Help prevent viruses, remove spyware, block hackers and safeguard your personal information.

DellTM  understands that keeping your system safe is critical. We've partnered with the world's leading manufacturers of security software to provide you with affordable products to help guard your PC from the various threats that currently exist. With Internet threats on the rise, the right protection has never been more critical. However, McAfee®  together with DellTM  offer industry-leading software protection compatibility tested to work with your new DellTM  system. Your system will automatically ship with a McAfee® security software.

DellTM  recommends that you sign up now for one of the security subscriptions. It will give you peace of mind and you can stay protected against security related issues for up to three years. Purchasing security software with your computer purchase can help prevent your system from slowing down and ever being infected with many known viruses, and thus help reduce long term costs while helping protect your PC from prevalent threats.

Why Security Software?gizmo: Kids Safe OnlineRecommendationsDetailsGlossary

A Firewall basically acts as a security barrier between your computer or network and the Internet, preventing other computers from connecting to your computer (or your network) without permission and blocking anything it sees as a possible security breach.

A slang term for a computer enthusiast who attempts to gain unauthorized access to computer systems, typically for the purpose of stealing and corrupting data.

Unsolicited junk e-mail sent to large numbers of people to promote products or services.

Trojan Horse
A Trojan horse program is a malicious program that appears to be a benign application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.

A computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission. Some viruses attach to files so when the infected file executes, the virus also executes. Other viruses sit in a computer's memory and infect files as the computer opens, modifies or creates the files. Some viruses display symptoms, and some viruses damage files and computer systems, but neither symptoms nor damage is essential in the definition of a virus; a non-damaging virus is still a virus.

Worms are parasitic computer programs that replicate, but, unlike viruses, do not infect other computer program files. Worms can create copies on the same computer, or can send the copies to other computers via a network. Worms often spread via IRC (Internet Relay Chat).