Advertisement

Quick Links

User's Guide
PrivacyExpert 2003
Compute with confidence
www.acronis.com

Advertisement

Table of Contents
loading

Summary of Contents for ACRONIS PRIVACYEXPERT 2003

  • Page 1 User's Guide PrivacyExpert 2003 Compute with confidence www.acronis.com...
  • Page 2 Copyright © SWsoft, 2000-2002 All rights reserved. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder.
  • Page 3: Table Of Contents

    3.2.9 R ............38 ECENTLY OCUMENTS 3.2.10 W .................39 INDOWS 3.2.11 O ...............40 PENED AVED ILES ISTORY A. H .......... 41 PPENDIX IPING ALGORITHMS ... 41 NFORMATION WIPING ALGORITHMS FUNCTIONING PRINCIPLES ...... 42 LGORITHMS USED BY CRONIS RIVACY XPERT Acronis PrivacyExpert...
  • Page 4: Introduction

    ISP access passwords. Your every computer action is somehow registered by Windows. Only Acronis PrivacyExpert is the guaranteed solution to all these problems. Acronis PrivacyExpert thoroughly checks Windows sections for evidence of user activity and completely removes and obliterates it.
  • Page 5 A user regularly using Acronis PrivacyExpert to clean up their computer can be sure that personal data as well as information about Internet activity is only presented in resources (files) that he/she controls. Confidential data threats: who and what to protect from There are three types of threats to your confidential data (user’s personal...
  • Page 6 Software use conditions The conditions of Acronis PrivacyExpert use are listed in the supplied «License Agreement». To be able to prove that you legally purchased and use Acronis PrivacyExpert, you receive a registration card along with the package.
  • Page 7 Technical support Users that have legally purchased and registered their copy of Acronis PrivacyExpert receive free technical support from Acronis. If you have problems installing or using the system that you cannot be resolve with the help of this Guide and file, please e-mail technical support.
  • Page 8: Chapter 1. Installing And Starting To Work With Acronis Privacyexpert

    PrivacyExpert files to the hard disk, you must to re-boot your PC. Recovering Acronis PrivacyExpert If Acronis PrivacyExpert was damaged during installation or execution, run its installation program again. The software will determine that Acronis PrivacyExpert has already been installed to your PC and ask if you want to recover (update) or completely remove it from the disk.
  • Page 9: Removing The System

    1.6.1 The Acronis PrivacyExpert Main Window Acronis PrivacyExpert is controlled from the main window. It is shown on the screen after selecting Acronis PrivacyExpert from the PrivacyExpert Programs menu. The Acronis PrivacyExpert main window is a Windows dialog box split into two parts: •...
  • Page 10: Logical Software Organization: Sections

    (2) clean-up separate system components. Complex PC clean-up In the One Click Clean-up section, shown by default in the right part of the Acronis PrivacyExpert main window, users have access to icons of three predefined complex PC clean-up. If you need to perform: 1.
  • Page 11: Executing Pc Clean-Up Manually

    Clean-up Settings Clean-up settings By changing clean-up settings, you can set Acronis PrivacyExpert for your personal needs. For example, you can select an algorithm of guaranteed data destruction that suits your needs by speed and reliability; enter the type of...
  • Page 12 This will enable Acronis PrivacyExpert to clean your PC at maximum speed and performance. Settings are described below. Clean-up settings editor Having selected a clean-up variant by mouse-clicking from the right part of the Acronis PrivacyExpert main window, and then Properties from the sidebar Edit list, you invoke the settings editor.
  • Page 13 3. to save your settings click . To discard changes click Apply Cancel If you need to restore Acronis PrivacyExpert default clean-up settings: 1. select the component tree root – Settings; 2. in the right part of the editor click Restore Defaults...
  • Page 14: Separate Components Clean-Up Settings

    Having selected a specific component to clean from the editor, you open the list of its clean-up settings. Each component to clean has several settings in Acronis PrivacyExpert (from 1 to 3 depending on a component). Below are settings common for a number of components. Specific settings of separate components are described in the Chapter 3 «Separate PC Components...
  • Page 15 Entering the Internet addresses list, you can browse files (visited pages) selected according to the list. To do this click . You will see Show URLs the window with selected addresses. They will be deleted during the selected component clean-up. Acronis PrivacyExpert...
  • Page 16 – the selection of data destruction algorithms. Selecting a data destruction algorithm Mouse-clicking the drop-down list in the right part of the editor, you will see all data destruction algorithms available in Acronis PrivacyExpert. Chapter 1 : Installing and Starting to Work with Acronis PrivacyExpert...
  • Page 17 (see A.2 «Algorithms Used by Acronis PrivacyExpert »). «Files» setting The «Files» setting provides temporary file names to clean with Acronis PrivacyExpert (from Windows Recycle Bin and from system and user folders) and can be used with a search string.
  • Page 18 As a result files read!.txt, read1.txt, read2.txt, etc. will be deleted, while read.doc, readme.doc, etc. will remain. Entering filenames, you can browse the files selected by Acronis PrivacyExpert. To do this click . You will see a window containing selected files.
  • Page 19 As a result all computer search strings will be deleted from the registry. «Computers» setting Upon entering the «Computers» setting value, you can browse the search strings in the registry selected by Acronis PrivacyExpert. To do this click . You will see the window with full and partial computer Show Computers names searched for in the network.
  • Page 20: Executing Scheduled Pc Clean-Up

    Acronis PrivacyExpert features a built-in scheduler. Invoking the scheduler Having mouse-clicked a clean-up variant in the right part of the Acronis PrivacyExpert main window, and selected Schedule in the sidebar Clean-up list, you invoke the scheduler. You can also do this by selecting a clean-up variant and Clean-up Schedule from the main menu.
  • Page 21: Renaming Clean-Up Variants

    If you want to rename a PC (or separate component) clean-up variant you can do this by following one of these methods: 1. mouse-clicking Rename on the sidebar; 2. selecting Clean-up Rename from the main menu; 3. selecting Rename from the context menu of a PC (component) clean-up variant. Acronis PrivacyExpert...
  • Page 22: Data Clean-Up Algorithms

    Appendix A «Hard Disk Wiping algorithms». There you will also find information on the number of hard disk passes, provided by each algorithm, and numeric chains written in the process (see A.2 «Algorithms Used by Acronis PrivacyExpert »). Chapter 1 : Installing and Starting to Work with Acronis PrivacyExpert...
  • Page 23: Chapter 2. Complex Pc Clean-Up

    PC activity. Vice versa, if you need to clean-up only a specific Windows component, for example, last visited Internet pages, you should use one of the Acronis PrivacyExpert sections, described below (see Chapter 3 «Separate PC Components Clean-up»). Separate component clean-up is faster than any variant of complex PC clean-up.
  • Page 24: System Clean-Up

    System clean-up can be executed by mouse-clicking the clean-up variant in the right part of the main window (for other execution methods see sections 1.6.3, 1.6.6). For detailed descriptions of what Acronis PrivacyExpert performs in every specific case see Chapter 3. Internet Clean-up If you need to wipe the evidence of your Internet activity, use Internet clean- up.
  • Page 25: Chapter 3. Separate Pc Components Clean-Up

    (of for example a swap file). The following chapters are generally meant for experienced PC/Windows users who are interested in actions that Acronis PrivacyExpert can perform in specific cases. Various execution and set-up capabilities of PC and separate components clean-up variants of Acronis PrivacyExpert are described in detail above (see 1.6.3, 1.6.6 and 1.6.4).
  • Page 26: Internet Cache

    3.1.1 Internet Cache Internet cache clean-up deletes files downloaded during browsing/surfing Internet pages. As you surf the Internet, your browser keeps («caches») the content of pages you visited in a special folder on a hard disk. This Internet cache folder contains web pages (HTML files), including text and graphics (in JPEG and GIF graphic files).
  • Page 27: Cookies

    Acronis PrivacyExpert enables you to delete unnecessary cookies. You can keep the cookies you need, as Acronis PrivacyExpert can choose what cookies to delete and what to leave safe. What cookies are unnecessary and what is their threat? In the aggregate cookies can provide full traces of where and how you surfed the Internet.
  • Page 28: Downloaded Components

    1. select Cookies from the Internet Clean-up group; 2. select «Protected Cookies»; check boxes near cookies you want to keep after PC or separate components clean-up. Fully cleaning your PC, Acronis PrivacyExpert will destroy all cookies except those protected. «Protected Cookies» setting 3.1.3...
  • Page 29 ActiveX element from a dubious site, Acronis PrivacyExpert will help you to delete it from your hard disk drive. You can control downloads of ActiveX elements to your hard disk to a certain extent by setting an appropriate security level for Internet access. Still, it is nearly impossible to fully control all ActiveX elements.
  • Page 30: Last Visited

    3.1.4 Last Visited Pages Last Visited Pages clean-up deletes lists of separate Internet addresses for selected installed browser according to «Address» values. To provide faster access, Internet Explorer shows visited addresses in the Address list and History journal. Internet Explorer’s last visited addresses Internet Explorer stores lists differently depending on the page visiting method –...
  • Page 31 Netscape Navigator (Mozilla) keeps similar lists as well, located in the browser folders. Acronis PrivacyExpert cleans all visited Internet address lists whether they were manually typed or clicked. Note that site address can be typed into the Open field of the Run window, invoked from the Start menu.
  • Page 32: System Components

    Windows Recycle Bin, represented by an icon on the desktop and as a folder in Explorer, is actually a number of system folders located on your logical PC disk. Acronis PrivacyExpert completely cleans every system folder.
  • Page 33: Hard Disks Free Space

    Please note the above list is far from complete. Besides temporary files clean-up Acronis PrivacyExpert offers to clean your user folders and files (described further), deleting all temporary files from folders on any connected disks according to the provided «Files» value.
  • Page 34: Custom Folders/Files

    «Files» setting value and the user folder list to clean. To select a list of folders and files to clean with Acronis PrivacyExpert:: 1. select Custom Folders/Files List; 2. select «Folders/Files» setting and add the folders and files to destroy clicking in the right part of the editor window.
  • Page 35: Registry Back-Ups

    So user data – last visited pages lists, files or computers search lists, etc. -- are stored not only in the registry, but also in its back-up copy. If you clean-up the user data stored in the registry with Acronis PrivacyExpert and re-boot the PC, Windows will automatically create a back- up copy without traces of your PC activity.
  • Page 36: Find Computers List

    Registry back-up copies clean-up under Windows 95/98/Me 3.2.7 Find Computers List Find computers list clean-up deletes it from the Windows registry. A search string may contain a full computer name, including its domain name, but can also be a partial computer name. Find computer strings stored in the registry Windows Explorer performs various file system navigation functions.
  • Page 37: Find Files List

    Windows registry. A file string may contain a full filename, including its path, or just a partial name. Find files strings stored in the registry In most cases you can simply specify «Computers» value as *.* to wipe the entire find computers list. Acronis PrivacyExpert...
  • Page 38: Recently Used Documents List

    3.2.9 Recently Used Documents List Recently used documents list clean-up deletes the list of documents, recently opened by a user during PC activity. Selecting Documents from the Start menu you will find that Windows shows recently executed or opened files. These can be images viewed, Excel tables, MP3 or WAV sound files, etc.
  • Page 39: Windows Run List

    (application), open file or connect to the selected site. Windows keeps a history of your actions. You can see this by opening the Open list. Acronis PrivacyExpert completely wipes it, deleting names of files and folders accessed by the user.
  • Page 40: Opened/Saved Files History

    Performing the PC clean-up, Acronis PrivacyExpert will destroy the opened/saved file history according to the provided «Files» value. Chapter 3 : Separate PC Components Clean-up...
  • Page 41: Appendix A. Hard Disk Wiping Algorithms

    Algorithms offered by national standards provide (single or triple) recording of random symbols to disk sectors that are straightforward and arbitrary decision, in general, but still acceptable in simple situations. The most effective information wiping algorithm based on deep analysis of subtle Acronis PrivacyExpert...
  • Page 42: Algorithms Used By Acronis Privacyexpert

    Algorithms Used by Acronis PrivacyExpert The table below briefly describes information wiping algorithms used by Acronis PrivacyExpert. Each description features the number of hard disk sector passes along with number(s) written to each sector byte. The description of built-in information wiping algorithms...
  • Page 43 Bruce Schneier offers seven pass algorithm overwriting algorithm in his Applied Cryptography book. 1 pass – 0xFF, pass – 0x00, and then five times with a cryptographically secure pseudo-random sequence. Fast Logical zeros (0x00 numbers) to all sectors to wipe. Acronis PrivacyExpert...

Table of Contents