Search
  • Videos
  • Windows 10
  • 5G
  • CES
  • Best VPNs
  • Cloud
  • Security
  • more
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • CES
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

McAfee Total Protection 2010: Photo gallery

1 of 25 NEXT PREV
  • mcafee-total-protection-20101.jpg

    This is the window that pops up upon inserting the McAfee disc. In this instance we'll select the first option, on the basis that the second option is not going to serve our security needs quite as well.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-20102.jpg

    McAfee is another member of a growing trend of programs to completely ignore the installation media and proceed directly to downloading the product. At least there is the option to use the CD though.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-20103.jpg

    Scanning the PC for threats is even included in the installation.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-20104.jpg

    Once the downloading, scanning and further downloads are complete, the installation onto the hard drive finally begins. Here you can see the components of the software suite.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-20105.jpg

    Being a security suite, having the product phone home is encouraged by the company.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-20106.jpg

    Online activation is another staple of security suites.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-20107.jpg

    As is the need to create an account with the vendor.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-20108.jpg

    Once installation is complete, this is the opening screen of the product.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-20109.jpg

    Updating the product takes place in the background with no feedback to speak of other than the icon in the taskbar.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201010.jpg

    The network manager is able to label network peers as friend or intruder.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201011.jpg

    Computer maintenance consists of defragmenting the hard drive and removing unneeded files and registry entries. The task scheduler only allows scheduling of the defragmenter and QuickClean utilities. The defragmenter used is the standard Windows defragmenter.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201012.jpg

    With one button, you can make the outside world truly go away.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201013.jpg

    McAfee's modularity allows various parts of the program to be turned off depending on your needs.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201014.jpg

    The suite offers buffer overflow protection as well as standard virus scanning options.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201015.jpg

    Interesting that there is such a thing as a trusted buffer overflow.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201016.jpg

    Firewall options are similar to options found in most firewall products.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201017.jpg

    The ease with which to create spam rules is a nice feature.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201018.jpg

    Instant Messaging also gets the scanning treatment.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201019.jpg

    McAfee says it can protect personal information from being transmitted over the internet without the user's permission.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201020.jpg

    When files just need to disappear forever and be unrecoverable, the Shredder comes into play.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201021.jpg

    System Restore launches the Windows System Restore utility.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201022.jpg

    An activity map of McAfee's HackerWatch shows global threat activity.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201023.jpg

    A visual trace-route utility makes an appearance.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201024.jpg

    The virus map option launches a map from McAfee.com, notice that the McAfee SiteAdvisor bar in Internet Explorer is also installed.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

  • mcafee-total-protection-201025.jpg

    But the McAfee bar isn't completely mundane, and will prompt you to try to install the Yahoo Toolbar as well. I was not particularly pleased about this behaviour.

    Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

    Photo by: Chris Duckett/ZDNet.com.au

    Caption by: Chris Duckett

1 of 25 NEXT PREV
Chris Duckett

By Chris Duckett | November 5, 2009 -- 00:51 GMT (16:51 PST) | Topic: Security

  • mcafee-total-protection-20101.jpg
  • mcafee-total-protection-20102.jpg
  • mcafee-total-protection-20103.jpg
  • mcafee-total-protection-20104.jpg
  • mcafee-total-protection-20105.jpg
  • mcafee-total-protection-20106.jpg
  • mcafee-total-protection-20107.jpg
  • mcafee-total-protection-20108.jpg
  • mcafee-total-protection-20109.jpg
  • mcafee-total-protection-201010.jpg
  • mcafee-total-protection-201011.jpg
  • mcafee-total-protection-201012.jpg
  • mcafee-total-protection-201013.jpg
  • mcafee-total-protection-201014.jpg
  • mcafee-total-protection-201015.jpg
  • mcafee-total-protection-201016.jpg
  • mcafee-total-protection-201017.jpg
  • mcafee-total-protection-201018.jpg
  • mcafee-total-protection-201019.jpg
  • mcafee-total-protection-201020.jpg
  • mcafee-total-protection-201021.jpg
  • mcafee-total-protection-201022.jpg
  • mcafee-total-protection-201023.jpg
  • mcafee-total-protection-201024.jpg
  • mcafee-total-protection-201025.jpg

McAfee Total Protection 2010 is the latest in McAfee's security stable to offer all the bells, whistles and options that the company can squeeze into one security suite. This program is nothing if not extensive, as the following screenshots show.

Read More Read Less

This is the window that pops up upon inserting the McAfee disc. In this instance we'll select the first option, on the basis that the second option is not going to serve our security needs quite as well.

Published: November 5, 2009 -- 00:51 GMT (16:51 PST)

Caption by: Chris Duckett

1 of 25 NEXT PREV

Related Topics:

Security Collaboration Security TV Data Management CXO Data Centers
Chris Duckett

By Chris Duckett | November 5, 2009 -- 00:51 GMT (16:51 PST) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums