mcafee profiler 1.0 release notes

23
Release Notes McAfee(R) Profiler Version 1.0.0 Copyright (C) 2010 McAfee, Inc. All Rights Reserved __________________________________________________________ CONTENTS - About this Document - About McAfee Profiler - Features - Known Issues - Installation and System Requirements - System Requirements - Installing Profiler - Uninstalling Profiler - Running Profiler - License for ZedGraph - Finding product documentation __________________________________________________________ ABOUT THIS DOCUMENT Thank you for choosing this McAfee(R) product. This document contains important information about the current release. We strongly recommend that you read the entire document. IMPORTANT: McAfee does not support automatic upgrading of a pre-release version of the software. To upgrade to a released version of the product, you must uninstall the existing pre-release version of the software. __________________________________________________________ ABOUT MCAFEE PROFILER McAfee Profiler gathers statistics from the systems

Upload: prakash-vivek

Post on 27-Nov-2014

50 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: McAfee Profiler 1.0 Release Notes

Release Notes McAfee(R) Profiler Version 1.0.0 Copyright (C) 2010 McAfee, Inc. All Rights Reserved

__________________________________________________________CONTENTS

- About this Document - About McAfee Profiler - Features - Known Issues - Installation and System Requirements - System Requirements - Installing Profiler - Uninstalling Profiler - Running Profiler - License for ZedGraph - Finding product documentation

__________________________________________________________ABOUT THIS DOCUMENT

Thank you for choosing this McAfee(R) product. Thisdocument contains important information about thecurrent release. We strongly recommend that you readthe entire document.

IMPORTANT:

McAfee does not support automatic upgrading of a pre-release version of the software. To upgrade to a released version of the product, you must uninstall the existing pre-release version of the software.

__________________________________________________________ABOUT MCAFEE PROFILER

McAfee Profiler gathers statistics from the systems

Page 2: McAfee Profiler 1.0 Release Notes

that shows how on-access scan is affecting the CPU.

McAfee Profiler captures top processes and files thatare accessed by on-access scan. Based on the datacollected, an administrator can decide if they wantto exclude a process or a file for scanning tolessen the impact on the system.__________________________________________________________FEATURES

Here is a list of features included with thisrelease of the product.

- General - Records process specific information - Command line and User Interface support

- Reports - Top 10 Processes - Top 10 Files - Top 10 File Extensions - Top 10 Processes with Read/Write Count - Top 3 files for Top 10 Processes - View reports in Graphical or Tabular format

- Comparison - Compare two sets of results side-by-side.

__________________________________________________________KNOWN ISSUES

Here is a list of known issues that we were aware ofat production time.

1. McAfee Profiler fails to capture data when Profiler and on-demand scan are initializing simultaneously.

WORKAROUND: Do not run McAfee Profiler during VSE on-demand scan.

BZ ID: 580184

Page 3: McAfee Profiler 1.0 Release Notes

2. McAfee Profiler fails to launch if installed in a custom path with VSE access protection level configured to Maximum Protection.

BZ ID: 582290

3. Windows Security Center alert is displayed while initializing McAfee Profiler.

BZ ID: 583933

4. McAfee Profiler cannot be installed by using Run option directly with VSE access protection level configured to Maximum Protection.

WORKAROUND: Save the McAfee Profiler installer to a local drive on the system, then double-click the file to install. BZ ID: 583933

5. Complete file name will not be displayed in the "Top 10 files" pie chart report when the length of the file name is more than 124 characters with a screen resolution of 1024*768.

BZ ID: 578832

6. Process names are overlapped and unreadable in the Pie chart, when the percentages of process count is very low in comparison to the percentages of other processes.

NOTE: Same is applicable for all the Pie Charts.

BZ ID: 579163

7. In the scenarios listed below files or processes are displayed multiple times in the Top 10 Files or Top 10 Processes report even if the same file

Page 4: McAfee Profiler 1.0 Release Notes

or process was scanned.

EXAMPLE: a. Same process launched from the same location is captured multiple times with different launch locations and contains wild cards in the one of the paths. **\notepad.exe and c:\windows\system32\notepad.exe

b. When a particular *.txt file is opened multiple times, the file extension is captured as *.lnk

c. When a *.txt file is opened, the associated process that gets captured would be explorer.exe or notepad.exe based on caching mechanism of the Operating System.

d. When multiple files or processes have the same number of read or writes, the files or processes scanned first will be captured in the list of TOP 10 Files or Processes. BZ ID: 584193

8. User Access Control prompt is displayed even with Silent option when running McAfee Profiler in command line.

BZ ID: 583874

9. The "Download" button in the webpage to download McAfee Profiler is disabled when accessed from a Windows 2008 Server system using Internet Explorer 8.

WORKAROUND: Add the "mer.mcafee.com" website to the trusted sites list of Internet Explorer 8.

BZ ID: 578834

10. Final page of Uninstallation of McAfee

Page 5: McAfee Profiler 1.0 Release Notes

Profiler displays the message "Installation Complete".

BZ ID: 581612

11. Installing McAfee Profiler multiple times using different user profiles requires same number of uninstalls.

EXAMPLE: If McAfee Profiler is installed twice, once using the current user profile and other for all user profiles by another user requires two uninstalls.

BZ ID: 579642

12. Zoom in option is not available for the pie charts.

BZ ID: 580230

13. On a Windows XP or Windows 2003 system, which has only Microsoft .NET Framework 4.0 version installed, McAfee Profiler prompts the user to install 2.0 version of .NET Framework.

WORKAROUND: Install Microsoft .NET Framework 2.0, then install McAfee Profiler. BZ ID: 592831__________________________________________________________INSTALLATION AND SYSTEM REQUIREMENTS

REQUIREMENTS

Operating systems supported:

- Windows XP Professional with Service Pack 2 or later

- Windows Vista with Service Pack 1 or later

- Windows 7

Page 6: McAfee Profiler 1.0 Release Notes

- Windows Server 2003 Enterprise with Service Pack 2 or later

- Windows Server 2003 Standard with Service Pack 2 or later

- Windows Server 2008 Enterprise edition with Service Pack 1 or later

- Windows Server 2008 Standard edition with Service Pack 1 or later

SOFTWARE REQUIREMENTS

- Microsoft .NET Framework Version 2.0 redistributable Package (x86) or later - Virus Scan Enterprise 8.5 or later

NOTE: - User needs administrative privileges to use McAfee Profiler.

- McAfee Profiler is supported only on 32 Bit system.

INSTALLING MCAFEE PROFILER

1. Download and double-click the McAfee Profiler installer McProfilerSetup.msi from the following location:

http://mer.mcafee.com/enduser/downloadmcprofiler.aspx

2. Follow the on screen instructions to install the product at the required location.

3. Launch McAfee Profiler from the Start | Programs | McAfee-McAfee Profiler or launch from the desktop shortcut icon.

UNINSTALLING PROFILER

1. Launch Add or Remove Programs.

Page 7: McAfee Profiler 1.0 Release Notes

2. Select McAfee Profiler, then click Remove.

3. Select all default options during the uninstall process.

__________________________________________________________RUNNING PROFILER

1. Double-click Profiler on the desktop or Programs menu.2. Enter a value in the Capture duration field, then click Capture. Capture duration must range from 5 minutes to 1440 minutes (24hr)

CommandLine Options /Help Displays commandline help

/Save [Filename] Saves output to the specified location

/Time [Duration] Sets the capture duration, range from 5 minutes to 1440 minutes(24hr)

/Silent Runs the application in silent mode.

NOTE: Do not shutdown McAfee Profiler during capture initialization. This may leave McShield service in an unknown state.

__________________________________________________________LICENSE FOR ZEDGRAPH

GNU LESSER GENERAL PUBLIC LICENSE

Version 2.1, February 1999

Copyright (C) 1991, 1999 Free Software Foundation,Inc. 51 Franklin Street, Fifth Floor, Boston, MA02110-1301 USA Everyone is permitted to copy anddistribute verbatim copies of this license document,but changing it is not allowed.

Page 8: McAfee Profiler 1.0 Release Notes

[This is the first released version of the LesserGPL. It also counts as the successor of the GNULibrary Public License, version 2, hence the versionnumber 2.1.]Preamble

The licenses for most software are designed to takeaway your freedom to share and change it. Bycontrast, the GNU General Public Licenses areintended to guarantee your freedom to share andchange free software--to make sure the software isfree for all its users.

This license, the Lesser General Public License,applies to some specially designated softwarepackages--typically libraries--of the Free SoftwareFoundation and other authors who decide to use it.You can use it too, but we suggest you first thinkcarefully about whether this license or the ordinaryGeneral Public License is the better strategy to usein any particular case, based on the explanationsbelow.

When we speak of free software, we are referring tofreedom of use, not price. Our General PublicLicenses are designed to make sure that you have thefreedom to distribute copies of free software (andcharge for this service if you wish); that youreceive source code or can get it if you want it;that you can change the software and use pieces ofit in new free programs; and that you are informedthat you can do these things.

To protect your rights, we need to make restrictionsthat forbid distributors to deny you these rights orto ask you to surrender these rights. Theserestrictions translate to certain responsibilitiesfor you if you distribute copies of the library orif you modify it.

For example, if you distribute copies of thelibrary, whether gratis or for a fee, you must give

Page 9: McAfee Profiler 1.0 Release Notes

the recipients all the rights that we gave you. Youmust make sure that they, too, receive or can getthe source code. If you link other code with thelibrary, you must provide complete object files tothe recipients, so that they can relink them withthe library after making changes to the library andrecompiling it. And you must show them these termsso they know their rights.

We protect your rights with a two-step method: (1)we copyright the library, and (2) we offer you thislicense, which gives you legal permission to copy,distribute and/or modify the library.

To protect each distributor, we want to make it veryclear that there is no warranty for the freelibrary. Also, if the library is modified by someoneelse and passed on, the recipients should know thatwhat they have is not the original version, so thatthe original author's reputation will not beaffected by problems that might be introduced byothers.

Finally, software patents pose a constant threat tothe existence of any free program. We wish to makesure that a company cannot effectively restrict theusers of a free program by obtaining a restrictivelicense from a patent holder. Therefore, we insistthat any patent license obtained for a version ofthe library must be consistent with the full freedomof use specified in this license.

Most GNU software, including some libraries, iscovered by the ordinary GNU General Public License.This license, the GNU Lesser General Public License,applies to certain designated libraries, and isquite different from the ordinary General PublicLicense. We use this license for certain librariesin order to permit linking those libraries intonon-free programs.

When a program is linked with a library, whetherstatically or using a shared library, the

Page 10: McAfee Profiler 1.0 Release Notes

combination of the two is legally speaking acombined work, a derivative of the original library.The ordinary General Public License thereforepermits such linking only if the entire combinationfits its criteria of freedom. The Lesser GeneralPublic License permits more lax criteria for linkingother code with the library.

We call this license the "Lesser" General PublicLicense because it does Less to protect the user'sfreedom than the ordinary General Public License. Italso provides other free software developers Less ofan advantage over competing non-free programs. Thesedisadvantages are the reason we use the ordinaryGeneral Public License for many libraries. However,the Lesser license provides advantages in certainspecial circumstances.

For example, on rare occasions, there may be aspecial need to encourage the widest possible use ofa certain library, so that it becomes a de-factostandard. To achieve this, non-free programs must beallowed to use the library. A more frequent case isthat a free library does the same job as widely usednon-free libraries. In this case, there is little togain by limiting the free library to free softwareonly, so we use the Lesser General Public License.

In other cases, permission to use a particularlibrary in non-free programs enables a greaternumber of people to use a large body of freesoftware. For example, permission to use the GNU CLibrary in non-free programs enables many morepeople to use the whole GNU operating system, aswell as its variant, the GNU/Linux operatingsystem.

Although the Lesser General Public License is Lessprotective of the users' freedom, it does ensurethat the user of a program that is linked with theLibrary has the freedom and the wherewithal to runthat program using a modified version of theLibrary.

Page 11: McAfee Profiler 1.0 Release Notes

The precise terms and conditions for copying,distribution and modification follow. Pay closeattention to the difference between a "work based onthe library" and a "work that uses the library". Theformer contains code derived from the library,whereas the latter must be combined with the libraryin order to run.TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION ANDMODIFICATION

0. This License Agreement applies to any softwarelibrary or other program which contains a noticeplaced by the copyright holder or other authorizedparty saying it may be distributed under the termsof this Lesser General Public License (also called"this License"). Each licensee is addressed as"you".

A "library" means a collection of software functionsand/or data prepared so as to be conveniently linkedwith application programs (which use some of thosefunctions and data) to form executables.

The "Library", below, refers to any such softwarelibrary or work which has been distributed underthese terms. A "work based on the Library" meanseither the Library or any derivative work undercopyright law: that is to say, a work containing theLibrary or a portion of it, either verbatim or withmodifications and/or translated straightforwardlyinto another language. (Hereinafter, translation isincluded without limitation in the term"modification".)

"Source code" for a work means the preferred form ofthe work for making modifications to it. For alibrary, complete source code means all the sourcecode for all modules it contains, plus anyassociated interface definition files, plus thescripts used to control compilation and installationof the library.

Page 12: McAfee Profiler 1.0 Release Notes

Activities other than copying, distribution andmodification are not covered by this License; theyare outside its scope. The act of running a programusing the Library is not restricted, and output fromsuch a program is covered only if its contentsconstitute a work based on the Library (independentof the use of the Library in a tool for writing it).Whether that is true depends on what the Librarydoes and what the program that uses the Librarydoes.

1. You may copy and distribute verbatim copies ofthe Library's complete source code as you receiveit, in any medium, provided that you conspicuouslyand appropriately publish on each copy anappropriate copyright notice and disclaimer ofwarranty; keep intact all the notices that refer tothis License and to the absence of any warranty; anddistribute a copy of this License along with theLibrary.

You may charge a fee for the physical act oftransferring a copy, and you may at your optionoffer warranty protection in exchange for a fee.

2. You may modify your copy or copies of the Libraryor any portion of it, thus forming a work based onthe Library, and copy and distribute suchmodifications or work under the terms of Section 1above, provided that you also meet all of theseconditions:

a) The modified work must itself be a softwarelibrary.b) You must cause the files modified to carryprominent notices stating that you changed the filesand the date of any change.c) You must cause the whole of the work to belicensed at no charge to all third parties under theterms of this License.d) If a facility in the modified Library refers to afunction or a table of data to be supplied by anapplication program that uses the facility, other

Page 13: McAfee Profiler 1.0 Release Notes

than as an argument passed when the facility isinvoked, then you must make a good faith effort toensure that, in the event an application does notsupply such function or table, the facility stilloperates, and performs whatever part of its purposeremains meaningful.

(For example, a function in a library to computesquare roots has a purpose that is entirelywell-defined independent of the application.Therefore, Subsection 2d requires that anyapplication-supplied function or table used by thisfunction must be optional: if the application doesnot supply it, the square root function must stillcompute square roots.)

These requirements apply to the modified work as awhole. If identifiable sections of that work are notderived from the Library, and can be reasonablyconsidered independent and separate works inthemselves, then this License, and its terms, do notapply to those sections when you distribute them asseparate works. But when you distribute the samesections as part of a whole which is a work based onthe Library, the distribution of the whole must beon the terms of this License, whose permissions forother licensees extend to the entire whole, and thusto each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claimrights or contest your rights to work writtenentirely by you; rather, the intent is to exercisethe right to control the distribution of derivativeor collective works based on the Library.

In addition, mere aggregation of another work notbased on the Library with the Library (or with awork based on the Library) on a volume of a storageor distribution medium does not bring the other workunder the scope of this License.

3. You may opt to apply the terms of the ordinaryGNU General Public License instead of this License

Page 14: McAfee Profiler 1.0 Release Notes

to a given copy of the Library. To do this, you mustalter all the notices that refer to this License, sothat they refer to the ordinary GNU General PublicLicense, version 2, instead of to this License. (Ifa newer version than version 2 of the ordinary GNUGeneral Public License has appeared, then you canspecify that version instead if you wish.) Do notmake any other change in these notices.

Once this change is made in a given copy, it isirreversible for that copy, so the ordinary GNUGeneral Public License applies to all subsequentcopies and derivative works made from that copy.

This option is useful when you wish to copy part ofthe code of the Library into a program that is not alibrary.

4. You may copy and distribute the Library (or aportion or derivative of it, under Section 2) inobject code or executable form under the terms ofSections 1 and 2 above provided that you accompanyit with the complete corresponding machine-readablesource code, which must be distributed under theterms of Sections 1 and 2 above on a mediumcustomarily used for software interchange.

If distribution of object code is made by offeringaccess to copy from a designated place, thenoffering equivalent access to copy the source codefrom the same place satisfies the requirement todistribute the source code, even though thirdparties are not compelled to copy the source alongwith the object code.

5. A program that contains no derivative of anyportion of the Library, but is designed to work withthe Library by being compiled or linked with it, iscalled a "work that uses the Library". Such a work,in isolation, is not a derivative work of theLibrary, and therefore falls outside the scope ofthis License.

Page 15: McAfee Profiler 1.0 Release Notes

However, linking a "work that uses the Library" withthe Library creates an executable that is aderivative of the Library (because it containsportions of the Library), rather than a "work thatuses the library". The executable is thereforecovered by this License. Section 6 states terms fordistribution of such executables.

When a "work that uses the Library" uses materialfrom a header file that is part of the Library, theobject code for the work may be a derivative work ofthe Library even though the source code is not.Whether this is true is especially significant ifthe work can be linked without the Library, or ifthe work is itself a library. The threshold for thisto be true is not precisely defined by law.

If such an object file uses only numericalparameters, data structure layouts and accessors,and small macros and small inline functions (tenlines or less in length), then the use of the objectfile is unrestricted, regardless of whether it islegally a derivative work. (Executables containingthis object code plus portions of the Library willstill fall under Section 6.)

Otherwise, if the work is a derivative of theLibrary, you may distribute the object code for thework under the terms of Section 6. Any executablescontaining that work also fall under Section 6,whether or not they are linked directly with theLibrary itself.

6. As an exception to the Sections above, you mayalso combine or link a "work that uses the Library"with the Library to produce a work containingportions of the Library, and distribute that workunder terms of your choice, provided that the termspermit modification of the work for the customer'sown use and reverse engineering for debugging suchmodifications.

You must give prominent notice with each copy of the

Page 16: McAfee Profiler 1.0 Release Notes

work that the Library is used in it and that theLibrary and its use are covered by this License. Youmust supply a copy of this License. If the workduring execution displays copyright notices, youmust include the copyright notice for the Libraryamong them, as well as a reference directing theuser to the copy of this License. Also, you must doone of these things:

a) Accompany the work with the completecorresponding machine-readable source code for theLibrary including whatever changes were used in thework (which must be distributed under Sections 1 and2 above); and, if the work is an executable linkedwith the Library, with the complete machine-readable"work that uses the Library", as object code and/orsource code, so that the user can modify the Libraryand then relink to produce a modified executablecontaining the modified Library. (It is understoodthat the user who changes the contents ofdefinitions files in the Library will notnecessarily be able to recompile the application touse the modified definitions.)b) Use a suitable shared library mechanism forlinking with the Library. A suitable mechanism isone that (1) uses at run time a copy of the libraryalready present on the user's computer system,rather than copying library functions into theexecutable, and (2) will operate properly with amodified version of the library, if the userinstalls one, as long as the modified version isinterface-compatible with the version that the workwas made with.c) Accompany the work with a written offer, validfor at least three years, to give the same user thematerials specified in Subsection 6a, above, for acharge no more than the cost of performing thisdistribution.d) If distribution of the work is made by offeringaccess to copy from a designated place, offerequivalent access to copy the above specifiedmaterials from the same place.e) Verify that the user has already received a copy

Page 17: McAfee Profiler 1.0 Release Notes

of these materials or that you have already sentthis user a copy.

For an executable, the required form of the "workthat uses the Library" must include any data andutility programs needed for reproducing theexecutable from it. However, as a special exception,the materials to be distributed need not includeanything that is normally distributed (in eithersource or binary form) with the major components(compiler, kernel, and so on) of the operatingsystem on which the executable runs, unless thatcomponent itself accompanies the executable.

It may happen that this requirement contradicts thelicense restrictions of other proprietary librariesthat do not normally accompany the operating system.Such a contradiction means you cannot use both themand the Library together in an executable that youdistribute.

7. You may place library facilities that are a workbased on the Library side-by-side in a singlelibrary together with other library facilities notcovered by this License, and distribute such acombined library, provided that the separatedistribution of the work based on the Library and ofthe other library facilities is otherwise permitted,and provided that you do these two things:

a) Accompany the combined library with a copy of thesame work based on the Library, uncombined with anyother library facilities. This must be distributedunder the terms of the Sections above.b) Give prominent notice with the combined libraryof the fact that part of it is a work based on theLibrary, and explaining where to find theaccompanying uncombined form of the same work.

8. You may not copy, modify, sublicense, link with,or distribute the Library except as expresslyprovided under this License. Any attempt otherwiseto copy, modify, sublicense, link with, or

Page 18: McAfee Profiler 1.0 Release Notes

distribute the Library is void, and willautomatically terminate your rights under thisLicense. However, parties who have received copies,or rights, from you under this License will not havetheir licenses terminated so long as such partiesremain in full compliance.

9. You are not required to accept this License,since you have not signed it. However, nothing elsegrants you permission to modify or distribute theLibrary or its derivative works. These actions areprohibited by law if you do not accept this License.Therefore, by modifying or distributing the Library(or any work based on the Library), you indicateyour acceptance of this License to do so, and allits terms and conditions for copying, distributingor modifying the Library or works based on it.

10. Each time you redistribute the Library (or anywork based on the Library), the recipientautomatically receives a license from the originallicensor to copy, distribute, link with or modifythe Library subject to these terms and conditions.You may not impose any further restrictions on therecipients' exercise of the rights granted herein.You are not responsible for enforcing compliance bythird parties with this License.

11. If, as a consequence of a court judgment orallegation of patent infringement or for any otherreason (not limited to patent issues), conditionsare imposed on you (whether by court order,agreement or otherwise) that contradict theconditions of this License, they do not excuse youfrom the conditions of this License. If you cannotdistribute so as to satisfy simultaneously yourobligations under this License and any otherpertinent obligations, then as a consequence you maynot distribute the Library at all. For example, if apatent license would not permit royalty-freeredistribution of the Library by all those whoreceive copies directly or indirectly through you,then the only way you could satisfy both it and this

Page 19: McAfee Profiler 1.0 Release Notes

License would be to refrain entirely fromdistribution of the Library.

If any portion of this section is held invalid orunenforceable under any particular circumstance, thebalance of the section is intended to apply, and thesection as a whole is intended to apply in othercircumstances.

It is not the purpose of this section to induce youto infringe any patents or other property rightclaims or to contest validity of any such claims;this section has the sole purpose of protecting theintegrity of the free software distribution systemwhich is implemented by public license practices.Many people have made generous contributions to thewide range of software distributed through thatsystem in reliance on consistent application of thatsystem; it is up to the author/donor to decide if heor she is willing to distribute software through anyother system and a licensee cannot impose thatchoice.

This section is intended to make thoroughly clearwhat is believed to be a consequence of the rest ofthis License.

12. If the distribution and/or use of the Library isrestricted in certain countries either by patents orby copyrighted interfaces, the original copyrightholder who places the Library under this License mayadd an explicit geographical distribution limitationexcluding those countries, so that distribution ispermitted only in or among countries not thusexcluded. In such case, this License incorporatesthe limitation as if written in the body of thisLicense.

13. The Free Software Foundation may publish revisedand/or new versions of the Lesser General PublicLicense from time to time. Such new versions will besimilar in spirit to the present version, but maydiffer in detail to address new problems or

Page 20: McAfee Profiler 1.0 Release Notes

concerns.

Each version is given a distinguishing versionnumber. If the Library specifies a version number ofthis License which applies to it and "any laterversion", you have the option of following the termsand conditions either of that version or of anylater version published by the Free SoftwareFoundation. If the Library does not specify alicense version number, you may choose any versionever published by the Free Software Foundation.

14. If you wish to incorporate parts of the Libraryinto other free programs whose distributionconditions are incompatible with these, write to theauthor to ask for permission. For software which iscopyrighted by the Free Software Foundation, writeto the Free Software Foundation; we sometimes makeexceptions for this. Our decision will be guided bythe two goals of preserving the free status of allderivatives of our free software and of promotingthe sharing and reuse of software generally.

NO WARRANTY

15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE,THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENTPERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISESTATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHERPARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTYOF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY ANDPERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THELIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALLNECESSARY SERVICING, REPAIR OR CORRECTION.

16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW ORAGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, ORANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTETHE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FORDAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL

Page 21: McAfee Profiler 1.0 Release Notes

OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE ORINABILITY TO USE THE LIBRARY (INCLUDING BUT NOTLIMITED TO LOSS OF DATA OR DATA BEING RENDEREDINACCURATE OR LOSSES SUSTAINED BY YOU OR THIRDPARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITHANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHERPARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES.

END OF TERMS AND CONDITIONSHow to Apply These Terms to Your New Libraries

If you develop a new library, and you want it to beof the greatest possible use to the public, werecommend making it free software that everyone canredistribute and change. You can do so by permittingredistribution under these terms (or, alternatively,under the terms of the ordinary General PublicLicense).

To apply these terms, attach the following noticesto the library. It is safest to attach them to thestart of each source file to most effectively conveythe exclusion of warranty; and each file should haveat least the "copyright" line and a pointer to wherethe full notice is found.

one line to give the library's name and an idea ofwhat it does. Copyright (C) year name of author

This library is free software; you can redistributeit and/or modify it under the terms of the GNULesser General Public License as published by theFree Software Foundation; either version 2.1 of theLicense, or (at your option) any later version.

This library is distributed in the hope that it willbe useful, but WITHOUT ANY WARRANTY; without eventhe implied warranty of MERCHANTABILITY or FITNESSFOR A PARTICULAR PURPOSE. See the GNU Lesser GeneralPublic License for more details.

You should have received a copy of the GNU Lesser

Page 22: McAfee Profiler 1.0 Release Notes

General Public License along with this library; ifnot, write to the Free Software Foundation, Inc., 51Franklin Street, Fifth Floor, Boston, MA 02110-1301USA

__________________________________________________________COPYRIGHT

Copyright (C) 2010 McAfee, Inc. All Rights Reserved.No part of this publication may be reproduced,transmitted, transcribed, stored in a retrievalsystem, or translated into any language in any formor by any means without the written permission ofMcAfee, Inc., or its suppliers or affiliatecompanies.

__________________________________________________________TRADEMARK ATTRIBUTIONS

AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE,GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEESECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD,PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE,SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELDare registered trademarks or trademarks of McAfee,Inc. and/or its affiliates in the US and/or othercountries. McAfee Red in connection with security isdistinctive of McAfee brand products. All otherregistered and unregistered trademarks herein arethe sole property of their respective owners.

__________________________________________________________LICENSE INFORMATION

LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATELEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOUPURCHASED, WHICH SETS FORTH THE GENERAL TERMS ANDCONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IFYOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE

Page 23: McAfee Profiler 1.0 Release Notes

ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATEDLICENSE GRANT OR PURCHASE ORDER DOCUMENTS THATACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVERECEIVED SEPARATELY AS PART OF THE PURCHASE (AS ABOOKLET, A FILE ON THE PRODUCT CD, OR A FILEAVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADEDTHE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OFTHE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALLTHE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THEPRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR AFULL REFUND.

V3.1.9