Você está na página 1de 9

<<USE COURIER REGULAR 10 FONT IF YOU WOULD LIKE TO PRINT THIS DOCUMENT>>

Trend Micro, Inc. October 27, 2009


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Trend Micro(TM) USB Security
Version 1.5
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Note: Trend Micro considers this file current as of the date above.
However, you should check the Trend Micro website for any
documentation updates:
http://www.trendmicro.com/download/

Contents
=====================================================================
1. About Trend Micro(TM) USB Security
2. What's New
3. Documentation Set
4. System Requirements
4.1 Compatible Microsoft Operating Systems
4.2 CPU
4.3 Memory, Computer Disk Space, USB Storage Space, and Monitor
4.4 Web Browsers
4.5 Trend Micro Software Capable of Sharing Security Updates
4.6 Internet Connection
5. Activation
6. After Activation
7. Restoring Trend Micro USB Security
8. Known Issues
9. Contact Information
10. About Trend Micro
11. License Attributions
=====================================================================

1. About Trend Micro(TM) USB Security


========================================================================
Trend Micro(TM) USB Security protects against malicious software in
files transferred to your USB drive.
2. What's New
========================================================================
This version of Trend Micro USB Security includes the
following features:
a. Trend Micro USB Security prevents autorun.inf from performing the
"open" or "shellexecute" tasks on unfamiliar malicious software.
b. Even before fully launching the feature that protects against
viruses, Trend Micro USB Security can prevent viruses from
replicating.
c. After attaching the USB drive to a computer connected to the
Internet protected by Trend Micro security software (such as
Trend Micro OfficeScan, the Trend Micro Client/Server/Messaging
Suite, Worry-Free Business Security (Advanced), or Trend Micro
Internet Security), Trend Micro USB Security can automatically
determine the best source to retrieve the latest security update.
d. Trend Micro USB Security now includes a license checking system
and supports upgrades from a trial version to the full version.
e. The interface of Trend Micro USB Security can now switch between
several different languages.
f. Trend Micro USB Security now fully supports Microsoft Windows 7.

3. Documentation Set
========================================================================
a. This README.txt file contains basic installation and configuration
instructions, a list of known issues, and contact information.
b. The Trend Micro Knowledge Base provides you with a searchable
database of known product issues, including specific problem
solving and troubleshooting topics.
http://esupport.trendmicro.com/support/consumer/submitonline.do
Note: You can download electronic versions of printed manuals from
the Trend Micro website:
http://www.trendmicro.com/download

4. System Requirements
========================================================================
To run Trend Micro USB Security, your computer must meet these
hardware and software specifications:
4.1 Compatible Microsoft Operating Systems
=====================================================================
a. Windows 7 Ultimate, Professional, Home Premium, Home Basic,
or Starter
b. Windows Vista Ultimate, Business, Home Premium, or Home Basic
with Service Pack 1 (SP1) or Service Pack 2 (SP2)
c. Windows XP Home or Professional Edition with Service Pack 2
(SP2) or Service Pack 3 (SP3)
d. Windows XP Media Center Edition 2005 with Service Pack 2
(SP2) or Service Pack 3 (SP3)
e. Windows XP Tablet PC Edition 2005 with Service Pack 2
(SP2) or Service Pack 3 (SP3)
f. Windows 2000 Professional, Server or Advanced Server with
Service Pack 4 (SP4)
g. Windows Server 2003 (or R2) Standard, Enterprise,
or Datacenter with Service Pack 1 (SP1)
Note: Trend Micro USB Security supports the 32-bit and
64-bit versions of all editions of Windows Vista and
Windows 7 named above. It also supports the 64-bit
edition of Windows XP Professional.

4.2 CPU
=====================================================================
a. Windows 7 Starter, Home Basic, Home Premium, Professional,
Ultimate, or Enterprise (32-bit or 64-bit)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Intel Pentium 1GHz (2GHz for 64-bit versions)
b. Windows Vista Home Basic, Home Premium, Business, or Ultimate
(32-bit or 64-bit)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Intel Pentium 800MHz (1GHz recommended)
c. Windows XP Home, Professional, Media Center or Tablet PC
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Intel Pentium 350MHz
d. Windows 2000 Professional, Server, or Advanced Server
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Intel Pentium 133MHz (or faster processor)
e. Windows Server 2003 (or R2) Standard, Enterprise, or
Datacenter (32-bit or 64-bit)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Intel Pentium 800MHz (1GHz recommended)
Note: Trend Micro USB Security can support computers with
processors equivalent to those listed above, as well as
Intel Hyper-Threading and dual core processors.

4.3 Memory, Disk Space, USB Storage Space, and Monitor


=====================================================================
a. Memory
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2GB minimum for Windows 7 (64-bit)
1GB minimum for Windows 7 (32-bit)
512MB minimum (1GB recommended) for Windows Vista
or Windows Server 2003
256MB minimum (512MB recommended) for Windows XP
128MB minimum (256MB recommended) for Windows 2000
or Advanced Server
b. Computer Disk Space
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
64MB available for intermediate files
c. USB Storage Space
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
128MB available for pattern files
d. Monitor
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
800 x 600 (SVGA) minimum with high color

4.4 Web Browsers


=====================================================================
Microsoft Internet Explorer 6.0 with Service Pack 2 (SP2)
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 8.0

4.5 Trend Micro Software Capable of Sharing Security Updates


=====================================================================
To save time and avoid burdening your Internet connection,
Trend Micro USB Security can share security updates downloaded
by the following Trend Micro software:
a. Trend Micro Internet Security (Pro) 2008, 2009, and 2010
b. Trend Micro OfficeScan 7, 8, and 10
c. Trend Micro Client/Server and Client/Server/Messaging
Security for SMB 5 and 7
d. Trend Micro Worry-Free Business Security 5 and 6
e. Trend Micro AntiVirus plus AntiSpyware 2008, 2009, and 2010

4.6 Internet Connection


=====================================================================
Trend Micro USB Security needs an Internet connection for
activating online, checking the expiration date, downloading
updates, obtaining virus information, or browsing pages on the
Trend Micro website.
If you have a dial-up or other connection to the Internet that
charges fees per connection, by the amount of time connected or
for the amount of data downloaded, make sure your router or
connection software does not automatically start a connection
to support the features listed above to avoid extra connection
fees. Follow your router's instructions to edit your router
settings as required.

5. Activation
========================================================================
Trend Micro USB Security will usually open a window to activate the
software when you first plug the USB drive into a computer. However,
the window does appear automatically, just follow the steps below:
a. Connect the USB drive to your computer and double-click the
Launcher.exe program stored on the USB drive.
b. Accept the license agreement, then click the "OK" button.
c. Click "Finish" to close the confirmation window.

6. After Activation
========================================================================
To ensure that Trend Micro USB Security provides you with the latest
protection, complete the following tasks.
a. Click the Trend Micro USB Security icon on the system tray at the
bottom of your Microsoft Windows desktop.
b. Click the "Update" button.

7. Restoring Trend Micro USB Security


========================================================================
If you must replace your USB drive before Trend Micro USB Security
has expired, you can restore the full version of the software by
following the steps below.
a. Click the Trend Micro USB Security icon in the system tray at the
bottom of your Microsoft Windows desktop, and select "About" from
the list that appears.
b. Click the "Click here" link in the "Subscription Expired" section.
d. Enter your email address and password in the restore window.
e. Choose an activation date to restore the full license.

8. Known Issues
========================================================================
This release has the following known issues:
a. Trend Micro USB Security will not immediately scan for malicious
software in files restored from the hidden quarantine folder.
b. Trend Micro USB Security can only find security threats
recognized by the VSAPI engine and the LPT$VPN pattern.
c. If using Trend Micro USB Security with a computer protected by
other security software, the other software may detect some
infected files before they can move to the USB drive.
d. When dealing with a large file, Trend Micro USB Security will
wait until the file has finished transferring to the USB drive
before starting to scan it.
e. If Trend Micro USB Security has not finished checking for threats
when the computer connected to the USB drive shuts down, locks
up, or hibernates, any unscanned files will not be checked later.
In this case, security threats might remain on the USB drive
the next time you plug it into a computer, when Trend Micro USB
Security will run another scan.
f. Trend Micro USB Security can only protect the USB drive when
attached to a computer running a supported Microsoft Windows
operating system. If you plug the USB drive into a computer
running another operating system (like MacOS or LINUX), then
Trend Micro USB Security cannot quarantine risky files or
download updates.
g. Trend Micro USB Security does not support the NTFS file format.
h. You must use the "Safely Remove Hardware" option from the
Microsoft Windows system tray before unplugging the USB drive
protected by Trend Micro USB Security. Neglecting this step
could disrupt your protection or cause problems with your files.

9. Contact Information
========================================================================
A license to Trend Micro software usually includes the right to
product updates, pattern file updates, and basic technical support
for one (1) year from the date of purchase only. After the first
year, you must renew Maintenance on an annual basis at Trend Micro's
then-current Maintenance fees.
Contact Trend Micro via fax, phone, and email, or visit our website
to download evaluation copies of Trend Micro products.
http://www.trendmicro.com
Global Mailing Address/Telephone numbers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For global contact information in the Asia/Pacific region, Australia
and New Zealand, Europe, Latin America, and Canada, please refer to:
http://www.trendmicro.com/en/about/overview.htm
When the Trend Micro "About Us" screen displays, click the
appropriate link in the "Contact Us" section of the screen.
Note: This information is subject to change without notice.

10. About Trend Micro


========================================================================
Trend Micro, Inc. provides virus protection, anti-spam, and content-
filtering security software and services. Trend Micro helps customers
worldwide stop malicious code from harming their computers.
Copyright 2009, Trend Micro Incorporated. All rights reserved.
Trend Micro, Trend Micro USB Security, Trend Micro Internet Security,
Trend Micro Internet Security Pro, Trend Micro OfficeScan, Trend
Micro Client/Server, Trend Micro Client/Server/Messaging Security,
Worry-Free Business Security, and Trend Micro AntiVirus plus
AntiSpyware are trademarks of Trend Micro Incorporated and
registered in some jurisdictions. All other marks are the
trademarks or registered trademarks of their respective companies.

11. License Attributions


========================================================================
This product includes or may include the following:
OpenSSL License Agreement
====================================================================
OpenSSL License
--------------------------------------------------------------------
Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in
the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this
software must display the following acknowledgment:
"This product includes software developed by the OpenSSL Project
for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be
used to endorse or promote products derived from this software
without prior written permission. For written permission, please
contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL"
nor may "OpenSSL" appear in their names without prior written
permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following
acknowledgment:
"This product includes software developed by the OpenSSL Project
for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS" AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
====================================================================
This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com). This product includes software written by Tim
Hudson (tjh@cryptsoft.com).
Original SSLeay License
-----------------------
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
All rights reserved.
This package is an SSL implementation written
by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long
as the following conditions are adhered to. The following conditions
apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code. The SSL documentation
included with this distribution is covered by the same copyright
terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices
in the code are not to be removed.
If this package is used in a product, Eric Young should be given
attribution as the author of the parts of the library used.
This can be in the form of a textual message at program startup or
in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer
in the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this
software must display the following acknowledgement:
"This product includes cryptographic software written by
Eric Young (eay@cryptsoft.com)"
The word 'cryptographic' can be left out if the rouines from
the library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative
thereof) from the apps directory (application code) you must
include an acknowledgement: "This product includes software
written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND WITHOUT ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
The licence and distribution terms for any publically available
version or derivative of this code cannot be changed. i.e. this
code cannot simply be copied and put under another distribution
licence [including the GNU Public Licence].
Zlib License Agreement
===================================================================
Copyright (C) 1995-2004 Jean-loup Gailly and Mark Adler
This software is provided 'as-is', without any express or implied
warranty. In no event will the authors be held liable for any
damages arising from the use of this software.
Permission is granted to anyone to use this software for any
purpose, including commercial applications, and to alter it and
redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must
not claim that you wrote the original software. If you use this
software in a product, an acknowledgment in the product
documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must
not be misrepresented as being the original software.
3. This notice may not be removed or altered from any source
distribution.

Você também pode gostar