Table of Contents
INTRODUCTION............................................................................................................................... 6
Software use conditions........................................................................................................ 7
Technical support.................................................................................................................. 8
1.1
System requirements.................................................................................................. 9
1.2
1.3
1.3.1
Usernames and passwords .................................................................................................. 9
1.3.2
Firewall setup ..................................................................................................................... 10
1.4
License policy ........................................................................................................... 10
1.5
1.6
1.7
1.8
1.9
1.10
14
2.1
Getting started .......................................................................................................... 14
2.2
2.3
3.1
3.2
3.3
Spyware removal...................................................................................................... 17
3.3.1
3.3.2
3.3.3
Selecting scanning mode ................................................................................................... 18
3.3.4
Spyware Removal Script .................................................................................................... 19
3.4
3.4.1
3.4.2
3.4.3
3.4.4
3.5
Quarantine................................................................................................................ 22
3.6
Using the Log ........................................................................................................... 23
4.1
4.2
4.2.1
General options .................................................................................................................. 26
4.2.2
Advanced options............................................................................................................... 27
4.2.3
Remembered events .......................................................................................................... 27
4.2.4
4
Copyright © Acronis, Inc., 2000-2005