Windows - Security

McAfee Total Protection 2008 (Retail)

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -
McAfee Total Protection 2008 (Retail)

Free and Direct Download with 300GB+ free

Torrent info

Name:McAfee Total Protection 2008 (Retail)

Total Size: 83.38 MB

Magnet: Magnet Link

Seeds: 0

Leechers: 2

Stream: Watch Online @ Movie4u

Last Updated: 2009-11-22 23:09:26 (Update Now)

Torrent added: 2008-07-04 03:36:26

Torrent Files List

McAfee Total Protection 2008 (Retail).rar (Size: 83.38 MB) (Files: 1)

 McAfee Total Protection 2008 (Retail).rar

83.38 MB

Announce URL:

Torrent description

McAfee Total Protection
Release Notes
Copyright(C) 2007-2008 McAfee, Inc.
All Rights Reserved


This file contains important information regarding
this new release. McAfee recommends that you read
the entire document.

Installation and System Requirements
Known Issues
Diagnosing Your Protection Problems
Configuring Your Web Browser
Contacting McAfee
Copyright and License Agreement

McAfee Total Protection includes the following
programs and features:

Simplified protection status
Easily review your computer's protection status,
check for updates, and fix potential protection

Automated updates and upgrades
Automatically download and install updates for
your registered programs. When a new version
of a registered McAfee program is available,
you get it at no charge while your subscription
is valid, ensuring that you always have
up-to-date protection.

Real-time alerting
Receive notification of emergency virus outbreaks
and security threats. Then remove, neutralize,
or learn more about the threat.

Comprehensive virus protection
Protect your computer from the latest security
threats, including viruses, Trojans, tracking
cookies, spyware, adware, and other potentially
unwanted programs. Protection extends beyond
the files and folders on your desktop, targeting
threats from different points of entry — including
e-mail, instant messages, and the Web. No tedious
administration required.

Resource-aware scanning options
Use minimal computer resources when scanning so
that higher priority is given to other tasks.
Using minimal computer resources does not reduce
the effectiveness of the scan. VirusScan offers
you the flexibility to customize real-time
and manual scanning options if you want to;
but if you don't, your computer remains

Automatic repairs
Let VirusScan decide how to repair a threat.
If VirusScan detects security threats while
running a real-time or manual scan, it tries
to handle the threat automatically according
to the threat type. This way, most threats
can be detected and neutralized without your

Standard and custom protection levels
Guard against intrusion and suspicious activity
using Firewall's default or customizable protection

Real-time recommendations
Receive recommendations, dynamically, to help you
determine whether programs should be granted Internet
access or network traffic should be trusted.

Intelligent access management for programs
Manage Internet access for programs, through alerts
and event logs, and configure access permissions
for specific programs.

Gaming protection
Prevent alerts regarding intrusion attempts and
suspicious activities from distracting you during
full-screen gaming.

Computer startup protection
Protect your computer from intrusion attempts,
unwanted programs, and network traffic as soon
as Windows starts.

System service port control
Manage open and closed system service ports
required by some programs.

Manage computer connections
Allow and block remote connections between
other computers and your computer.

HackerWatch information integration
Track global hacking and intrusion patterns through
HackerWatch's Web site, which also provides current
security information about programs on your
computer, as well as global security events and
Internet port statistics.

Lockdown Firewall
Instantly block all inbound and outbound traffic
between your computer and the Internet.

Restore Firewall
Instantly restore Firewall's original protection

Advanced Trojan detection
Detect and block potentially malicious
programs, such as Trojans, from relaying
your personal information on the Internet.

Event logging
Track recent inbound, outbound, and intrusion

Monitor Internet traffic
Review worldwide maps showing the source of hostile
attacks and traffic. You can also locate detailed
owner information and geographical data for
originating IP addresses, analyze inbound and
outbound traffic, and monitor program bandwidth and

Intrusion prevention
Protect your privacy from possible Internet threats.
Using heuristic-like functionality, McAfee provides
a tertiary layer of protection by blocking items
that display symptoms of attacks or characteristics
of hacking attempts.

Sophisticated traffic analysis
Review inbound and outbound Internet traffic and
program connections, including those that are
actively listening for open connections. This allows
you to see and act upon programs that can be
vulnerable to intrusion.

Use various cleaners to delete unnecessary files
safely and efficiently.

Use Shredder to delete (or shred) items from your
computer's hard drive.

Network map
View a graphical overview of the protection status
of the computers and components that make up your
home network. When you make changes to your network
(for example, you add a computer), the network map
recognizes those changes. You can refresh the
network map, rename the network, and show or hide
components of the network map to customize your
view. You can also view the details for any of the
components on the network map.

Remote management
Use Network Manager’s network map to manage the
protection status of the computers that make up
your home network. You can invite a computer to
join the managed network, monitor the managed
computer's protection status, and fix known
security vulnerabilities from a remote computer on
the network.

Parental Controls
Filter potentially inappropriate images, configure
content rating groups (age groups used to restrict
the Web sites and content that a user can view), and
set Web browsing time limits (the period and duration
of time that a user can access the Web). Parental
Controls also lets you universally restrict access
to specific Web sites, and grant or block access
based on associated keywords.

Personal Information Protection
Block the transmission of sensitive or confidential
information (for example, credit card numbers,
bank account numbers, addresses, and so on) across
the Web.

Password Vault
Securely store your personal passwords so that no
other user (not even an Administrator) can access

Spam filtering
Prevent unsolicited e-mail from entering your
Inbox. Filters are updated automatically for all your
e-mail accounts. You can also create custom filters
to ensure that all spam is filtered, and report spam
to McAfee for analysis.

Phishing filtering
Receive warnings about potential phishing (fraudulent)
Web sites that solicit personal information.

Customized spam processing
Mark unsolicited e-mail as spam and move it to your
McAfee Anti-Spam folder, or mark legitimate e-mail as
not spam and move it to your Inbox.

Import your friends' e-mail addresses to the friends
list so that their e-mail messages are not filtered.

Sort list items by relevance
Sort your personal filters, friends, address books,
and Webmail accounts, by relevance (simply click
the appropriate column name).

Additional support
Anti-Spam supports Mozilla(R) Thunderbird(TM) 1.5
and 2.0, and provides Windows Vista(TM) 64-bit
support for Windows(R) Mail. In addition, the
new gaming mode feature stops Anti-Spam background
processes so that your computer does not slow down
while you play video games or watch DVDs. Anti-Spam
also filters Microsoft(R) Outlook(R), Outlook Express,
or Windows Mail accounts on any port, including SSL
(Secure Socket Layer) ports.

Local scheduled archiving
Protect your data by archiving files and folders
to CD, DVD, USB drive, external hard drive, or network
drive. After you initiate the first archive,
incremental archives occur automatically for you.

One-click restore
Restore files and folders if they are mistakenly
deleted, or become corrupt on your computer

Compression and encryption
Compress your archived files (default), saving space
on your archive media. As an additional security
measure, your archives are encrypted by default.

File sharing
Share files with other computers on your network.
When you share files, you grant other computers
read-only access to those files. Only computers
that have full or administrative access to your
managed network (members) can share or access
files shared by other members.

File transfer
Send files to other computers that have full or
administrative access to your managed network
(members). When you receive a file, it appears in
your EasyNetwork inbox. The inbox is a temporary
storage location for all the files other computers
on the network send to you.

Automated printer sharing
Share any local printers attached to your computer
with other members, using the printer's current
name as the shared printer name. It also detects
printers shared by other computers on your network
and allows you to configure and use those printers.
Installation and System Requirements

-Internet connection
-Microsoft(R) Windows(R) 2000 Service Pack 4 (SP4)
or later, Windows XP with Service Pack 1 (SP1) or
later, Windows Vista(TM)
-Personal computer with Pentium-compatible processor
500 MHz or later
-256 MB RAM
-100 MB hard disk space
-800 X 600 or higher resolution
-Microsoft .NET(TM) Framework version 1.1.4322

Supported browser programs
-Microsoft Internet Explorer(R) 6.0 or later
-Mozilla(R) Firefox(R) 1.5 or later

Note: To upgrade to the latest version of Internet
Explorer, visit the Microsoft Web site at

Supported e-mail programs
-Outlook(R), Outlook Express, Eudora(TM),
Netscape(R), Thunderbird, IncrediMail
- Becky, PostPet(TM)(Japanese only)
-MAPI Outlook
-MSN(R)/Hotmail(R), or e-mail account with POP3
access, Vista 64-bit Windows Mail

Supported instant messaging programs
-AOL(R) Instant Messenger(TM) 2.1 or later
-Yahoo(R) Messenger 4.1 or later
-Microsoft Windows Messenger 3.6 or later
-MSN Messenger 6.0 or later

Anti-Spam toolbar plug-In
-Outlook Express 6.0 or later
-Outlook 2000 or later
-Eudora 6.0 or later
-Thunderbird 1.0 or later

related torrents

Torrent name

health leech seeds Size

comments (0)

Main Menu