetahome.htm


Security Headquarters:  AVERT
(Anti-Virus & Vulnerability Emergency Response
Team)
    Home Page
       http://www.mcafeesecurity.com/us/security/home.asp

    Virus Information Library
       http://vil.mcafeesecurity.com/

    AVERT WebImmune & Submit a Virus Sample
       https://www.webimmune.net/default.asp

    AVERT DAT Notification Service
       http://vil.mcafeesecurity.com/vil/join-DAT-list.asp


Download Site
    Home Page
       http://www.mcafeesecurity.com/us/products/mcafee/antispam/category.htm


Training
    On-Site Training
       http://www.mcafeesecurity.com/us/services/security/home.htm
    McAfee University
       http://www.mcafeesecurity.com/us/services/education/mcafee/university.htm


Customer Service
    US, Canada, and Latin America toll-free:
   Phone:     +1-888-VIRUS NO or +1-888-847-8766
              Monday-Friday, 8am-8pm, Central Time

   E-mail:    https://secure.mcafeesecurity.com/us/forms/support/request_form.asp

   Web:       http://www.mcafee.com/us/default.asp
              http://www.mcafeesecurity.com/us/support/default.asp


_____________________________________________________
COPYRIGHT AND TRADEMARK ATTRIBUTIONS

Copyright (C) 2005 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced,
transmitted, transcribed, stored in a retrieval
system, or translated into any language in any form
orbyany means without the written permission of
Networks Associates Technology, Inc., or its
suppliers or affiliate companies. To obtain this
permission, write to the attention of the McAfee
department at: 5000 Headquarters Drive, Plano, Texas
75024, or call +1-972-963-8000.


TRADEMARKS

Active Firewall, Active Security, ActiveSecurity
(and in Katakana), ActiveShield, AntiVirus Anyware
and design, Clean-Up, Design (Stylized E), Design
(Stylized N), Entercept, Enterprise SecureCast,
Enterprise SecureCast (and in Katakana), ePolicy
Orchestrator,  First Aid, ForceField, GMT,
GroupShield, GroupShield (and in Katakana), Guard
Dog,  HomeGuard, Hunter, IntruShield, Intrusion
Prevention Through Innovation, M and Design, McAfee,
McAfee (and in Katakana), McAfee and Design,
McAfee.com, McAfee VirusScan, NA Network Associates,
Net Tools, Net Tools (and in Katakana), NetCrypto,
NetOctopus, NetScan, NetShield, Network Associates,
Network Associates Colliseum, NetXray, NotesGuard,
Nuts & Bolts, Oil Change, PC Medic, PCNotary,
PrimeSupport, RingFence, Router PM, SecureCast,
SecureSelect, SpamKiller, Stalker, ThreatScan, TIS,
TMEG, Total Virus Defense, Trusted Mail,
Uninstaller, Virex, Virus Forum, Viruscan,
Virusscan, Virusscan (And In Katakana), Webscan,
Webshield, Webshield (And In Katakana), Webstalker,
WebWall, Whats The State Of Your IDS?, Whos
Watching Your Network, Your E-Business Defender,
Your Network. Our Business. are registered
trademarks or trademarks of McAfee, Inc. and/or its
affiliates in the US and/or other countries. Red in
connection with security is distinctive of McAfee(R)
brand products.  All other registered and
unregistered trademarks herein are the sole property
of their respective owners.



_____________________________________________________
LICENSE & PATENT INFORMATION

LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE
LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU
PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND
CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF
YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE
ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED
LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE
RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A
BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE
AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED
THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF
THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL
THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE
PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A
FULL REFUND.


LICENSE ATTRIBUTIONS

This product includes or may include:
*Software developed by the OpenSSL Project for use
in the OpenSSL Toolkit (http://www.openssl.org/).
*Cryptographic software written by Eric A. Young
and software written by Tim J. Hudson. *Some
software programs that are licensed (or sublicensed)
to the user under the GNU General Public License
(GPL) or other similar Free Software licenses which,
among other rights, permit the user to copy, modify
and redistribute certain programs, or portions
thereof, and have access to the source code. The GPL
requires that for any software covered under the GPL
which is distributed to someone in an executable
binary format, that the source code also be made
available to those users. For any such software
covered under the GPL, the source code is made
available on this CD. If any Free Software licenses
require that Network Associates provide rights to
use, copy or modify a software program that are
broader than the rights granted in this agreement,
then such rights shall take precedence over the
rights and restrictions herein.  *Software
originally written by Henry Spencer, Copyright 1992,
1993, 1994, 1997 Henry Spencer.  *Software
originally written by Robert Nordier, Copyright
(C)1996-7 Robert Nordier.  *Software written by
Douglas W. Sauder.  *Software developed by the
Apache Software Foundation (http://www.apache.org/).
A copy of the license agreement for this software
can be found at
www.apache.org/licenses/LICENSE-2.0.txt.
*International Components for Unicode ("ICU")
Copyright (C)1995-2002 International Business
Machines Corporation and others.  *Software
developed by CrystalClear Software, Inc., Copyright
(C)2000 CrystalClear Software, Inc. *FEAD(R)
Optimizer(R)  technology, Copyright Netopsystems AG,
Berlin, Germany. *Outside In(R)  Viewer Technology
(C)1992-2001 Stellent Chicago, Inc. and/or Outside
In(R) HTML Export, (C)2001 Stellent Chicago, Inc.
*Software copyrighted by Thai Open Source Software
Center Ltd. and Clark Cooper, (C)1998, 1999, 2000.
*Software copyrighted by Expat maintainers.
*Software copyrighted by The Regents of the
University of California, (C)1989.  *Software
copyrighted by Gunnar Ritter.  *Software
copyrighted by Sun Microsystems(R), Inc. (C)2003.
*Software copyrighted by Gisle Aas. (C)1995-2003.
*Software copyrighted by Michael A. Chase,
(C)1999-2000.  *Software copyrighted by Neil
Winton, (C)1995-1996.  *Software copyrighted by
RSA Data Security, Inc., (C)1990-1992.  *Software
copyrighted by Sean M. Burke, (C)1999, 2000.
*Software copyrighted by Martijn Koster, (C)1995.
*Software copyrighted by Brad Appleton,
(C)1996-1999.  *Software copyrighted by Michael G.
Schwern, (C)2001.  *Software copyrighted by Graham
Barr, (C)1998.  *Software copyrighted by Larry
Wall and Clark Cooper, (C)1998-2000.  *Software
copyrighted by Frodo Looijaard, (C)1997.
*Software copyrighted by the Python Software
Foundation, Copyright (C)2001, 2002, 2003. A copy
of the license agreement for this software can be
found at www.python.org.  *Software copyrighted by
Beman Dawes, (C)1994-1999, 2002.  *Software
written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G.
Siek (C)1997-2000 University of Notre Dame.
*Software copyrighted by Simone Bordet & Marco
Cravero, (C)2002.  *Software copyrighted by
Stephen Purcell, (C)2001.  *Software developed by
the Indiana University Extreme! Lab
http://www.extreme.indiana.edu/).  *Software
copyrighted by International Business Machines
Corporation and others, (C)1995-2003.  *Software
developed by the University of California, Berkeley
and its contributors.  *Software developed by Ralf
S. Engelschall <rse@engelschall.com> for use in the
mod_ssl project (http://www.modssl.org/).
*Software copyrighted by Kevlin Henney,
(C)2000-2002.  *Software copyrighted by Peter
Dimov and Multi Media Ltd. (C)2001, 2002.
*Software copyrighted by David Abrahams, (C)2001,
2002. See http://www.boost.org/libs/bind/ bind.html
for documentation.  *Software copyrighted by Steve
Cleary, Beman Dawes, Howard Hinnant & John Maddock,
(C)2000.  *Software copyrighted by Boost.org,
(C)1999-2002.  *Software copyrighted by Nicolai M.
Josuttis, (C)1999.  *Software copyrighted by
Jeremy Siek, (C)1999-2001.  *Software copyrighted
by Daryle Walker, (C)2001.  *Software copyrighted
by Chuck Allison and Jeremy Siek, (C)2001, 2002.
*Software copyrighted by Samuel Krempp, (C)2001.
See http://www.boost.org for updates, documentation,
and revision history.  *Software copyrighted by
Doug Gregor (gregod@cs.rpi.edu), (C)2001, 2002.
*Software copyrighted by Cadenza New Zealand Ltd.,
(C)2000.  *Software copyrighted by Jens Maurer,
(C)2000, 2001.  *Software copyrighted by Jaakko
Jrvi (jaakko.jarvi@cs.utu.fi), (C)1999, 2000.
*Software copyrighted by Ronald Garcia, (C)2002.
*Software copyrighted by David Abrahams, Jeremy
Siek, and Daryle Walker, (C)1999-2001.  *Software
copyrighted by Stephen Cleary (shammah@voyager.net),
(C)2000.  *Software copyrighted by Housemarque Oy
<http:// www.housemarque.com>,(C)2001.  *Software
copyrighted by Paul Moore, (C)1999.  *Software
copyrighted by Dr. John Maddock, (C)1998-2002.
*Software copyrighted by Greg Colvin and Beman
Dawes, (C)1998, 1999.  *Software copyrighted by
Peter Dimov, (C)2001, 2002.  *Software copyrighted
by Jeremy Siek and John R. Bandela, (C)2001.
*Software copyrighted by Joerg Walter and Mathias
Koch, (C)2000-2002.


DBN 004-EN

V3.1.1

