I ignored both these settings, which default to being turned off in any case.
With as the primary web browser, popups have not been a problem on the test machine for some time.
During this configuration process the machine is isolated from any network connections, thus protecting the user during a potentially vulnerable period.
As noted in the splash screen, the configuration process may be aborted at any time, resulting in the default security settings being applied.
Any user completing the registration will, by default, be subjected to four different streams of email information – a service which I would have preferred to actively opt into, rather than out of.
Rather than subject this registration page to even more abuse, however, rebooting to complete installation seemed a wise option.
) has been one of the lesser-known giants of the security software industry for a number of years – its products in this field being overshadowed both by other enterprise offerings and by boardroom antics.
In the past, ) combines several products within one package, the applications within it each being available as standalone purchases.
The updates seemed to take longest at this stage – perhaps not surprising given the relative size of the applications.The level of interactivity during the installation procedure so far is not exactly great.This seeming oversight is dealt with by the Configuration Wizard which now appears.This is one of the more irritating ways of supplying demonstration software.On principle I would usually steer well clear of such demonstration versions.