    What's New in McAfee VirusScan for DOS v3.1.7 (3102)
    Copyright (c) 1992-1998 by Network Associates, Inc.,
     and its Affiliated Companies. All Rights Reserved.


Thank you for using McAfee VirusScan for DOS. This What's
New file contains important information regarding the
current version of this product. It is highly recommended
that you read the entire document.

Network Associates welcomes your comments and suggestions.
Please use the information provided in this file to contact
us.

___________________
WHAT'S IN THIS FILE

- New Features
- Known Issues
- Installation
- Documentation
- Frequently Asked Questions
- Contacting Network Associates

____________
NEW FEATURES

1.  VirusScan now scans Microsoft Excel spreadsheets for
    Formula-based macro viruses. It is able to detect and
    clean the XF/PAIX virus.

2.  VirusScan now scans files embedded within Microsoft
    Office files (Word and Excel). When infections are
    detected in these embedded files, VirusScan allows you
    to clean, delete, or move the files.

3.  VirusScan now has the ability to detect macro virus 
    infections in password-protected Word 7.0 (Word for
    Office 95) files in all languages supported by Word.

4.  VirusScan now detects mIRC script viruses by scanning
    files with the .INI extension. To take advantage of
    this new feature, update to the 3103 or later .DAT
    files, then use the /ALL scanning option.

5.  VirusScan now scans files with the .VXD extension by
    default.


* NEW VIRUSES DETECTED *

The 3102 .DAT files included with VirusScan are compatible
with VirusScan's v3.x engines only. The 3102 .DAT files are
not intended for use with VirusScan v2.5.x products.

These .DAT files detect the following 232 new viruses.
Locations that have experienced particular problems with
specific viruses are also identified.

500
AB6A.3500
ALAR.5088
ANDROMEDA.1140
ANTINUKE.TROJAN
ANXIETY.POPPY           (Internet)
ANXIETY.POPPY.II        (Internet)
ARARA.1375
AUSPAR
BANDUNG.BF
BLEE.A
BLEE.B
BLEE.D                  (Internet)
BLEE.E                  (Internet)
BOOT.666
BOX.D
BOX.F
BREEDER.A
BRR.BOO
BURMA.442.D
CAP.BZ
CAP.CA
CAP.CB
CAP.CC
CAP.CD
CAP.CE
CAP.CF
CAP.CG
CAP.CH
CAP.CI
CAP.CJ
CAP.CK
CAP.CL
CAP.CM
CAP.CN
CAP.CO
CAP.CP
CAP.CQ
CAP.CR
CAP.CS
CAP.CT
CAP.CU
CAP.CV
CAP.CW
CAP.CX
CIUDAD.590              (Europe)
CLEANUP.A               (Europe)
COAHUILA
CONCEPT.CA
CONCEPT.CB
CONCEPT.CC
CONCEPT.CD
CONCEPT.CE
COOKIE.MONSTER.TROJAN
DEMON.B
DENZUKO.V1526
DIAMETRIC.3514
DRIVEL
EDDY.1386
EIGHT-CLOCK.A           (US)
ERMUA.A
ERMUA.B
ERMUA.C
FAKE.A
FEINT_7F_(BS/MBR)
GOODNIGHT.M
GROG.1146
HABIR.A
HASSLE.B
HLLP.FECI.6000
HLLT.KRILE.4608         (Internet)
HLLT.KRILE.5831         (Internet)
HNL.A                   (US)
HOT.B
IBLIS.252
IBLIS.252 DROPPER
IVP.967
IWASHERE.710
JERUSALEM.1808.CT.B DROPPER
JOHNNY.S
JOHNNY.T
KELA.1171
KHIZHNJAK.1011
KHIZHNJAK.509
KHIZHNJAK.565
KILLDOS.A:TW
KLA.A
KOMCON.A                (US)
KOMPU.J
KYOKUSHINKAI
LAPIDARIO.766
LARRY
LEONARD.1194
LIGHT.A
LIZARD.1967             (Portugal, US)
MBR-COM.1410
MDMA.AO
MDMA.AP
MDMA.AQ
MDMA.AR
MDMA.AS
MINIMAL.AA
MINIMAL.Y
MINIMAL.Z
MIRC/7TH_SPERE
MIRC/REPRO_V1
MUCK.AP
MUCK.AQ
MULTI
MWIM.BOO
NGKOEN
NICEDAY.P
NICEDAY.Q
NIKNAT.D
NIKNAT.E
NIKNAT.F
NIKNAT.G
NJVCK2.D
NJVCK2.E
NJVCK2.F
NJVCK2.G
NJVCK2.H
NJVCK2.I
NJVCK2.J
NJVCK2.K
NJVCK2.L
NJVCK2.M
NJVCK2.N
NO2.A (TWNO variant)    (Taiwan)
NOP.R:BR
NOP.S:ES
NOP.T:IT
NOSTARDAMUS.3584
NPAD.FD
NPAD.FE
NPAD.FF
NPAD.FG
NPAD.FH
NPAD.FI
NPAD.FJ
NPAD.FK
NPAD.FL
NPAD.FM
NPAD.FN
NPAD.FO
NPAD.FP
NPAD.FQ
NPAD.FR
NPAD.FS
NPAD.FT
NPAD.FU
NPAD.FV
NPAD.FW
NPAD.FX
NPAD.FY
ORPHAN.174
PASTIK.2049
PAYCHECK.J
PAYCHECK.K
PINGPONG.M
PRESIDENT.MP.1504
RAZER.B
SARCOMA.1328
SCHUMANN.G              (Europe)
SCHUMANN.H              (Europe)
SCHUMANN.I
SCHUMANN.J              (Europe)
SCHUMANN.L              (Europe)
SEEYOU
SHOWOFF.CN
SHOWOFF.CO
SHOWOFF.CP
SHOWOFF.CQ
SHOWOFF.CR
SHOWOFF.CS
SILLYC.124
SILLYC.144
SILLYC.166
SILLYC.169
SILLYC.264
SILLYC.302
SILLYC.331
SILLYC.343
SILLYC.498
SILLYC.511
SILLYC.563
SILLYC.626
SILLYC.657
SPHINX.2520
SPHINX.2536
SPHINX.2548
SWISS_BOOT              (Switzerland)
SWISS_BOOT_2            (Switzerland)
SWLABS.H
TAGUCHI.A               (Brazil)
TALON.L
TEDY.4350
TEMPLE.L
TPVO.3463
TPVO.3626
TPVO.3654
TPVO-OPEN.1569
TRASH.B
TROUT.6787
TWNO.AB:TW
VAMPIRE.K:TW
VAMPIRE.L/M:TW
VHDL.B:TW
VIENNA.BETABOYS DROPPER
WAZZU.DM
WAZZU.DN
WAZZU.DP
WAZZU.DQ
WAZZU.DR
XF/PAIX.A               (Requires 3.1.6 engine or later)
XM/LAROUX.AF
XM/LAROUX.AH
XM/LAROUX.AP
XM/LAROUX.BC
XM/LAROUX.BE
XM/LAROUX.BG
XM/LAROUX.BH
XM/LAROUX.BI
XM/LAROUX.BJ
XM/LAROUX.BK
XM/LAROUX.BL
XM/LAROUX.BM
XM/LAROUX.BN
XM/LMV.A (TROJAN)
XM/NINJA.D              (Japan)
XM/NOCAL.A              (Japan)
ZHENGZHOU.3584.B


* NEW VIRUSES CLEANED *

These .DAT files clean the following 167 new viruses:

ANDROMEDA.1140
BANDUNG.BF
BLEE.A
BLEE.B
BLEE.D                  (Internet)
BLEE.E                  (Internet)
BOX.F
BREEDER.A
CAP.BZ
CAP.CA
CAP.CB
CAP.CC
CAP.CD
CAP.CE
CAP.CF
CAP.CG
CAP.CH
CAP.CI
CAP.CJ
CAP.CK
CAP.CL
CAP.CM
CAP.CN
CAP.CO
CAP.CP
CAP.CQ
CAP.CR
CAP.CS
CAP.CT
CAP.CU
CAP.CV
CAP.CW
CAP.CX
CIUDAD.590              (Europe)
CLEANUP.A               (Europe)
COAHUILA
CONCEPT.CA
CONCEPT.CB
CONCEPT.CC
CONCEPT.CD
CONCEPT.CE
DEMON.B
DIAMETRIC.3514
EIGHT-CLOCK.A           (US)
ERMUA.A
ERMUA.B
ERMUA.C
FAKE.A
FEINT_7F_(BS/MBR)
GOODNIGHT.M
GROG.1146
HABIR.A
HASSLE.B
HNL.A                   (US)
HOT.B
IBLIS.252
IBLIS.252 DROPPER
IWASHERE.710
JERUSALEM.1808.CT.B DROPPER
JOHNNY.S
JOHNNY.T
KILLDOS.A:TW
KLA.A
KOMCON.A                (US)
KOMPU.J
LARRY
LEONARD.1194
LIZARD.1967             (Portugal, US)
MDMA.AP
MDMA.AQ
MDMA.AR
MDMA.AS
MINIMAL.Y
MINIMAL.Z
MINIMAL.AA
MUCK.AP
MUCK.AQ
MWIM.BOO
NICEDAY.P
NICEDAY.Q
NIKNAT.E
NIKNAT.F
NIKNAT.G
NJVCK2.D
NJVCK2.E
NJVCK2.F
NJVCK2.G
NJVCK2.H
NJVCK2.I
NJVCK2.J
NJVCK2.K
NJVCK2.L
NJVCK2.M
NJVCK2.N
NO2.A (TWNO variant)    (Taiwan)
NOP.R:BR
NOP.S:ES
NOP.T:IT
NPAD.FD
NPAD.FE
NPAD.FF
NPAD.FG
NPAD.FH
NPAD.FI
NPAD.FJ
NPAD.FK
NPAD.FL
NPAD.FM
NPAD.FN
NPAD.FO
NPAD.FP
NPAD.FQ
NPAD.FR
NPAD.FS
NPAD.FT
NPAD.FU
NPAD.FV
NPAD.FW
NPAD.FX
NPAD.FY
PAYCHECK.J
PAYCHECK.K
RAZER.B
SARCOMA.1328
SCHUMANN.G              (Europe)
SCHUMANN.H              (Europe)
SCHUMANN.J              (Europe)
SCHUMANN.L              (Europe)
SHOWOFF.CN
SHOWOFF.CO
SHOWOFF.CP
SHOWOFF.CQ
SHOWOFF.CR
SHOWOFF.CS
SWISS_BOOT              (Switzerland)
SWISS_BOOT_2            (Switzerland)
SWLABS.H
TAGUCHI.A               (Brazil)
TALON.L
TEDY.4350
TEMPLE.L
TRASH.B
TWNO.AB:TW
VAMPIRE.K:TW
VAMPIRE.L/M:TW
VHDL.B:TW
VIENNA.BETABOYS DROPPER
WAZZU.DM
WAZZU.DN
WAZZU.DP
WAZZU.DQ
WAZZU.DR
XM/LAROUX.AF
XM/LAROUX.AP
XM/LAROUX.BC
XM/LAROUX.BE
XM/LAROUX.BG
XM/LAROUX.BH
XM/LAROUX.BI
XM/LAROUX.BJ
XM/LAROUX.BK
XM/LAROUX.BL
XM/LAROUX.BM
XM/LAROUX.BN
XM/LMV.A (TROJAN)
XM/NINJA.D              (Japan)
XM/NOCAL.A              (Japan)

____________
KNOWN ISSUES

1.  Legitimate programs that write to the Master Boot Record
    of a disk, such as some disk security programs, may be
    identified by VirusScan as a "probable unknown boot
    sector virus." If this problem is encountered, use the
    /NODDA command-line switch. This prevents VirusScan
    from scanning the Master Boot Record of the disk.

2.  VirusScan's delete and move operations are not currently
    supported for infected objects detected within Microsoft
    Office binder files.

____________
INSTALLATION

* INSTALLING THE PRODUCT *

Perform procedure 1 to use the installable version of
VirusScan for DOS, or procedure 2 to use the non-installable
version.

1.  For the installable version of VirusScan for DOS,
    take the following steps:

    a.  Execute the INSTALL.BAT program.
    b.  Follow the on-screen instructions.

    By default, the installation program makes 
    a directory on the hard disk drive named
    C:\NETA\VIRUSCAN and copies the program files
    to that directory.

    The installation script adds the directory
    to the path statement in your AUTOEXEC.BAT file
    and adds two lines that reference the VShield
    program to provide on-access virus prevention.
    For the most complete virus protection, Network
    Associates recommends using the /ANYACCESS switch.

    or  

2.  For the non-installable version of VirusScan for
    DOS, take the following steps:

    a.  Make a directory on your hard disk drive.
    b.  Copy the files to that directory.
    c.  Add that directory to the path statement in
        your AUTOEXEC.BAT file.
                              

* PRIMARY PROGRAM FILES FOR VIRUSSCAN FOR DOS *

Files located in the Install directory:
=======================================

        SCAN.EXE = VirusScan for DOS program
      README.1ST = Network Associates information
     PACKING.LST = Packing list
    VALIDATE.EXE = Authenticity validation program
        SCAN.DAT = Virus scan definition data
       NAMES.DAT = Virus names definition data
       CLEAN.DAT = Virus clean definition data
    WHATSNEW.TXT = What's New document
    RESELLER.TXT = Network Associates authorized resellers


* TESTING YOUR INSTALLATION *

The Eicar Standard AntiVirus Test File is a combined effort 
by anti-virus vendors throughout the world to come up 
with one standard by which customers can verify their 
anti-virus installations.

To test your installation, copy the following line into its
own file and name it EICAR.COM.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

When done, you will have a 69- or 70-byte file.

When VirusScan is applied to this file, SCAN will report 
finding the EICAR-STANDARD-AV-TEST-FILE virus.

It is important to know that THIS IS NOT A VIRUS. However,
users often have the need to test that their installations 
function correctly. The anti-virus industry, through the 
European Institute for Computer Antivirus Research, has 
adopted this standard to facilitate this need.

Please delete the file when installation testing is 
completed so unsuspecting users are not unnecessarily 
alarmed.


* UNINSTALLING THE PRODUCT * 

Follow the instructions outlined below to uninstall the
installable version of VirusScan for DOS.
                                         
1.  Execute VSHIELD /REMOVE to remove VShield from
    memory, then remove the files from your hard
    drive and remove any lines in your AUTOEXEC.BAT
    file that call VShield. If an error message is
    displayed indicating that VShield could not be
    removed from memory, take the following step. 
        
2.  Edit your AUTOEXEC.BAT file and remove all lines
    that call VShield, then reboot your system. On
    restarting your system, VShield will not be loaded
    into memory and you can remove the files from your
    hard drive.

    Note: If the files are removed from your hard drive
    prior to removing VShield from memory, an error
    message will be displayed until you remove
    VShield from memory or restart your system.

_____________
DOCUMENTATION

For more information, refer to the McAfee VirusScan for DOS
User's Guide, included on the CD-ROM versions of this
program or available from the Network Associates BBS and
FTP site. Network Associates Documentation files are in
Adobe Acrobat Portable Document Format (.PDF) and can be
viewed using Adobe Acrobat Reader. This form of electronic
documentation includes hypertext links and easy navigation
to assist you in finding answers to questions about your
Network Associates product.

Adobe Acrobat Reader is available on CD-ROM in the ACROREAD
subdirectory. Adobe Acrobat Reader also can be downloaded 
from the World Wide Web at:

http://www.adobe.com/Acrobat/readstep.html

VirusScan documentation can be downloaded from the Network
Associates BBS or the World Wide Web at:

http://www.nai.com

For more information on viruses and virus prevention,
see the McAfee Virus Information Library, included on the
CD-ROM version of this product or available from Network
Associates BBS and FTP site.

__________________________
FREQUENTLY ASKED QUESTIONS 

Regularly updated lists of frequently asked questions 
about Network Associates products also are available on the
Network Associates BBS, website, and CompuServe and AOL
forums.
   
Q:  How do I enable the Centralized Alerting and Reporting
    option?

A:  VirusScan now supports Centralized Alerting and
    Reporting to remote NetWare or Windows NT servers
    running NetShield for Windows NT v2.5.3 and later
    or NetShield for NetWare v2.3.3 and later. To 
    configure this option on your VirusScan client,
    use the /ALERTPATH <directory> option, where the 
    <directory> is the path to the remote NetWare 
    volume or NT directory. From this directory, 
    NetShield can broadcast or compile the alerts 
    and reports
    according to its established configuration.

    NOTE: The client must have write access to this
    <directory> location and the directory must contain
    the NetShield-supplied CENTALRT.TXT file.

    To send a complete alerting file identifying the
    system and user, establish the following environment
    variables or add them to the AUTOEXEC.BAT file.

      Set COMPUTERNAME=<name of computer>
      Set USERNAME=<user name>

    The alert file sent to the server is an .alr text
    file. Upon receipt of the alert file, NetShield NT
    or NetShield for NetWare sends an alert message to
    an administrator and/or appropriate personnel.


Q:  How can I scan my Zip drive?

A:  If you are experiencing complications accessing your
    Zip drive, use the /NODDA switch. For example, enter
    SCAN X: /NODDA (where X is the letter of your Zip
    drive). 

    Note: Using /NODDA with the /ADN or /ADL switches 
    may generate errors when accessing empty CD-ROM 
    drives or empty Zip drives. If this occurs, typing 
    F (for Fail) in response to the error messages will 
    allow the scan to continue.


Q:  I have created my own Emergency diskette. How
    can I optimize its performance?

A:  For optimal performance, create a CONFIG.SYS file on
    the boot diskette and add the following lines:

       [CONFIG.SYS]

       DEVICE=HIMEM.SYS
       DOS=HIGH
    
    Also, add the HIMEM.SYS file from the DOS directory
    to the boot diskette. 

    Note: For detailed instructions on creating an Emergency
    diskette, refer to the instructions outlined in your
    online documentation or see FaxBack Document #214.

 
Q:  What does Network Associates recommend for systems that
    have low conventional memory?

A:  Network Associates recommends using ScanPM for low
    memory environments. ScanPM is a command-line scanner
    with a reduced conventional memory footprint, that
    operates in protected mode command-line environments.

    ScanPM is available for a free evaluation and can be
    downloaded from the online services listed below.


Q:  What is the difference between the VShield DOS TSR
    and VirusScan for DOS?

A:  VShield installs itself in memory and stays resident in
    memory to monitor your system for viral activity. If an
    infected program is executed or an infected boot sector
    is accessed, VShield displays a warning that a virus is
    present.

    VirusScan for DOS is an on-demand scanner that allows
    you to perform a complete or partial scan of your
    computer, floppies, and CDs at any time. VirusScan for
    DOS can run customized scans through a large set of
    command-line switches.

 
Q:  How can I run VirusScan for DOS from a NetWare login
    script without running out of memory?

A:  If you are having memory problems when trying to
    run VirusScan for DOS from a NetWare login script,
    take these steps to resolve the issue:

    1.  Rename LOGIN.EXE to LOGIN1.EXE and remove
        any references to VirusScan.
    2.  Create a batch file named LOGIN.BAT.
    3.  On the first line of the batch file, run your
        scan with whatever switches you want to include.
    4.  On the second line of the batch file, run
        LOGIN1.EXE.
 
    By taking these steps, you eliminate the problem
    of having LOGIN.EXE and SCAN.EXE in memory at the
    same time. This allows VirusScan for DOS to run
    prior to accessing the network and allows your login
    script to be processed without complications.


Q:  Can I clean the Master Boot Record (MBR) of a
    Windows NT file system (NTFS) formatted hard drive?

A:  Yes. Take these steps to clean the MBR. Boot the
    Windows NT computer from a virus-free DOS bootable
    (system) diskette. Then run VirusScan for DOS;
    SCAN C: /BOOT /CLEAN from a known virus-free floppy.
    This will clean the NTFS Master Boot Sector and allow 
    Windows NT to successfully reboot from the hard disk
    drive. However, VirusScan for DOS will not be able to
    read the rest of the NTFS partition.

    After starting Windows NT, execute VirusScan for
    Windows NT to detect and clean Windows NT file
    infections.


Q:  Can I update VirusScan's data files to detect
    new viruses?

A:  Yes. If you have Internet access, you can download
    updated VirusScan data files from the Network Associates
    website, BBS, or other online resources. To download 
    from the McAfee website, follow these steps:
 
    1.  Go to the Network Associates website
        (http://www.nai.com).

    2.  Click the Download tab.

    3.  Click Update Virus DAT Files, then click Download
        Virus DAT File.

    4.  Follow the on-screen downloading instructions.

    5.  Data file updates are stored in a compressed form 
        to reduce transmission time. Unzip the files into
        a temporary directory, then copy the files to the
        appropriate directory, replacing your old files.    

    6.  Before performing any scans, shut down your
        computer, wait a few seconds, and turn it on again.

    If you need additional assistance with downloading, 
    contact Network Associates Download Support at
    (408) 988-3832.

Q:  Why is the /NOEMS switch no longer in my VirusScan 
    product?

A:  The /NOEMS switch prevented VirusScan from using both
    expanded and extended memory. Because there are more
    than 15,000 known viruses, VirusScan's database has
    grown considerably. Thus, VirusScan now requires
    extended memory.

_____________________________
CONTACTING NETWORK ASSOCIATES

* FOR QUESTIONS, ORDERS, PROBLEMS, OR COMMENTS *

Contact the Network Associates Customer Care department: 

1.  Corporate-licensed customers, call (408) 988-3832
    Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time

    Retail-licensed customers, call (972) 278-6100
    Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time

2.  Fax (408) 970-9727
    24-hour, Group III fax 
        
3.  Fax-back automated response system (408) 988-3034
    24-hour fax

Send correspondence to any of the following Network
Associates locations:

    Network Associates Corporate Headquarters
    2805 Bowers Avenue
    Santa Clara, CA 95051-0963

    Network Associates Canada
    139 Main Street, Suite 201
    Unionville, Ontario
    Canada L3R 2G6

    Network Associates Europe B.V.
    Gatwickstraat 25
    1043 GL Amsterdam
    The Netherlands

    Network Associates International Ltd.
    Minton Place, Victoria Street
    Windsor, Berkshire
    SL4 1EG
    United Kingdom

    Network Associates France S.A.
    50 rue de Londres
    75008 Paris
    France

    Network Associates Deutschland GmbH
    Industriestrasse 1
    D-82110 Germering
    Germany

    Network Associates Japan Co, Ltd.
    Toranomon 33 Mori Bldg.
    3-8-21 Toranomon
    Minato-Ku, Tokyo 105
    Japan

    Network Associates Korea
    135-090, 18th Fl., Kyoung Am Bldg.
    157-27 Samsung-Dong, Kangnam-Ku
    Seoul, Korea

    Network Associates South East Asia
    7 Temasek Boulevard
    The Penthouse
    #44-01, Suntec Tower One
    Singapore 038987

    Network Associates Australia
    Level 1, 500 Pacific Highway
    St. Leonards, NSW 2065
    Australia

    Network Associates Latin America
    150 South Pine Island Road, Suite 205
    Plantation, FL 33324
    USA
        
Or, you can receive online assistance through any of the 
following resources:

1.  Bulletin Board System: (408) 988-4004
    24-hour US Robotics HST DS

2.  Internet e-mail: support@nai.com

3.  Internet FTP: ftp.nai.com

4.  World Wide Web: http://www.nai.com

5.  America Online: keyword MCAFEE

6.  CompuServe: GO MCAFEE

Before contacting Network Associates, please make note of
the following information. When sending correspondence,
please include the same details.

- Program name and version number
- Operating system type and version
- Contents of your AUTOEXEC.BAT, CONFIG.SYS, and 
  system LOGIN script
- Network name, operating system, and version
- Type and brand of your computer, hard drive, and any 
  peripherals
- Microsoft service pack, where applicable
- Network card installed, where applicable
- Modem manufacturer, model, and baud, where 
  applicable
- Relevant browsers/applications and version number,
  where applicable

- Issue encountered
- Specific scenario where problem occurs
- Conditions required to reproduce problem
- Statement of whether problem is reproducible on demand

- Your contact information: voice, fax, and e-mail

Other general feedback is also appreciated.

Documentation feedback is welcome. Send e-mail to
documentation@nai.com.


* FOR ON-SITE TRAINING INFORMATION *
 
Contact Network Associates Customer Service at
(800) 338-8754.


* FOR PRODUCT UPGRADES *

To make it easier for you to receive and use Network
Associates products, we have established a Resellers
program to provide service, sales, and support for our
products worldwide. For a listing of resellers, see the file
RESELLER.TXT, where applicable, or contact Network
Associates Customer Service for resellers near you.


* NETWORK ASSOCIATES BETA SITE *

Get pre-release software, including .DAT files, through
http://beta.nai.com/public/datafiles. You will have
access to Public Beta and External Test Areas. Your
feedback will make a difference.